Page 1,608«..1020..1,6071,6081,6091,610..1,6201,630..»

Join us for the Intelligent Application Summit Madrona – Madrona Venture Group

Innovation has a way of appearing to be an overnight success while actually being a transformation taking a decade or more to emerge. Intelligent applications are one such area. In 2012, consumers were already experiencing the first generation of intelligent apps through Google and Bing search engines, recommender systems for services like Amazon.com, Netflix and Spotify, and nascent voice and image services like Siri and Alexa. Then the early days of enterprise and functional applications architected with intelligence inside began.

Since intelligent applications are the future, we are co-hosting our first-ever Intelligent Application Summit to meet, share perspectives, and discuss with other leaders the future of applications and the data-driven services that enable them to be intelligent.

A decade later, we are fully immersed with intelligent applications as consumers, employees, citizens, and patients. In fact, any application that is just software will struggle to survive in the coming years. Since intelligent applications are the future, we are co-hosting our first-ever Intelligent Application Summit to meet, share perspectives, and discuss with other leaders the future of applications and the data-driven services that enable them to be intelligent.

Madrona has been interested in and invested in ML-enabling technologies for years including but not limited to Turi (acquired by Apple in 2016), Lattice (acquired by Apple in 2017) and Algorithmia (acquired by DataRobot in 2021). And the pace of company formation and progress in intelligent apps has become torrid. Last year, we were inspired to work with the broader venture community and other partners to identify the top 40 private intelligent application companies. We then revealed the group, which included 10 intelligent application enablers and 30 intelligent apps across early, mid, and later stages, at AWS re:invent in late November 2021. Since then, those 40 companies have raised over $3 billion in new capital, including several successful up-rounds after the 2022 tech correction.

Be sure to request an invite to the Intelligent Application Summit:

Request an invitation

We define intelligent applications to be software services with contextually relevant machine/deep learning models embedded in the application. Of course, the precursor to these models is access to and preparation of multiple data sets and the use of algorithmic techniques to train, build and deploy the models in software. For example, Amperity combines first-party data major brands have about their customers to help better identify and personalize communications with those customers. SeekOut helps employers identify candidates inside and outside their company with the best attributes to fill specific roles. And there are endless examples like these in life sciences, financial services, creative arts, and process automation.

Many factors have had to come together for the intelligent applications era to fully arrive. Infrastructure capabilities around model training, such as GPUs and other specialized processors, have become so cost-effective and available through cloud services that model creation and iteration are much more approachable. Data is far more ubiquitous but is also more digitized and portable. Even though data has gravity, it can increasingly be aggregated in a data store, lake, or warehouse to enable the preparation and training of AI/ML models. SaaS software is also ubiquitous in the world of hybrid work, which allows new data to be easily captured and turned into predictive recommendations and insights. And with the emergence of foundational models such as transformers, the next generation of intelligent and accessible services are being enabled.

Our Intelligent Applications Summit will host a curated group of leaders from cloud computing companies, rapidly growing companies, venture capitalists, corporate development and research institutions. The event starts the evening of Nov. 1 with a reception and runs all day on Nov. 2. The day-long agenda combines keynotes, short company overviews/showcases, breakout sessions, and networking. We will also be celebrating this years IA 40 winners, which we will announce ahead of the summit. We encourage anyone interested to request an invite at the event page.

Intelligent Applications as a theme resonates with the industry, and we are honored to work with Summit sponsors: Microsoft, AWS, Goldman Sachs, and PitchBook. We are also thrilled that confirmed speakers so far include Charles Lamanna and Peter Lee from Microsoft, Matt Garman from AWS, Sidd Srinivasa from the UW, Maddison Masaeli from Deepcell, Craig Hanson from Gong, Oren Etzioni from the Allen Institute for AI, Justin Borgman from Starburst, Alex Ratner from Snorkel, Michelle Yi from Relational AI, Zayd Enam from Cresta, Geoffrey von Maltzahn from Flagship Pioneering, Kyle Coleman from Clari, Anoop Gupta from SeekOut, Diego Oppenheimer from DataRobot, Amanda Marrs from AMP Robotics, Prasad Raje from Outreach, Leo Dirac from Groundlight AI, Anu Sharma from Statsig, Zoe Hillenmeyer from Peak, and Were still finalizing the agenda, but keep an eye on the Summit event page. A few key conference topics include:

Originally posted here:
Join us for the Intelligent Application Summit Madrona - Madrona Venture Group

Read More..

What Is Sandbox Security and Do You Need It in Your Business? – TechGenix

With sandbox security, cybercriminals think theyre attacking the real thing when theyre only playing with a decoy.Source: Markus Spiske via UnSplash.com

Sandbox security is a virtualization-based security (VBS) solution to protect systems from intrusions. You can use a sandbox to test security and solutions, including catastrophic attacks. The sandbox allows these tests without endangering the original system.

A sandbox effectively determines which attack vectors your system is vulnerable to. You can then patch them before anything becomes available to the public.

Ill first go into the details of what sandboxing is and how it works. Later, well consider a few scenarios which show you what to focus on if you want to use sandbox security.

Sandbox security is an approach to testing and developing cybersecurity systems. It creates a model on the on-site or cloud server and attacks it with Advanced Persistent Threats (APT). Its also a way to test unknown threats that might enter the system from the outside.

You can choose from three sandbox types. The one you select depends on what systems you believe malware would attack. These choices also use different amounts of system resources. So, in the end, its a calculation of what is most useful for your needs.

With full system emulation, you copy everything, including the hardware you use. At completion, you have two identical systems. The only difference is that the sandbox has its software dependent on and backed up by the master system.

Because these systems are alike, malware cant detect a sandbox unless its instructed not to act for unreasonable lengths of time. Even through side-channel attacks, malware cant determine that its attacking a trap instead of the real thing.

But, these systems are also expensive, as they need double the hardware and maintenance. The expense is worth it for large companies with remote workers sending information through the system.

The minimal increase in security wont be worth the added overhead for smaller companies.

Operating system (OS) emulation offers very good protection without needing a whole new hardware setup. Also, it works with cloud servers such as Microsoft Azure and AWS.

For on-premise servers, the added resource expenditure can be significant. But, the virtual device requires no hardware maintenance or added purchasing costs.

This setup is ideal for service industries with customers sending in information. People working in a field that would otherwise create a weak security point will benefit too.

In these cases, the only thing emulated is the access point, which can be the entire app, drop box, or inbox. Its also possible to set up a sandbox instance for emails. It emulates the person receiving it and clicks on the link. It can check if the link or document sent is legitimate or phishing and respond.

Using sandbox security for email can be useful for any enterprise. But the most common use is to test apps and web-based programs where customers import data. For this purpose, its cheap, effective, and scalable.

Although different in scope, these sandboxing options share many benefits in different capacities. Ill now list those benefits and discuss how they apply to different businesses.

In the next section, Ill go through how to create a sandbox and how they work.

Youve got two main methods to create a sandbox.

The first method uses one set of hardware. It usually has a higher capacity to run both the main and sandbox mirror systems.

The second method has separate hardware, and the main system controls both systems. This method performs better but increases component, maintenance, and power costs. This option is better for demanding businesses.

For many businesses, this cost increase isnt worth it. Its optimal to use the same system and lower the requirements for both the main OS and the sandbox.

Ill now go through the operational process. Whether using full system emulation or mimicking one instance, the rundown looks similar.

Its possible to make a sandbox more intricate depending on the requirements. But, in most situations, the process of building the sandbox, detecting malware, trapping it, and restarting looks like this:

The same server that copies the important parts to a sandbox on a functional system makes a new instance. It then creates a new virtual environment.

For anyone inside this new environment, it seems as if theyre in the main system. With full system emulation, businesses can see hardware, power consumption, and OS information.

