Page 2,161«..1020..2,1602,1612,1622,163..2,1702,180..»

Move your body for a healthy mind: Health experts weigh in on winter activity – WKOW

This winter stay active so you can boost your mental health

MADISON (WKOW) -- Health and wellness experts remind us theres a powerful correlation between mental and physical health.Darkerand colderdayscan causeyou tofeel more fatigued and tired all the timeand thiscausesstress and anxiety to increase.

However, aquick workout at the gym,or even a brisk walk around your neighborhoodcould help decrease these symptoms and improve your mood.

Studies have shown that a lack of physical activity will actually make your mental health and your stress and anxiety levels worse, says Devin Peterson,ahealth and wellness coach atQuickHITFitness Labs.So even though this time of year can be very difficult to feel motivated to get exercise in, it's very important to get that physical activity in there, because if you don't,it will amplify those negative feelings.

Petersonrecommendstrying toreframe your thoughtswhen it comes to exercise.Instead of telling yourself this is something youhaveto do on top of your busy schedule, think ofphysical activityas something you know will give you a boost of energy.

Also, your workout doesn't have to be an hour and a halfevery daytosee results. Think about spending a maximum an hour a week of exercisingin 20-minute chunks. Thatshouldfeel more doable.

You can stay activebystretching and making sure you hityourentire body.Hold the position for 10-20 seconds and focusontaking long,deep breaths.Thisis agood way to feelmore calm and relaxed.

Healthexperts also recommend finding someone to exercise with. This helps you to be accountable. Also, studies show the social interaction helps reduce symptoms ofdepressionand anxiety.

Separatingyourself from those stressful factors or your busy schedule and then just doing something that you enjoy for a little bit of time each dayhelps, says Peterson.That's a big thing that will help improve the mental healthandthen might make it easier for you to feel more motivated todo some physical activity.

Visit link:
Move your body for a healthy mind: Health experts weigh in on winter activity - WKOW

Read More..

Valentino Khan Shares Heartwarming Story of Bob Saget’s Reaction to "Deep Down Low" – EDM.com

The tragic passing of Bob Saget over the weekend has inspired several high-profile electronic music artists to share their stories of meeting the late comedy icon.

Who would America's Dad have had such a curiosity and appreciation for in dance music? Saget made a particularly meaningful impact on renowned producer Valentino Khan, who shared a heartwarming tribute on Instagram. Khan explains he was playing a set at Encore Las Vegas when the Full House star approached the booth to introduce himself. The two exchanged pleasantries and although it was brief, Khan said that Saget struck him as particularly kind.

Later in the evening before leaving the club, Saget returned to the DJ booth to show Khan he'd been trying to identify his global hit, "Deep Down Low," on his phone and was surprised to find the track's creator was standing right in front of him.

Saget excitedly tells Khan, "I was trying to find out what song was playing and its you!"

Khan says the moment left him mind-blown. The fact that Saget would take the time to go out of his way to share such a genuine reaction for the mere sake of it certainly speaks volumes about his character.

Khan's takeaway from the experience is simple, but timeless. "If you can make a positive impact on someone even for a small moment in this life youre doing it right," he wrote.

Facebook: facebook.com/ValentinoKhanTwitter: twitter.com/ValentinoKhanInstagram: instagram.com/valentinokhanSpotify: https://spoti.fi/2ZgLEkr

Read the original here:
Valentino Khan Shares Heartwarming Story of Bob Saget's Reaction to "Deep Down Low" - EDM.com

Read More..

Nobel Laureates to discuss the future of science at Vietnams VinFuture Award Week – Yahoo Finance

HANOI, VIETNAM --News Direct-- Vingroup

HANOI, VIETNAM - Media OutReach - 14 January 2022 - As part of the VinFuture Award Week (Jan 18 21, in Hanoi), the "Science for Life" Symposium will see some of humanitys greatest thinkers give detailed predictions about the future of mankind.

Slated for January 19, the symposium, covering three main areas: Energy, Artificial Intelligence (AI) and Health, is considered a must-go event for outstanding minds in global science and technology, who will be attending the VinFuture Awards Week from January 18-22.

The "Future of Energy" session is a unique event in Vit Nam that brings together two Nobel laureates, Sir Konstantin S. Novoselov and Professor Grard Mourou, as well as the owner of the 2010 Millennium Technology Prize - Sir Richard Henry Friend.

