Page 1,738«..1020..1,7371,7381,7391,740..1,7501,760..»

The Global Endpoint Detection and Response Market size is expected to reach $7.1 billion by 2028, rising at a market growth of 24.8% CAGR during the…

ReportLinker

Endpoint detection and response (EDR) has several benefits, including the capacity to identify threats in real-time and enable an immediate halt to a breach. Additionally, EDR tools help analyze data to spot threat patterns, automatically react to threats to neutralize them or take other measures, and alert security staff.

New York, Aug. 19, 2022 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Endpoint Detection and Response Market Size, Share & Industry Trends Analysis Report By Vertical, By Component, By Deployment Type, By Organization Size, By Enforcement Point, By Regional Outlook and Forecast, 2022 - 2028" - https://www.reportlinker.com/p06315005/?utm_source=GNW It can be used as a forensics tool to support an investigation, which is anticipated to offer the industry lucrative growth potential. Furthermore, it tracks events and processes including registry changes, logins, and network connections to enable real-time visibility across all endpoints.

That makes it possible for the group or businesses to look into any suspicious conduct right away. The workload involved in identifying and responding to threats or hazards can also be lessened with the use of enhanced endpoint detection and response (EDR) processes. Removing the requirement for the security team to constantly monitor several tools and dashboards, which fuel the markets growth, saves time and resources.

Technology platforms known as EDR tools enable quick analysis and containment of attacks on endpoints in addition to warning security teams of potentially harmful activities. A workstation or laptop used by an employee, a server, a cloud system, a smartphone, or an IoT device are all examples of endpoints. EDR systems typically aggregate endpoint data, such as process execution, terminal communication, and customer logins; analyze data to find anomalies and suspicious attacks; and record data about harmful conduct. This gives security teams the information they need to look into and handle issues. They also make it possible to perform manual and automatic tasks to neutralize threats on the endpoint, such as wiping and reimaging the device or isolating it from the network.

Security teams now have the insight they need to find problems that might otherwise go undetected due to EDR security solutions, which keep track of all endpoint and workload activity and events. Continuous and thorough visibility into what is occurring on endpoints in real-time must be offered by an EDR system. An EDR tool should have sophisticated capabilities for threat detection, investigation, and response, such as incident data search, investigation alert triage, and validation of suspicious activity, threat hunting, and detection and containment of malicious activity.

COVID-19 Impact Analysis

The COVID-19 pandemic has caused social unrest and economic turbulence all across the world. The lockdown imposed by many governments has positively affected the adoption of endpoint detection and response (EDR). Following the effects of COVID-19, businesses are focusing on cutting-edge technologies to perform contactless operations safely and securely. These technologies include AI-powered remedies, computing technology, automation, and cloud-based endpoint detection and response across industries like BFSI, healthcare, government, and others. Additionally, as companies transition to digitalization, there is a growing need for an EDR solution that is reliable, AI-integrated, and has real-time reporting capabilities.

Market Growth Factors

Malware, crypto-jacking, and enterprise email hacks are all on the rise.

Crypto-jacking incidents drive companies to update unsecure systems, eliminating a potential point of entry for ransomware. Organizations implemented recommended fixes to address the exploited vulnerability. Every single moment in the web application compromises Expel conducted research that led to the introduction of a coin miner in 2021. This typically occurs when a victim unwittingly installs malicious scripts that let a cybercriminal access the device or other Internet-connected devices, such as by clicking on an unknown link in an e-mail or going to a malicious website. Because they are digital, cryptocurrencies can only be produced by computer programmers and processing power.

Security rules and compliance reporting can both be changed.

A companys rules and laws are unique to it. They may include goals, procedures, and risks that are specific to that company. Using the finest EDR tools, each user can create a security policy based on a customized rules engine. By using this engine, users can implement security and operational guidelines that will then be updated to address shifting business needs, changing threats, and applicable laws and regulations. Using custom security rules, the EDR team can filter out unimportant noise and remain focused on identifying both predictable and unanticipated risks. A flexible rules engine helps the providers efficiency and accuracy, enabling them to identify and protect against a wider range of threats in the particular environment of the business.

Market Restraining Factors

Poor And Erratic Third-Party Software

The security of the third-party infrastructure and a loss of control are just two disadvantages of outsourcing security tasks to a third-party EDR network operator. The service companys cyber architecture must be secure and up to date if it is to be effective in fending off the most recent sophisticated threats. An EDR service providers infrastructure may include sensitive customer and employee information from multiple companies, making it more susceptible to frequent and intricate attacks. Because of this, businesses could be reluctant to provide these service providers access to valuable data.

Component Outlook

On the basis of the Component, the Endpoint Detection and Response market is divided into Solution and services. The services segment witnessed a significant revenue share in the endpoint detection and response market in 2021. It is because The Endpoint Detection and Response service provides a skilled team of threat hunters, cutting-edge EDR technology, and up-to-the-minute threat data to discover threats that other measures may miss. This dramatically improves the visibility of attacks aimed at endpoint devices.

Deployment Mode Outlook

Based on the Deployment Mode, the Endpoint Detection and Response market is classified into On-premise and Cloud. The on-premise segment procured the largest revenue share in the endpoint detection and response market in 2021. This is due to the many benefits that come with on-premises deployment, including the high level of data protection and safety. Companies favor on-premises models over cloud-based deployment models because they offer greater data security and experience fewer data breaches, which is what drives demand in both the public and private sectors.

Organization Size Outlook

By Organization Size, the Endpoint Detection and Response market is bifurcated into Large Enterprises and SMEs. The small & medium enterprises segment recorded a significant revenue share in the endpoint detection and response market in 2021. It is because cyber-attacks on SMEs result in severe data and financial losses. Since most businesses are struggling as a result of COVID-19, banks are seeing an increase in demand for business loans, especially from SMEs, to maintain operations during the pandemic, reduce operational risks associated with remote working practices, and comply with regulations to avoid fines.

Enforcement Point Outlook

Based on the Enforcement point, the Endpoint Detection and Response market is segmented into Workstations, Mobile devices, Servers, Point of sale terminals, and others. The workstation segment acquired the largest revenue share in the endpoint detection and response market in 2021. Enterprises often offer alternatives for remote management so security professionals can set the proper parameters. To be audited and analyzed, each endpoint transmits audit data to a central repository. Consumers dont require the same level of centralized management. A specialized computer called a workstation is made for use in technical or scientific tasks.

Vertical Outlook

On the basis of the vertical, the Endpoint Detection and Response market is fragmented into Retail, Healthcare & Life Sciences, Manufacturing & Automotive, Government & Public Sector, BFSI, IT &Telecom, and Others. The IT & Telecom segment procured the highest revenue share in the endpoint detection and response market in 2021. It has been established that automatic speech recognition systems depend critically on endpoint detection. The system analyses the signals static (energy) and dynamic (delta energy) characteristics frame by frame. The endpoint detector can be adjusted to the working environment such as telephone lines and can keep track of changes in the background noise levels.

