Page 2,008«..1020..2,0072,0082,0092,010..2,0202,030..»

Boosting US Fighter Jets NASA Research Applies Artificial Intelligence To Hypersonic Engine Simulations – EurAsian Times

Researchers from the National Aeronautics and Space Administration (NASA) have teamed up with the US Department of Energys Argonne National Laboratory (ANL) to develop artificial intelligence (AI) to enhance the speed of simulations to study the behavior of air surrounding supersonic and hypersonic aircraft engines.

Fighter jets such as F-15s regularly exceed Mach 2 two times the speed of sound during the flight which is known as supersonic level. On a hypersonic flight which is Mach 5 and beyond, an aircraft flies faster than 3,000 miles per hour.

Hypersonic speeds have been made possible since the 1950s by the propulsions systems used for rockets however, engineers and scientists are working on advanced jet engine designs to make the hypersonic flight much less expensive than a rocket launch and more common such as for commercial flight, space exploration, and national defense purposes.

The newly published paper by a team of researchers from NASA and ANL details the machine learning techniques to reduce the memory and cost required to conduct computational fluid dynamics (CFD) simulations related to fuel combustion at supersonic and hypersonic speeds.

The paper was previously presented at the American Institute of Aeronautics and Astronautics SciTech Forum in January.

Before building and testing any aircraft, CFD simulations are used to determine how the various forces surrounding an aircraft in flight will interact with it. CFD consists of numerical expressions representing the behavior of fluids such as air and water.

When an aircraft breaks the sound barrier which involves traveling at speeds surpassing that of sound, it generates a shock wave which is a disturbance that makes the air around it hotter, denser, and higher in pressure causing it to behave very violently.

At hypersonic speeds, the air friction created is so strong that it could melt parts of a conventional commercial plane.

The air-breathing jet engines draw in oxygen to burn fuel as they fly so the CFD simulations have to account for major changes in the behavior of air, not only surrounding the plane but also as it moves through the engine and interacts with fuel.

While a conventional plane has fan blades to push the air along, in planes approaching Mach 3 and above speeds, their movement itself compresses the air. These aircraft designs, known as scramjets, are important to attain fuel efficiency levels that rocket propulsion cannot.

So, when it comes to CFD simulations on an aircraft capable of breaking the sound barrier, all the above factors add new levels of complexity to an already computationally intense exercise.

Because the chemistry and turbulence interactions are so complex in these engines, scientists have needed to develop advanced combustion models and CFD codes to accurately and efficiently describe the combustion physics, said Sibendu Som, a study co-author and interim center director of Argonnes Center for Advanced Propulsion and Power Research.

NASA has a hypersonic CFD code known as VULCAN-CFD which is specially meant for simulating the behavior of combustions in such a volatile environment.

This code uses something called flamelet tables where each flamelet is a small unit of a flame within the entire combustion model. This data table consists of different snapshots of burning fuel in one huge collection which takes up a large amount of computer memory to process.

Therefore, researchers at NASA and the ANL are exploring the use of AI to simplify these CFD simulations by reducing the intensive memory requirements and computational costs, to increase the pace of development of barrier-breaking aircraft.

Computational Scientists at ANL used a flamelet table generated by Argonne-developed software to train an artificial neural network that could be applied to NASAs VULCAN-CFD code. The AI used values from the flamelet table to learn shortcuts about determining the combustion behavior in supersonic engine environments.

The partnership has enhanced the capability of our in-house VULCAN-CFD tool by leveraging the research efforts of Argonne, allowing us to analyze fuel combustion characteristics at a much-reduced cost, said Robert Baurle, a research scientist at NASA Langley Research Center.

Countries across the world are racing to achieve hypersonic flight capability and an essential part of this race are simulation experiments where there is huge potential for the application of emerging tech such as AI and machine learning (ML).

Last month, according to a recent EurAsian Times report, Chinese researchers led by a top-level advisor to the Chinese military on hypersonic weapon technology, claimed a significant breakthrough in an AI system that can design new hypersonic vehicles autonomously.

Moreover, in February a Chinese space company called Space Transportation announced plans for tests beginning next year on a hypersonic plane capable of doing 7,000 miles per hour.

The company claimed that their plane could fly from Beijing to New York in an hour.

Read more:
Boosting US Fighter Jets NASA Research Applies Artificial Intelligence To Hypersonic Engine Simulations - EurAsian Times

Read More..

