Page 2,110«..1020..2,1092,1102,1112,112..2,1202,130..»

The ‘no-code revolution’ is one of the next big tech trends – Siliconrepublic.com

Channel Mechanics Geraldine Powderly discusses some of the biggest trends changing the tech industry, from zero-trust security to the no-code revolution.

Geraldine Powderly is the chief information security officer at Galway-based cloud management company Channel Mechanics.

In this role, she works across a wide variety of domains including security operations, risk management, incident detection and response, identity and access management, product security, continuity planning, cyber intelligence and vulnerability management.

While the cybersecurity industry is full of technical products that help prevent or detect cyberattacks, these products often come with a hefty price tag. A price tag that is not always easily understood or accepted by a company, she told SiliconRepublic.com.

My role within Channel Mechanics is to ensure that we always consider security risk and business risk together. They are two sides of the same coin. When it comes to defining a strategy for our platform and technical investments, I always put emphasis on considering the security risk and the business risk to help drive the best decision-making process.

No-code interfaces are very exciting from both a design and innovation perspective GERALDINE POWDERLY

In my opinion, one of the biggest challenges out there for any IT department is the implementation of a zero-trust strategy. Zero trust means dont trust anyone and only connect to an application, not the entire network. Its the opposite to VPN and firewall where once youre authenticated, you are on a routable network.

Its not a new concept. I have been hearing about if for several years now. Having listened in on numerous talks with vendors describing their zero-trust products, it always left me feeling that the challenge of successful implementation is still underestimated.

Comments about how VPN is so last decade always make me smile, because it reminds me of a quote you would expect to hear at fashion week. Of course its very dependent on the size of a companys footprint.

In todays world, it has become very clear that the traditional company network perimeter is in the past. Nothing has emphasised this more than the pandemic and working from home.

Overnight, the work-from-home requirements put an unforeseen load on VPNs, creating issues with internet access and speed while on VPN. This led to complaints and requests for split tunnels or other unsecure tactics. The impact of this forced users off VPN to browse the internet, thereby removing the protection of web filtering gateways, leaving users unprotected and susceptible to attack.

The challenge I see for companies with large footprints and hybrid deployments is that there is still a big gap between talking about it and implementing it in a successful manner that provides protection without disrupting the functioning of the business.

For smaller companies, the risk is also very real. In a lot of cases there might not even be a corporate VPN or web filtering gateways. The company could be reliant on endpoint protection, with users remotely connecting to environments. In this case, the implementation should be a lot of easier, but the same rules apply Dont break the business!

According to Forbes, everything-as-a-service and the no-code revolution are some of the next big technology trends in 2022. The concept is that it aims to put the skills and tools for tech-led innovation in the hands of as large a proportion of society as possible, regardless of their expertise.

At Channel Mechanics, we have already reaped the rewards of concepts like platform-as-a-service in terms of cloud solutions. As a born-in-the-cloud company, our SaaS offering provides a platform for channel program automation.

Choosing a reputable cloud-hosting solution provides a wonderful level of security, out of the box. Its akin to renting an apartment within a large apartment block offering security guards, CCTV, locked front doors, secure windows and alarms.

However, the security of the apartment is the tenants responsibility. If the tenant fails to secure the entrance or the contents stored within, then the buildings security is quickly negated. This is the same for software that is hosted in the cloud, whereby the tenant still has a responsibility for the security of their product.

At Channel Mechanics we take this responsibility very seriously. We continuously assess risk that may arise due to our environment configurations, and we follow our risk management and vulnerability management strategies to mitigate any risks found.

No-code interfaces are very exciting from both a design and innovation perspective. As CISO and a self-professed security nerd, I will be following this closely as it will definitely provide a challenge when it comes to ensuring these interfaces are secure.

From a 100-foot view, the challenge for any security team is finding all the possible vulnerabilities that could be exploited and secure them. A malicious actor only needs one successful exploit that gives them a foothold into an application or environment. There are specialist companies that you can engage and partner with to support this challenge.

Agile and DevOps provide faster to market software. However, the speed at which software can be deployed and environments can be created can introduce risk when it comes to deploying vulnerable code and environments.

Embedding security early in the software design cycle is the most effective method to help address this challenge. This may seem pretty obvious, but a lot of companies still see security as an afterthought or an added expense, which then relies on detection and containment rather than prevention.

Shifting security activities left by implementing DevSecOps is the most effective method to help address this challenge, and by engaging in the software development life cycle as early as possible.

Implementing security architectural reviews, threat modelling, static and dynamic analysis are all proactive methods of preventing security flaws entering an application.

Dont miss out on the knowledge you need to succeed. Sign up for theDaily Brief, Silicon Republics digest of need-to-know sci-tech news.

Excerpt from:
The 'no-code revolution' is one of the next big tech trends - Siliconrepublic.com

Read More..

Automobile Association looks to the future with help from Huawei Cloud – Mail and Guardian

When Willem Groenewald took over as CEO of the Automobile Association of South Africa (AASA) two years ago, the not-for-profit organisation was 90 years old and in dire need of an overhaul. Being a turnaround specialist he realised that an ageing Membership base and a lack of clarity around what the AA actually does meant that a lot of work had to be done to give the brand new relevancy and to connect with a younger market segment.

The work is ongoing to win the hearts and minds of new customers, especially the younger market, while also providing excellent quality service to our most valued corporate customer base. Product and service diversification was required in the business to move away from the brand being perceived as a being only roadside assistance business.

Most people talk about the AA as a service that their grandfather or dad used to have, but Groenewald decided to move away from that and use emerging technology to change this narrative: I wanted to change how we connect with the public, creating something that provides more value for our Members and corporate customers, and more touch points that we can use to engage and interact with our customers. Our loyal member base is extremely important to us they are the core and foundation of our business.

The aim, adds Layton Beard, Spokesperson for the AA, is to move away from just being a traditional automobile association which Members join to enjoy certain benefits related to the ownership of a vehicle to something much more, providing support across every aspect of a motorists life.

