Page 1,450«..1020..1,4491,4501,4511,452..1,4601,470..»

Legislator revives effort to address police radio encryption – Pleasanton Weekly

After falling just short in the final days of last year's legislative session, Sen. Josh Becker is renewing his push for a law that would require law enforcement agencies to make radio communications accessible to the media.

Becker, D-San Mateo, has recently introduced Senate Bill 719, a bill that would require all police departments to grant access to real-time radio communications to media representatives or organizations. The bill, which he calls the Law Enforcement Communications Transparency Act, is similar in its intent to last year's Senate Bill 1000, which faltered last August when the powerful Assembly Appropriations Committee opted not to advance it for a full Assembly vote.

There are, however, some differences between the two bills. While last year's proposal would have required law enforcement agencies to grant access to the broader public, the current one would ensure access for "duly authorized media representatives or organizations." If SB 719 passes, police departments would have 30 days to comply with a media request for access to real-life radio communications.

The bill is a response to a recent trend across California of police and sheriff departments encrypting radio communications, a move that blocks news organizations from using scanners to track police activities. Many of these agencies, including Palo Alto and Mountain View, were responding to an October 2020 directive from the state Department of Justice, requiring them to enact procedures that protect sensitive personal information such as an individual's Social Security number and criminal history from being broadcast over publicly accessible frequencies. The state DOJ allowed departments to either encrypt communications or adopt policies that protect personal information.

News organizations, including Embarcadero Media, had opposed law enforcement's switch to encryption, arguing that it reduces transparency and impedes their ability to provide information to the public during emergencies. Numerous law enforcement agencies opposed the bill and claimed that undoing their recent efforts to encrypt radio communications would be costly. A spokesperson for the Riverside County Sheriff's Office told an Assembly committee that removing encryption would cost the department "several millions of dollars" and thousands of hours.

That argument did not hold true in Palo Alto, where the police department encrypted radio communications in January 2021 but then reversed that decision last August, when Andrew Binder took over as police chief. Instead of encryption, the department adopted a new radio policy that gives officers various options for securely transmitting personally identifiable information. These include using their cellphones for that purpose or using multiple broadcasts to relay bits of information that, if considered together, could be used to identify an individual.

Former Palo Alto Police Chief Bob Jonsen, who opted to encrypt the city's radio communications, has since been elected to serve as sheriff at Santa Clara County, where encryption remains in place.

Becker said the goal of the new bill is to "restore access the media and the public had to police radio communications for nearly a century up until three years ago when law enforcement agencies were given the option to shut it down."

Becker said that since the DOJ directive, about 100 law enforcement agencies across the state have gone with full encryption, a number that he noted is climbing. The list includes large countywide agencies such as the sheriff's departments in Santa Clara, Riverside, Orange and San Bernardino counties.

SB 719 would not apply to tactical operations, undercover operations or "other communications that would unreasonably jeopardize public safety or the safety of officers or dispatchers if made public," according to the bill's text.

"Encryption of public safety radio communications has largely focused on its impact to public safety officers without consideration of the public's vested interest," the bill states. "This bill seeks to correct that imbalance by continuing to protect sensitive information from public distribution while also ensuring the transparency of non-sensitive communications that Californians have come to expect."

Becker said in a statement that the ability to hear how officers talk to one another over the radio helps make police departments more accountable.

"On a practical level, it also makes it easier for the media to report on public safety activities such as accidents or shootings, so the public can be told about areas to avoid."

The bill is scheduled for a hearing in front of the Senate Public Safety Committee on March 28.

Read more:
Legislator revives effort to address police radio encryption - Pleasanton Weekly

Read More..

Focus where the value is with data science – The Australian Financial Review

Tong says this is a challenge for data science teams across every sector of the Australian economy.

Ada Tong, Product Director at Domain Insight.Actuaries Institute

Data sources are vast and complex and, in some cases, havent been used before. Were at the cusp of an explosion in machine-generated data egged on by widespread adoption of connected apps and devices, so its an incredibly exciting time, but that means nothing unless the right data is directed to solve the most important problems.

As actuaries working in data science, our job is to turn data into something an organisation can interpret rapidly and confidently make decisions that deliver better experiences for the people it serves, she says.

Tongs team harnesses a massive volume of data, including buyer behaviour on their app and portal illuminating leading indicators of property market dynamics at a micro market level. Thats critical information for all parties involved on both the buying and financing sides of the equation.

It may just be the perfect use-case for an actuary to aid disparate parties engage with more confidence in Australias largest, most scrutinised and, most emotionally charged asset classes.

Understanding the whole ecosystem and being able to navigate its complexities has been crucial to serving up the most valuable insights possible from our data. The actuarial training teaches us to start with a clear understanding of the market, the customer and the business problem and then work back to a focused solution she says.