Professor Novoselov, the world's youngest Nobel laureate in Physics, created graphene known as a super material, which is predicted to become a mainstream material in the future.

Professor Mourou, the 2018 Nobel laureate in Physics, is considered the "father" of ultra-short pulse laser amplification technology - a technique used in eye surgeries for millions of people each year.

Meanwhile, Professor Friend is recognised worldwide as his research has laid the foundation for the birth of OLED screens - a common part in electronic devices such as televisions and smartphones today.

At the symposium, questions about the most important alternative energy sources in the future like How to make energy cleaner, cheaper and easily accessible to the vast majority of people around the world? will be addressed. The topic interests both the scientific community and business circles.

At the "Future of Artificial Intelligence" session, the world's leading scientists such as Dr. Padmanabhan Anandan, Prof. Jennifer Tour Chayes, Dr. Xuedong David Huang, and Dr. Bui Hai Hung will provide an overview of the impact of AI on people's lives, how to create competitive advantages, close the gap between countries as well and ease potential risks or consider ethical aspects.

Story continues

The event will bring Vietnamese scholars and public a rare opportunity to meet and talk directly with famous names coming from technology giants such as Microsoft, Google or Adobe.

Dr. Padmanabhan Anandan is former founder and CEO of Microsoft Research India, vice president at Adobe Research, with expertise in computer vision, visual motion analytics, video surveillance and 3D scene modelling.

Jennifer Tour Chayes is the managing director of three Microsoft Research centers in Cambridge, New York and Montreal. Microsoft Corporation Chief Technology Officer Xuedong David Huang currently owns 170 patents, and plays an important role in robot research that can see, hear, understand and support human life best way. Meanwhile, Dr. Bui Hai Hung used to hold important positions at Google DeepMind and Adobe Research, AI Center, and SRI International.

Attracting the most attention is probably the "Future of Health" session, where health spellbinders will discuss the progress of medicine, responsibilities in the field of health and issues surrounding the fight against the COVID-19 pandemic and its variants.

Notably, the scientists laying the foundation for COVID-19 vaccines technology will reveal the journey of a nearly 30-year preparation to produce a "weapon" in the fight against the global pandemic. These include Prof. Pieter Rutter Cullis, pioneer in gene therapy using lipid nanoparticle (LNP) technology; Drew Weissman and Dr. Katalin Kariko, co-recipient of the Breakthrough Prize in Life Sciences 2021 with mRNA technology that shortens the production time of vaccines from years to just months.

Attending the symposium, the South African-born professor married couples, Salim Abdool Karim and Quarraisha Abdool Karim, will also share information about the "miracle" Tenofovir. This is considered a breakthrough invention that helps reduce the amount of HIV in the blood and reduces the risk of AIDS-related illnesses and other dangerous infectious diseases.

Right after the "Science for Life" Symposium, the winners of the prestigious VinFuture Prize will be announced in the award ceremony held at 8:10pm on January 20 at the Hanoi Opera House.

The organizers have carefully prepared a COVID-19 test for all guests participating in VinFuture events, in order to ensure a high level of safety.

VinFuture Science Week has four main activities:

- January 18, 2022: Conversation with VinFuture Prize Council and Pre-Screening Committee, where famous scientists share stories of passion, achievements and sacrifices of scientists.

- January 19, 2022: The "Science for Life" Symposium has three discussion sessions, each session will last 90 minutes with the topics: Future of Energy, Future of Artificial Intelligence and Future of Global Health.

- January 20, 2022: Inaugural Award Ceremony of VinFuture Prize at Hanoi Opera House at 8:10pm (live broadcast on VTV1 and major domestic and international platforms).

- January 21, 2022: Scientific Dialogue with the VinFuture Prize Laureates.

Vingroup

v.nammh@vingroup.net

https://www.vingroup.net/en

View source version on newsdirect.com: https://newsdirect.com/news/nobel-laureates-to-discuss-the-future-of-science-at-vietnams-vinfuture-award-week-976079978

Follow this link:
Nobel Laureates to discuss the future of science at Vietnams VinFuture Award Week - Yahoo Finance

Read More..