Groenewald says the idea is to create a movement developing and showcasing the different services the AA has to offer. Today, the AAs different offerings typically fall under five key pillars. Firstly, the AAs conventional business provides mobility services such as roadside assistance, with access to medical support where necessary. The second pillar, says Groenewald, focuses on the services offered across the brands AA Auto Centres. These facilities include car services and provide the analysis and validation reports needed to prove that a car is in good working condition before it is bought or sold. The third pillar incorporates the AAs financial services offerings, including insurance, service plans and warranty products.

The fourth pillar is the technology side of things. As part of their efforts to transform the business, the AA is building a connected environment called AA Connected.Me which provides products and services like vehicle telematics and connected devices such as GSM panic buttons. The AAs Connected.Me offering includes asset trackers, which can be used to keep track of your valuables, or even to keep tabs on your loved ones. It also provides AA Connected Vehicle functionality, which can be used to do everything from monitoring vehicle health and setting up geo-fencing to tracking driver behaviour and analysing vehicle performance.

The AA also offers a Connected Home experience, which turns regular homes into smart homes via smart geyser solutions and electricity, water, geyser and security tampering management systems.

Finally, the AA has an accommodation network nationwide where ratings are applied to different venues. Incorporated into this the travel-related offer is the issuing of International Driving Permits (IDPs), and Carnet de Passage, an international customs declaration identifying a vehicle that can be used for cross-border travel.

So, what is enabling all of this innovation?

Huawei Cloud

For us, Huawei is an execution platform, enabling us to deliver all of these services, notes Groenewald. Before partnering with Huawei, the brand had a very scattered environment, with physical hardware and backups sitting on-premise. The challenge with this approach, he explains, is that they had to duplicate all of the data stored on these physical devices and then store it elsewhere: a massive expense.

Using cloud technology, Huawei has helped us to consolidate all of these platforms from a hosting and capacity perspective so that it is possible for us to scale and move forward with our future plans.

According to Jay Zhou, Managing Director of Huawei Cloud South Africa, we live in a continuously evolving world, and all companies must be aware of new ways of working and leverage new forms of technology if they want to survive in the future. Today, digital transformation is a means of survival. Cloud has a key role to play in this transformation. Companies that embrace the cloud can bring new offerings to market quickly, they can innovate easily and they have the ability to scale as and when they need to do so. But migrating to the cloud demands that the business adopt a different business-technology model, which can be difficult to get right without the support of the right technology partner.

Today, the AA is a very different business. All but one of the innovation pillars I mentioned earlier didnt exist just two years ago. Our service centres, financial services offering and our Connected.Me products are part of our business optimisation efforts, none of which would have been possible without the technology and the support of Huawei Cloud, says Groenewald.

For Huawei, joint value creation is the goal. When value is created both for the customer and the supplier, then a supplier like us works with a customer in a totally different way, says Zhou. Working together achieves things that end up being so much better than anything we do alone.

Having executed his first cloud migration back in 2006, Groenewald is well versed in the value that can be gained and the efficiency that can be realised via virtual environments. Hes not alone. The global cloud computing market is expected to rise in value to more than $947-billion by 2026; industry experts forecast that around 80% of organisations will migrate to the cloud by 2025. In South Africa, cloud adoption is expected to grow up to 25% annually and generate revenue of as much as $1.5-billion by 2024.

From a cost optimisation perspective, cloud just makes sense. Cloud also allows us to access a larger pool of data and storage, which makes it possible for us to scale our business, Groenewald says. From a business continuity and data recovery perspective, having a cloud solution is a good business decision, because it reduces the risk of physical disasters. If youre conducting business in the 21st century, you have to move with the times and, as part of this, I firmly believe that you have to have a cloud solution in place.

This strategy could also enable the brand to reach a global market. As a member of the Fdration Internationale de lAutomobile (FIA) Region 1 management council, Groenewald can connect with about 150 other automobile clubs across the globe. As we build our digital capacity and enhance our capabilities into the future, we have the option of selling software licensing agreements to other similar clubs globally; clubs that have been around for a long time and that face the same challenges we faced just a few years ago. The beauty of what Huawei Cloud offers us is that by white-labelling our solution, we can allow others the option simply to dial into our cloud platform and, as such, we can sell our software to other clubs around the world. In this way, software could become a new revenue stream for us.

As industries change and technologies evolve, businesses need to realise that being competitive in the future is made easier when you have help from others, notes Zhou. We already know that the age of digital transformation demands that companies collaborate in order to survive and grow. In any strategic partnership, if you are open and honest about where you want to go and how you want to get there, the right partner will know exactly what to do to help you achieve your goals as quickly as possible.

A question of culture

When you change processes and challenge the status quo, your people have to buy into it or your efforts wont get off the ground, says Groenewald, which is why making such a big, bold company culture shift can be difficult. Were an old business. If some kid comes along and questions the way youve been doing things for 90 years, its understandable that youd be a bit put out by their suggestions and ideas. Mitigating this uncertainty comes down to illustrating and demonstrating the benefits that the change can bring.

Speaking of culture, in his early interactions with Huawei, Groenewald was struck by the brands collaborative culture. It really impressed me that they wanted to work alongside us to improve how we do business. Whenever we meet with them, they ask how they can partner with us and they are always so willing to introduce us to products and solutions beyond their cloud hosting offerings.

A prime example of this can be seen in the AAs call centre environment. According to Groenewald, Huawei technology is currently being investigated as an enterprise-wide solution for the AA. He says Huaweis willingness to introduce proof of concept discussions are underway. We are yet to engage with another service provider that is willing to go the extra mile in this way, he says.

Platforms and partnerships like this, adds Groenewald, allow the AA to access best-of-breed future technologies. Bringing robotics and automated call centre systems into our environment could enable us to open up different digital channels of communication that will make it possible to interact with Members on a more personal level and provide a better user experience. In alignment with their other digital efforts, the goal is to deliver continuous and sustained optimisation of their IT cost environment.

South Africa and our South African customers remain an important market for Huawei and the company is committed to strengthening relationships with partners across the region, says Zhou. Last year, Huawei Cloud unveiled plans to increase its market share in South Africa and Africa via strategic investments and collaboration with the right partners. As part of this commitment to South Africa and the African continent, Huawei seeks to support and enable our local customers to achieve their best results by equipping them with the best technological advancements the industry has to offer.

For the AA, one of the main benefits of the partnership is that it has allowed them to optimise their costs by significantly reducing their capital expenses (Capex).