Regional Outlook

Region-wise, the Endpoint Detection, and Response market is analyzed across North America, Europe, Asia Pacific, and LAMEA. The North America segment acquired the highest revenue share in the endpoint detection and response market in 2021. In the North American region, the market is anticipated to exhibit robust growth due to the rising use of endpoint detection and response for security applications in forensic, governmental, and banking & finance. However, during the Endpoint Detection and Response Market Forecast period, the Asia-Pacific region is anticipated to develop at the fastest rate. This area has a strong IT infrastructure, good software, and reliable services.

The major strategies followed by the market participants are Partnerships. Based on the Analysis presented in the Cardinal matrix; Microsoft Corporation is the forerunner in the Endpoint Detection and Response Market. Companies such as Cybereason Inc., Broadcom, Inc. and SentinelOne, Inc. are some of the key innovators in Endpoint Detection and Response Market.

The market research report covers the analysis of key stake holders of the market. Key companies profiled in the report include Broadcom, Inc., Cisco Systems, Inc., Microsoft Corporation, OpenText Corporation, Crowdstrike Holdings, Inc., McAfee Corp., VMware, Inc., Palo Alto Networks, Inc., SentinelOne, Inc., and Cybereason Inc.

Recent Strategies deployed in Endpoint Detection and Response Market

Partnerships, Collaborations and Agreements:

Dec-2021: Cybereason came into a partnership with M.Tech, one of the biggest cybersecurity and network performance solutions suppliers. Through this partnership, M.Tech would provide consumers a Managed Detection and Response solution supported by the Cybereason XDR Platform. Additionally, the platform offers Extended Detection and Response, Next-Generation Antivirus, Endpoint Detection and Response, and Predictive Ransomware Security to business consumers by way of a single suitable mechanism.

Sep-2021: SentinelOne formed a partnership with Deepwatch, the leader in advanced managed detection and response (MDR) security. Through this partnership, Deepwatch would provide SentinelOne Endpoint Detection and Response as the territory of its award-winning MDR portfolio. Additionally, The integration of SentinelOne endpoint protection and Deepwatch MDR allows detection engineers to grab more endpoint data that can be consumed into the greater Deepwatch SecOps Platform for contextualization and correlation.

Jul-2021: SentinelOne partnered with ConnectWise, the foremost provider of enterprise automation software for technology solution suppliers. Together, the companies aimed to support their cooperative fight against cyber criminals by delivering SentinelOne Control and SentinelOne Complete as intended products in the ConnectWise security product offering.

Jul-2021: Cybereason partnered with CYDERES, the security-as-a-service division of Fishtech Group. Through this partnership, the companies aimed to bring improved Managed Detection and Response to future and currently managed security clients. Additionally, CYDERES and Cybereason mutual consumers would instantly be satisfied with the Cybereason Defense Platform, which integrates EDR, preventative next-gen antivirus, and proactive threat tracking to decrease cyber threats.

Jun-2021: SentinelOne came into a partnership with Coalition, the superior cyber insurance and security business. Together, the companies aimed to deliver an integrated solution of premium threat surveillance and cyber insurance to safeguard companies from ransomware. Additionally, The partnership would provide consumers of both Coalition and SentinelOne financial incentives to embrace EDR solutions and cyber insurance to encourage a more holistic risk management approach.

Jan-2021: Cybereason came into a partnership with Ensign InfoSecurity, one of the largest pure-play cybersecurity firms. This partnership allows joint consumers to permit next-generation detection, elite threat hunting, and response abilities and provides actionable safety intelligence to manage growing cyber threats encountered by companies and their dispersed workforce. Additionally, This partnership would help Ensigns consumers to access Cybereasons superior Cybereason Defense Platform, a mixture of endpoint detection and response and endpoint prevention abilities.

Mar-2020: SentinelOne formed a partnership with Lenovo, a Chinese multinational technology corporation. This partnership aimed to combine SentinelOnes autonomous endpoint protection platform with Lenovos ThinkShield security offering. Additionally, Lenovo consumers now can buy machines with SentinelOne, providing IoT security, real-time protection, ActiveEDR, and cloud workload security supported by patented Behavioral AI.

Product Launches and Product Expansions:

Oct-2021: CrowdStrike introduced Falcon XDR, providing security teams. The new Falcon XDR extends CrowdStrikes superior Endpoint Detection and Response (EDR) abilities to provide real-time automated detection response within the complete security pile. Additionally, Falcon XDR supplies security groups with the data and equipment to react, contain and remediate refined attacks quickly.

Feb-2020: Cisco unveiled Cisco SecureX, a combined cloud-native security platform. The new Cisco SecureX delivers a complete user experience around the range of Ciscos combined security offering and consumers living security systems. Moreover, Cisco SecureX provides transparency, recognizes anonymous threats, and automates procedures to bolster consumers protection within the endpoint, network, cloud, and applications.

Acquisitions and Mergers:

Jun-2021: Cisco acquired Kenna Security, a cybersecurity leader that delivers a risk-based vulnerability management platform. Through this acquisition, the company aimed to obtain Kennas open market-superior machine-learning risk-based security control medium together within Ciscos open SecureX platform.

Jan-2021: Cisco took over Banzai Cloud, a privately held company that specializes in deploying cloud-native applications. Under this acquisition, the Banzai Cloud team boosts Ciscos abilities and expertise through its established experience with total end-to-end cloud-native deployment, application, runtime, development, and security operations.

Sep-2020: CrowdStrike completed the acquisition of Preempt Security, a foremost provider of Zero Trust and conditional access technology. Under this acquisition, CrowdStrike would provide consumers with improved Zero Trust security abilities and bolster the CrowdStrike Falcon platform with dependent access technology. Additionally, the acquisition would assist consumers to reach end-to-end transparency and enforcement of identity data.

Mar-2020: McAfee took over Light Point Security, pioneer of browser isolation. Through this acquisition, the company aimed to integrate Light Point Securitys robust browser isolation abilities to the McAfee product offering along with its award-winning crew. Additionally, Browser isolation safeguards consumer against web-based hazards because vicious code is included in an isolated ecosystem and cannot achieve the endpoint.

Scope of the Study

Market Segments covered in the Report:

By Vertical

IT & Telecom

BFSI

Manufacturing & Automotive

Retail

Government & Public Sector

Healthcare & Life Sciences

Others

By Component

Solution

Services

By Deployment Type

On-premise

Cloud

By Organization Size

Large Enterprises

Small & Medium Enterprises

By Enforcement Point

Workstations

Servers

Mobile Devices

Point of Sale Terminals

Others

By Geography

North America

o US

o Canada

o Mexico

o Rest of North America

Europe

o Germany

o UK

o France

o Russia

o Spain

o Italy

o Rest of Europe

Asia Pacific

o China

o Japan

o India

o South Korea

o Singapore

o Malaysia

o Rest of Asia Pacific

LAMEA

o Brazil

o Argentina

o UAE

o Saudi Arabia

o South Africa

Read more:
The Global Endpoint Detection and Response Market size is expected to reach $7.1 billion by 2028, rising at a market growth of 24.8% CAGR during the...