Developing countries are being left behind in the AI race – and that’s a problem for all of us – Economic Times

By Joyjit Chatterjee and Nina Dethlefs, University of Hull Cottingham

Artificial Intelligence (AI) is much more than just a buzzword nowadays. It powers facial recognition in smartphones and computers, translation between foreign languages, systems which filter spam emails and identify toxic content on social media, and can even detect cancerous tumours. These examples, along with countless other existing and emerging applications of AI, help make people's daily lives easier, especially in the developed world.

As of October 2021, 44 countries were reported to have their own national AI strategic plans, showing their willingness to forge ahead in the global AI race. These include emerging economies like China and India, which are leading the way in building national AI plans within the developing world.

Notably, the lowest-scoring regions in this index include much of the developing world, such as sub-Saharan Africa, the Carribean and Latin America, as well as some central and south Asian countries.

The developed world has an inevitable edge in making rapid progress in the AI revolution. With greater economic capacity, these wealthier countries are naturally best positioned to make large investments in the research and development needed for creating modern AI models.

In contrast, developing countries often have more urgent priorities, such as education, sanitation, healthcare and feeding the population, which override any significant investment in digital transformation. In this climate, AI could widen the digital divide that already exists between developed and developing countries.

The hidden costs of modern AI AI is traditionally defined as "the science and engineering of making intelligent machines". To solve problems and perform tasks, AI models generally look at past information and learn rules for making predictions based on unique patterns in the data.

AI is a broad term, comprising two main areas - machine learning and deep learning. While machine learning tends to be suitable when learning from smaller, well-organised datasets, deep learning algorithms are more suited to complex, real-world problems - for example, predicting respiratory diseases using chest X-ray images.

Many modern AI-driven applications, from the Google translate feature to robot-assisted surgical procedures, leverage deep neural networks. These are a special type of deep learning model loosely based on the architecture of the human brain.

Crucially, neural networks are data hungry, often requiring millions of examples to learn how to perform a new task well. This means they require a complex infrastructure of data storage and modern computing hardware, compared to simpler machine learning models. Such large-scale computing infrastructure is generally unaffordable for developing nations.

Beyond the hefty price tag, another issue that disproportionately affects developing countries is the growing toll this kind of AI takes on the environment. For example, a contemporary neural network costs upwards of US$150,000 to train, and will create around 650kg of carbon emissions during training (comparable to a trans-American flight). Training a more advanced model can lead to roughly five times the total carbon emissions generated by an average car during its entire lifetime.

Developed countries have historically been the leading contributors to rising carbon emissions, but the burden of such emissions unfortunately lands most heavily on developing nations. The global south generally suffers disproportionate environmental crises, such as extreme weather, droughts, floods and pollution, in part because of its limited capacity to invest in climate action.

Developing countries also benefit the least from the advances in AI and all the good it can bring - including building resilience against natural disasters.

Using AI for good While the developed world is making rapid technological progress, the developing world seems to be underrepresented in the AI revolution. And beyond inequitable growth, the developing world is likely bearing the brunt of the environmental consequences that modern AI models, mostly deployed in the developed world, create.

But it's not all bad news. According to a 2020 study, AI can help achieve 79 per cent of the targets within the sustainable development goals. For example, AI could be used to measure and predict the presence of contamination in water supplies, thereby improving water quality monitoring processes. This in turn could increase access to clean water in developing countries.

The benefits of AI in the global south could be vast - from improving sanitation, to helping with education, to providing better medical care. These incremental changes could have significant flow-on effects. For example, improved sanitation and health services in developing countries could help avert outbreaks of disease.

But if we want to achieve the true value of "good AI", equitable participation in the development and use of the technology is essential. This means the developed world needs to provide greater financial and technological support to the developing world in the AI revolution. This support will need to be more than short term, but it will create significant and lasting benefits for all. (This article is syndicated by PTI from The Conversation)

Go here to read the rest:
Developing countries are being left behind in the AI race - and that's a problem for all of us - Economic Times

Read More..

Top 5 Benefits of Artificial intelligence in Software Testing – Analytics Insight

Have a look at the top 5 benefits of using Artificial intelligence in software testing

One of the recent buzzwords in the software development industry is artificial intelligence. Even though the use of artificial intelligence in software development is still in its infancy, the technology has already made great strides in automating software development. Integrating AI in software testing enhanced the quality of the end product as the systems adhere to the basic standards and also maintain company protocols. So, let us have a look at some of the other crucial benefits offered by AI in software testing.