Regardless if its a part of a test or an actual attack attempt, a sandbox is made to be attacked and taken down. The system records the attack, quarantines the malware, shuts down, and restarts.

A good sandbox destroys malware and knows when the data is safe or beneficial. The tested files are copied to the main server while the sandbox is refreshed for other data.

Now Ill go through some use cases where sandboxing is often used. If you recognize your business in the examples, you likely need to consider it.

Situations where sandboxing, including sandbox development and security, can be useful are plentiful. In almost every security situation you can think of, you want to have a decoy to use.

Here, Ill list four of the most frequent use cases. While your business might not fit these exactly, explore sandboxing options if you recognize the situation.

Because websites are almost always cloud-based through professional hosting, virtualization is often integrated. When using sandbox security, the interactive pages would run as a sandbox.

If the sandbox finds malware someone is trying to upload, the anti-malware software will start. It records the attack and flushes the entire web browser environment. The pages are still available for everyone else, but no malware can find its way into the websites back end.

Software protection works like web protection. The main difference is that, rather than a third party, the business runs the server, even if cloud-based.

The first step for protection is determining which components interact with the outside. Then, you must predict possible attack vectors to determine which sandbox you need to emulate. These include side-channel attacks.

Once you have the preparations and predictions, you can set up a sandbox system. It serves as the front end for communication with the outside. Here, you can allow people to send files and other types of code, including executable code.

The virtual machine runs internal and external anti-malware software. This software makes it hard for common threats to hide. If it finds anything malicious, it deletes the virtual machine and the threats.

Developing a security system isnt easy. You cant know how the features will work together unless you use proven solutions. Rather have a virtual machine to test malware attacks before malicious attacks occur.

Sandboxes certainly work more like containerization than virtualization in this regard. But, as you have full control, test it with more risks, attacks, and resource consumption.

In cybersecurity, its much better to be a pessimist proven wrong than an optimist proven wrong.

Virtual instances encompass the scenarios where many sandboxes run the same thing repeatedly. The primary resource consumption is on malware detection software and not the sandbox.

You can only set up the communication point for mobile and browser apps without OS information or dedicated hardware. For apps, its usually only the inbox page, shared folder, or similar access points.

On the outside, it seems identical to the main system because it is. But, if anyone tries to send malware, its detected, recorded, and the sandbox gets deleted. Plus, this virtualization solution works seamlessly on the cloud as it isnt resource-intensive.

The main difference between cases is the resources needed for optimal results. In most cases, creating a sandbox is rather inexpensive and quick. But youll find that investing more in this security offers excellent benefits for the money.

Now, lets summarize what we have covered about sandbox security.

Sandbox security is a solution using virtual machines. It creates a mock system that takes on the risk of interacting with external information. Sandboxing has three options: full system emulation, operating system emulation, and single instance virtualization.

For many companies, sandboxing reduces intrusions and allows for easier testing and innovation. While it can be resource-intensive, careful gauging can make it more than worth the added cost.

Sandboxing can prevent attacks, especially against Advanced Persistent Threats and cybercrime cases.

Additionally, complex systems can use sandboxing for software protection and security research. Its also used with web browsers and online apps where it can protect only one instance inside the system.

Do you have more questions about sandboxing? Check out the FAQ and Resources sections below!

It depends. Above all, a sandbox isnt safer than any other system for stopping malware. Virtualization security allows the malware to attack, then traps it inside so it cant cause damage.

Yes. If the malware recognizes its in a sandbox or stays dormant for a long time, it can circumvent sandbox protections. Also, its possible to miss malware if theres a new attack vector.

Yes, sandboxes are virtual machines. You can set up a sandbox security system if you know how to boot up your virtual machine. Unlike regular virtual machines, sandboxes with full system emulation can have dedicated hardware.

Microsoft Azure offers several native options for virtual machines. You can turn these into sandbox security systems. While it doesnt offer direct service, the increase for new instances is affordable and easy to set up.

Yes, AWS offers EC2 virtual machines. With dedicated servers, theyre indistinguishable from regular on-premise servers. These servers allow sandboxing and QA instances in the AWS Management Console. Through Amazon Connect, it creates a new instance, which you then dedicate to a sandbox.

See how you can create Linux Virtual Machines and learn more about how they work.

Learn how to host Hyper-V virtual machines on Azure.

Explore Virtualization-Based Security (VBS) and how you can use it.

Learn how to prepare your VM for Windows 11 with PowerShell.

Find out how to troubleshoot a non-responsive Microsoft Hyper-V virtual machine.

The rest is here:
What Is Sandbox Security and Do You Need It in Your Business? - TechGenix

Read More..

United States Expands Sanctions Authorization of Internet-Based Activities in Wake of Protests in Iran – Gibson Dunn

October 3, 2022

Click for PDF

On September 23, 2022, the U.S. Treasury Departments Office of Foreign Assets Control (OFAC) issued General License D-2 (GL D-2), expanding a prior authorization to further facilitate the free flow of information over the internet to, from, and among residents of Iran. GL D-2 authorizes the exportation to Iran of certain services, software, and hardware incident to the exchange of internet-based communications. GL D-2 supersedes and replaces an existing license, General License D-1 (GL D-1), that had been in place without update for over eight years. According to the Treasury Department, the updated license is designed to bring the scope of the license in line with modern technology and ultimately to expand internet access for Iranians, providing them with more options of secure, outside platforms and services. As noted below, even though GL D-2 certainly expands upon the types of software and services allowed to be exported, one of its principal effects will likely be the enhanced comfort parties may have in providing such technology to Iran. GL D-1 was often not fully leveraged by the exporting community that was concerned about the extent of coverage. GL D-2 is an evident attempt to right this balance, making sure that exporters remain aware of limitations while also providing more certainty to those who wish to leverage the exemption.

GL D-2 is the latest Biden Administration effort to support the Iranians protesting the death of Mahsa Amini, a 22-year-old woman who was arrested by Irans Morality Police for allegedly violating the countrys laws on female dress and who died in police custody on September16. Iranian protest-related videos and messages on the internet and social media have captured local and global attention. The United Nations Secretary-General, among others, has called for an independent investigation into Aminis death. The Iranian government, meanwhile, has violently responded to protests and cut off internet access for most of its nearly 80million citizens. OFACs initial response on September22 was to impose blocking sanctions on Irans Morality Police and on seven senior leaders of Irans security organizations that have overseen the suppression of peaceful protests. The next day, OFAC issued GL D-2 and published accompanying FAQ guidance. The State Department highlighted the development as a step toward ensuring that the Iranian people are not kept isolated and in the dark.

GL D-2 retains much of the core operative language from GL D-1, including certain limitations. For example, the expansion in authorized services does not apply to the Government of Iran, for which there is still no authorization for fee-based services, and the license does not authorize services to most Iranian Specially Designated Nationals (SDNs). At the same time, as described by the Treasury Department, GL D-2 has modernized and broadened the authorization originally granted in GL D-1 in a number of meaningful ways. We highlight below the most notable updates.

Authorized Communications No Longer Need to Be Personal

As mentioned, GL D-2 authorizes the exportation to Iran of certain services, software, and hardware incident to the exchange of communications over the [i]nternet. Notably absent throughout the license is the requirement, previously present in GL D-1, that required the internet-based communications be personal. This is a significant change, because what exactly qualified as a personal communication under GL D-1 has been a gray area that caused many compliance questions. Indeed, a Treasury Department official confirmed that the change was motivated by feedback from industry that the personal limitation was a sticking point. This update makes clear that technology companies need not assess the personal nature of communications, which may make such companies and others more comfortable relying on the license.