More broadly, she says Domain Insights data provides a unique perspective on how people approach refinancing, renovation or borrowing decisions, and how lenders value the funding of those decisions.

As well as planning, local and state governments use the data to scope future infrastructure needs and ensure property-based levies are collected on a fair and accurate basis.

Its incredibly empowering to help so many different parties make better decisions in a complex and dynamic property market, says Tong.

They say information is power and I tend to agree with that we cant eliminate uncertainty altogether but the right insights can certainly reduce it, and Im proud of the role we play in democratising access to high quality property data.

Tongs Domain Insight experience is just one example of actuaries helping businesses right across the economy break new ground with data in sectors ranging from health to retail, financial services to agriculture, and, perhaps most pertinently, solutions to climate change.

Elayne Grace, CEO of the Actuaries Institute of Australia, says almost every business process can be improved through the intelligent deployment of data.

Elayne Grace, CEO of the Actuaries Institute.Actuaries Institute

Actuaries are at the forefront of innovation in Australias most exciting start-ups, disruptors, and established businesses, says Grace.

They help businesses understand their customers as individuals, leveraging data to personalise products, pricing, and experiences.

They also help supply chain managers move things from farm, mine, factory, or warehouse to sale as quickly and efficiently as possible.

Actuaries are also modelling climate risk, determining where to invest, base agriculture and build communities over coming decades, she says.

One of the areas where data science is having a huge impact is public health, both in terms of improving services and enhancing efficiency.

Actuaries were prominent advisors to government during the pandemic, projecting infection rates and modelling the potential impact of the available policy settings, she says.

In insurance, meanwhile, they use techniques including natural language processing to get claims to the right assessor as quickly as possible and scrutinise remediation quotes from repairers to make sure theyre fair.

Grace says that when businesses hire an actuary, they hire someone who is rigorously trained in the technical, commercial, and innovation skills needed to succeed in data science.

Humans, and increasingly machines, are producing more data than ever before. But more data only means more in the right hands, she says.

Great data scientists can come from a wide range of backgrounds, but when you hire an actuary know they are rigorously trained in the technical, commercial and innovation skills needed to succeed in data science.

We are trained to start with the commercial problem and work back, and thats absolutely key. Theres no point creating a theoretically perfect solution if it doesnt work in the real world.

Many leading businesses across every sector of the Australian economy have actuaries making a significant contribution, says Grace.

Actuaries are making a difference in respected tech businesses like Canva and Domain, leading data science consultancies like Quantium, Deloitte, and Taylor Fry.

CBA, Telstra, and Woolworths are forming long-term partnerships with consultancies because they want to access data science talent that would be hard to hire direct, says Grace.

She says the key to actuarial advice is not recommending a solution that a business doesnt have the capacity to execute.

Thats why commerciality is so important, she says.

You can distract a business and destroy a lot of value by creating a solution a company doesnt have the technology, people or culture to deliver. The role of the actuary is to define a solution that delivers the commercial outcome in the real world.

And the rewards? Real-world data science solutions to your most urgent commercial challenges, always delivered with the highest ethical standards.

Grace says our actuaries are only at the tip of the iceberg in terms of the problems data science and AI can solve.

In addition to helping established businesses, our members are starting and scaling new businesses from the ground up, applying their skills to brand new problems, says Grace.

Its only going to accelerate from here.

With the revolution in IoT and sensors, were at the early stages of an explosion of machine generated data that promises to transform supply chains across the economy making them highly responsive to the needs of consumers and with enormous environmental and social dividends.

Its an incredibly exciting time.

To learn more, visit http://www.dodatabetter.com.au.

Read the original post:

Focus where the value is with data science - The Australian Financial Review

Read More..

WhatsApp Tells UK Government It’s Still Not Willing To Undermine … – Techdirt

from the don't-make-me-tap-the-sign dept

The UK government is entertaining even more plans to undermine (or actually outlaw) end-to-end encryption. And its not gaining any support from the multiple services (and multiple people) these efforts would harm.

Both Signal and Proton have made it clear theyll pull their services rather than weaken their encryption to comply with UK government demands. WhatsApp is saying the same thing telling the UK government something it has already told it at least twice.

In 2017, WhatsApp made an unofficial announcement of its policies when UK law enforcement showed up with a demand to compel decryption of a targeted account. WhatsApp refused to comply and the UK government apparently decided not to press the issue. At least not directly.

Five years later, the UK government is still hammering away at encryption, adding more mandates to its steadily simmering Online Safety Bill. And WhatsApp told the UK government what it told it back in 2017: breaking encryption just isnt an option. (In the form of a lawsuit challenging an Indian law, WhatsApp said the same thing to the Modi administration and its series of rights-violating internet-related laws.)