With this approach, were not just seeing a once-off benefit based on the changes weve made. This partnership is delivering sustained improvement across our environment. And as we enhance and continue to build using the Huawei platform, we become more and more efficient, which means that our IT costs will either remain the same over time or they could even decline in the future.

According to Groenewald, the AA is in the process of an important turnaround from where it was just two years ago, and this process is a work in progress, ultimately all to the benefit of Members and corporate customers.

Perhaps Im old fashioned but when I pick a partner, I want to stick with them for the long haul so that we can learn and build together, and this is where I think were headed with the team from Huawei.

Working so closely with the AASA team, we really do admire their commitment to digital transformation and appreciate all the work they have put in to turn their business around and become a digital success story, concludes Zhou.

But theres still a lot of work to be done. In 2022, Groenewald hopes to gain on the traction he has already created by optimising the business. He says: Anyone can cut costs, but our focus in 2022 is to provide customer service that people start talking about and that makes people feel delighted and excited to work with the AA.

Layton Beard, Spokesperson for the AASA, says the organisation wants to be a voice for ordinary South Africans on all things affecting traffic/transport legislation and road safety. This includes pushing for the scrapping of the e-toll system and the repayment of monies to those who have already paid, and educating and informing the public on matters relating to vehicle safety and maintenance. The AA is very actively engaging with government and other key stakeholders on important legislation such as the new National Road Traffic Amendment Act, which prohibits alcohol consumption by all motor vehicle operators on South African public roads by setting the legal blood-alcohol limit for drivers at 0%. The AAs efforts also extend to championing important initiatives like the 3 500 Lives campaign and the #ISeeYou campaign, which seek to educate the public about their role in road safety, be it those driving vehicles or pedestrians.

Excerpt from:
Automobile Association looks to the future with help from Huawei Cloud - Mail and Guardian

Read More..

Who’s Behind India’s First Cloud Platform MicroHost Cloud, A conversation with Founder – APN Live

February 18: Twelve years ago, a developer from Haryana wanted to provide the solution to the mass population of India. In the process, he would tackle a much bigger opportunity by starting a web hosting business. Today, his company owns the most modern cloud computing services in different locations all over the world and serves more than 9000 clients across the globe. Most of their clients are from southeast Asia.

MicroHost Cloud became the first cloud platform in India and the fastest-growing cloud computing platform worldwide in 2018. The company focused on simplifying the complexities of infrastructure for software developers. The simple and fast SSD/NVMe servers can be deployed with just one click to provide your applications with scalable performance without any worries about scalability or hardware maintenance costs!

In this special interview with the founder and CTO of MicroHost Cloud Manoj Dhanda, we discover a special blend of his long-term vision, discuss the hosting business landscape, and Manojs journey in the web hosting business.

Our mission is to help developers all around the world create amazing products, and our robust, cost-effective, and easy architecture is making cloud computing more accessible than ever.

Outside of the core developer market, start-ups are driving our growth. Even if its for personal use cases, developers familiarity with our platform enables them to bring MicroHost Cloud to their business or enterprise environments as well.

Developers and startups care about the same things regardless of their location they want a cloud platform thats simple, fast, feature-rich, and inexpensive. MicroHost Cloud meets these criteria because we take care of the infrastructure side while allowing developers to focus on creating applications that address real client issues.

You can select the type of operating system you want to use on our platform and have a server up and running in less than 30 seconds. Other cloud platforms, on the other hand, have a significant learning curve.

Weve always prioritized making our products easy to use. While other cloud providers have focused their efforts on large enterprises and legacy businesses, weve continued to develop better development tools for cloud developers wanting to deploy and manage apps.

Simplicity is our trademark, which can be found in all of our items. This characteristic may be seen in every item we release. We make sure that the idea of simplicity is kept across our services such as Block storage and object storage, firewall, and load balancer.

We want to provide a simple yet efficient cloud platform, as well as pay-as-you-go pricing that is simple and transparent. Weve also concentrated on developing a genuine community of developers to assist in the growth of the market and support them as they create tomorrows technology.

We provide phone, email, and ticket support to all of our clients at any time.

Our Cloud Servers are virtual machines with a pre-determined compute, storage, and networking capacity that may be expanded as needed, and theyre currently available. It specializes in offering software developers high-performance servers at market-leading prices while maintaining simplicity and user experience as top priorities. Outside of Cloud Servers, we also have a Block storage offering that provides additional flexibility in increasing storage for an existing virtual machine.

Our platform appealed to individual developers and hobbyists who wanted to use our platform for their freelance or hosting needs. Teams of developers started using MicroHost Cloud for commercial purposes as our platform developed. Our objective is to enable businesses and engineering teams to better address their large-scale production environment requirements with new features such as Kubernetes, Block Storage, Load Balancers, Firewall, Monitoring, Object Storage and a host of new offerings (across the 3 pillars of Compute, Storage & Networking) in our upcoming roadmap; our goal is to enable businesses and engineering teams to better address their large-scale production environment needs.

We will add more products to our portfolio to make the experience of our customers seamless.

I would like to recommend signing up for a trial account at https://microhost.com and testing our products.

Read the rest here:
Who's Behind India's First Cloud Platform MicroHost Cloud, A conversation with Founder - APN Live

Read More..

OWIT Global Partners with Large Global Reinsurer to Manage Their Growing Need to Ingest, Cleanse and Transform Their Incoming Program Data with OWIT’s…

LONDON & WEST HARTFORD, Conn.--(BUSINESS WIRE)--OWIT Global (OWIT), a provider of insurance-specific microservices architected solutions for the global insurance industry, is pleased to announce the latest customer to select OWITs Bordereaux Management Solution to automate and streamline the consumption of disparate data and the onboarding process. The Bermuda-based international reinsurer has over $9 billion in total capital, with 16 office locations and over 1,200 employees worldwide.

The reinsurer undertook an extremely intensive due diligence process across the entire OWIT organisation and product capabilities. Selecting OWITs Bordereaux Management Solution as their global strategic platform was a critical decision as they recognised the importance of choosing the right partner to underpin their growth aspirations. OWITs Bordereaux Management Solution supports the latest architectural designs to maximise cloud-hosting efficiencies and security. This is coupled with a raft of extended business and operations functions and features to improve the global insurance communitys need to streamline the processing of bordereaux-based business dramatically.