Read More..

Discord details how it dodged latency with a super-disk made in the cloud – The Register

Chat platform Discord delivered a playful slap to Google yesterday with a post describing how the company dealt with "reliability issues" to achieve some impressively low latency.

Discord deals with 4 billion messages sent through the platform per day by its millions of users. The company runs a set of NoSQL database clusters (powered by ScyllaDB) but its real-time nature means that the databases need to respond to queries as quickly as possible.

"The biggest impact on our database performance is the latency of individual disk operations, how long it takes to read or write data from the physical hardware," said Glen Oakley, a senior software engineer at Discord.

Below a certain query rate, all is good. "Our databases do a great job of handling requests in parallel," said Oakley.

However, at some point you will hit blocking issues, where the database has to wait for an outstanding disk operation to complete before starting another. Things slow down, and users notice. The queries might time out before reaching the top of the queue.

One might have thought that slinging the Local SSDs on offer from GCP would deal with the problem. Oakley noted that the NVMe-based storage had incredibly fast latency profiles, but "in our testing, we ran into enough reliability issues that we didn't feel comfortable with depending on this solution for our critical data storage."

Another option was persistent disks, storage that could be attached or detached when needed, replicated, and connected via the network. So nowhere near as low latency as a directly attached disk.

So what to do? The team wanted to stick with GCP and prioritize low-latency disk reads, but did not want to sacrifice existing uptime guarantees. They also needed to be able to survive a bad sector on an SSD. The solution was to use GCP's Local SSDs for low-latency reads while still writing to the Persistent Disks to take advantage of snapshotting and redundancy via replication.

After faffing around with various caching options in software (Discord runs Ubuntu on its database servers), the team settled on md and a tricked-out RAID configuration. RAID0 (which just splits raw data over disks lose one, lose 'em all) was selected for the Local SSDs and a RAID1 (basically a mirror) between the Persistent Disk and RAID0 array.

The result was, more or less, the super-disk success hoped for, although Oakley noted there were some specific edge cases encountered in the cloud environment. "In retrospect," he said, "disk latency should have been an obvious concern early on in our database deployments.

"The world of cloud computing causes so many systems to behave in ways that are nothing like their physical datacenter counterparts."

Something to keep in mind during your company's charge to the cloud.

Read the original here:
Discord details how it dodged latency with a super-disk made in the cloud - The Register

Read More..

The Satanic Panic Is Back, and It’s Bipartisan – Reason

A new poll looking at Americans' belief in conspiracy theories finds high levels of support for loony-tunes ideas about sex, Satan, and U.S. institutions. In addition, more than half of those surveyed believed child sex-trafficking myths.

The situation echoes fears prevalent during the 1980s and '90s, a mass hysteria that has in retrospect been dubbed the Satanic Panic. This vintage worry about ritual murders, sexual abuse inspired by devil worship, and Satanists in child care centers, the entertainment industry, and elsewhere was unfoundedbut still ruined lives. (You can read much more about the Satanic Panic inReasonBooks Editor Jesse Walker'sThe United States of Paranoia: A Conspiracy Theory.)

For a few decades, the moral panic around these topics seemed to subsidewhich is not to say people didn't displace these fears into other overblown villains, such as sex trafficking cabals. Now it seems to be in full swing again, blended with ongoing panic about sex trafficking and retro myths about queer people being pedophiles and perverts.

"Accusations involving ritual sex abuse and the sexualization of children have surged into the mainstream of American politics over the past year," University of Miami political science professors Joseph E. Uscinski and Casey Klofstad note on the London School of Economics' U.S. politics and policy blog. "In particular, conservative politicians and opinion leaders have increasingly expressed concerns about Satan, Satanists, sex "grooming", and the supposed "agenda" by public schools and entertainment companies to indoctrinate children into sexualized lifestyles or to turn them gay or trans."

To gauge support for such views, Uscinski and Klofstad conducted a nationwide poll, garnering 2,001 (nationally representative) respondents between May 26 and June 30, 2022. They found not only high levels of nouveau Satanic Panic but also high levels of belief in conspiracy theories about child sex trafficking and Disney:

25 percent agree that "Satanic ritual sex abuse is widespread in this country."

33 percent agreed that "members of Satanic cults secretly abuse thousands of children every year."

26 percent agreed that "the Disney Corporation 'grooms' children into sexualized lifestyles."

28 percent agreed that "there is a secret 'gay agenda' aimed at converting young people into gay and trans lifestyles."

30 percent agreed that "elites, from government and Hollywood, are engaged in a massive child sex trafficking racket."

60 percent agree that there are at least 300,000 kids being sex trafficked in the U.S.

The child sex-trafficking myth: Only 10.3 percent of those surveyed said there are somewhat fewer or far fewer than 300,000 kids being trafficked. Around 30 percent said they didn't know.

We've tackled this last myth at Reason a number of times. It's a statistic based on a bad study that assigned risk factors based on broad situationslike being the child of immigrants, being in foster care, or living in public housingand then used these factors to arrive at the conclusion that 326,000 kids were "at risk for commercial sexual exploitation." The research never said this many kids were or would be trafficked, and even the method used to calculate risk is dubious. Nonetheless, the study is still cited frequently by people in government and law enforcement, and often morphs from children at risk of trafficking to children who are being trafficked.

The National Center for Missing and Exploited Children drew from this study and a 2002 Justice Department study (the National Incidence Studies of Missing, Abducted, Runaway and Thrownaway Children, or NISMART) to suggest that the number actually being trafficked is 100,000.

Years ago, Washington Post fact checker Glenn Kessler did a thorough debunking of both myths. Kessler notes that the NISMART survey "showed nearly 1.7 million kids had a runaway episode a year," but "only 1,700 kids less than one percent reported having engaged in sexual activity in exchange for money, drugs, food, or shelter during the episode."

Bipartisan lunacy: Many have blamed former President Donald Trump and other Republicans for myths about sex trafficking, given the right-wing bent of believers in the sex-trafficking panic that is QAnon. But myths and misinformation about sex trafficking have been spread for decades by both Republicans and Democrats.

And if Uscinski and Klofstad's poll is accurate, both Republicans and Democrats are strong believers in child sex-trafficking myths as well as Satanic Panic hoopla. In the poll, Republicans were more likely to agree that Disney is "grooming" children and that there's a secret "gay agenda." But Democrats were as or more likely to believe other conspiracy theories.

For instance, on the question of whether Satanic ritual sex abuse is widespread, 29 percent of Democrats and 26 percent of Republicans said yes.

Thirty-two percent of both Republicans and Democrats said Hollywood and government elites are sex-trafficking children.

And 61 percent of Democrats and 63 percent of Republicans agreed that 300,000 or more children are being trafficked in the U.S.

Surveys like this one get at why curbing misinformation on social mediasomething politicians are constantly harping on tech companies to dois so difficult. Wild myths are not merely fringe beliefs in many cases. They're shared by a number of Americans and, all too often, rooted in rhetoric from mainstream politicians.

You can find the full poll results here.