A method of testing that is getting more and more popular every day is image-based testing using automated visual validation tools. Many ML-based visual validation tools can detect minor UI anomalies that human eyes are likely to miss.

Shared automated tests can be used by the developers to catch problems quickly before sending them to the QA team. Tests can be run automatically whenever the source code changes, checked in and notified the team or the developer if they fail.

Manual testing is a slow process. And every code change requires new tests that consume the same amount of time as before. AI can be leveraged to automate the test processes. AI provides for precise and continuous testing at a fast pace.

AI/ ML tools can read the changes made to the application and understand the relationship between them. Such self-healing scripts observe changes in the application and start learning the pattern of changes and then can identify a change at runtime without you having to do anything.

With software tests being repeated each time source code is changed, manually happening those tests can be not only time-consuming but also expensive. Interestingly, once created automated tests can be executed over and over, with zero additional cost at a much quicker pace.

Conclusion: The future of artificial intelligence and machine learning is bright. AI and its adjoining technologies are making new waves in almost every industry and will continue to do so in the future.

Share This ArticleDo the sharing thingy

About AuthorMore info about author

Analytics Insight is an influential platform dedicated to insights, trends, and opinions from the world of data-driven technologies. It monitors developments, recognition, and achievements made by Artificial Intelligence, Big Data and Analytics companies across the globe.

More here:
Top 5 Benefits of Artificial intelligence in Software Testing - Analytics Insight

Read More..

Insights on the Artificial Intelligence in Digital Genome Global Market to 2028 – by Offering, Technology, Functionality, Application, End-user, and…

Dublin, April 18, 2022 (GLOBE NEWSWIRE) -- The "Artificial Intelligence in Digital Genome Market, by Offering, by Technology, by Functionality, by Application, by End User, and by Region - Size, Share, Outlook, and Opportunity Analysis, 2021 - 2028" report has been added to ResearchAndMarkets.com's offering.

Digital genome is a comprehensive digital set of genetic material that occurs in a cell or an organism. It is a simpler way to gather information concerning chronic diseases and utilized by experts to get a nearer look of genetic disorders. A digital genome acts as a supporter that facilitates instant access to trait sequences to resolve unending custom queries.

In genomics artificial intelligence focuses on the use of artificial intelligence (AI) in the development of computer systems that can perform tasks such as mapping genomes. Artificial intelligence and machine learning methods are currently been used to overcome various problems faced by genomics such as annotating genomic sequence elements, identifying splice sites, promoters, enhancers, and positioned nucleosomes.

Market Dynamics

Factors such as key players in the market are focusing on growth strategies such as development in AI tools and collaborations which is expected to drive the growth of the global artificial intelligence in digital genome market over forecast period.

For instance, in May 2020, NVIDIA, a U.S. based multinational technology company, had developed new artificial intelligence and genomic sequencing capabilities to help researchers track and treat COVID-19. Moreover, in September 2019, Novartis, an American Swiss multinational pharmaceutical corporation and Microsoft, a U.S. based multinational technology corporation, announced a multiyear alliance which will leverage data & artificial intelligence (AI) to transform how medicines are discovered, developed, and commercialized.

Key features of the study:

Key Topics Covered:

1. Research Objectives and Assumptions

2. Market Purview

3. Market Dynamics, Regulations, and Trends Analysis

4. Global Artificial Intelligence in Digital Genome Market- Impact of Coronavirus (COVID-19) Pandemic

5. Global Artificial Intelligence in Digital Genome Market, By Offering, 2017 - 2028, (US$ Mn)

6. Global Artificial Intelligence in Digital Genome Market, By Technology, 2017 - 2028, (US$ Mn)

7. Global Artificial Intelligence in Digital Genome Market, By Functionality, 2017 - 2028, (US$ Mn)

8. Global Artificial Intelligence in Digital Genome Market, By Application, 2017 - 2028, (US$ Mn)

9. Global Artificial Intelligence in Digital Genome Market, By End User, 2017 - 2028, (US$ Mn)

10. Global Artificial Intelligence in Digital Genome Market, By Region, 2017 - 2028, (US$ Mn)

11. Competitive Landscape

12. Section

For more information about this report visit https://www.researchandmarkets.com/r/7y29sv

Read more:
Insights on the Artificial Intelligence in Digital Genome Global Market to 2028 - by Offering, Technology, Functionality, Application, End-user, and...