We are delighted to welcome such a respected reinsurer as a new OWIT customer and partner, and humbled by the trust placed in OWIT to deliver such a strategically critical solution to support their aggressive global growth plans, said Julian James, President EMEA, and Chief Revenue Officer.

Built on microservices, the OWIT Bordereaux Management Solution supports the ingestion of various file formats, the cleansing and transformation of the data through configurable intelligent business rules, and external validations to other services. OWITs reusable microservices minimise the development and IT maintenance costs common to insurance organisations unable to engage with customers in new digital ecosystems due to the pain points of an enterprise rip-and-replace initiative.

James continued, We are truly excited by the industrys response to our new offering to the market and continue to invest heavily in the next generation of technology to deliver unsurpassed business benefits to our customers.

To learn more about OWITs Bordereaux Management Solution click here.

About OWIT GLOBAL

OWIT Global (OWIT) is an insurance technology company specializing in solutions built on a unique suite of reusable insurance-specific microservices. OWITs solutions include Bordereaux and Binder Management, Business to Business/Consumer Portals, User and Point of Sale Portals, Rating, Document-lite Generation, Insurance Data Transformation, and Policy Administration. Each OWIT solution is built on a collection of microservices that allow for unprecedented reusability to deliver an array of additional solutions to solve pressing pain points for both immediate and longer-term business benefits. OWITs solutions can be deployed standalone or integrated with a Brokers, Carriers, or MGAs existing environment to maximise investments. To see the power and flexibility of the OWIT catalog of cloud-based microservices, visit http://www.owitglobal.com.

Read more:
OWIT Global Partners with Large Global Reinsurer to Manage Their Growing Need to Ingest, Cleanse and Transform Their Incoming Program Data with OWIT's...

Read More..

What If Quantum Physics Were Applied To Economics? – Walter Bradley Center for Natural and Artificial Intelligence

Applied mathematician David Orrell offers a look at the difference quantum mechanical thinking would make to economics. The author of Money, Magic, and How to Dismantle a Financial Bomb: Quantum Economics for the Real World (2022) received considerable criticism for an article he wrote four years ago, Economics is quantum, which he summarizes in a followup article, published this month:

The idea is that money is best understood as a quantum social technology, with quantum properties of its own. In financial transactions, for example, value can be modelled as a probabilistic wave function which collapses down to an exact number when money is exchanged. When you put your house up for sale, you might have a fuzzy idea of its worth, but the actual price is only determined when a deal is made. An idea that seems bizarre in physics makes perfect sense in economics. Financial contracts such as mortgages and other loans entangle the debtor and the creditor in a fashion that can be modelled using quantum mathematics. The debtor is treated as being in a superposed state, balanced somewhere between a propensity to honour the debt and a propensity to default. Methods from quantum cognition can handle those phenomena, such as mental interference between incompatible concepts, that first inspired quantum physicists.

And the argument that quantum effects dont scale up has no relevance to economics. The idea isnt that money inherits its quantum properties from subatomic properties, but that its properties can be modelled using quantum mathematics (the aim isnt to use more maths, just different maths where needed). For example, the creation of money can be expressed using a quantum circuit in a way that captures effects such as uncertainty, power relationships, and so on. The effects of this substance scale up all the time (its called the financial system), and, like dark matter, exert a huge pull over the economy that goes undetected by classical approaches.

What difference would seeing things from a quantum perspective make in practice?

A defining feature of quantum mechanics, after all, is that it looks hard, but the picture that it paints of reality is soft and fuzzy. In many respects it isnt a hard science, but a soft science. A wave equation, for example, looks hard when it is written out as a mathematical formula but it is an equation of a wave, which is soft.

Quantum mechanical thinking might make better sense of markets where social values intersect with economic ones. For example people will pay more for an elite label than for a functionally equivalent house brand. Some zip codes (and universities) cost more than others when the main offering seems to be the prestigious number or name.

The people who respond to such fuzzy signals are not necessarily acting irrationally, as a classical economics approach might suppose. They are often responding to genuine realities which, like quantum mechanics, are fuzzy. The realities often collapse into a single situation: An introduction to an influential neighbor in the elite zip code can change a life or a career. But no single, hard number can be assigned to the role of influence during the process.

That said, Orrell leans heavily on claims that quantum mechanics is somehow more female and that women have been deprived and neglected in classical economics. Many women may find this sort of thing the assumption that femaleness is a reliable marker for having a different attitude to economics off-putting. But his thoughts are well worth reading anyway.

Author and design theorist Eric Anderson offers a note of caution. He is concerned that we make a distinction between what intelligent agents do and what quantum mechanics can do: Quantum mechanics is a terrible explanation for intelligent decision-making. We might as well argue that a Beethoven sonata resulted from the collapse of probabilistic wave functions as the large number of possible notes eventually collapsed to the final notes when he put pen to page. Might there be some interesting analogies between quantum mathematical models and human activities? Perhaps. But we need to be careful to not fall into the trap of thinking that the quantum model is ever an actual explanation for real decision-making. He develops the point that intelligent agents collapse probabilities to achieve a particular outcome in a podcast, Probability & Design (June 6, 2015), 7:00 minute mark.

It appears that Orrell, whose specialty is scientific forecasting, is attempting to model a process rather than its origin.

You may also wish to read: How Erik Larson hit on a method for deciding who is influential. The author of The Myth of Artificial Intelligence decided to apply an algorithm to Wikipedia but it had to be very specific.

The difference between influence and official power. Do you wonder why some people are listened to and not others, regardless of the value of their ideas? Well, read on

and

As money slowly transitions from matter to information Lets look at a brief history of cryptocurrencies which is not quite what we might think. The mysterious Satoshi Nakamoto, founder of Bitcoin, did not invent new concepts in computer science or cryptography; he put them together in a way that worked.

Read the original:

What If Quantum Physics Were Applied To Economics? - Walter Bradley Center for Natural and Artificial Intelligence

Read More..