Another year has passed and the UK government still wants to get the Online Safety Bill passed. And, once again, Meta has surfaced to tell the government that it can pass all the laws it want, but none of them will force WhatsApp to undermine its encryption.

WhatsApp would refuse to comply with requirements in the online safety bill that attempted to outlaw end-to-end encryption, the chat apps boss has said, casting the future of the service in the UK in doubt.

Speaking during a UK visit in which he will meet legislators to discuss the governments flagship internet regulation, Will Cathcart, Metas head of WhatsApp, described the bill as the most concerning piece of legislation currently being discussed in the western world.

The UK government doesnt have any leverage here. WhatsApp will simply stop offering its service in the UK. As Cathcart points out, 98% of its users reside in other countries. And theres no reason it should put all of its users at risk, just because the home to 2% of its user base is being stupid about end-to-end encryption.

Now, that 2% would probably like to have access to an encrypted messaging service, whether its WhatsApp, Signal, or Protons offering. Unfortunately for them, supporters of the bill dont want them to have these options. But thats not going to work out well for the government. Angering constituents tends to shift the leverage back their way, which means legislators are pushing a terrible bill from a position of weakness.

The potential for hefty fines only makes it more likely service providers will exit this market rather than give the government what it wants.

Under the bill, the government orOfcomcould require WhatsApp to apply content moderation policies that would be impossible to comply with without removing end-to-end encryption. If the company refused to do, it could face fines of up to 4% of its parent company Metas annual turnover unless it pulled out of the UK market entirely.

If the options are providing a weakened service that harms all users or shelling out 4% of its income on a regular basis, the option these legislators failed to consider is really the only intelligent option: exiting the market.

And when that starts happening, the government is going to get an earful from the people it never bothered to listen to in the first place: domestic users of services these legislators are actively trying to destroy.

Filed Under: encryption, online safety bill, ukCompanies: meta, whatsapp

See the rest here:
WhatsApp Tells UK Government It's Still Not Willing To Undermine ... - Techdirt

Read More..

Rancho Biosciences Welcomes Regeneron as the Newest Member … – AccessWire

SAN DIEGO, CA / ACCESSWIRE / March 21, 2023 / Rancho Biosciences, a leading data sciences services company, is pleased to announce that Regeneron has become the latest Member to join its Single Cell Data Science (SCDS) pre-competitive consortium, along with existing Members: BenevolentAI, Bristol Myers Squibb, Janssen Research & Development, LLC, part of the Janssen Pharmaceutical Companies of Johnson & Johnson, Novartis and Vesalius Therapeutics.

The mission of the SCDS consortium is to find a common industry standard around how single cell datasets are created and formatted by a systematic effort to develop data models and ensure that public data are curated in a consistent way. Due to the undeniable impact of single cell transcriptomics technology on drug discovery, there continues to be an exponential growth in the use of single cell sequencing methods by pharmaceutical companies. The availability of ever-increasing amounts of single cell datasets in the public domain allows pharmaceutical companies to dramatically expand their universe of single cell experiments over those generated internally. Leveraging this vast public data lake by finding, downloading and curating single cell data is highly laborious and time consuming compared to the resources for collectively analyzing data by scientists to gain value for biomedical research.

In Year 1, the SCDS consortium delivered a Data Tracker portal, and a 4-entity, deep data model around which 115 analysis-ready, harmonized datasets were released to Members. Now in Year 2, Members will continue to prioritize the deliverables and receive an ongoing stream of harmonized single cell datasets. In addition, there will be increased emphasis on cell type annotation, the creation of an SCDS Reference Atlas and evaluating multi-modal datasets. Under this shared cost model, these can be delivered at much higher throughput than one single company could achieve and much more cost-effectively. New Members are welcome.

About Rancho

Founded in 2012, Rancho Biosciences is a privately held company offering services for data curation, management and analysis for companies engaged in pharmaceutical research and development. Its clients include top 20 pharma and biotech companies, research foundations, government labs and academic groups.

For more information about Rancho and the SCDS consortium, contact:

Andy Hope, PhD

[emailprotected]

Contact Information

Andy Hope Business Development [emailprotected] 6302407809

SOURCE: Rancho BioSciences, LLC

Read more here:

Rancho Biosciences Welcomes Regeneron as the Newest Member ... - AccessWire

Read More..

What is the CIA Triad? – Check Point Software

The Components of the CIA Triad

The CIA triads three main components confidentiality, integrity, and security are fundamental to a successful IT security program.