Judges shouldn't be able to sentence people based on crime accusations they've been cleared of, right? That seems like it only makes sense. Alas, it's not so clear to some, apparently. A case involving this question is before the U.S. Supreme Court. The Due Process Institute lays out the stakes in a new friend-of-the-court brief:

TikTok is pushing back on claims that it poses a national security threat. In a letter obtained by Politico and sent to Catherine Szpindor, chief administrative officer of the U.S. House of Representatives, the company challenged a "TikTok Cyber Advisory" issued by Szpindor's office. The company is urging Szpindor's office to rescind the advisory.

"Allegations that TikTok stores U.S. user data in China are inaccurate," states the letter, noting that U.S. user data is currently stored in Virginia and backed up on a server in Singapore. "Moreover, as we recently announced, 100% of U.S. user traffic is being routed to Oracle Cloud Infrastructure. We still use our U.S. and Singapore data centers for backup, but we expect to delete U.S. users' personal information from our own data centers and fully pivot to Oracle cloud servers located in the U.S."

TikTok also noted that contrary to the House report, it does not use facial recognition technology or collect face or voice data and "does not automatically collect precise GPS location information in the U.S. Our privacy policy is quite clear that in the event we were to request precise location data, users would have to approve it for each request."

The letter is the latest in an ongoing saga involving attempts to ban or further regulate the popular video app since it is owned by a Chinese company.

Arizona is punishing a mom for letting her 7-year-old kid and his friend play at the park without adult supervision.

The Centers for Disease Control and Prevention should get back to its roots, writes Reason's Ron Bailey.

"Two former Pennsylvania judges who orchestrated a scheme to send children to for-profit jails in exchange for kickbacks were ordered to pay more than $200 million to hundreds of people they victimized," reports the Associated Press.

Monkeypox may be spreading specifically through sex, rather than through simple skin-to-skin transmission as previously believed.

Oklahoma's governor issued a two-month stay of execution for Richard Glossip, a man on death row for a 1997 murder he did not (by anyone's account) commit and may have had nothing to do with.

Sex workers say they're increasingly being restricted on Redditone of the few social media sites to still allow nudity and explicit sexual content.

PEN America looks at censorship in American schools and finds that "this year, proposed educational gag orders have increased 250 percent compared to 2021. Thirty-six different states have introduced 137 gag order bills in 2022, compared to 22 states introducing 54 bills in 2021," though "there has been a decline in new gag order laws passed from 12 last year to 7 this year."

What could go wrong?

Read more:
The Satanic Panic Is Back, and It's Bipartisan - Reason

Read More..

The Global Network Functions Virtualization Market size is expected to reach $94.1 billion by 2028, rising at a market growth of 24.8% CAGR during the…

New York, Aug. 18, 2022 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Network Functions Virtualization Market Size, Share & Industry Trends Analysis Report By Component, By End User, By Enterprises Type, By Organization Size, By Application, By Regional Outlook and Forecast, 2022 - 2028" - https://www.reportlinker.com/p06315032/?utm_source=GNW NFV depends on conventional server virtualization strategies, like those employed in enterprise IT.

Instead of using specialized hardware appliances for every network function, a virtualized network function, or VNF, is deployed within one or even more virtual machines or containers that are each running different software and processes on top of high-volume commercial off-the-shelf (COTS) servers, switches, storage devices, and cloud computing infrastructure. This prevents vendor lock-in. For instance, to safeguard a network, a virtual session border controller can be used instead of actual network protection units, which are typically more expensive and complicated to buy and install.

Other NFV examples include virtualized firewalls, load balancers, WAN accelerators, and intrusion detection systems, to mention a few. By separating the network function software from the specialized hardware platform, a flexible network architecture is realized, allowing for rapid service rollouts, agile network administration, and a significant decrease in CAPEX and OPEX. With the help of NFV, communication services may be separated from specialized hardware like routers and firewalls.

Because of this division, network operations can offer new services on demand and without buying new hardware. With network functions virtualization, network components can be deployed in a matter of hours as opposed to months as with conventional networking. Additionally, rather than using expensive proprietary hardware, the virtualized services can function on less expensive generic servers. Network function virtualization essentially takes the role of the features offered by separate hardware networking components.

COVID-19 Impact Analysis

The IT and telecommunications sector, among others, was severely impacted by countermeasures including blockades, social isolation, and quarantine to combat the infection, due to which, the utilization of network functions virtualization software was reduced in the sector. For several months, various manufacturing facilities were shut down, which had a negative impact on the supply chain, the ability to import and export end devices, as well as the production, sales, and operations of the sector. The network functions virtualization market and revenues were impacted by supply chain disruptions and delays in the introduction of 5G standards. Due to this, the market was negatively impacted by the emergence of the pandemic. Hence, the market is estimated to recover from the impact of the COVID-19 pandemic in the coming years.

Market Growth Factors

Helps Businesses In Saving Costs And Boosting Agility

Carriers must offer more bandwidth at a reduced price. However, high bandwidth requirements or on-demand services were not incorporated into traditional carrier networks. Additionally, it is costly, complicated, and ineffective to attempt to improve already-existing hardware-based networks. As a result, carrier income is now growing slower than networking costs. Additionally, this is not a long-term business strategy. By separating network software from hardware, network functions virtualization solutions are intended to assist carriers in moving away from proprietary network hardware, which considerably reduces costs and improves service agility.

Rising Number Of Initiatives And Efforts By Market Players

NFVs benefits and concepts are straightforward, but putting it into practice becomes more difficult. This is due to the fact that NFV requires some level of engagement and collaboration between different network solution suppliers and network operators in order to fully benefit from it. Industry associations can help in such situations. Industry Specification Group, or ISG, for NFV, is being formed by the top network operators all over the world at a very rapid speed. Even while there is a lot of interest in the efforts of such associations to define the NFV framework, it is just one of many aspects in this rapidly expanding sector of industry development.

Market Restraining Factors

Security And Scalability Risks

What will happen to their job if their assets are unavailable is the biggest concern that many people have about virtualization. An organization would find it difficult to compete in its business if it is unable to access its data for an extended length of time. Additionally, since availability is managed by outside providers, virtualization does not provide users control over their ability to maintain connectivity. Although virtualization makes it possible to expand a business or prospect quickly, users might not be able to do so as quickly as they consider. A virtualized network experiences lag as a result of growth since numerous entities share the same resources.

Component Outlook

On the Basis of Component, the Network Functions Virtualization Market is bifurcated into Solutions and Services. In 2021, the solution segment acquired the largest revenue share of the network function virtualization market. The growth of the segment is ascribed to the rising adoption of automation and virtualization technologies. The need for mobility services is predicted to increase, and businesses significance in lowering operating costs through NFV is expected to expand. The solution consists of orchestration and automation as well as additional elements like virtual infrastructure managers, SDN controllers, NFV orchestrators, and WAN configurations.