Enhancing Mind-Bending Simulations of Curved Space With Qubits – SciTechDaily

(Left image) Microwave photons that create an interaction between pairs of qubits (black dots on the edge) in a hyperbolic space are most likely to travel along the shortest path (dotted line). In both images, the darker colors show where photons are more likely to be found. (Right image) A quantum state formed by a qubit (grey dot containing parallel black lines) and an attached microwave photon that can be found at one of the intersections of the grid representing a curved space. Credit: Przemyslaw Bienias/JQI

One of the mind-bending ideas that physicists and mathematicians have come up with is that space itselfnot just objects in spacecan be curved. When space curves (as happens dramatically near a black hole), sizes and directions defy normal intuition. Something as straightforward as defining a straight line requires careful consideration.

Understanding curved spaces is important to expanding our knowledge of the universe, but it is fiendishly difficult to study curved spaces in a lab setting (even using simulations). A previous collaboration between researchers at JQI explored using labyrinthine circuits made of superconducting resonators to simulate the physics of certain curved spaces (see the previous story for additional background information and motivation of this line of research). In particular, the team looked at hyperbolic lattices that represent spacescalled negatively curved spacesthat have more space than can fit in our everyday flat space. Our three-dimensional world doesnt even have enough space for a two-dimensional negatively curved space.

Now, in a paper published in the journal Physical Review Letters on January 3, 2022, the same collaboration between the groups of JQI Fellows Alicia Kollr and Alexey Gorshkov, who is also Fellow of the Joint Center for Quantum Information and Computer Science, expands the potential applications of the technique to include simulating more intricate physics. Theyve laid a theoretical framework for adding qubitsthe basic building blocks of quantum computersto serve as matter in a curved space made of a circuit full of flowing microwaves. Specifically, they considered the addition of qubits that change between two quantum states when they absorb or release a microwave photonan individual quantum particle of the microwaves that course through the circuit.

This is a new frontier in tabletop experiments studying effects of curvature on physical phenomena, says first author Przemyslaw Bienias, a former JQI assistant research scientist who is now working for Amazon Web Services as a Quantum Research Scientist. Here we have a system where this curvature is huge and its very exciting to see how it influences the physics.

For researchers to use these simulations they need a detailed understanding of how the simulations represent a curved space and even more importantly under what situations the simulation fails. In particular, the edges that must exist on the physical circuits used in the simulations must be carefully considered since scientists are often interested in an edgeless, infinite curved space. This is especially important for hyperbolic lattices because they have nearly the same number of sites on the edge of the lattice as inside. So the team identified situations where the circuits should reflect the reality of an infinite curved space despite the circuits edge and situations where future researchers will have to interpret results carefully.

The team found that certain properties, like how likely a qubit is to release a photon, shouldnt be dramatically impacted by the circuits edge. But other aspects of the physics, like the proportion of states that photons occupy at a given shared total energy, will be strongly influenced by the edge.

With proper care, this type of simulation will provide a peek into how negatively curved spaces are a foundation for an entirely new world of physics.

In this paper, we asked the question, What happens when you add qubits to the photons living on those hyperbolic lattices? Bienias says. We are asking, What type of physics emerges there and what type of interactions are possible?

The researchers first looked at how the microwaves and a single qubit in the circuit can combine. The team predicts that the size of special quantum states in which a photon is attached to a particular qubita bound statewill be limited by the curved space in a way that doesnt happen in flat space. The right-side image above shows such a state with the darker coloring showing where the photon is most likely to be found around the qubit represented by the grey dot.

They then investigated what happens when there are multiple qubits added to a circuit full of microwaves. The photons traveling between qubits serve as intermediaries and allow the qubits to interact. The teams analysis suggests that the photons that are causing qubits to interact tend to travel along the shortest path between the two points in the circuitcorresponding to the shortest distance in the simulated curved space. One of these paths through the curved space is shown in the left-side image above. This result matches physicists current expectations of such a space and is a promising sign that the simulations will reveal useful results in more complex situations.

Additionally, the researchers predict that the curvature will limit the range of the interactions between qubits similar to the way it limits the size of the individual bound states. Simulations using this setup could allow scientists to explore the behaviors of many particles interacting in a curved space, which is impractical to study using brute numerical calculation.

These results build upon the previous research and provide additional tools for exploring new physics using superconducting circuits to simulate curved space. The inclusion of interactions explored in this paper could aid in using the simulations to investigate the topic called AdS/CFT correspondence that combines theories of quantum gravity and quantum field theories.

Hyperbolic connectivity is immensely useful in classical computation, underlying, for example, some of the most efficient classical error correcting codes in use today, Kollr says. We now know that adding qubits to a hyperbolic resonator lattice will endow the qubits interactions with hyperbolic structure, rather than the native flat curvature of the lab. This opens the door to allow us to carry out direct experiments to examine the effect of hyperbolic connectivity on quantum bits and quantum information.

Reference: Circuit Quantum Electrodynamics in Hyperbolic Space: From Photon Bound States to Frustrated Spin Models by Przemyslaw Bienias, Igor Boettcher, Ron Belyansky, Alicia J. Kollr and Alexey V. Gorshkov, 3 January 2022, Physical Review Letters.DOI: 10.1103/PhysRevLett.128.013601

In addition to Kollr, Gorshkov and Bienias, other co-authors of the paper were Ron Belyansky, a JQI physics graduate student, and Igor Boettcher, a former JQI postdoctoral researcher and current assistant professor at the University of Alberta.

Read more here:

Enhancing Mind-Bending Simulations of Curved Space With Qubits - SciTechDaily

Read More..

What is Encryption and How Does it Work? – TechTarget

Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography.

In computing, unencrypted data is also known asplaintext, and encrypted data is called ciphertext. The formulas used to encode and decode messages are called encryption algorithms, or ciphers.

To be effective, a cipher includes a variable as part of the algorithm. The variable, which is called a key, is what makes a cipher's output unique. When an encrypted message is intercepted by an unauthorized entity, the intruder has to guess which cipher the sender used to encrypt the message, as well as what keys were used as variables. The time and difficulty of guessing this information is what makes encryption such a valuable security tool.

Encryption has been a longstanding way for sensitive information to be protected. Historically, it was used by militaries and governments. In modern times, encryption is used to protect data stored on computers and storage devices, as well as data in transit over networks.