Confidentiality refers to the ability to keep sensitive data secret. This is a cornerstone of a data security policy and involves controlling access to sensitive data to ensure that unauthorized parties do not have access to it.

One of the most widely-used and powerful tools for protecting confidentiality is encryption. Modern encryption algorithms can ensure that only someone with access to the decryption key for data has the ability to read it. If an attacker or other unauthorized user gains access to the encrypted data, then it is unusable and does not pose a risk to data security.

However, with data encryption, data security and confidentiality boils down to managing control over the private keys used for data encryption and decryption. An organization can help to ensure data confidentiality by using strong encryption and defining access controls that control access to these encryption keys.

Data integrity refers to ensuring that data is authentic and has not been tampered with. This involves both ensuring that data was generated by the alleged creator and that it has not been modified since creation by an unauthorized party.

An organization has a variety of different tools that can help to ensure the integrity of its data. Some examples include the following:

Availability is the final part of the CIA triad because data is only useful to the organization if it is accessible for legitimate use. If security measures or cyberattacks render data or systems inaccessible, then the business suffers. Organizations face a variety of natural and human-driven threats to data and system availability. Power and internet outages or natural disasters could knock systems offline. Distributed denial-of-service (DDoS), ransomware, and other attacks could render systems and data inaccessible.

Companies can use a variety of countermeasures to help to protect the availability of data and systems. Resiliency and redundancy can reduce the potential risks of single points of failure. Strong patch management, anti-DDoS mitigations, and other security protections can help to block cyberattacks that could knock systems offline. Endpoint security solutions and backups can protect against ransomware and other malware that poses a threat to data availability.

The CIA triad is important because it clearly and simply lays out the main goals of data security and cybersecurity. If an organizations systems ensure confidentiality, integrity, and availability, then the potential cyber threats to those systems are limited. By making it easy to think about and remember these key goals, the CIA triad helps in secure design and security reviews.

The CIA triad is a general-purpose tool for secure design. Every system should have data confidentiality and integrity, and software and data should always be available for legitimate use. This means that the CIA triad should be used whenever making or evaluating cybersecurity decisions. It can also be useful for performing post-mortems after security incidents and training employees on IT security policies, security best practices, and common security threats.

The CIA triad is a theoretical framework that defines the main goals of a cybersecurity program. However, it is only useful if it is actually implemented within an organizations systems. Doing so requires the use of a range of cybersecurity solutions.

Check Point helps companies to achieve the CIA triad via an all-in-one security platform. To learn more about simplifying security through integration, check out this eBook. Then, sign up for a free demo of Check Points Quantum Network Security to see the capabilities of Check Points solutions for yourself.

Read the rest here:
What is the CIA Triad? - Check Point Software

Read More..

Future of Winning: How Data Science is Reshaping Politics and … – Columbia University

Molly MurphyPresident of Impact Research

Navin NayakCounselor and President, Center for American Progress Action Fund

Patrick RuffiniFounding Partner, Echelon Insights

Gregory J. Wawro, Ph.D.Professor of Political Science; Program Director, Political Analytics

Analytics is a driving force in politics and advocacy today. Whether its developing content and ads across media, fundraising for causes or campaigns, building a social platform, getting people to register or vote, or helping to define and defend a political strategyif its not data-driven, its dead on arrival. In this robust conversation with right- and left-leaning leaders in the use of data in politics and advocacy, you will learn about how the numbers will determine tomorrows victoriesand defeats.

Event details:

This event is hosted by Columbia School of Professional Studies.

This event is open to the public and the Columbia community including alumni, prospective and current students, faculty, and their guests.

An admissions counselor will be available to speak with interested prospective students at this event. For additional information about program offerings at Columbia Universitys School of Professional Studies, please contact an admissions counselor at 212-854-9666 or[emailprotected].

For further information please contact[emailprotected].

Click here to RSVP!!!

Molly MurphyPresident of Impact ResearchMolly Murphy is a top pollster and campaign strategist who has worked on some of the most consequential campaigns in recent history. Murphy has experience with hundreds of statewide, congressional, and local races all over the country, helping elect Democrats in Republican and swing districts on top of making it possible for Democrats to prevail in competitive primaries. In addition to her work with candidates, Murphy serves as a lead advisor for the DCCC, as well as closely supporting the DSCC and DGA to elect Democrats across the country.

Navin NayakCounselor and President, Center for American Progress Action FundNavin Nayak serves as counselor at the Center for American Progress and president of the Center for American Progress Action Fund. He oversees day-to-day management of the Action Fund and helps create new programs and projects that will assist the organization in fulfilling its mission.