Organization Size Outlook

Based on the Organization Size, the Network Functions Virtualization Market is divided into Small & Medium Enterprises and Large enterprises. In 2021, the large enterprises segment witnessed the biggest revenue share of the network functions virtualization market. The growth of the segment is rapidly expanding as network operations, virtualization tools, and services are becoming more widely used by large businesses. The need for network functions and virtualization solutions and services is also being driven by major organizations because they are the early adopters of cutting-edge technologies like virtualization, orchestration, and automation.

Application Outlook

By Application, the Network Functions Virtualization Market is classified into Virtual Appliance and Core Network. In 2021, the core network segment registered a substantial revenue share of the network functions virtualization market. The growth of this segment is being driven by the complexity of complex networks and the rising demand for network virtualization and automation. Network functions like security monitoring, traffic forwarding, domain name services, as well as intrusion detection systems are typically included in the core network.

End-User Outlook

Based on End-User, the Network Functions Virtualization Market is segregated into Service Providers, Data Centers, and Enterprises (BFSI, Healthcare, Retail, Manufacturing, Government and Defense, Education, and Others). In 2021, the enterprise segment witnessed a substantial revenue share of the network functions virtualization market. Because NFV offers substantial advantages including centralized administration for network efficiency, IT agility, and quick and dependable application services for network adaption, enterprise customers are majorly adopting this solution in order to grow their business. Therefore, this factor is propelling the growth of this segment of the market.

Regional Outlook

Region-Wise, the Network Functions Virtualization Market is analyzed across North America, Europe, Asia-pacific, and LAMEA. In 2021, North America accounted for the biggest revenue share of the network functions virtualization market. The adoption of technologies, like cloud computing, Software Defined Everything (SDx), and IoT is increasing, driving the growth of the regional market. The rapid expansion of numerous sectors has been facilitated by the high level of industrialization in countries, such as the United States and Canada. Moreover, the regional NFV sector is growing as a result of the favorable standards and laws in North American nations.

The major strategies followed by the market participants are Partnerships and Acquisition. Based on the Analysis presented in the Cardinal matrix; Intel Corporation and Huawei Technologies Co., Ltd. are the forerunners in the Network Functions Virtualization Market. Companies such as Hewlett Packard Enterprise Company, Oracle Corporation, Ericsson AB are some of the key innovators in Network Functions Virtualization Market.

The market research report covers the analysis of key stake holders of the market. Key companies profiled in the report include Intel Corporation, Oracle Corporation, Huawei Technologies Co., Ltd. (Huawei Investment & Holding Co., Ltd.), Ericsson AB, Hewlett Packard Enterprise Company, Juniper Networks, Inc., NEC Corporation, Amdocs Limited, F5 Networks, Inc, and Alcatel-Lucent Enterprise (China Huaxin Post and Telecom Technologies Co., Limited).

Recent Strategies Deployed in Network Functions Virtualization Market

Partnership, Collaboration and Agreement:

Jun-2022: Oracle partnered with Vodafone, the largest African and pan-European technology communications company. Under this partnership, the companies would focus on modernizing Vodafones European IT infrastructure and expedite its migration to the cloud.

Jul-2021: Intel joined hands with Bharti Airtel, an Indian telecommunications operator. Following this collaboration, the companies aimed to accelerate the development of 5G and 4G virtualized radio access networks as well as radio access network technology.

Apr-2021: NEC collaborated with Red Hat, the worlds enterprise open source leader. With this collaboration, the companies aimed to jointly focus on open-source software development and network functions virtualization system integration via the OpenStack Platform of Red Hat.

Product Launch and Product Expansion:

Jun-2021: Hewlett Packard rolled out a new 5G software solution into its existing 5G portfolio. The new solution comprises the ability to monitor and orchestrate the infrastructure, network functions, and services. Moreover, the new 5G software solution also detects and addresses issues automatically to secure service continuity.

Acquisition and Merger:

Jul-2022: NEC Corporation acquired Aspire Technology, an end-to-end network optimization services, and software solutions provider. This acquisition aimed to strengthen NECs SI portfolio for Open RAN 5G applications. In addition, this acquisition would also drive NECs capacity to provide End-to-End Open RAN ecosystems.

Apr-2022: Intel acquired spree from Granulate Cloud Solutions, a leading provider of cloud-based CRM software professional services. Through this acquisition, the company aimed to expand its portfolio and aid customers in minimizing the use of CPU and app latencies.

Dec-2021: Oracle took over Cerner, a supplier of health information technology solutions. This acquisition aimed to drive the revenue of Oracle on a non-GAAP basis within the first full fiscal year after closing. Moreover, Oracle also aimed to expand its revenue growth engine along with its business across several countries in the coming years

Sep-2021: F5 took over Threat Stack, a leading security and workload protection company. With this acquisition, the company aimed to integrate cloud security capabilities and expertise into its application and API protection solutions in order to improve visibility across applications and integrate workloads and infrastructures.

Jun-2021: Hewlett Packard took over Determined AI, a startup offering a robust software stack for Ai training. Through this acquisition, the company aimed to integrate software solutions of Determined AI into its leading high-performance and AI computing portfolio to allow ML engineers to train and deploy machine learning models.

Feb-2020: Hewlett Packard completed its acquisition of Scytale, a leader in InfoSec compliance automation. Through this acquisition, the company aimed to accelerate its progress toward achieving its goals through the integration of expertise.

Scope of the Study

Market Segments covered in the Report:

By Component

Solutions

Services

By End User

Service Providers

Data Centers

Enterprises

o BFSI

o Manufacturing

o Government & Defense

o Healthcare

o Retail

o Education

o Others

By Organization Size

Large Enterprises

Small & Medium Enterprises

By Application

Virtual Appliance

Core Network

By Geography

North America

o US

o Canada

o Mexico

o Rest of North America

Europe

o Germany

o UK

o France

o Russia

o Spain

o Italy

o Rest of Europe

Asia Pacific

o China

o Japan

o India

o South Korea

o Singapore

o Malaysia

o Rest of Asia Pacific

LAMEA

o Brazil

o Argentina

o UAE

o Saudi Arabia

o South Africa

o Nigeria

o Rest of LAMEA

Companies Profiled

Intel Corporation

Oracle Corporation

Huawei Technologies Co., Ltd. (Huawei Investment & Holding Co., Ltd.)

Ericsson AB

Hewlett Packard Enterprise Company

Juniper Networks, Inc.

NEC Corporation

Read the rest here:
The Global Network Functions Virtualization Market size is expected to reach $94.1 billion by 2028, rising at a market growth of 24.8% CAGR during the...

Read More..

This start-up incubated at IIT Kanpur just got govt funding of over Rs 3 crore – Business Today

Aiming at effectively monitoring and controlling the ground water exploitation in India, Department of Science & Technology (DST) has given financial support of Rs 3.29 crores to a start-up company Kritsnam Technologies which is developing a smart water monitoring system.The start-up incubated at IIT Kanpur is developing Dhaara Smart Flowmeter - an integrated system for online monitoring using two beam ultrasonic flowmeters that is designed to track the water distribution in real-time for applications such as drinking water supply, ground water extraction, industrial water usage and precision irrigation. The product being developed initially aims at commercial users like hotels, hospitals, malls, IT parks, schools, colleges and industrial users such as food products, packaged drinking water, pharmaceuticals, paper and pulp, etc.