This is also not the first time OFAC has omitted or removed the personal requirement in a communications-related general license authorizing internet-based activities. This past July, for example, OFAC issued General License No. 25C under its Russia Harmful Foreign Activities Program (promulgated in response to Russias invasion of Ukraine). This General License also allows the exportation of communications-related services to Russia without requiring that such communications be personal. Another example is the 2015 amendment by OFAC of the Cuba sanctions regulations which also dropped the personal requirement from that programs internet-communications license.

Casting a Wider Net Over Supporting Software

The new license has also further expanded the authorization of software. GL D-2 now allows the export of certain supporting software that is incident to or enables internet communications. Previously, GL D-1 only permitted software necessary to enable internet communications. By removing the requirement that software be necessary to support authorized services, GL D-2 expands the types of software covered by the exemption and provides an additional measure of confidence to exporters of internet-based communications software.

Additional Activities Are Now Expressly Covered

Compared to its predecessor license, the authorizing language in GL D-2 is broader and more explicit regarding the types of services that U.S. persons may offer to people in Iran. Previously, OFACs guidance listed only six examples of permitted activities: instant messaging, chat and email, social networking, sharing of photos and movies, web browsing, and blogging. GL D-2 expands on that illustrative list, adding social media platforms, collaboration platforms, video conferencing, e-gaming, e-learning platforms, automated translation, web maps, and user authentication services. In our view, many of the newly added activities were likely already authorized under the prior GL D-1, but their addition to GL D-2 helps to confirm that they are indeed covered.

Entirely New Cloud-Based Authorization That Extends Beyond GL D-2

GL D-2 authorizes the provision of cloud-based services in support of both the activities enumerated in GL D-2 and any other transaction authorized or exempt under the [Iranian Transactions and Sanctions Regulations (ITSR)]. As a Treasury Department official explained, cloud-based services are key to aiding Iranians access to the internet because today so many VPNs and other [sorts] of anti-surveillance tools are delivered via cloud.

This cloud-based authorization is among the most significant expansions of GL D-1s original authorization, because it applies to a variety of transactions, parties, and services beyond those listed in GL D-2. For instance, as described in FAQ 1087, the cloud-based services provision applies to news outlets and media websites covered by the exemption for information or informational materials in section 560.210(c) of the ITSR. Treasury also highlights that the cloud-based services provision applies to other transactions authorized under the ITSR, including:

Coverage of No-Cost Services and Software

Under the prior regime, GL D-1 authorized fee-based services and software, while the general license at ITSR section 560.540 contained a parallel authorization for services and software provided at no cost. GL D-2 explicitly covers both fee-based and no-cost activity, but no-cost services to the Government of Iran continue to be limited to those described in Section 560.540, which retains the personal communications requirement that has been dropped from GL D-2. This combination of restrictions means that it is permissible, for example, to provide the Government of Iran with a no-cost instant messaging service, but not with a fee-based collaboration platform supporting a commercial endeavor.

Clarification of Providers Due Diligence Obligations

In conjunction with the expansion of permitted activities under GL D-2, the Treasury Department released guidance regarding cloud-based providers due diligence obligations under the new license. In FAQ 1088, OFAC explained that providers whose non-Iranian customers provide services or software to persons in Iran may rely on GL D-2 as long as the provider conducts due diligence based on information available to it in the ordinary course of business. This ordinary course of business formulation is not new, and OFAC has increasingly used this standard in describing its due diligence expectations. See, for example, FAQ 901 on complying with the Chinese Military Companies Sanctions under Executive Order13959.

In FAQ 1088, OFAC provides several hypotheticals to further articulate its expectations: If a U.S.-based provider supports non-Iranian customers that supply access to activities authorized under GL D-2such as providing access to Iranian news sites or VPNsthen the U.S.-based provider need not evaluate whether providing access to Iranian end users is related to communications. On the other hand, if a U.S.-based provider supports non-Iranian customers providing services or software not incident to communications under GL D-2for instance, if the non-Iranian customer provides payroll-management software to Iranthen the U.S.-based provider must evaluate whether the service or software is a prohibited export.

Expansion of Specific Licensing Policy

GL D-2 also expands OFACs policy for reviewing applications for specific licenses for activities not authorized by the license. In FAQ 1089, the Treasury Department encourages specific license applications by those seeking to export items or conduct other activities in support of internet freedom in Iran that are not authorized by GL D-2.

In particular, GL D-2 expands OFACs specific licensing policy by encouraging applications for specific licenses for activities to support internet freedom in Iran, including development and hosting of anti-surveillance software by Iranian developers. A Treasury Department official described the agencys specific licensing policy under GL D-2 as forward-leaning and supportive, noting that OFAC will expedite [specific license applications] by working with the State Department for foreign policy guidance.

Key License Features That Have Remained the Same

While GL D-2 uses a number of mechanisms to increase internet access for Iranians, certain exceptions and other limitations have carried over from GL D-1:

* * *

GL D-2 is a welcome upgrade and enhancement to GL D-1, and should encourage the private sector to be more forward leaning with respect to tools and technologies incident to internet-based communications that are now listed or otherwise covered by the license. It remains to be seen whether corresponding changes will be made to communications-related licenses under other OFAC programs. We will continue to report on, and advise on, these nuances as well as any further developments in this evolving area of sanctions law.

The following Gibson Dunn lawyers prepared this client alert: Audi Syarief, Samantha Sewall, Lanie Corrigan*, Judith Alison Lee, Adam M. Smith, and Stephenie Gosnell Handler.

Gibson Dunns lawyers are available to assist in addressing any questions you may have regarding these developments. Please contact the Gibson Dunn lawyer with whom you usually work, the authors, or the following members and leaders of the firms International Trade practice group:

United StatesJudith Alison Lee Co-Chair, International Trade Practice, Washington, D.C. (+1 202-887-3591, jalee@gibsondunn.com)Ronald Kirk Co-Chair, International Trade Practice, Dallas (+1 214-698-3295, rkirk@gibsondunn.com)Courtney M. Brown Washington, D.C. (+1 202-955-8685, cmbrown@gibsondunn.com)David P. Burns Washington, D.C. (+1 202-887-3786, dburns@gibsondunn.com)Stephenie Gosnell Handler Washington, D.C. (+1 202-955-8510, shandler@gibsondunn.com)Nicola T. Hanna Los Angeles (+1 213-229-7269, nhanna@gibsondunn.com)Marcellus A. McRae Los Angeles (+1 213-229-7675, mmcrae@gibsondunn.com)Adam M. Smith Washington, D.C. (+1 202-887-3547, asmith@gibsondunn.com)Christopher T. Timura Washington, D.C. (+1 202-887-3690, ctimura@gibsondunn.com)Annie Motto Washington, D.C. (+1 212-351-3803, amotto@gibsondunn.com)Chris R. Mullen Washington, D.C. (+1 202-955-8250, cmullen@gibsondunn.com)Samantha Sewall Washington, D.C. (+1 202-887-3509, ssewall@gibsondunn.com)Audi K. Syarief Washington, D.C. (+1 202-955-8266, asyarief@gibsondunn.com)Scott R. Toussaint Washington, D.C. (+1 202-887-3588, stoussaint@gibsondunn.com)Shuo (Josh) Zhang Washington, D.C. (+1 202-955-8270, szhang@gibsondunn.com)

AsiaKelly Austin Hong Kong (+852 2214 3788, kaustin@gibsondunn.com)David A. Wolber Hong Kong (+852 2214 3764, dwolber@gibsondunn.com)Fang Xue Beijing (+86 10 6502 8687, fxue@gibsondunn.com)Qi Yue Beijing (+86 10 6502 8534, qyue@gibsondunn.com)

EuropeAttila Borsos Brussels (+32 2 554 72 10, aborsos@gibsondunn.com)Nicolas Autet Paris (+33 1 56 43 13 00, nautet@gibsondunn.com)Susy Bullock London (+44 (0) 20 7071 4283, sbullock@gibsondunn.com)Patrick Doris London (+44 (0) 207 071 4276, pdoris@gibsondunn.com)Sacha Harber-Kelly London (+44 (0) 20 7071 4205, sharber-kelly@gibsondunn.com)Penny Madden London (+44 (0) 20 7071 4226, pmadden@gibsondunn.com)Benno Schwarz Munich (+49 89 189 33 110, bschwarz@gibsondunn.com)Michael Walther Munich (+49 89 189 33 180, mwalther@gibsondunn.com)

* Lanie Corrigan is a recent law graduate practicing in the firms Washington, D.C. office and not yet admitted to practice law.