Nayak has more than 15 years of experience in advocacy and elections with several organizations. Most recently, Nayak served as the director of opinion research for Hillary Clintons presidential campaign, where he oversaw all the campaigns message research. Prior to that, he worked for eight years at the League of Conservation Voters, where, among several roles, he served as senior vice president for campaigns, overseeing all the organizations electoral work. He also served as the deputy director for the Clean Energy Works campaign, a national multimillion-dollar effort to pass comprehensive climate legislation in 20092010.

In addition to his advocacy experience, Nayak worked as a donor advisor at Corridor Partners, where he provided strategic guidance to donors on their advocacy and electoral investments.

Patrick RuffiniFounding Partner, Echelon InsightsOver the past 15 years, Patrick Ruffini has advanced the digital and data-driven transformation of politics in numerous roles, most recently as a cofounder of Echelon Insights, a next-generation polling, analytics, and intelligence firm.

Ruffini began his career as one of the countrys first political-digital practitioners, starting at the Republican National Committee in 2002. He managed grassroots technology and outreach for President George W. Bushs 2004 reelection campaign and returned to the RNC to run digital strategy in 2006. As the founder of Engage, a leading right-of-center digital agency, Ruffini would apply these lessons learned at the presidential level to political campaigns nationally and internationally, the advocacy and nonprofit worlds, the Fortune 50, and beyond.

In 2014 he cofounded Echelon Insights to evolve the traditional ways that organizations collect information to drive strategy. Ruffini leads the firms analytics and technology practices, helping a wide array of clients craft more persuasive messages, manage crises, and reach audiences more cost-effectively.

As a writer and public speaker, Ruffini offers insights on political, demographic, and technology trends that are often highlighted by national media. He has contributed to publications including The Washington Post, FiveThirtyEight, Politico, and National Review; has been featured in The New York Times, Time, and Newsweek; and has appeared as a political analyst for NPR.

Gregory J. Wawro, Ph.D.Professor of Political Science; Program Director, Political AnalyticsProfessor Gregory Wawro is the director and founder of the M.S. in Political Analytics program. He previously served as the chair of the Department of Political Science at Columbia. He holds his Ph.D. from Cornell University and specializes in American politics, including Congress, elections, campaign finance, judicial politics, political economy, and political methodology. He is the author of Legislative Entrepreneurship in the U.S. House of Representatives and coauthor (with Eric Schickler) of Filibuster: Obstruction and Lawmaking in the United States Senate, which is a historical analysis of the causes and consequences of filibusters. His most recent book, Time Counts: Quantitative Analysis for Historical Social Science (with Ira Katzelson), seeks to advance historical research in the social sciences by bridging the divide between qualitative and quantitative analysis through an expansion of the standard quantitative methodological toolkit with a set of innovative approaches that capture nuances missed by more commonly used statistical methods. Professor Wawro is currently working on projects that explore the role that social media is playing in congressional elections and democratic participation.

Visit link:

Future of Winning: How Data Science is Reshaping Politics and ... - Columbia University

Read More..

WhatsApp vs Signal: Which messaging app is better? – TrustedReviews

You have likely come across both WhatsApp and Signal, but which messaging app is the easiest, and safest, to use?

Were going to be running through some of the key advantages of both Signal and WhatsApp to see how much they differ, so you can decide which messaging app is right for you.

Both WhatsApp and Signal use the same encryption protocol developed by Open Whisper Systems. This is open-source and peer-reviewed software, making it one of the most trustworthy end-to-end encryption services in use.

However, Signal does have some advantages over WhatsApp, even though they use the same encryption service. In a nutshell, when you send a message or photo, metadata is also sent out. Metadata includes information about when the message was delivered, who it was sent to and more. Metadata is not protected by end-to-end encryption, meaning that while the content of your message is safe, a lot of information can still be gleaned from it.

Signal has developed a technology for protecting metadata called Sealed Sender. This allows for metadata to be hidden, giving you an added level of security and privacy. WhatsApp does know the IP address and technical information showing that the request comes from the WhatsApp app.

Moreover, you need to consider data sharing when downloading a new messaging app. Data sharing includes information like your phone number, contacts, location, media and device details, essentially any information that is already on your phone.

WhatsApp does not store messages, but if a message cannot be delivered immediately, it is kept in an encrypted form on the servers for up to 30 days before it is delivered. If it is not delivered, it is then deleted. It does keep track of how often you use the WhatsApp app and your usage habits whilst in the app.

Signal also does not store its messages, and it will not try and link this phone number to an identity, meaning that it wont have access to your location, email, or other private information.

NordVPN offer 2.56

NordVPN is now offering up to 66% off with 3 months free using code TrustedReviewsat checkout

The company that owns each service is something you will want to keep in mind when you sign up. WhatsApp is currently owned by Meta, formerly known as Facebook. Due to this integration and WhatsApps privacy policy, your information will be shared in order to help Meta better customise its users experiences.