Alibaba ponders its crystal ball to spy coming advances in AI and silicon photonics – The Register

Alibaba has published a report detailing a number of technology trends the China-based megacorp believes will make an impact across the economy and society at large over the next several years. This includes the use of AI in scientific research, adoption of silicon photonics, the integration of terrestrial, and satellite data networks among others.

The Top Ten Technology Trends report was produced by Alibaba's DAMO Academy, set up by the firm in 2017 as a blue-sky scientific and technological research outfit. DAMO hit the headlines recently with hints of a novel chip architecture that merges processing and memory.

Among the trends listed in the DAMO report, AI features more than once. In science, DAMO believes that AI-based approaches will make new scientific paradigms possible, thanks to the ability of machine learning to process massive amounts of multi-dimensional and multi-modal data, and solve complex scientific problems. The report states that AI will not only accelerate the speed of scientific research, but also help discover new laws of science, and is set to be used as a production tool in some basic sciences.

As evidence, the report cites that fact that Google's DeepMind has already used AI to prove and propose new mathematical theorems and assisted mathematicians in areas involving complex mathematics.

One unusual area where DAMO sees AI having an impact is in the integration of energy from renewable sources into existing power networks. Energy generated from renewable sources will vary depending on weather conditions, the report states, which are unpredictable and may change rapidly, thereby posing challenges for integration of renewable energies such as maintaining a stable output.

DAMO states that AI will be essential to solving these challenges, in particular being able to provide more accurate predictions of renewable energy capacity based on weather forecasts. Intelligent scheduling using deep learning techniques should be able to optimise scheduling policies across energy sources such as wind, solar, and hydroelectric.

The use of big data and deep learning technologies will be able to monitor grid equipment and predict failures, according to the report, so perhaps in the near future you will blame the AI when the power cuts out just as you are trying to binge-watch Line of Duty.

DAMO also believes that we will see a shift in the evolution of AI models, away from large-scale pre-trained models such as BERT and GPT-3 that require huge amounts of processing power to operate and therefore consume a lot of energy, to smaller-scale models that will handle learning and inferencing in downstream applications.

According to this view, the cognitive inferencing in foundational models will be delivered to small-scale models, which are then applied to downstream applications. This will result in separately evolved branches from the main model that have developed their own perception, decision-making and execution results from operating in their separate scenarios, which are then fed back into the foundational models.

In this way, the foundational models continually evolve through feedback and learning to build an organic intelligent cooperative system, the report claims.

There are challenges to this vision, of course, and the DAMO report states that any such system needs to address the collaboration between large and small-scale models, and the interpretability and causal inference issues of foundational models, as the small-scale models will be reliant on these.

Silicon photonics has been just around the corner for many years now, promising not just the ability for computer chips to communicate using optical connections, but perhaps even using photons instead of electrons inside chips. DAMO now expects we will see the widespread use of silicon photonic chips for high-speed data transmission across data centres within the next three years, and silicon photonic chips gradually replacing electronic chips in some computing fields over the next five to ten years.

The continuing rise of cloud computing and AI will be the driving factors for technological breakthroughs that will deliver the rapid advancement and commercialisation of silicon photonic chips, the report states.

Silicon photonic chips could be widely used in optical communications within and between data centres and optical computing. However, the current challenges of silicon photonic chips are in the supply chain and manufacturing processes, according to DAMO. The design, mass production, and packaging of silicon photonic chips have not yet been standardised and scaled, leading to low production capacity, low yield, and high costs.

Privacy is another area where DAMO believes we will see advances in the next few years. It states that techniques already exist that allow computation and analysis while preserving privacy, but widespread application of the technology has been limited due to performance bottlenecks and standardisation issues.

The report predicts that advanced algorithms for homomorphic encryption, which enables calculations on data without decrypting it, will hit a critical point so that less computing power will be required to support encryption. It also foresees the emergence of data trust entities that will provide technologies and operational models as trusted third parties to accelerate data sharing among organisations.

Another prediction from DAMO is that satellite-based communications and terrestrial networks will become more integrated over the next five years, providing ubiquitous connectivity. The report labels this as satellite-terrestrial integrated computing (STC), and states that it will connect high-Earth orbit (HEO) and low-Earth orbit (LEO) satellites and terrestrial mobile communications networks to deliver "seamless and multidimensional coverage."