2022 Gibson, Dunn & Crutcher LLP

Attorney Advertising: The enclosed materials have been prepared for general informational purposes only and are not intended as legal advice.

Read this article:
United States Expands Sanctions Authorization of Internet-Based Activities in Wake of Protests in Iran - Gibson Dunn

Read More..

How crowdfunding can help boost startups in Tanzania – The Citizen

Dar es Salaam. One of the challenges facing those with startups is to fail to get loans from banks and financial institutions due to lack of collateral.As a result of this, many innovations that could have provided solutions in various sectors end up undeveloped.To overcome the challenge, Mzumbe University has come up with a new research project aimed at finding new methods to help the youth in Tanzania access funds for business startups via the Internet known as crowdfunding.According to young people, most of them are walking with ideas because they do not have the money to develop them and they say that if the platform starts being introduced, it would be of great use.

Also Read: Why most startups in Tanzania fail - and the way forwardCrowdfunding is the financial model that supports new ventures by using the Internet to solicit and aggregate small monetary contributions from many funders.Fund seekers might target a large audience to which each participant contributes only a small amount of money to develop the project.According to the Tanzania Startup Association (TSA), 82 percent of them in Tanzania are underfunded.

ResearchA project coordinator, Dr Nsubili Mwalukasa, said the research started in 2019 with the aim of creating the awareness of Crowdfunding Youth Entrepreneurs in Tanzania (C4YET) if they knew about the way to get a loan.Explaining how the youth can get funds, Dr Mwalukasa said there are people who are in a crowdfunding network willing to help startups, therefore, if anyone has a good innovative idea, they should send it to the stakeholders who may donate money to develop it.The kind of financing is different from banks because the collateral is the financial intermediary who brought the idea to the crowdfunding so the fund would be given under a small interest rate and conditions.So the financial intermediary will receive the funds on behalf of applicants and make all the surveys on the project as well as make a follow-up, therefore, this would help many young people to develop their creativities by using that finance method, she stressed.During the research findings, most of the entrepreneurs, who accounted for 60.7 percent, have already participated in fundraising activities. That implies that they can easily learn about fundraising methods.About 52.7 percent of entrepreneurs are not aware of crowdfunding and 47.2 percent are aware of the practice. Of those who are aware, most 42.0 percent heard of crowdfunding from family and friends, 32 percent through social media, 16.0 percent through financial institutions, and 8.0 percent through training about alternative sources of funding, such as crowdfunding.Only a few of those, who have heard about crowdfunding, have some ideas on what it is, what is involved, and how it works. 80.9 percent of respondents have never been involved in crowdfunding, only 19.1 percent who have previously participated, she said.The next project is to train the youth on how best to use the finance method before the introduction of the platform in the country.On the other hand, senior project coordinator Dr Daudi Ndaki said the project started in February 2019 and has planned to implement 17 activities from which 12 are expected to be accomplished by January 2024.Dr Ndaki added that for the period up to September 2021, five activities have been implemented, six are in various implementation stages and five have not taken off.The project consortium includes Mzumbe University, Small Industries Development Organization in Tanzania and Copenhagen Business School from Denmark.Several challenges still hinder the performance of youth entrepreneurship, with lack of finance cited as the leading obstacle. The overall objective of C4YET is to promote the sustainability of youthled businesses and start- ups through increased access to crowdfunding, he said.If we get crowd funding kick-started in Tanzania, we can help the youth create self-employment. More than fifty per cent of the total population in Tanzania are young people who can work, yet most struggle to get employment, he stressed.The crowd funding project for youth entrepreneurship in Tanzania (C4YET) is a timely study that seeks to remove barriers for youth accessing funds from the Internet.

Youths commentsA founder of Taotic Innovation Company, Mr Kiko Kiwanga, said lack of funding is a very critical challenge to startups, adding that only few are supported by their families to implement their projects. He said those with no ideas end up on the way without being developed.For SMEs, they can manage to develop their ideas because most of them do part-time jobs or are employed somewhere else, but for startups you find most of the time they develop ideas while they dont have other means of revenue, he said.Innovator James Marandu said the traditional method of acquiring funds is hindering many youth from developing their ideas due to failing criteria as business must have begun, guarantors among others.We believe if innovation is introduced, a number of youths will come up with constructive ideas based on solutions in various sectors: health, agriculture, communication, finance among others, he insisted.

Continued here:
How crowdfunding can help boost startups in Tanzania - The Citizen

Read More..

Fracturing bones and traditional views of civil engineering – ASU News Now

October 3, 2022

When most people think of civil engineering, images of construction sites, bridges and tunnels will likely come to mind. However, a recent collaboration between Arizona State University and Mayo Clinic is placing civil engineers in a new light.

There is a huge world out there where engineers can use their skills in areas that are traditionally not associated with civil engineering, says Subramaniam Subby Rajan, a civil engineering professor in the Ira A. Fulton Schools of Engineering at ASU.

Putting that concept to the test, Rajan has spearheaded a number of projects in the School of Sustainable Engineering and the Built Environment, part of the Fulton Schools, with private companies such as Honeywell and Raytheon and government organizations such as the Federal Aviation Administration and NASA. He has aided in the materials testing of everything from jet engines to bulletproof vests efforts that have not only expanded his knowledge of civil engineering, but also that of his students and research assistants who get to participate in the studies as well.

If you ask a person on the street or even a practicing civil engineer whether civil engineering skills can be used in answering questions dealing with bone fractures, the answer will inevitably be 'no'; there is not a connection between the two. However, there are a lot of connections, Rajan says.

In his latest research project, Rajan is using his civil engineering expertise to help forensic researchers draw more accurate conclusions about the impact of trauma made on the human body.

Video by Steve Filmer/ASU Media Relations

Subramaniam Subby Rajan

With a long track record of applying civil engineering mechanics to diverse research projects, Rajan was contacted by researchers at Mayo Clinic in Arizona. The team is actively working on a project that could redefine the process for identifying trauma made to human remains. More specifically, the research could allow forensic anthropologists to determine the time at which blunt-force trauma may have occurred to a human body with greater precision and, ultimately, if the trauma played a role in a person's death.

This work is important to forensic scientists because knowing whether a fracture occurred perimortem at or around the time of death versus postmortem can give us important information about the cause and manner of death with crime scene investigations, says Natalie Langley, a consultant in the Department of Laboratory Medicine and Pathology at Mayo Clinic in Arizona and president of the American Board of Forensic Anthropology.

The collaborative team at Mayo Clinic also includes researchers from the Center for Regenerative Medicine in Arizona, the Biomaterials and Histomorphometry Core Laboratory at Mayo Clinic Rochester, Mayo Clinic postdoctoral research fellow Jessica Skinner and ASU's Barrett, The Honors College graduate intern Yuktha Shanavas.

Langley explains that femur bones are sourced from males between the ages of 50 and 80 who donated their bodies to scientific research. Those demographic variables were chosen to control for sex- and age-related compositional differences in bone. The bones are then heated at controlled temperature and humidity for varying amounts of time to simulate the loss of elasticity that bones experience during the postmortem interval.