Signal is instead owned by the Signal Technology Foundation, which is a registered non-profit that is run on donations from its users. Due to this, Signal does not need to share its users information with third-party apps and its unlikely that this will change in the future.

Overall, if security and privacy are your biggest concern, Signal is by far the more secure service. While both services do use end-to-end encryption, Signal takes extra steps to ensure that the metadata information of its users is kept private and does not go out of its way to collect extra data on its users.

Since Signal is an independent and non-profit organisation, it is also unlikely that it will ever change its privacy policy, which cannot be said for WhatsApp, which falls under the Meta umbrella.

While we wouldnt necessarily recommend that you immediately stop using WhatsApp, you may want to turn to Signal if youre looking for the best protection available.

Visit link:
WhatsApp vs Signal: Which messaging app is better? - TrustedReviews

Read More..

A precise measurement technology of optical coherent structure of … – EurekAlert

image:Schematic of experimental setup for generation (part 1) and measurement (part 2) of the complex optical coherence structures of random light fields. view more

Credit: OEA

A new publication from Opto-Electronic Science; DOI10.29026/oes.2023.220024considers a precise measurement technology of optical coherent structure of random lights.

Optical manipulation and applications involve numerous fields, such as physics, information, materials and life sciences. It has been included in the national 14th Five-Year Plan major engineering and projects. To better promote manipulation and application of the light beams, developing precision measurement technologies of optical parameters (such as intensity, phase, polarization and frequency, etc.) is vital, which is also an interesting topic. Compared with the fully coherent beam, partially coherent beams viewed as the dynamic random light fields are robust in complex environments. The amplitude and phase of random light fields fluctuate randomly over time, and its speckle intensity is shown in the following figure. Significantly, the valuable information is embedded in the statistical properties of random light fields. The optical coherent structure of a random electric field, as a second-order statistical parameter, can determine the beam evolution behavior, far-field intensity distribution and light-matter interaction etc. Up to now, the random lights with prescribed optical coherent structures have been found applications in coherence tomography, ghost imaging, super-resolution imaging and free-space optical communication. Recently, using the coherent structure of random lights as information carrier for high-security encryption and far-field robust imaging has also been proposed. The rapid development of optical coherence structures related research highly requires the precise measurement of optical coherent structures in return.

To fully recover optical coherent structure, as a complex function, we must precisely measure their real and imaginary parts (or amplitude and phase) simultaneously. The optical coherence structure has traditionally been measured using Youngs interference experiment, wherein its magnitude and phase can be predicted based on the visibility and position of the fringes, respectively. However, this experiment only considers two position points. Full characterization of the optical coherence structure requires that each point be scanned independently across the beam plane, which needs significant time and effort. Improvements to this experiment have been proposed, such as wavefront-folding interferometers, phase-space approach and self-reference holography, Hanbury Brown and Twiss (HBT) effect and generalized HBT effect have been developed to measure optical coherence structures. These methods involve a complicated, misalignment- and vibration-sensitive setup, or are limited to Gaussian optical statistic. Despite all efforts, measuring the complex optical coherence structure remains an open and great challenge.

Recently, the research group of Prof. Yangjian Cai from Shandong Normal University proposed a robust, convenient, and fast protocol for precise measurement of the optical coherence structures of random optical fields via generalized Arago (or Poisson) spot experiments. It had rigorous mathematical solutions. This method only required to capture the far-field intensity of the obstructed random light beams thrice, and was applicable to any optical coherence structures, regardless of their type and optical statistics. Fig. 1 shows the experimental setup for the generation (in Part 1) and measurement (in Part 2) of the complex optical coherence structures of random optical fields. In this setup, a spatial light modulator (SLM1) was used to reproduce random light beams with prescribed complex optical coherence structure and SLM2 was used to realize that the produced beam is obstructed by the obstacles.

The simulation and experimental results of the real and imaginary parts of the coherent structure were achieved by this method. Compared with theoretical results, the structural similarity SSIM of the simulated and measured results are both higher than 0.98, which strongly demonstrated the effectiveness and accuracy of the proposed protocol. In addition, they also conducted the measurements of the Schell mode sources and the non-Schell mode sources with non-Gaussian optical statistics. The relevant results were given in the manuscript, and proved this method was independent of the optical statistics and beam types of random light beams.