Read More..

Becker bill to remove police radio encryption picks up support – The Almanac Online

A bill authored by Sen. Josh Becker, D-Menlo Park, that would require law enforcement agencies throughout California to find alternatives to encrypting their radio communications cleared its first hurdle Tuesday when the Senate Public Safety Committee voted to advance the legislation.

Becker's legislation, Senate Bill 1000, responds to a recent trend of police departments throughout the state moving to encrypted radio communications, a switch that makes it impossible for journalists and other residents to monitor police activities. Palo Alto, which switched to an encrypted channel in January 2021, was among the early adopters. Almost every other police department in Santa Clara County has since made the switch.

Becker's bill aims to reverse the trend and force law enforcement agencies to find alternatives to encrypted radios. If approved by the Legislature and signed into law, police departments would have to adopt policies that allow radio communications to be monitored while protecting personally identifiable information such as Social Security numbers, driver's license numbers and criminal records of individuals.

Like other departments, Palo Alto police said their switch to encryption was prompted by an October 2020 directive from the state Department of Justice requiring all police agencies that rely on the California Law Enforcement Telecommunications System (CLETS), a database used by law enforcement agencies across the state, to protect personal information. Under the directive, agencies were allowed to do so either by encrypting their radio communications or by adopting policies that protect the personal information, which could mean relaying this information by cellphone, computer or other means.

At a hearing Monday, Becker said that his bill is consistent with that order because it will require law enforcement agencies to protect personally identifiable information, as required by the Department of Justice. He argued, however, that full encryption is both unnecessary and harmful when it comes to protecting the residents' right to know what is happening in their communities.

"For 70-plus years, news outlets, journalists and the public have had access to this information, and it's critically important for transparency and accountability and for reporting public safety activities to the public," Becker said.

The committee voted 4-1 to advance the bill, with only state Sen. Rosilicie Ochoa Bogh, R-Yucaipa, dissenting. While she said she agreed with Becker that journalists play an important role in society, she argued that many police departments had already spent significant funds on encryption technology. Switching back would be "extremely costly and difficult for our police department to implement," she said.

She also argued that making police communication available to the public would allow "nefarious actors" to track police activities.

Other committee members Chair Steven Bradford and Sens. Sydney Kamlager, Nancy Skinner and Scott Wiener all supported the Becker bill, which will next go to the Senate Appropriations Committee.

Jennifer Seelig, director of news and programming at KCBS and board member at the Radio Television Digital News Association, testified on Monday that having access to the police scanner is critical for news organizations.

"We need to know what first responders are doing in real time," Seelig said. "The decision by a number of law enforcement agencies to fully encrypt communication greatly limits the ability of journalists to serve the public."

Excerpt from:
Becker bill to remove police radio encryption picks up support - The Almanac Online

Read More..

Thales and TheGreenBow join forces to offer a high-security encryption solution for network communications – Thales

In todays increasingly connected world, the security of our information systems is more crucial than ever. In response to rapidly changing mobility and security needs, Thales, a leader in the cybersecurity market, and TheGreenBow, a French provider of VPN solutions, have signed an industrial cooperation agreement to provide a secure remote access solution.

The solution includes TheGreenBows Windows Enterprise VPN client and Thaless Gateways IPsec Mistral encryption technology. The latest version has been certified by French information security agency ANSSI to offer civil and military organisations top-notch protection for their information systems. Combining a very high data rate infrastructure encryptor with a security-certified VPN client1, Mistral also protects employees accessing these information systems while travelling or working remotely. Mistral is currently the only product capable of protecting information systems at EU Restricted and NATO Restricted level in line with ANSSIs IPsec security recommendations. It is on the cutting edge of developments in the field of security and offers a superior level of performance and quality of service for enterprise networks. This new solution meets the specific need to protect access to information systems for critical national infrastructure providers, local authorities and healthcare services including hospitals and clinics. It provides end-to-end data security from the remote access point to the enterprise information system across all types of networks from satellite links to 10Gbps real-time datacentre traffic.

Mistral DR gateways draw on Thales's expertise in network encryption and its extensive experience in large-scale deployments and migrations of critical networks. With TheGreenBows VPN client, the gateways secure data traffic to and from any mobile or remote platform to provide a sovereign, integrated solution allowing users to access sensitive networks from any device. This partnership meets to a growing need for secure, remote interconnection of sensitive information systems.