Encryption plays an important role in securing many different types of information technology (IT) assets. It provides the following:

Encryption is commonly used to protect data in transit and data at rest. Every time someone uses an ATM or buys something online with a smartphone, encryption is used to protect the information being relayed. Businesses are increasingly relying on encryption to protect applications and sensitive information from reputational damage when there is a data breach.

There are three major components to any encryption system: the data, the encryption engine and the key management. In laptop encryption, all three components are running or stored in the same place: on the laptop.

In application architectures, however, the three components usually run or are stored in separate places to reduce the chance that compromise of any single component could result in compromise of the entire system.

At the beginning of the encryption process, the sender must decide what cipher will best disguise the meaning of the message and what variable to use as a key to make the encoded message unique. The most widely used types of ciphers fall into two categories: symmetric and asymmetric.

Symmetric ciphers, also referred to as secret key encryption, use a single key. The key is sometimes referred to as a shared secret because the sender or computing system doing the encryption must share the secret key with all entities authorized to decrypt the message. Symmetric key encryption is usually much faster than asymmetric encryption. The most widely used symmetric key cipher is the Advanced Encryption Standard (AES), which was designed to protect government-classified information.

Asymmetric ciphers, also known as public key encryption, use two different -- but logically linked -- keys. This type of cryptography often uses prime numbers to create keys since it is computationally difficult to factor large prime numbers and reverse-engineer the encryption. The Rivest-Shamir-Adleman (RSA) encryption algorithm is currently the most widely used public key algorithm. With RSA, the public or the private key can be used to encrypt a message; whichever key is not used for encryption becomes the decryption key.

Today, many cryptographic processes use a symmetric algorithm to encrypt data and an asymmetric algorithm to securely exchange the secret key.

The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet or any other computer network.

In addition to security, the adoption of encryption is often driven by the need to meet compliance regulations. A number of organizations and standards bodies either recommend or require sensitive data to be encrypted in order to prevent unauthorized third parties or threat actors from accessing the data. For example, the Payment Card Industry Data Security Standard (PCI DSS) requires merchants to encrypt customers' payment card data when it is both stored at rest and transmitted across public networks.

While encryption is designed to keep unauthorized entities from being able to understand the data they have acquired, in some situations, encryption can keep the data's owner from being able to access the data as well.

Key management is one of the biggest challenges of building an enterprise encryption strategy because the keys to decrypt the cipher text have to be living somewhere in the environment, and attackers often have a pretty good idea of where to look.

There are plenty of best practices for encryption key management. It's just that key management adds extra layers of complexity to the backup and restoration process. If a major disaster should strike, the process of retrieving the keys and adding them to a new backup server could increase the time that it takes to get started with the recovery operation.

Having a key management system in place isn't enough. Administrators must come up with a comprehensive plan for protecting the key management system. Typically, this means backing it up separately from everything else and storing those backups in a way that makes it easy to retrieve the keys in the event of a large-scale disaster.

Encryption is an effective way to secure data, but the cryptographic keys must be carefully managed to ensure data remains protected, yet accessible when needed. Access to encryption keys should be monitored and limited to those individuals who absolutely need to use them.

Strategies for managing encryption keys throughout their lifecycle and protecting them from theft, loss or misuse should begin with an audit to establish a benchmark for how the organization configures, controls, monitors and manages access to its keys.

Key management software can help centralize key management, as well as protect keys from unauthorized access, substitution or modification.

Key wrapping is a type of security feature found in some key management software suites that essentially encrypts an organization's encryption keys, either individually or in bulk. The process of decrypting keys that have been wrapped is called unwrapping. Key wrapping and unwrapping activities are usually carried out with symmetric encryption.

Hash functions provide another type of encryption. Hashing is the transformation of a string of characters into a fixed-length value or key that represents the original string. When data is protected by a cryptographic hash function, even the slightest change to the message can be detected because it will make a big change to the resulting hash.

Hash functions are considered to be a type of one-way encryption because keys are not shared and the information required to reverse the encryption does not exist in the output. To be effective, a hash function should be computationally efficient (easy to calculate), deterministic (reliably produces the same result), preimage-resistant (output does not reveal anything about input) and collision-resistant (extremely unlikely that two instances will produce the same result).

Popular hashing algorithms include the Secure Hashing Algorithm (SHA-2 and SHA-3) and Message Digest Algorithm 5 (MD5).

Encryption, which encodes and disguises the message's content, is performed by the message sender. Decryption, which is the process of decoding an obscured message, is carried out by the message receiver.

The security provided by encryption is directly tied to the type of cipher used to encrypt the data -- the strength of the decryption keys required to return ciphertext to plaintext. In the United States, cryptographic algorithms approved by the Federal Information Processing Standards (FIPS) or National Institute of Standards and Technology (NIST) should be used whenever cryptographic services are required.

For any cipher, the most basic method of attack is brute force -- trying each key until the right one is found. The length of the key determines the number of possible keys, hence the feasibility of this type of attack. Encryption strength is directly tied to key size, but as the key size increases, so too do the resources required to perform the computation.

Alternative methods of breaking encryptions include side-channel attacks, which don't attack the actual cipher but the physical side effects of its implementation. An error in system design or execution can enable such attacks to succeed.

Attackers may also attempt to break a targeted cipher through cryptanalysis, the process of attempting to find a weakness in the cipher that can be exploited with a complexity less than a brute-force attack. The challenge of successfully attacking a cipher is easier if the cipher itself is already flawed. For example, there have been suspicions that interference from the National Security Agency (NSA) weakened the DES algorithm. Following revelations from former NSA analyst and contractor Edward Snowden, many believe the NSA has attempted to subvert other cryptography standards and weaken encryption products.

An encryption backdoor is a way to get around a system's authentication or encryption. Governments and law enforcement officials around the world, particularly in the Five Eyes (FVEY) intelligence alliance, continue to push for encryption backdoors, which they claim are necessary in the interests of national safety and security as criminals and terrorists increasingly communicate via encrypted online services.

According to the FVEY governments, the widening gap between the ability of law enforcement to lawfully access data and their ability to acquire and use the content of that data is "a pressing international concern" that requires "urgent, sustained attention and informed discussion."

Opponents of encryption backdoors have said repeatedly that government-mandated weaknesses in encryption systems put the privacy and security of everyone at risk because the same backdoors can be exploited by hackers.