With aids of this protocol, they also achieved dynamic optical images encryption and decryption with random light fields, in which the coherent structure function of random light beams was used as the information carrier. A dynamic (shifting and rotating) optical image "OES" was encrypted into the coherent structure with a key. Figure 3(a)~(f) show the real and imaginary parts of the measured coherent structure functions at different time. They can precisely recover the dynamic optical images with the encryption key, displayed in Figure 3(g) ~(h). The speed of image recovery depends on the refresh rate of the SLM and frame rate of the CCD. In the lab, an ideal 20fps video can be decrypted. This technology has potential applications in the fields of optical information encryption, orbital angular momentum measurement, and optical communication etc.

Keywords: optical coherence / statistical optics / Arago spot / optical encryption / optical imaging

# # # # # #

Center of Light Manipulation and application of Shandong Normal University (www.gctk.sdnu.edu.cn) was established in May 2018 and was selected as the Shandong Provincial Engineering and Technical Center of Light Manipulation Research Center in the same year. Professor Yangjian Cai, winner of the National Science Fund for Distinguished Young ScholarsOSA fellow, serves as the center director. The center dedicated to the major demands of China and the priority development fields of the Shandong Provincial new and conventional energy conversion project. The center focuses on novel spatiotemporal lights manipulation and applications in complicated environments, material light processing, laser radar and optical imaging. Since 2018, the center has won more than 50 national-level projects such as major projects of the National Natural Science Foundation of China, national key research and development plan et. al., and published more than 200 SCI research papers on international authoritative journals including Physical Review LettersLaser & Photonics ReviewsPhotoniXNano Letters et al.

# # # # # #

Opto-Electronic Science (OES) is a peer-reviewed, open access, interdisciplinary and international journal published by The Institute of Optics and Electronics, Chinese Academy of Sciences as a sister journal of Opto-Electronic Advances (OEA, IF=9.682). OES is dedicated to providing a professional platform to promote academic exchange and accelerate innovation. OES publishes articles, reviews, and letters of the fundamental breakthroughs in basic science of optics and optoelectronics.

# # # # # #

More information: https://www.oejournal.org/oes

Editorial Board: https://www.oejournal.org/oes/editorialboard/list

OES is available on OE journals (https://www.oejournal.org/oes/archive)

Submission of OES may be made using ScholarOne (https://mc03.manuscriptcentral.com/oes)

CN 51-1800/O4

ISSN 2097-0382

Contact Us: oes@ioe.ac.cn

Twitter: @OptoElectronAdv (https://twitter.com/OptoElectronAdv?lang=en)

WeChat: OE_Journal

# # # # # #

Liu X, Chen Q, Zeng J, Cai YJ, Liang CH. Measurement of optical coherence structures of random optical fields using generalized Arago spot experiment.Opto-Electron Sci2, 220024 (2023).doi:10.29026/oes.2023.220024

# # # # # #

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

Link:
A precise measurement technology of optical coherent structure of ... - EurekAlert

Read More..

Who is the Mysterious Koyo Token Burning Billions of Shiba Inu? – The Crypto Basic

Who is the mysterious Koyo Token that is taking web3 by storm?

Koyo Token launched exclusively on ShibaSwap on March 9, 2023. The Telegram channel (https://t.me/KoyoToken)channel had but a few members with a single anonymous admin at the time of launch. Within minutes to hours of the launch, the telegram filled up into the hundreds including over 50+ Shiba OGs, both from the past and the current.

A flame was lit within the community, and the KoyArmy was formed virtually overnight. But you might be asking what brought everyone into Koyo? A call, in fact; for those trusted frens and frens of frens into a trusted place for frens, which has laid the solid foundation, and now KoyArmy is becoming one of the fastest growing communities in defi.

In an epic effort, the KOY contract has single-handedly burned 4.6 billion SHIB in the span of 8 days, with the most significant of burns in one transaction just short of 1 billion SHIB. In pure genius, the KOY contract has automated 2% from the 5% buy and sell tax for ongoing SHIB burns through the burn portal contract dapp; the very same burn address that Vitalik Buterin originally sent 410 trillion Shib too.

These transactions caused quite a stir within the ShibArmy and the greater defi space. A project, not more than 11 days old, gaining the attention of the Shiba Inu lead developer himself, Shytoshi Kusama, who has liked several tweets about Koyo and follows both Kintaro (Koyos founder) and the main KoyoToken Twitter account. It has also been noted that many among the Shiba team and ShibArmy have been showing proactive support on Twitter and within the Koyo telegram for the KoyArmy.

In a surprise twist to the KoyArmy, the Koyo channel recently announced that the KOY smart contract was launched with an automated 40M KOY token weekly burn function to a max cap of 40% of the total KOY supply. There was much excitement from the KoyArmy when the first 40M KOY token was burned from the total supply, and with 9 weeks of remaining weekly $40M KOY burned from the total supply, it is going to be an exciting few months for the KoyArmy.