This partnership will allow Thales and TheGreenBow to offer a cutting-edge cybersecurity solution with the performance needed by critical national infrastructure providers and other economic actors in sensitive sectors in France and internationally. It is an illustration of Thaless ability to integrate third-party solutions with its systems to better meet the needs of its customers and the market at large. Pierre Jeanne, Vice President Cybersecurity, Thales

"With this new ODM1 partnership, TheGreenBow is continuing its policy of forging alliances to offer the highest possible level of security, performance and quality of service for enterprise networks. Mathieu Isaia, Managing Director, TheGreenBow

1TheGreenBow Windows VPN client (version 6.52.006)

1ODM: Original Design Manufacturer

Read the original:
Thales and TheGreenBow join forces to offer a high-security encryption solution for network communications - Thales

Read More..

Congress wants a plan for post-quantum hacking threats for federal IT systems – SC Media

Congress wants the federal government to have a plan in place for protecting federal IT systems and assets from future hacks carried out by quantum computers.

To be clear, computer scientists at the National Institute for Standards and Technology believe the tangible threat of quantum codebreaking is still years away, but the widespread replacement of much of the older, classical encryption underpinning systems and data is likely to come during the next few years.

The Quantum Computing Cybersecurity Preparedness Act, sponsored by Reps. Ro Khanna, D-Calif.; Nancy Mace, R-S.C.; and Gerry Connolly, D-Va., would force the civilian federal government to develop a concerted strategy to tackle this replacement. The bill, which Khanna first referenced during a January House Oversight Committee hearing, would give the Office of Management and Budget a year from the time NIST finalizes its post-quantum encryption standards (expected later this year) to begin prioritizing the migration of devices and systems at civilian federal agencies. It also requires OMB to begin developing a list of high-risk systems and assets that will be prioritized for replacement.

The director of OMB would be responsible for delivering a report updating Congress on the governments progress, the potential cybersecurity risks posed by quantum computers, the amount of estimated funding needed to replace encryption for government systems and devices and U.S. coordination on post-quantum encryption with other international standards bodies.

Even though classical computers cant break encryption now, our adversaries can still steal our data in the hopes of decrypting it later," Khanna said in a statement. "Thats why I believe that the federal government must begin strategizing immediately about the best ways to move our encrypted data to algorithms that use post-quantum cryptography."

Mace said that while she was "optimistic" about the potential benefits of quantum computing "we must take preemptive steps to ensure bad actors aren't able to use this technology in more sinister ways."

Any such strategy, the bill posits in a sense of Congress, should involve the government and private sector coming together to develop software, hardware and applications that facilitate what is known as crypto agility" or the ability to easily switch out one post-quantum encryption algorithm for another with minimal loss to performance or interoperability. This capability is critical because so much of quantum computing and code breaking is still largely theoretical at this point.

Until a working quantum computer advanced enough to break classical encryption comes along, officials at NIST working on the next wave of encryption are basing their algorithmic choices, in part, on mathematical estimations of what those computers might do.

That means that the algorithms we think will protect us may actually fall short and, in fact, NIST official Dustin Moody told SC Media last year that each round of their post-quantum cryptography selection process has revealed a previously unknown or unforeseen weakness in one of the algorithms.

The work required to switch out such algorithms and implement crypto agility, where possible, is expected to be a long, grueling multi-year process. While the threat of quantum codebreaking mostly applies to public key encryption, most organizations dont have good visibility over the kinds of encryption they rely on.

A lot of people dont have any real sense of where [their public key encryption] are deployed in their systems, Bill Newhouse, a NIST cybersecurity engineer said last year to the Information Security and Privacy Advisory Board. The non-technical folks that rely on them probably just dont really recognize that it's all going to be rather complicated.

View post:
Congress wants a plan for post-quantum hacking threats for federal IT systems - SC Media

Read More..

Global Encryption Key Management Market 2022 Industry Insights, Drivers, Top Trends and Forecast to 2028 Blackswan Real Estate – Blackswan Real…

MarketsandResearch.biz recent record on the Global Encryption Key Management Market is projected to experience a high growth from 2022 to 2028. It offers a clear understanding of Encryption Key Management market attributes such as market shares, size, values, and production volume. The Encryption Key Management market segmentation analysis, comprising quantitative qualitative research incorporating the impact of economic non-economic aspects. The study involves the most up-to-date competitive data practical advice for firms other consumers looking to enter the regional or global market. The SWOT and Porters five forces model analysis increase the practicality of this report.