The device collects data through sensors, stores it in the device, and transmits to the online cloud servers. The data transmitted to servers is analysed and displayed in the dashboard. This unique solution is a combination of hardware and software for flow measurement and water management respectively.

An MoU was signed on Wednesday between the Technology Development Board (TDB) under Department of Science and Technology and Kritsnam Technologies Private Limited, Ranchi, Jharkhand for production and commercialisation of Dhaara Smart Flow Meter. Dhaara Smart Flow Meter will greatly benefit Prime Minister Modis Atal Bhujal Yojana (Atal Jal), a Rs.6,000 crore Central Sector Scheme, for sustainable management of ground water resources with community participation, Singh said.The scheme is being implemented in 80 water stressed districts and 8,565 Gram Panchayats of seven states viz. Gujarat, Haryana, Karnataka, Madhya Pradesh, Maharashtra, Rajasthan and Uttar Pradesh from 1st April 2020 for a period of five years. Dhaara Smart Flow Meter can also help bulk water consumers to budget their water usage and empower them to understand their patterns, points of inefficiencies and help them to build strong strategies for reducing water wastage, Singh said.

The Dhaara Smart Flow Meter is battery operated and does not require external power. The hardware architecture is based on the internet of things (IoT) communication circuits which is patented in India. In addition, it complies with ISO and Central Ground Water Authority standards. The water usage data is automatically recorded in an online logbook through telemetry via 4G/2G. The built-in telemetry and battery-operated capabilities make it easy for users to monitor their water consumption virtually anywhere (even when the power is out).

The Central Groundwater Authority recently issued guidelines under which every commercial ground water user must install a smart water meter and pay yearly bills. All the project users drawing ground water and seeking/having NOC shall have to mandatorily install tamper-proof digital water flow meters with telemetry on all the ground water abstraction structures within their premises.

Ground Water levels in various parts of the country are declining because of continuous withdrawal due to reasons such as increased demand of fresh water for various uses, vagaries of rainfall, increase in population, industrialisation and urbanisation. As per the assessment of Dynamic Ground Water Resources (2017) carried out by the Central Ground Water Board (CGWB) in collaboration with States/UTs, out of the total 6,881 assessment units (Block/ Taluks/ Mandals/ watersheds/ Firkas) in the country, 1,186 units in 17 States/UTs have been categorised as over-exploited where Annual Ground Water Extraction is more than Annual Extractable Ground Water Resource.

Continue reading here:
This start-up incubated at IIT Kanpur just got govt funding of over Rs 3 crore - Business Today

Read More..

Global Hyper-Converged Infrastructure Markets, 2022-2027: Moving Towards Edge Computing, Benefits from HCI Adoption, Shift to Subscription-Based…

DUBLIN--(BUSINESS WIRE)--The "Global Hyper-Converged Infrastructure Market: Analysis By Component, By Application, By End-User, By Region Size and Trends with Impact of COVID-19 and Forecast up to 2027" report has been added to ResearchAndMarkets.com's offering.

The global hyper-converged infrastructure market in 2021 was valued at US$8.98 billion. The market is expected to reach US$38.58 billion by 2027. The market is expected to grow at a CAGR of 27.50% during the forecast period of 2022-2027.

Hyper-converged infrastructure (HCI) is referred to as an information technology that is a combination of various elements namely storage, computing, and networking which are virtualized to provide a single system for users and decrease the complexities related to the data center and upturn scalability. HCI is composed of virtualized computing (hypervisor), software-defined storage, and virtualized networking.

Due to the requirement for increased simplicity, agility, and hybrid deployments, businesses are abandoning traditional storage, server, and networking solutions in favor of hyper-converged infrastructure (HCI), which is changing the modern data center and technology updates.

Market Dynamics:

Growth Drivers: One of the most important factors impacting the hyper-converged infrastructure market is the need for enhanced data protection and disaster recovery solutions. To reduce complexity in both hardware and virtualized settings, organizations are turning to HCI.

Furthermore, the market has been growing over the past few years, due to factors such as shifting workload towards the cloud, growing HCI adoption rate by emerging countries, optimistic organization behavior for HCI installation, data center consolidation, and increasing demand from the healthcare industry and SMEs, etc.

Challenges: However, the market has been confronted with some challenges specifically, limitations due to dual-socket servers, challenges of HCI implementation, etc.

Trends: The market is projected to grow at a fast pace during the forecast period, due to various latest trends such as the shift to subscription-based contracts, benefits from HCI adoption, the transition towards a multi-cloud environment, and moving toward edge computing, HCI automation, etc.

The majority of the market-share leaders in multi-cloud deployments and hybrid cloud services are adopting hyper-converged infrastructure. For instance, the Dell Technologies Cloud platform, which is based on VxRail, the leading hyper-converged technology in the industry, is Dell Technologies' most aggressive cloud investment in years.

Market Segmentation Analysis:

In 2021, Hardware held a major share of 69% in the market as organizations are increasingly turning to hyper-converged infrastructure to simplify complexity for both hardware and virtualized environments. On the other hand, the software segment is expected to grow at the highest CAGR in the forthcoming years.

The data center consolidation segment held the major of 25.4% in the market, Whereas, the backup recovery or disaster recovery is expected to grow at a significant rate owing to the rising number of data breaching cases.

The BFSI held the one-fourth share in the market. Hyper-converged systems tick all critical boxes in the banking, financial services, and insurance (BFSI) industry, such as reducing time in managing infrastructure, as well as ensuring scalability of infrastructure, availability of critical workloads, and disaster recovery (DR). In addition, these systems solve the issue of single-vendor networking infrastructure. Thus, the adoption of HCI in BFSI is expected to grow in the coming years.

North America held the major share of 38% in the market as the growing number of connected devices and video services are expected to broaden the reach of the hyper-converged industry in North America. Asia Pacific is expected to grow at the highest CAGR of 30.1% in the forthcoming years.

The rise in ICT infrastructure investments by government bodies and private companies has enhanced the need to modernize data center structures. Moreover, this is mainly owing to the increase in service requirements among the ever-increasing population base in various Asia Pacific countries. In Europe, Germany occupied the major share of approx. 23% in the market.

Impact Analysis of COVID-19 and Way Forward:

During the pandemic, the use of hyper-converged infrastructure increased since activities in the IT business were often carried out through a 'work from home' framework. As a result, hyper-converged infrastructure was in high demand in the IT industry all over the world.

Furthermore, due to the pandemic, the new hyper-converged infrastructure installation has been postponed. On the contrary, the advent of hyper-converged infrastructure as a viable alternative to public cloud computing would have a beneficial impact on the market and considerably contribute to its growth in the forthcoming years.

Competitive Landscape:

In 2021, Vmware Inc., announced the acquisition of Octarine Inc., in order to expand the company's security abilities for containers and kubernetes. The application running on Kubernets and would integrate security capabilities into the fabric of the present IT and DevOps environments.