During the week, the Koyo channel announced that a further 2% from the Buy & Sell Tax would be allocated to liquidity and an additional 0.5% of buys and sells towards the KOY burn as well, while Kintaro approved a buy of 777,777 KOY tokens paired with Ethereum from the marketing wallet and allocated to liquidity pool on ShibaSwap due the efforts of the community adding to the proactively to liquidity pool.

- Advertisement -

Koyo also recently announced the entire team had been KYCd and smart contract audited by solidproof.io and has locked their liquidity on dx.sale.

It has been interesting to note the high-profile list of members to join the KoyArmy telegram, from David Gokhshtein, Zach Humphries, YourPOP, Majestic Drama, Dom CEO of vEmpire, Lucie Shiba Ambassador, DogeCoinRide, Giba from Kingdom x100, and to the likes of Travladd Crypto co-founder of KingFinance who has become known as one of the loyal KoyArmy Resident OG Community Leaders.

The Koyo team continues to shock and surprise their community with mysterious announcements and continuous interference to an upcoming Revelationmysterious, right?

Kintaro, although limited in chats, has been extremely powerful in his words and GIFs, which has the entire community in awe, while leaders called protectors have been continuously released into the community, preparing to build the KoyArmy for the upcoming revelation, which has many in anticipation.

Kintaro, the leader of the KoyArmy and Koyo Token, recently announced via Twitter.

While in a previous tweet hinted at what the ShibArmy should expect on SHIB burns.

Kintaro plans to build the biggest of platforms servicing the largest armies, generating billions in volume and providing millions in rewards.

Connecting the dots, its become obvious that Koyo is building one of the most substantial utility platforms exclusively on Shibarium.

What has been quite fascinating, Koyo has not attempted to emulate Ryoshi or Shiba as seen in many past inu projects but has announced itself as a trusted and loyal alliance to the ShibArmy and its ecosystem. Many are awaiting the revelation to unpack the mystery behind Koyo.

With Shytoshi battling away from within to ensure the bigger vision comes to fruition, we are starting to realize this very vision, with significant projects such as Koyo that envision bringing billions of dollars in volume by exclusively building their utility platform onto shibarium.

Shytoshi Kusamas grand vision is slowly becoming a reality, and the community sentiments are starting to rise; the confidence in the ShibArmy has taken social media by storm, and the belief is back to its former peaks.

Is this the start of Shytoshis unifying vision coming to fruition? Bringing community-driven projects onto shibarium alongside leading web2 brands in building possibly the biggest decentralized marketplace web3 has ever seen.

Koyo token is listed on Coinmarketcap and Coingecko and recently hit an ATH $23M Market cap with over 600+ holders, all this with limited information available; it wont surprise many if KOY becomes the next big FOMO attraction for the web3 community, make sure to always DYOR.

- Advertisement -

Read more here:

Who is the Mysterious Koyo Token Burning Billions of Shiba Inu? - The Crypto Basic

Read More..

Top Ethereum Rival Could Be Gearing Up for Glorious Move, Says Investor Who Called 2022 Crypto Bottom – The Daily Hodl

Venture capitalist Chris Burniske says that Ethereum (ETH) rival Solana (SOL) could be setting itself up for a massive move to the upside.

Burniske, a former ARK Invest analyst and a current partner at venture capital firm Placeholder, says that a big rally may be in store for Solana if it can clearly break the 200-day simple moving average (SMA),

SOL definitively reclaiming its 200-day SMA should be a glorious move.

SOLs 200-day moving average is currently hovering at about $23. At time of writing, SOL is trading for $22.42.

Burniske has previously predicted that Solana could be the next Ethereum-level opportunity should another bull market happen.

Last month, Burniske said,

I think if I had to pick an ecosystem thats contentious and that you should pay attention to, and in its contentiousness is undervalued, it would be Solana. Placeholder, each bear market, tends to pick an ecosystem or two and build an aircraft carrier strategy around that ecosystem. And so the last bear [market], it was ETH and Bitcoin, because those were really the only things at scale and liquid enough to justify.

And what I mean by aircraft carrier if you take Ethereum, buy a bunch of the core ETH asset, but then venture invest around it and really get to know that ecosystem and who all the people are that are working on say, at that point in time, lending or DEXs [decentralized exchanges] or asset management or whatever. And then you can pick the best teams of the teams that most speak to you from a venture perspective. Were doing that exact same aircraft carrier strategy around Cosmos and Solana right now.

Featured Image: Shutterstock/Jorm S/Modvector

Original post:

Top Ethereum Rival Could Be Gearing Up for Glorious Move, Says Investor Who Called 2022 Crypto Bottom - The Daily Hodl

Read More..