Bone is an elastic material, and it maintains elasticity for some time after death, Langley says. By heating the bone, we are able to replicate longer periods of time after death that commonly lead to a bone losing some elasticity, leaving different fracture patterns than if it were broken while still elastic.

A layer of spray paint is also applied to the surface of the bones so high-speed cameras can detect deformation and surface strain that occur during the impact testing.

Donated femur bones are coated in a black-and-white speckled spray paint that allows high-speed cameras to capture the deformations on the surface of the sample during fracture testing. Photo by Monica Williams/ASU

Langley says her team needed help minimizing the unknowns in their research.

I contacted ASU initially because we needed an impact tester to induce fractures in a controlled manner, she says.

Rajans team and Mayo Clinic researchers created a special apparatus to hold a fragment of femur bone to allow for an impactor to drop at a controlled and monitored rate.

These are impacts that are strong enough to break a bone, but they are not as high velocity as a gunshot wound, Langley says. We even take it one step further and use high-speed photography to measure, or track, the movement of the bone during the fracture process.

This allows her team to consider what forces are being distributed across the bone.

Once the bone is fractured, it is handed back over to Langley and her team for a thorough review and documentation of the fracture characteristics.

One of the things we look at is the pattern of the fracture, Langley says. Fractures that occur at or around the time of death have a certain appearance; and those that occur much longer after death, when the bone is not as elastic, have a different appearance.

We captured 5,000 frames per second and were able to tell where the weight struck the bone and where the cracks were propagating in the bone, says Ashutosh Maurya, a graduate research associate who volunteered to participate in the bone testing.

Maurya is completing his doctorate in civil, sustainable and environmental engineering in the Fulton Schools. Despite the bone testing research having a different focus from his dissertation work, he felt it was a great opportunity to expand his skills as he explores impact dynamics problems connected to aircraft structures.

If you look at almost any research, you will see people from different areas working together, Maurya says. This will definitely help me in my future career as I collaborate with non-engineering background professionals and manage projects across disciplines.

Ashutosh Maurya, a doctoral student of civil, sustainable and environmental engineering, volunteered to participate in the collaboration with Mayo Clinic in hopes of expanding his experience working with individuals in different research fields. Photo by Monica Williams/ASU

It is a philosophy Mauryas mentor Rajan has tried to instill in all of the students that pass through his classroom.

It's only when you start looking at the fundamental tools that are used across all these different problems, that you find there are a lot of commonalities, Rajan says. For this specific project, we are able to make an impact beyond what is commonly expected of civil engineers.

In the coming months, Langley and her team will be compiling data from the fracture testing, tracking formations and markings left in the bones at different intervals of drying. The results will then be used to create a new standard for determining when trauma was inflicted on a crime victim.

Working with Rajan and his team allowed us to think outside of the box of our own work, Langley says. Their knowledge in controlling the variables with forcefully creating fractures gives validity to our work, ultimately changing the process for solving crimes and giving closure to families.

Top photo:Natalie Langley, a consultant in the Department of Laboratory Medicine and Pathology at Mayo Clinic in Arizona, applies fingerprint powder to a fractured bone to help see fracture surface markings left by an impact. These markings are then documented to help create a new set of criteria for determining the timing of fracture events (e.g., perimortem versus postmortem). Photo by Monica Williams/ASU

See more here:

Fracturing bones and traditional views of civil engineering - ASU News Now

Read More..

McDonough to lead SwRI’s Chemistry and Chemical Engineering Division – Business Wire

SAN ANTONIO--(BUSINESS WIRE)--Dr. Joe McDonough has been named vice president of Southwest Research Institutes Chemistry and Chemical Engineering Division. McDonough previously served as director of the divisions Pharmaceuticals and Bioengineering Department.

I am privileged to step into this role to lead SwRIs Chemistry and Chemical Engineering Division, McDonough said. The Institute has a longstanding legacy as pioneers and visionaries in the chemistry field. We have an exceptional staff working to advance technologies in multiple disciplines.

The Chemistry and Chemical Engineering Division is one of SwRIs longest-running organizations, with chemistry and related technologies being a research focus since its founding in 1947. As vice president, McDonough will oversee a staff of more than 200, working in five departments: Analytical and Environmental Chemistry, Chemical Engineering, Fire Technology, Geosciences and Engineering, and Pharmaceuticals and Bioengineering.

Our staff continues to innovate and expand capabilities to meet changing clients needs, McDonough said. In keeping with SwRIs mission, we will continue to innovate and expand our research programs and transition technologies to the marketplace. We will remain at the forefront for our clients, providing new discoveries, high-impact advanced development and critical analyses.

McDonough joined the Institute in 2000 and was appointed director of SwRIs Pharmaceuticals and Bioengineering Department in 2008. Under McDonoughs leadership, the department has grown its microencapsulation, formulation and clinical supply of pharmaceuticals and vaccine development programs, integrating Good Manufacturing Practices and ISO quality measures. McDonough leads a chemical weapons medical countermeasures program, developing a cyanide antidote licensed for clinical development as well as a vaccine for tularemia, a potential biothreat. His team is developing treatments for filovirus, type 1 diabetes, COVID-19 and other emerging threats as well as a controlled-release steroid formulation that has been licensed for commercialization.

For more information, visit https://www.swri.org/technical-divisions/chemistry-chemical-engineering.

About SwRI:

SwRI is an independent, nonprofit, applied research and development organization based in San Antonio, Texas, with more than 3,000 employees and an annual research volume of nearly $726 million. Southwest Research Institute and SwRI are registered marks in the U.S. Patent and Trademark Office. For more information, please visit http://www.swri.org.

https://www.swri.org/press-release/mcdonough-lead-swri-chemistry-chemical-engineering-division

View post:

McDonough to lead SwRI's Chemistry and Chemical Engineering Division - Business Wire

Read More..

The pitfalls of trust: all you need to know about social engineering – Raconteur

The natural inclination to trust is a fundamental part of life and business. You would not be able to form business relationships, secure investment, serve customers and keep staff without it. But, there are increasing instances where our human instinct to trust something can lead to us being taken advantage of, and social engineering is a prime example ofthis.

Richard De Vere is the founder of The Antisocial Engineer and head of social engineering for business solution company Ultima. He has spent his career highlighting the many ways that trusting strangers can make a business vulnerable to threats both physically andonline.

Social engineering is a professional name for scams and crime where there is an element of human manipulation, De Vereexplains.

In cases where social engineering is used, fraudsters turn our most human instincts against us to access information, physical spaces or systems for financial gain. To do this, they might present themselves as a trusted - or trustworthy - individual and source of information.

De Vere illustrates this with a standard example from outside the business world. A parent gets a text message from a phone number they dont recognise. The text reads Mum/Dad, Ive just been mugged so Im borrowing my friends phone. Could you send some money to their online bank so I can gethome?

That particular scam works on peoples desire to care for their offspring, says De Vere. Its very human. And, he says, it is an impulse which all of us have to use social cues and our understanding of people to influence others behaviour.

By understanding how people build trust, you can then learn to dress and speak appropriately. You can start to orchestrate trust

In a business setting, a social engineer could be the slick salesperson who has learned to talk with a smile and turns up to meetings in an expensive suit with a polished pitch deck of slides. A lot of people probably dont know this form of manipulation is called social engineering, theyre just sick of sending out emails which dont get through to people and theyve started to think about the psychology behindit.

This situation can be classed as social engineering, rather than simply good sales technique, if the person is explicitly looking to trick you for their own nefarious purposes and to line their ownpockets.

The rise in levels of cybercrime is well documented and no business can afford to ignore the severe threats posed by hackers. But social engineering can be just as effective in person as it can online, and it takes much more than a bouncer to stopit.