The study report has comprehensively utilized the figures numbers with the help of pictorial graphical representation, representing more clarity at the global Encryption Key Management market. The company analysis is a veritable source of information derived from various documents like the companys website, case studies, annual reports, and other third-party data providers.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketsandresearch.biz/sample-request/160852

The growth rate (CAGR) of each region is predicted so that the report provides an opportunistic roadmap to the participants of the Encryption Key Management industry. This report also investigates the impact of COVID-19 on the Encryption Key Management market. The report incorporates an analysis of regional and country-level market dynamics. The manufacturers can use geographic and behavioral data from the global Encryption Key Management market to determine which features to include meeting current market dynamics.

Type-based market segmentation:

Folders/Files, SaaS App,

Application-based market segmentation:

Enterprise, Personal,

The countries comprised in the market report are:

Americas (United States, Canada, Mexico, Brazil), APAC (China, Japan, Korea, Southeast Asia, India, Australia), Europe (Germany, France, UK, Italy, Russia), Middle East & Africa (Egypt, South Africa, Israel, Turkey, GCC Countries)

ACCESS FULL REPORT: https://www.marketsandresearch.biz/report/160852/global-encryption-key-management-market-growth-status-and-outlook-2021-2026

The major players included in the market report are:

Thales Group, IBM, Egnyte, Google, Alibaba Cloud Computing, Box, Amazon, Ciphercloud, Unbound Tech, Keynexus,

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team (sales@marketsandresearch.biz), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: sales@marketsandresearch.biz

View post:
Global Encryption Key Management Market 2022 Industry Insights, Drivers, Top Trends and Forecast to 2028 Blackswan Real Estate - Blackswan Real...

Read More..

Bluefin, DRB and Datacap Systems Announce the Rollout of PCI-Validated Point-to-Point Encryption (P2PE) Processing at C-Store Car Washes – PR Web

Bluefin, DRB, Datacap Systems Partnership

ATLANTA, AKRON, Ohio and CHALFONT, Pa. (PRWEB) April 19, 2022

Integrated payments and security leader, Bluefin, announced today the rollout of its PCI-validated point-to-point encryption (P2PE) solution across 458 U.S. car wash locations with partners DRB and Datacap Systems.

With the largest install base of any car wash technology provider, DRB specializes in advanced point-of-sale systems (POS) and next generation business management. The companys brands include DRB Tunnel Solutions, DRB In-Bay Solutions (formerly Unitec), Suds, Washifyand Driverse.

Datacap Systems builds innovative and customized payment solutions that route through dozens of pre-certified devices from leading OEMs all via a universal payments integration. Datacaps solutions empower merchants to create a unified payments experience across brick and mortar, online, mobile and unattended applications.

Bluefin specializes in PCI-validated P2PE solutions that secure credit and debit card transactions by encrypting all data within a PCI-approved point-of-entry device, preventing clear-text cardholder data from being available in the device or the merchants system where it could be exposed to malware.

The partnership between Bluefin, DRB and Datacap is part of a large, multi-location P2PE project with a major C-store brand which includes car wash installation in Phase I, followed by P2PE for the pump and in the omni-channel C-store environment.

This solution will provide our customers the benefit of up to 90% PCI scope reduction while providing the highest level of data protection for consumer credit card data, said Sean Gately, VP of Security Solutions, Bluefin. Once phase 2 deployment is complete for both indoor and the forecourt, it will be the first-ever market ready enterprise PCI-validated P2PE solution for the C-Store/Petro industry.

Bluefin provides P2PE through the companys Decryptx stand-alone P2PE solution, which is connected to Datacap Systems, who processes the payments via their NETePay Hosted omnichannel payments gateway. Through the installation, payments will be immediately encrypted upon swipe, dip, or tap in the ID Tech VP6800, an all-in-one PCI PTS 5.x SRED certified unattended payment device. The project is on track to have 1,000 installations by the end of April.

As unattended payments continue to grow in the U.S., securing cardholder data at these terminals has become more critical than ever, said Justin Zeigler, Director of Product at Datacap Systems. With the implementation of a security-centric and modern payments solution, both the merchant and their customer base benefit from a secure and frictionless payment experience.