Recently, law enforcement agencies, such as the Federal Bureau of Investigation (FBI), have criticized technology companies that offer E2EE, arguing that such encryption prevents law enforcement from accessing data and communications even with a warrant. The FBI has referred to this issue as "going dark," while the U.S. Department of Justice (DOJ) has proclaimed the need for "responsible encryption" that can be unlocked by technology companies under a court order.

Australia passed legislation that made it mandatory for visitors to provide passwords for all digital devices when crossing the border into Australia. The penalty for noncompliance is five years in jail.

By 2019, cybersecurity threats increasingly included encryption data on IoT and on mobile computing devices. While devices on IoT often are not targets themselves, they serve as attractive conduits for the distribution of malware. According to experts, attacks on IoT devices using malware modifications tripled in the first half of 2018 compared to the entirety of 2017.

Meanwhile, NIST has encouraged the creation of cryptographic algorithms suitable for use in constrained environments, including mobile devices. In a first round of judging in April 2019, NIST chose 56 lightweight cryptographic algorithms candidates to be considered for standardization. Further discussion on cryptographic standards for mobile devices is slated to be held in November 2019.

In February 2018, researchers at MIT unveiled a new chip, hardwired to perform public key encryption, which consumes only 1/400 as much power as software execution of the same protocols would. It also uses about 1/10 as much memory and executes 500 times faster.

Because public key encryption protocols in computer networks are executed by software, they require precious energy and memory space. This is a problem in IoT, where many different sensors embedded in products such as appliances and vehicles connect to online servers. The solid-state circuitry greatly alleviates that energy and memory consumption.

The word encryption comes from the Greek word kryptos, meaning hidden or secret. The use of encryption is nearly as old as the art of communication itself. As early as 1900 B.C., an Egyptian scribe used nonstandard hieroglyphs to hide the meaning of an inscription. In a time when most people couldn't read, simply writing a message was often enough, but encryption schemes soon developed to convert messages into unreadable groups of figures to protect the message's secrecy while it was carried from one place to another. The contents of a message were reordered (transposition) or replaced (substitution) with other characters, symbols, numbers or pictures in order to conceal its meaning.

In 700 B.C., the Spartans wrote sensitive messages on strips of leather wrapped around sticks. When the tape was unwound, the characters became meaningless, but with a stick of exactly the same diameter, the recipient could recreate (decipher) the message. Later, the Romans used what's known as the Caesar Shift Cipher, a monoalphabetic cipher in which each letter is shifted by an agreed number. So, for example, if the agreed number is three, then the message, "Be at the gates at six" would become "eh dw wkh jdwhv dw vla." At first glance, this may look difficult to decipher, but juxtaposing the start of the alphabet until the letters make sense doesn't take long. Also, the vowels and other commonly used letters, like t and s, can be quickly deduced using frequency analysis, and that information, in turn, can be used to decipher the rest of the message.

The Middle Ages saw the emergence of polyalphabetic substitution, which uses multiple substitution alphabets to limit the use of frequency analysis to crack a cipher. This method of encrypting messages remained popular despite many implementations that failed to adequately conceal when the substitution changed -- also known as key progression. Possibly the most famous implementation of a polyalphabetic substitution cipher is the Enigma electromechanical rotor cipher machine used by the Germans during World War II.

It was not until the mid-1970s that encryption took a major leap forward. Until this point, all encryption schemes used the same secret for encrypting and decrypting a message: a symmetric key.

Encryption was almost exclusively used only by governments and large enterprises until the late 1970s when the Diffie-Hellman key exchange and RSA algorithms were first published and the first PCs were introduced.

In 1976, Whitfield Diffie and Martin Hellman's paper, "New Directions in Cryptography," solved one of the fundamental problems of cryptography: how to securely distribute the encryption key to those who need it. This breakthrough was followed shortly afterward by RSA, an implementation of public key cryptography using asymmetric algorithms, which ushered in a new era of encryption. By the mid-1990s, both public key and private key encryption were being routinely deployed in web browsers and servers to protect sensitive data.

Read the original:
What is Encryption and How Does it Work? - TechTarget

Read More..

Privacy and computer security are too important to be left to political meddling – The Register

Register Debate Welcome to the latest Register Debate in which writers discuss technology topics, and you the reader choose the winning argument. The format is simple: we propose a motion, the arguments for the motion will run this Monday and Wednesday, and the arguments against on Tuesday and Thursday. During the week you can cast your vote on which side you support using the poll embedded below, choosing whether you're in favor or against the motion. The final score will be announced on Friday, revealing whether the for or against argument was most popular.

This week's motion is: In the digital age, we should not expect our communications to remain private.

Our second contributor debating AGAINST the motion is veteran security journalist John E. Dunn.

If the British government fails to persuade the tech titans to back away from implementing end-to-end encryption (E2EE) in messaging apps then its next tactic will be to try to mobilize public opinion against it by claiming the technology puts society in moral peril.

It's a new approach laid bare in a recent report that the Home Office commissioned an advertising agency to come up with a campaign to turn citizens against E2EE, specifically Facebook's decision to add the technology to Messenger by 2023. As ever, it's about protecting children.

"We have engaged M&C Saatchi to bring together the many organisations who share our concerns about the impact end-to-end encryption would have on our ability to keep children safe," commented a Home Office spokesperson.

The tactic is probably doomed. The public probably doesn't like the idea of abusers hiding behind encryption, but many folks are equally suspicious of the government's motives. The government, it seems, doesn't trust its citizens. Facebook, meanwhile, doesn't trust governments, fearing that by agreeing to create E2EE backdoors it risks becoming an arm of state surveillance.Ordinary citizens just wonder whether they should trust anyone.

The public probably doesn't like the idea of abusers hiding behind encryption, but many folks are equally suspicious of the government's motives

The problem with trust is that once it's gone, it's gone for good. Although most people trust governments in a general way, this can wear thin if pushed too far. This is especially true for privacy even if people are often complacent about how much of it they really have. Tell people you're taking it away and they'll feel a liberty has been taken. In a free society, privacy should be something citizens and businesses have some control over rather than a privilege handed out by governments on their terms.

The British government has yet to ask businesses what they think. Small businesses increasingly depend on E2EE apps that have emerged from consumer tech so the idea of official snooping on these apps could eventually become an issue. Enterprises, of course, don't use these apps but are increasingly nervous that E2EE is the thin edge of a wedge being driven into the idea of private business communications.