To illustrate this, De Vere describes the occasion when he used a bunch of flowers to get past the receptionists of a large office complex and gain unaccompanied access to the boardroom to plant abug.

We trust people because we need tosurvive

In the scam, De Vere arrived at reception with a large bouquet from an expensive local florist and told the women behind the desk that he was there to deliver them to an employee who he secretly knew wasnt working that day. Flowers will only get you so far, though, he says, and the secret to success was in his manner. First of all - I was careful not to be scary! Im quite a big chap, so I could come across as intimidating. So I was very apologetic, embarrassed, flustered.

And that was it, he says. In his embarrassment he suggests the women keep the flowers and excuses himself, ostensibly to call the intended recipient to let her know what has happened. This provides exactly the right amount of time to slip into the conference room and plant thebug.

Its exploiting human nature. You have two receptionists who would love a bunch of flowers, then you have me acting like Hugh Grant - Oh God, Im such an idiot! - and it all falls intoplace.

This is how social engineers work: they study how people interact and use that to build personas which seem trustworthy. Youve got to look at how humans define trust on the fly. We do this through what we wear, how we speak, and through accents and mannerisms. By understanding how genuine people build trust, you can then learn to dress and speak appropriately. You can start to orchestrate trust.

So, how can businesses protect themselves from attacks such as these? Is it as simple as encouraging a dont trust anyone attitude among staff? Absolutely not, says De Vere. We trust people because we need to survive, he explains. If we question everything, we never get anything done. And it could have the counterintuitive outcome of filtering into relationships between colleagues, leadership and clients. Trust is crucial for successful businesses, but there are things you can do to make organisations less vulnerable to fraudsters.

1

For too long, weve said that people are the weakest link in the chain, says De Vere. The best way to scam-proof your organisation is to challenge this assumption. Empower staff to recognise and safeguard against attacks by training them and educating them to spot the risks. How many people do you think get training on psychological manipulation when they start working in a bank? Notmany!

2

Social engineering is no longer a niche area of the business. It very much should be in the forefront. You should be discussing it with your security teams. Much like cybersecurity, organisations who wish to protect themselves need to take threats like this seriously and factor them into risk management systems and business continuity plans.

3

The truth is, says De Vere, were all very much human. And I dont think that gets factored into any stage of the business until it becomes a problem and theres a reason to start to make processes. Designing your business around people means understanding that anyone can be scammed and that human behaviour is, to a certain extent, predictable. Mitigate for this by establishing set processes to combat risk, rather than simply holding people accountable once something has gone wrong. In the case of the receptionists and the flowers, had the business had a strict policy in place stating that visitors dont pass a certain point unaccompanied, it would have been far harder for De Vere to make it into the conference room.

Social engineering is a professional name for scams and crime where there is an element of human manipulation

Finally, says De Vere, there is one way to recognise that normal levels of human interaction might be tipping into the sphere of social engineering. Social engineering makes you feel stuff that isnt real, he explains. Potential victims should keep a keen eye out for when a radical change of emotion happens quickly. Its about spotting the triggers that this person is making me upset or elated all of a sudden. But why? From an emotional perspective its about being aware of the feeling of being strungalong.

By training everyone in your organisation to recognise this feeling, making security a top priority and establishing processes which assume natural levels of human fallibility, you can keep trust for the people who deserve it. And keep your business safer from those who donot.

See original here:

The pitfalls of trust: all you need to know about social engineering - Raconteur

Read More..

Twelve dramatic skybridges that push the limits of engineering – Dezeen

After Foster + Partners completed a pair of skyscrapers connected by a suspension bridge, Dezeen rounds up a dozen buildings that feature various types of skybridges.

Bridge structures that span buildings high up in mid-air are now a common trick for architects to show off in skyscraper projects.

Among the earliest examples is the famous Bridge of Sighs in Venice, which was completed in 1600, but skybridges have become increasingly common and ambitious in recent years thanks to advances in engineering technology.

Below are 12 of the most arresting contemporary skybridges around the world:

DJI Sky City, China, by Foster + Partners , 2022

British studio Foster + Partners's Shenzhen headquarters for drone manufacturer DJI consists of two 200-metre-tall skyscrapers linked by an open-air suspension bridge.

The bridge itself, which is a dizzying 105 metres above the ground and 90 metres long, is attached to the vertically slatted cores of its guardian towers.

Find out more about DJI Sky City

Petronas Towers, Malaysia, by Csar Pelli, 1998

Designed by lateArgentine-American architect Csar Pelli, the Petronas Towers in Kuala Lumpur arguably kicked off the wave of skybridges that have sprung up in the 21st century.

The towers were the tallest in the world between 1998 and 2004 at 451 metres, and remain the tallest twin towers on the globe.

Find out more about Petronas Towers

Tencent Global Headquarters, China, by NBBJ, 2018

Three large bridges clad in copper-coloured aluminium louvres connect the towers of the Tencent Global Headquarters in Shenzhen, designed by NBBJ.

They were designed to encourage the tech company's workers not to become siloed in their individual departments. Between them, the bridges house a health centre, a library, a running track and a full-sized basketball court.

Find out more about Tencent Global Headquarters

Marina Bay Sands, Singapore, by Safdie Architects, 2011

Israeli-Canadian architect Moshe Safdie is the king of the skybridge, with his Marina Bay Sands resort now widely recognised as an architectural icon in Singapore.

The complex's three 57-storey towers are topped by a sky garden that cantilevers out for 65 metres on one side. In an interview with Dezeen, Safdie said the project represented "a new kind of public realm".

Find out more about Marina Bay Sands

Sky Habitat, Singapore, by Safdie Architects, 2016

Another Singapore project by Safdie Architects, Sky Habitats consists of a pair of balcony-covered apartment towers linked by three aerial walkways.

The white truss bridges are intended to provide communal outdoor space for residents in the form of sky gardens and include a vertiginous swimming pool on the highest bridge.

Find out more about Sky Habitat

The Crystal, China, by Safdie Architects, 2020

At the Raffles City complex in Chongqing, The Crystal skybridge connects four 250-metre-tall skyscrapers.

Described by Safdie Architects as a "horizontal skyscraper", The Crystal is a 300-metre-long glass-and-steel tube containing gardens, bars, restaurants, a clubhouse and a hotel lobby, with a transparent-bottomed viewing deck at one end.

Find out more about The Crystal

CCTV Headquarters, China, by OMA, 2012

Dutch architect Rem Koolhaas sought to redefine the traditional form of skyscrapers with the deconstructivist CCTV Headquarters in Beijing.

The 234-metre-tall building's two towers are connected on their upper floors by a 75-metre-long cantilevered linking element. This produces its distinctive overall shape, described as a "three-dimensional cranked loop".

Find out more about CCTV Headquarters

American Copper Buildings, USA, by SHoP Architects, 2017

Floors 27 to 29 of these bent Manhattan skyscrapers designed by SHoP Architects are connected by a skybridge that is 30 metres long and sits 91 metres above the ground.

The three-storey bridge contains an indoor lap pool, a hot tub and a bar and lounge for residents of the luxury apartment complex.

Find out more about the American Copper Buildings

Sky Pool, UK, by HAL, 2021

The controversial Sky Pool is a transparent swimming pool bridge suspended 35 metres in the air between two buildings at the Embassy Gardens development in south-west London.

"It's the transparency, the lightness of touch and the fact that it's straddling two buildings that makes it unique and it captures the imagination, the fact that swimmers can see the ground and people below can see the sky," said HAL founder Hal Currey.

Find out more about the Sky Pool

ME Dubai, UAE, by Zaha Hadid Architects, 2020

Seen from the front, the ME Dubai hotel by Zaha Hadid Architects appears to be a giant cube with a large hole at its centre.