"This was a great project that significantly enhanced the security of the car wash payment environment and consumer card data, said Richard Carpenter, Director of Product Development & Customer Programs for DRB. Our customers car wash terminals were upgraded to implement EMV processing along with Bluefins PCI-validated P2PE technology. These solutions work hand-in-hand to protect the retailer from fraud, while ensuring security of their customers credit card data.

This truly has been a team effort to not only develop the solution, but to integrate it as well as deploy it with full P2PE validation, added Sean Gately, VP of Security Solutions, Bluefin.

About Bluefin

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data. Our product suite includes solutions for contactless, face-to-face, call center, mobile, Ecommerce and unattended payments and data in the healthcare, higher education, government and nonprofit industries. The companys 200 global partners serve 20,000 enterprise and software clients operating in 47 countries. For more information, visit https://www.bluefin.com/.

About DRB

For over a third of a century, DRB supported and often drove an era of unprecedented growth in the car wash industry with point-of-sale and wash optimization software, hardware and services. Now as a masterbrand that includes DRB Tunnel Solutions, DRB In-Bay Solutions (formerly Unitec), Suds, Washify and Driverse, that tradition continues. The DRB team works together toward a singular goal: To help all car wash operators squeeze every ounce of profitability out of their investments. They do this with data and industry insights, a best-in-class team and reliable, intuitive innovations that delight consumers and are secure, simple to service and easy to use.

About Datacap Systems

Datacap builds industry-standard payment solutions for Point of Sale providers to meet the needs of merchants in any market. Security-centric solutions for virtually all processing platforms route through dozens of pre-certified devices from leading OEMs all via a universal payments integration, empowering merchants to create a unified payments experience across brick and mortar, online, mobile and unattended applications. As the only channel-centric and processor-agnostic payments provider in the industry, Datacap is the ideal partner for any POS provider thats serious about building a solution that will scale to address the needs of virtually any merchant, regardless of market or payment processing platform. https://datacapsystems.com/contact-us/

Share article on social media or email:

More here:
Bluefin, DRB and Datacap Systems Announce the Rollout of PCI-Validated Point-to-Point Encryption (P2PE) Processing at C-Store Car Washes - PR Web

Read More..

Queen has encrypted mobile phone – but she only uses it to call two people – The Mirror

There are very few people in the world who have direct access to the Queen - for obvious security reasons - but it turns out Her Majesty has two people she regularly speaks to on the phone

Image: PA)

It goes without saying that the Queen is no ordinary person, so you can't just pick up the phone to be able to speak to her - not even some of her closest family.

There are strict rules in place for anyone who wishes to contact the Queen, as it could create a huge security threat if anyone were able to reach the monarch.

Luckily technology has moved on a lot over the last few years, which means Her Majesty is now able to have a personal mobile phone which is protected against hackers - but she only uses it to contact two people.

MyLondon reports that the Queen has two people she regularly speaks to on her mobile phone, but they're not necessarily the people you might expect.

Image:

Image:

Royal expert Jonathan Sacerdoti said the two people who have access to the royal via her mobile are her daughter Princess Anne and her racing manager, John Warren.

Speaking to Royally US, Sacerdoti explained: "Apparently the Queen has two people who she speaks to the most on her phones and she also apparently has a mobile phone which is said to be Samsung packed with anti-hacker encryption by MI6 so nobody can hack into her phone.

"But the two people she phones the most are said to be her daughter Princess Anne and her racing manager John Warren."

The Queen is said to be very close friends with Warren, who is married to the Earl of Carnarvon's sister, Lady Carolyn Warren, and owns and runs the stud at Highclere Castle - the home that famously doubles as Downton Abbey.

The pair have regularly been seen chatting and laughing at events and Warren recently praised his friend for being inducted into the QIPCO British Champions Series Hall of Fame for her dedication to horse breeding.

He said: "I suspect that the Queen will have a lot of inner pride in being invited into the Hall of Fame. The Queen's contribution to racing and breeding derives from a lifelong commitment. Her love of horses and their welfare comes with a deep understanding of what is required to breed, rear, train and ride a thoroughbred.

"Her Majesty's fascination is unwavering and her pleasure derives from all of her horses - always accepting the outcome of their ability so gracefully."

Do you have a story to share? We want to hear all about it. Email us at yourmirror@mirror.co.uk

Read More

Read More

See original here:
Queen has encrypted mobile phone - but she only uses it to call two people - The Mirror

Read More..