The global hyper-converged infrastructure market is considerably dominated.

Market Dynamics

Growth Drivers

Challenges

Market Trends

The key players of global hyper-converged infrastructure market are:

For more information about this report visit https://www.researchandmarkets.com/r/mxyy76

View original post here:
Global Hyper-Converged Infrastructure Markets, 2022-2027: Moving Towards Edge Computing, Benefits from HCI Adoption, Shift to Subscription-Based...

Read More..

25 Deep Questions about Life You Need to Ask Yourself – Learning Mind

Often in our busy lives, we dont stop to ask deep questions about life. However, making the time to ask these questions can transform our lives.

If we keep plodding along in life without asking deep questions, we can miss out on opportunities for growth, enlightenment, and self-fulfillment. Taking the time to ask ourselves some important questions can reveal to us many insights into who we are and what we want from life.

We can be held back by limiting beliefs that we have picked up in childhood or over the course of our lives. These limiting beliefs can block our progress. It is only by questioning everything we think, feel and believe that we can move towards living a life that truly fulfills us.

We can question our limiting beliefs and the rules and norms of society. In addition, we can question our political and religious beliefs and our ideas about ourselves and others. We can also question our work, relationships, and leisure.

It may sound daunting to question everything in our lives. However, if we desire to change its the best way to start.

So, if you feel you are stuck in a rut or you are just not sure what your life purpose is or what next step to take, consider asking yourself some of the following deep questions about life.

Settle down with your journal and favorite pen and commit to some soul searching. Take your time and just write what comes into your head. You may be surprised by the inner knowledge you have about what is holding you back and how to transform your life.

A word of caution though: these questions are powerful and can cause massive transformations in your life. If you want to stay in your comfort zone, you might want to give this practice a miss!

Asking these questions is not always easy. Sometimes the answers may bring us pain. They may bring up emotions that are difficult and we may need help from a counselor to process what we find.

But asking these questions is worth the trouble. If we dont question what we are doing with our lives, we may miss out on achieving the things we want.

Its easy to get stuck in a rut of work, paying bills, chores, and TV. Often we avoid getting real with ourselves and discovering what would make our hearts sing.

While some of the questions may cause us to be uncomfortable, many of them can bring us great joy and help us create better relationships and achieve our dreams. If we get clear about what we want from life and what might be holding us back, we can begin to make real progress.

What deep questions about life do you think shake us up and open our minds to different ways of living and being? Please share your thoughts with us in the comment section below.

Contributing writer at Learning Mind

Kirstie Pursey holds a diploma in creative writing from the Open University and works as a writer, blogger, and storyteller. She lives in London with her family of people, dogs, and cats. She is a lover of reading, writing, being in nature, fairy lights, candles, fireside, and afternoon tea.

See the article here:
25 Deep Questions about Life You Need to Ask Yourself - Learning Mind

Read More..

‘Why Do I Hate Myself’? 6 Deep-Rooted Reasons – Learning Mind

Why do I hate myself? Ive asked myself this question over and over again. So, I did some deep soul searching to find out. This is what I learned.

No matter who you are or what you do in life, you will come to a place of self-hatred. I think it happens to all of us. It happened to me several times, especially as a young adult. And guess what, I have moments here and there where it creeps up to bite me once more.

But now I know what to do when it happens.

If you ever get an opportunity to see your self-loathing with its true face, you will be well on your way to understanding why its there, to begin with.

The problem so many of us have is that we cover it up, or we deny that we hate ourselves. But we cannot keep doing this because it will absolutely destroy us in time. So, getting to the root of the problem is the ideal solution.

One reason you ask, Why do I hate myself? is because youve stored some things about your family in the back of your mind. Unveiling those truths, when youre ready to know, will be painful.

You either had a family that neglected you, or you had a family who smothered you. In some cases, the family you were given considered you the black sheep. If you were the black sheep, its easy to understand where the self-hate came from.

Our ego wasnt present at our birth, so we developed this as we went along. So many of us grew an ego that was flawed because it was enmeshed in a mixture of low and high self-esteem. We learned to survive and sometimes used people to get what we wanted. Come on, weve all been less than saintly people at times.

As we treated others in unkind ways, we understood that our ego was to blame. Some of us got stuck in this pattern of negative treatment that led to hating ourselves in the end. The more we hated ourselves, the worse we treated others, and so the pattern developed. This root could go back as far as our early teens.

Yes, dysfunctional families caused some childhood trauma just by being neglectful or smothering. However, severe childhood abuse, not just by family members, may have caused a thick root to travel throughout our lives and make us hate ourselves.

For years, I hated myself for being abused until someone finally convinced me that it wasnt my fault. If you wonder, Why do I hate myself so much?, look back at the roots of your childhood. Sometimes nefarious could be hiding there.

As you grow older, you will encounter what I call fake people. I try to stay away from them now. There was a time, although, that I tried hard to make friends with people who I thought were popular or influential. This only damaged my self-esteem.

When those friends betrayed me, I couldnt understand. I ended up hating myself and wondering what was wrong with me. You see, self-loathing comes quickly when dealing with fake friends. Be careful and guard your heart. Not every friend is really a friend at all.

One reason why we end up hating ourselves so much is that a relationship ended badly with a toxic person. Many times, we get involved with someone who turns out to have a personality disorder. The narcissism and gaslighting have us believing lies like, Im worthless, Im ugly, and even I will never amount to anything.

This toxic person already hates themselves, and the only way they can feel better is to spread the disease and make other people suffer too. Well, it could just be a root that needs to be cut from another person you thought loved you. Unfortunately, they did not.

Ive known many girls whove adopted low self-esteem simply because someone body-shamed them. In case you dont know, body shaming is when a person is meant to feel bad for either being too big or too small, among other physical differences. They are criticized or insulted horribly.

Its a form of bullying, and I guess you can say that self-loathing comes from this bullying behavior. This too can have roots from childhood. Even children are body-shamed every day.

Loving yourself might not be easy at first, especially if youre still in a relationship with someone who brings you down as fast as you try to get back up. The hate you feel for yourself may even be leading to self-harm. So, if this is the case, getting away from that influence will change your life.

If the roots are deeper and travel into childhood, learning to love yourself may take a bit more time. One thing that worked for me was getting to know myself apart from any other influence. I had to train myself to not dwell on the trauma all the time, and understand that what happened to me isnt who I am.

Even the people in my family, though they share genetic material still arent me. I am a good person. You are a good person too, and its important to realize this fact and appreciate the life you have. Its time to stop asking Why do I hate myself?, and instead, start saying, How can I be a better person tomorrow?

Be better, do better.

If you feel like you hate yourself, read this article to learn how to cope with this emotional state.

References:

Staff writer at Learning Mind

Sherrie Hurd is a professional writer and artist with over 20 years of experience. As a survivor of childhood trauma and multiple types of abuse, she is an advocate for mental health awareness. Sherrie manages multiple mental illnesses, including anxiety disorder, bipolar disorder, and PTSD. With this background and personal experience, she strives to help others overcome trauma and abuse, cope with mental illness, and heal over time.