But the reverse view reveals it is in fact a pair of towers connected at the bottom and top, with a three-storey bridge suspended 71 metres in the air above the lower atrium.

Find out more about ME Dubai

Collins Arch, Australia, by Woods Bagot and SHoP Architects (2020)

The tapered 164-metre-tall towers of Collins Arch, a mixed-use skyscraper in Melbourne designed by Woods BagotandSHoP Architects, are linked at the top by an eight-story skybridge.

"The skybridge connecting the two buildings is not simply decorative," said SHoP Architects founding principal Bill Sharples. "It maximizes views and sunlight for office, hotel and residential occupants of the two buildings that, on the ground, meet public space and commercial requirements."

Find out more about Collins Arch

Bundang Doosan Tower, South Korea, by Kohn Pedersen Fox (2021)

US firm Kohn Pedersen Fox designed the Bundang Doosan Tower to mimic Seoul's historic city gates, with the two blocks topped by a 100-metre-high skybridge forming an open rectangle.

The "gateway" office building stands beside the Gyeongbu Expressway, a major arterial road leading into the city that is used by around 1.2 million drivers a day.

Find out more about Bundang Doosan Tower

Read more:

Twelve dramatic skybridges that push the limits of engineering - Dezeen

Read More..

In Case You Missed It: From the U.S. Army Corps of Engineers – Governor Ron DeSantis

For Immediate Release: October 3, 2022

Contact:Jim Yocum or Shelly Roberts,904-232-3914 or 904-232-1004,publicmail.cesaj-cc@usace.army.mil

USACE announces start of Blue Roof Program in response to Hurricane Ian

The U.S. Army Corps of Engineers has been tasked by the Federal Emergency Management Agency (FEMA) to assist eligible homeowners with temporary roof repairs. The Operation Blue Roof program will begin on Oct. 3 to provide a temporary blue covering with fiber-reinforced sheeting to help reduce further damage to property until permanent repairs can be made.

Operation Blue Roof is a free service to homeowners. The counties that have been identified are Charlotte and Lee. The initial sign up period is set for 21 days and will end onOct. 23.

Residents impacted by Hurricane Ian can sign up at Blueroof.us. Here, you can sign up for Blue Roof assistance using a Right of Entry (ROE) form, which gathers information about your residence. The ROE is a legal document that allows Corps workers to access your property and assess your homes damage. The ROE also allows contracted crews to work on your roof.

Operation Blue Roof is a priority mission managed by the U.S. Army Corps Engineers. It protects property, reduces temporary housing costs, and allows residents to remain in their homes while recovering from the storm. This program is for primary residences or a permanently occupied rental property with less than 50 percent structural damage. Vacation rental properties are not eligible for this program.

After the blue roof is installed, the structure is declared habitable. Not all roof types qualify for the program. Roofs that are flat or made of metal or clay, slate, or asbestos tile do not qualify. All storm debris must be removed for the roof to qualify.

Residents can also call toll free 1-888-ROOF-BLU (1-888-766-3258) for more information.

-30-

Link:

In Case You Missed It: From the U.S. Army Corps of Engineers - Governor Ron DeSantis

Read More..

See How Much Amazon Pays Engineers, Analysts and Thousands of Others – Business Insider

Amazon's retail CEO Doug Herrington. Amazon

Accountants and Auditors

Financial Analyst I: $49,670 to $83,000Financial Analyst II: $60,882 to $130,000Financial Analyst III: $72,072 to $150,000Manager III, Finance: $78,645 to $190,000Tax Analyst II: $73,486 to $94,200Tax Analyst III: $87,797 to $129,900

Auditors

Financial Analyst II: $60,882 to $100,000

Business Intelligence Analysts

Business Analyst I: $38,958 to $110,000Business Analyst II: $53,102 to $143,000Business Analyst III: $67,267 to $155,000Business Intelligence Engineer I: $38,958 to $155,000.00Business Intelligence Engineer II: $58,178 to $182,000Business Intelligence Engineer III: $89,835 to $196,000Data Engineer II: $78,562 to $195,000IT Support Engineer I: $26,770 to $66,934.40Manager III, Business Intelligence: $132,000 to $178,400Manager III, Business Intelligence Engineer: $85,155 to $212,000

Civil Engineers

Data Center Infrastructure Engineer II: $120,110 to $152,000

Computer and Information Research Scientists

Applied Scientist I: $62,483 to $212,750Applied Scientist II: $78,291 to $220,000Applied Scientist III: $121,846 to $260,000Data Scientist I: $81,307 to $165,000Data Scientist II: $113,277 to $178,547Manager III, Applied Science: $142,626 to $192,400Research Scientist I: $70,366 to $167,600Research Scientist II: $84,427 to $212,800Research Scientist III: $130,146 to $185,000

Computer and Information Systems Managers

Director, Software Development: $153,920 to $312,500Manager II, Software Development: $97,614 to $220,000Manager III, Software Development: $127,629 to $305,422Principal Product Manager - Technical: $160,000 to $243,000Principal Software Development Engineer: $148,310 to $222,500Principal Technical Program Manager: $141,357 to $239,400Product Manager II - Technical: $98,904 to $201,100Product Manager III - Technical: $121,118 to $235,200Senior Manager, Product Management - Technical: $160,000 to $288,113Senior Manager, Software Development: $128,190 to $340,000Technical Program Manager II: $127,100 to $197,800Technical Program Manager III: $120,203 to $231,400

Computer Hardware Engineers

ASIC II: $151,008 to $205,000ASIC III: $151,008 to $240,500Hardware Development Engineer I: $83,179 to $165,000Hardware Development Engineer II: $78,458 to $185,000Hardware Development Engineer III: $109,928 to $200,000

Computer Network Architects

Network Development Engineer I: $75,795 to $160,000Network Development Engineer II: $105,622 to $212,056Network Development Engineer III: $134,846 to $185,280

Computer Occupations, All Other

Business Analyst I: $45,282 to $76,000Business Intelligence Engineer I: $45,282 to $72,696Business Intelligence Engineer II: $70,346 to $130,000

Computer Systems Analysts

Solutions Architect II: $80,267 to $170,000Solutions Architect III: $172,000 to $239,000Support Engineer I-External: $72,779 to $114,100Support Engineer II: $72,301 to $103,200Support Engineer IV: $89,600 to $155,000

Computer Systems Engineers/Architects

Support Engineer III: $88,005 to $99,008

Data Warehousing Specialists

Data Engineer I: $115,000 to $152,000Data Engineer II: $70,346 to $195,000

Database Administrators

Data Engineer I: $52,998 to $160,000Data Engineer II: $81,640 to $180,000Database Engineer II: $83,366 to $139,500Manager III, Data Science: $116,168 to $215,300Support Engineer IV: $75,088 to $148,800

Database Architects

Data Engineer I: $50,565 to $172,000Data Engineer II: $69,826 to $205,600Data Engineer III: $99,008 to $180,000

Economists

Economist I: $45,614 to $185,000Economist II: $92,248 to $190,000Economist III: $123,594 to $183,480

Electrical Engineers

Hardware Development Engineer II: $96,741 to $185,000

Financial Analysts

Financial Analyst III: $96,533 to $132,600

Financial Managers

Financial Analyst III - MBA: $129,043 to $139,500Manager III, Finance: $143,000 to $172,152Senior Manager, Finance: $149,000 to $166,000

Graphic Designers

Designer II: $65,333 to $145,000UX Designer I: $29,827 to $131,677UX Designer II: $44,741 to $173,500UX Designer III: $70,387 to $211,000UX Researcher II: $44,741 to $145,000

Human Resources Specialists

HR Assistant III: $27,186 to $48,984HR Generalist III: $71,531 to $175,000HR Specialist II: $64,251 to $97,000Recruiter II: $47,715 to $110,000Recruiter III: $70,366 to $160,000