For enterprises, encryption is non-negotiable. You can't have secure communications and data some of the time. It's all or nothing. This is how encryption has been sold to them for decades it creates absolute mathematical certainty that protects them from their rivals, from criminals, from nation states, and yes, from government interference. In many cases, this security is a regulatory and legal requirement.

In arguing to bypass E2EE, the British government appears to want to set itself up as the ultimate arbiter on where and when privacy and security should apply. Despite the moral arguments used to justify weakening encryption, this is the recourse of an authoritarian regime, ironic given UK and US antipathy to the oppressive mass surveillance carried out in countries such as Russia and China.

E2EE is the target today but it won't stop there

The benefits of backdooring E2EE are not only illusory but damaging. Criminals would continue their activities using different E2EE apps while ordinary citizens and businesses would be subjected to pointless surveillance. Trust in governments would decline. Hailed as a great advance it would be nothing of the sort, instead mere surveillance theater.

E2EE is the target today but it won't stop there. Other applications and perhaps broader uses of encryption will be next because criminals are probably hiding there too. Imagine living in a world in which governments control privacy and security.

This is not a world of greater security but eroding trust. Who is watching? You have no way of knowing. Nobody in their right mind would want to live in this world and for that reason I implore everyone to vote against this motion.

In a career of 30 years John E Dunn edited several dead tree computer magazines before specialising in cybersecurity in 2003 when he co-founded online title Techworld. These days he writes on the topic in numerous places because there is a lot to talk about.

Cast your vote below. We'll close the poll on Thursday night and publish the final result on Friday. You can track the debate's progress here.

JavaScript Disabled Please Enable JavaScript to use this feature.

Read more here:
Privacy and computer security are too important to be left to political meddling - The Register

Read More..

Here are the best ways to keep your digital files safe – The Dallas Morning News

This week I got an email from a reader with a question:

Im curious: Where do you recommend storage of historical documents such as tax returns, etc. Should I store them locally on a hard drive with a risk of failure or online in a service like Dropbox, with the risk of hacking?

I use the latter with two-step authentication, but Im still unsure.

There are hundreds of ways to safeguard your important data, and we cant come close to talking about them all, so lets concentrate on just a few.

To be clear, we are talking about digital files here, not paper.

As I collected my tax documents this year, about half were digital and half were paper. If you have paper documents to save, you can opt to scan them into PDFs. Ill be reviewing a nice document scanner in a few weeks.

Once you start gathering your important information as digital files, you have some choices to make.

The first (and easiest) choice is to store the files on your computers hard drive.

The danger here is someone else could gain access, either in person or through the internet.

If you dont have separate login accounts for each person in your household, now is the time to create them. If you are storing sensitive files on your PC, youll want to log out when you are not using the computer.

Giving everyone else their own accounts will keep them out of your files.

You can also encrypt your hard drive so that it cant be read even if someone steals your computer and removes the drive.

Mac users can search for File Vault and Windows users can search for BitLocker to read more about whole disk encryption.

You can also search for ways to encrypt folders.

Another option is to save or back up your digital files on USB drives (either flash drives or external hard drives).

It is always a good idea to keep a backup copy of your important files on a separate (removable) drive and store it away from your home. You dont want to lose all your data if your house burns down or your computer gets stolen.

These backup USB drives should also be encrypted.

Encryption lets you open the folders and files, but anyone else needs a password.

As for cloud storage services like DropBox, Google Drive or Microsoft OneDrive, you can store your documents there, but you should think about how you use those services.

Most people log into a cloud storage service and let their browser or operating system save their credentials to make it easier to log in (or to stay logged in).

You should always log out of those services when you are finished accessing the files.

That way you must log in each time.

You should also enable two-factor authentication, which is another level of protection.

With two-factor, youll enter your cellphone number during setup. Any time you want to log into the cloud storage, youll be texted a code that youll have to enter along with your usual password.

If there is one lesson here, remember that its not enough to save your files and to back them up. You need to encrypt those files to make it almost impossible for others to open them and set up two-factor authentication wherever you can.

Read this article:
Here are the best ways to keep your digital files safe - The Dallas Morning News

Read More..

HHS outlines threats to electronic health and medical records, remediation guidance – SC Media

The Department of Health and Human Services Cybersecurity Coordination Center (HC3) released new guidance outlining the biggest threats to the electronic medical record (EMR) and electronic health record (EHR) systems and best practice mitigation.

Although there are key security basics included in the insights, HC3 also included an overview of recommended read team and blue exercises as an imperative to understanding issues with an organizations network, vulnerabilities, and other possible security gaps.

The 35-page document shines a light on the importance of EHR technologies to patient care, but also how threat actors are able to exploit the platforms to gain a foothold onto healthcare networks. Phishing, malware, and ransomware are among the most common threats, as well as encryption blind spots and cloud threats.

Last year, the healthcare sector faced 578 reported data breaches, affecting over 41.5 million patients. In January 2022 alone, 2 million individuals have been impacted by 38 separate data breaches.

Covered entities and relevant business associates will find the guidance includes an overview of each threat type and the importance of data encryption. While The Health Insurance Portability and Accountability Act doesnt overtly require data encryption, it does mandate that if a provider chooses not to encrypt data that it provides evidence of what it will use to keep the data secure.

HC3 also provides a breakdown of preventative strategies specific to securing the EMR and EHR, which include evaluating the risk before an attack and the inclusion of red and blue team exercises. The guide breaks down the risk of ransomware against the remote desktop protocol (RDP) and the need for multi-factor authentication and endpoint detection and response (EDR).

Each section outlines the most important measures, as well as its importance to overall security posture.

While its impossible to completely eliminate risk, these recommendations can drastically reduce the impact of a potential attack. Given that previous HHS data shows the majority of health systems faced a cyberattack in the last 18 months and data show all healthcare entities are targets, its an ideal time to review these insights to ensure adherence to best practices.

The guide joins previously released HHS insights on ransomware, threat mitigation, and its five-volume cybersecurity guidance broken down by organization type.

Read more here:
HHS outlines threats to electronic health and medical records, remediation guidance - SC Media

Read More..