Read more:
'Why Do I Hate Myself'? 6 Deep-Rooted Reasons - Learning Mind

Read More..

DeepMind feuds with Russian scientists over quantum AI research – TNW

Theres nothing quite so dramatic and inspirational as a scientific breakthrough. But what happens when different groups of scientists cant seem to agree on the science?

DeepMind, an Alphabet research company based in London, published a fascinating research paper last year wherein it claimed to have solved the huge challenge of simulating matter on the quantum scale with AI. Now, nearly eight months later, a group of academic researchers from Russia and South Korea may have uncovered a problem with the original research that places the papers entire conclusion in doubt.

The implications for this cutting-edge research could be huge, if the papers conclusions are true. In essence, were talking about the potential to use artificial intelligence to discover new ways to manipulate the building blocks of matter.

Subscribe to our newsletter now for a weekly recap of our favorite AI stories in your inbox.

The big idea here involves being able to simulate quantum interactions. Our world is made up of matter which is made up of molecules that are made up of atoms. At each level of abstraction, it becomes harder and harder to simulate.

By the time you reach the quantum level, which exists inside of atoms, the problem of simulating potential interactions becomes incredibly challenging.

Per a blog post from DeepMind:

To do this on a computer requires the simulation of electrons, the subatomic particles that govern how atoms bond to form molecules and are also responsible for the flow of electricity in solids.

Despite decades of effort and several significant advances, accurately modelling the quantum mechanical behaviour of electrons remains an open challenge.

The basic problem is that its really hard to predict the probabilities of a given electron ending up in a specific position. And the complexity increases the more you add.

As DeepMind pointed out in the same blog post, a pair of physicists back in the 1960s came up with a breakthrough:

Pierre Hohenberg and Walter Kohn realised that it is not necessary to track each electron individually. Instead, knowing the probability for any electron to be at each position (i.e., the electron density) is sufficient to exactly compute all interactions. Kohn received a Nobel Prize in Chemistry after proving this, thus founding Density Functional Theory (DFT).

Unfortunately, DFT could only simplify the process so far. The functional part of the theory relied on humans to do all the heavy lifting.

That all changed back in December when DeepMind published a paper entitled Pushing the frontiers of density functionals by solving the fractional electron problem.

In this paper, the DeepMind team claims to have radically improved current methods for modeling quantum behavior through the development of a neural network:

By expressing the functional as a neural network and incorporating these exact properties into the training data, we learn functionals free from important systematic errors resulting in a better description of a broad class of chemical reactions.

DeepMinds paper made it through the initial, formal review process and all was well. Until August 2022 rolled around and a team of eight academics from Russia and South Korea published a comment questioning its conclusion.

Per a press release from Skolkovo Institute of Science and Technology:

DeepMind AIs ability to generalize the behavior of such systems does not follow from the published results and requires revisiting.

In other words: the academics are disputing how DeepMinds AI came to its conclusions.

According to the commenting researchers, the training process that DeepMind used to build its neural network taught it how to memorize the answers to the specific problems it was going to face during benchmarking the process by which scientists determine if one approach is better than another.

In their comment, the researchers write:

Although the conclusion of Kirkpatrick et al. about the role of FC/FS systems in the training set may be correct, it is not the only possible explanation for their observations.

In our opinion, the improvements in the performance of DM21 on the BBB test dataset relative to DM21m may be caused by a much more prosaic reason: an unintended overlap between the training and test datasets.

If this is true, it would mean DeepMind didnt actually teach a neural network to predict quantum mechanics.

DeepMind was quick to respond. The company published its response on the same day as the comment and provided an immediate and firm rebuke:

We disagree with their analysis and believe that the points raised are either incorrect or not relevant to the main conclusions of the paper and to the assessment of general quality of DM21.

The team expands on this throughout its retort:

DM21 is not memorizing the data; this is simply shown by the fact that the DM21 Exc changes over the full range of distances considered in BBB and is not equal to the infinite separation limit, as shown in Fig. 1, A and B, for H2+ and H2. For example, at 6 , the DM21 Exc is ~13 kcal/mol from the infinite limit in both H2+ and H2 (although in opposite directions).

And, while its beyond the scope of this article to explain the above jargon, we can safely assume that DeepMind was likely prepared for that particular objection.

As to whether that solves the problem remains to be seen. At this point, weve yet to see further rebuttal from the academic team to see if their concerns have been assuaged.

In the meantime, its possible that the ramifications of this discussion could go far beyond just affecting a single research paper.

As the fields of artificial intelligence and quantum science become increasingly intertwined, theyre also becoming more and more dominated by corporate research tanks with deep pockets.

What happens when theres a scientific deadlock opposing sides are unable to agree on the efficacy of a given technological approach via the scientific method and corporate interests come into play?

The core of the problem could lie in the inability to explain how AI models crunch the numbers to come to the conclusions they do.

These systems can go through millions of permutations before outputting an answer. It would be impossible to explain every step of the process, which is exactly why we need algorithmic shortcuts and AI to brute force mass-scale problems that would be too large for a human or computer to solve head on.

Eventually, as AI systems continue to scale, we could reach a point where we no longer have the tools necessary to understand how they work. When this happens, we could see a divergence between corporate technology and that which passes external peer review.

Thats not to say DeepMinds paper is an example of this. As the commenting academic team wrote in their press release:

The usage of fractional-electrons systems in the training set is not the only novelty in the work by DeepMind. Their idea of introducing the physical constraints into a neural network via the training set, as well as the approach for imposing physical sense through training on the correct chemical potential, are likely to be widely used in construction of neural network DFT functionals in the future.

But were experiencing a bold, new, AI-powered technology paradigm. Its probably time we started considering what the future looks like in a post-peer-review world.

Continued here:
DeepMind feuds with Russian scientists over quantum AI research - TNW

Read More..

Going deep inside the mind of Lincoln Riley on The Riley Files – Trojans Wire

Were almost there. Our 12-part summer podcast series on Lincoln Riley, The Riley Files, has arrived at Episode 11. We look at the thought processes, the emotional disposition, and personal inclinations of USCs head coach.

We turned to Oklahoma insider Kegan Reneau for more insights on the person, the public figure, the coach, and what makes him tick.

We discussed the media interviews Riley gave earlier this offseason, wondering why Riley gave what would widely be considered very generic and bland coach-speak. Why speak in such a coded way while making such an effort to talk to numerous media outlets? What was the strategy or purpose behind these decisions from Riley? What does this say about his relationship with the media, and how he manages a football program during the season?

Examining his Oklahoma years offers a basis for understanding more about this very complicated man. This is one of the cornerstone reasons for launching The Riley Files podcast series in the first place: to take you inside his mind and give you the assessment of a journalist who covered him up close for several years. Its a level of insight we wanted to bring to you at Trojans Wire.

Only one episode remains in our special series.

Ian Hest, as always, produced this latest show:

View post:
Going deep inside the mind of Lincoln Riley on The Riley Files - Trojans Wire

Read More..