Industrial Engineers

Industrial Designer I: $60,778 to $115,000Industrial Designer II: $72,821 to $150,000Industrial Designer III: $115,128 to $163,200

Information Security Analysts

Industry Specialist II: $141,100 to $160,000Security Engineer I: $67,392 to $200,000Security Engineer II: $91,333 to $185,000Security engineer III: $160,000 to $180,000

Information Technology Project Managers

Principal product manager, technical: $119,475 to $168,834Product manager II, technical: $78,562 to $175,000Product manager III, technical: $85,155 to $235,000Technical Program Manager I: $50,315 to $147,000Technical Program Manager II: $78,562 to $180,000Technical Program Manager III: $78,562 to $193,400

Lawyers

Legal Counsel II: $72,758 to $160,000Legal Counsel III: $105,747 to $164,700

Logisticians

Instock Manager II: $73,798 to $112,000Instock Manager III: $62,005 to $160,000Manager I, Operations: $35,526 to $63,100Manager II, Operations: $48,922 to $84,615Manager III, Operations: $59,342 to $105,664Operations Engineer I: $35,568 to $75,878Operations Engineer II: $48,547 to $107,500Operations Engineer III: $66,186 to $155,000Procurement Specialist II: $48,922 to $92,000Product Manager III: $128,000 to $162,300Program Manager II: $81,600 to $105,000Program Manager III: $118,250 to $160,000Senior Manager, Pathways Operations: $92,602 to $170,391Site Manager, Operations: $77,168 to $105,664Supply Chain Manager I: $35,568 to $84,080Supply Chain Manager II: $47,590 to $120,000Supply Chain Manager III: $63,523 to $141,900

Logistics Engineers

Operations Engineer II: $48,547 to $113,500

Market Research Analysts and Marketing Specialists

General Marketing II: $55,453 to $100,000General Marketing III: $43,534 to $185,000Instock Manager II: $50,731 to $120,000Product Manager II: $73,424 to $127,900Product Manager III: $67,475 to $160,000Product Marketing III: $74,090 to $183,000Retail Rotation Program - MBA: $83,533 to $132,600Retail Vendor Manager III: $97,718 to $148,000

Marketing Managers

Instock Manager III: $117,500 to $170,000Product Manager II: $96,158 to $140,000Product Manager III: $128,000 to $200,000Product Manager III - Technical - MBA: $134,139 to $204,000Retail Rotation Program - MBA: $79,955 to $132,600Senior Manager, Product Management: $149,100 to $203,341

Network and Computer Systems Administrators

Support engineer II: $93,400 to $97,000System Admin/Engineer II: $71,531 to $155,300

Occupational Health and Safety Specialists

Manager II, Safety: $54,600 to $82,500Safety Specialist I: $46,405 to $64,626

Operations Research Analysts

Account Manager II: $68,411 to $111,000Account Rep II: $83,595 to $91,042Business Analyst I: $68,370 to $82,100Business Analyst II: $38,938 to $122,000Business Intel Engineer II: $96,480 to $146,900Business Intelligence Engineer II: $75,670 to $154,500Manager II, Risk: $88,275 to $122,000Manager III, Program Management: $57,595 to $153,000PMT III - External Services: $104,374 to $225,000Principal Product Management: $120,494 to $184,850Principal Program Management: $101,213 to $206,500Product Manager II: $88,275 to $160,000Product Manager II - Technical: $88,275 to $186,000Product Manager III: $102,315 to $190,000Product Marketing II: $88,275 to $114,800Program Manager I: $20,259 to $100,700Program Manager II: $38,938 to $145,000Program Manager III: $57,595 to $182,000Risk Manager II: $68,162 to $120,000Risk Manager III: $84,822 to $181,500Senior Manager, Product Management - Tech: $120,494 to $270,000Senior Manager, Program Management: $120,494 to $195,000Technical Program Manager III: $84,822 to $211,200

Purchasing Managers

HW Commodity Specialist II: $101,754 to $140,000HW Commodity Specialist III: $130,333 to $165,000

Software Developers, Applications

Front-End Engineer I: $75,795 to $171,000Front-End Engineer II: $86,632 to $223,600Front-End Engineer III: $123,614 to $225,000IT App Analyst: $97,760 to $125,000IT App Analyst II: $98,550 to $160,000IT App Development Engineer I: $52,790 to $150,000IT App Development Engineer II: $67,933 to $185,000Manager II, Software Development: $119,350 to $152,80Manager III, Software Development: $114,234 to $185,000Manager III, Technical Program Management: $109,138 to $254,500Principal Product Management: $145,454 to $205,000Principal Software Development Engineer: $126,838 to $247,100Product Manager III - Technical - MBA: $118,373 to $166,500Senior Manager, Software Development: $119,350 to $185,000Software Dev Engineer I: $97,760 to $177,500Software Dev Engineer II: $144,000 to $216,500Software Development Engineer I: $50,190 to $212,000Software Development Engineer II: $66,477 to $223,600Software Development Engineer III: $96,450 to $260,000Support Engineer III: $62,462 to $120,800Support Engineer IV: $80,163 to $120,000Technical Program Manager I: $75,462 to $180,000Technical Program Manager II: $87,485 to $195,000Technical Program Manager III: $119,350 to $193,100

Software Developers, Systems Software

Hardware Development Engineer II: $119,350 to $136,500Hardware Development Engineer III: $145,400 to $172,000Manager II, Quality: $119,350 to $168,470Manager III, Quality: $109,138 to $221,400Professional Services II: $94,037 to $174,000Quality Assurance Engineer I: $57,470 to $169,300Quality Assurance Engineer II: $75,462 to $185,000Quality Assurance Engineer III: $97,760 to $180,300Software development engineer I: $67,018 to $200,000Software development engineer II: $90,750 to $195,000Software development engineer III: $109,138 to $250,000Solutions Architect II: $98,550 to $177,000Solutions Architect III: $109,595 to $239,000System Development Engineer I: $62,462 to $168,000System Development Engineer II: $79,310 to $196,000System Development Engineer III: $117,686 to $225,000

Software Quality Assurance Engineers and Testers

Quality Assurance Engineer I: $50,315 to $106,000Quality Assurance Engineer II: $78,562 to $130,000

Statisticians

Data Engineer I: $45,032 to $162,540Data Engineer II: $61,318 to $185,000Data Engineer III: $89,960 to $206,100Data Scientist I: $56,534 to $178,400Data Scientist II: $59,155 to $212,800Data Scientist III: $104,832 to $200,000Manager III, Data Engineering: $76,190 to $201,813Senior Manager, Data Engineering: $116,979 to $226,100

Stock Clerks and Order Fillers

Manager I, Operations: $22,006 to $30,389

Supply Chain Managers

Program Manager III: $132,600 to $150,000Supply Chain Manager II: $104,500 to $155,480Supply Chain Manager III: $124,800 to $155,000

Training and Development Specialists

Research Scientist I: $49,795 to $155,000

Transportation, Storage, and Distribution Managers

Manager I, Operations: $46,904 to $178,000Manager II, Operations: $64,900 to $85,571Manager III, Operations: $83,491 to $130,650Pathways Operations Manager - MBA: $82,659 to $152,300Product Manager III: $120,370 to $155,000Program Manager II: $88,700 to $129,800Program Manager III - MBA: $77,771 to $163,300.00Senior Manager, Operations: $90,230 to $149,600

Validation Engineers

Hardware Development Engineer I: $64,189 to $145,000Hardware Development Engineer III: $105,643 to $178,000Industry Specialist II: $85,946 to $165,800

Read the original here:

See How Much Amazon Pays Engineers, Analysts and Thousands of Others - Business Insider

Read More..