There are major challenges to implementing all this, of course, including that traditional satellite communications are expensive and use static processing mechanisms that cannot deliver the requirements for STC, while hardware for satellite applications is not commonplace and hardware for terrestrial applications cannot be used in space.

Finally, the DAMO report predicts the rise of what it calls cloud-network-device convergence. This appears to be based on the premise that cloud platforms offer a huge amount of compute power, while modern data networks can provide access to that compute power from almost anywhere, so that endpoint devices only need provide a user interface.

Yes, it's the thin client concept emerging again, this time using the cloud as the host. Clouds allow applications to break free of the limited processing power of devices and deliver more demanding tasks, according to the report, while new network technologies such as 5G and satellite internet need to be continuously improved to ensure wide coverage and sufficient bandwidth.

Just by sheer coincidence, Alibaba Cloud already has such devices, with the handheld "Wuying" launched in 2020 and a more substantial desktop device shown off last year.

Naturally, the DAMO report expects to see a "surge of application scenarios on top of the converged cloud-network-device system" over the next two years that will drive the emergence of new types of devices and promise more high quality and immersive experiences for users.

Read the original here:
Alibaba ponders its crystal ball to spy coming advances in AI and silicon photonics - The Register

Read More..

Neenah schools will be closed Tuesday because of a ‘technology security situation’ that shut down internet, phone systems – Post-Crescent

NEENAH All Neenah Joint School District schools will be closed Tuesday because of a "technology security situation."

According to a letter from the district, the security situation "involves potential unauthorized access to the school data system" that caused an outage of the internet, phone systems and several software applications.

At this point, the district has no reason to believe any confidential or personal information was compromised, the letter said.

After the district discovered the issue, it notified local and federal law enforcement and brought in cyber security experts to begin a forensic investigation, the letter said.

The district hopes to have phones and other systems working again by Wednesday so students and staff can return to school, but students will likely work "in a non-digital environment, possibly into next week."

This story will be updated when more information becomes available.

Reach AnnMarie Hilton at ahilton@gannett.com or 920-370-8045. Follow her on Twitter at @hilton_annmarie.

See the rest here:
Neenah schools will be closed Tuesday because of a 'technology security situation' that shut down internet, phone systems - Post-Crescent

Read More..

Google wants to work with government to secure open-source software – Engadget

Google has called on the US government to take a more proactive role in identifying and protecting open-source projects that are critical to internet security. In a blog post the company published following the White Houses Log4j vulnerability summit on Thursday, Kent Walker, president of global affairs and chief legal officer at Google and Alphabet, said the country needs a public-private partnership that will work to properly fund and staff the most essential open-source projects.

For too long, the software community has taken comfort in the assumption that open source software is generally secure due to its transparency and the assumption that many eyes were watching to detect and resolve problems, he said. But in fact, while some projects do have many eyes on them, others have few or none at all.

According to Walker, the partnership would look at the influence and importance of a project to determine how critical it is to the wider ecosystem. Looking to the future, he says the industry needs new ways to identify software that may, down the line, pose a systemic risk to internet security.

Walker said theres also a need for more public and private funding, noting Google is ready to contribute to an organization that matches volunteers from companies like itself to critical projects that need the most support. Open source software is a connective tissue for much of the online world it deserves the same focus and funding we give to our roads and bridges, he said.

The importance of open-source software has been a topic of a lot of discussions following the discovery of the Log4Shell vulnerability. Log4j happens to be one of the most popular and widely used logging library, with services like Steam and iCloud depending on it. Security researcher Marcus Hutchins, who helped stop the spread of WannaCry, called the vulnerability extremely bad as it left millions of applications open to attack.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.

Go here to read the rest:
Google wants to work with government to secure open-source software - Engadget

Read More..

This year, Russia’s internet crackdown will be even worse – Atlantic Council

When Russian President Vladimir Putin signed a law in 2019 allowing the state to isolate the internet within Russia in the event of a security incident, international media outlets extensively covered the development, with many (incorrectly) likening it to Chinas Great Firewall. The spotlight quickly swiveled back to Beijings grip on online content and dataeven though a Kremlin campaign continues to ratchet up pressure on US technology giants, and could soon create a disruptive playbook for other states.

While Moscow made headlines after throttling Twitter and coercing Google and Apple into censoring opposition leader Alexei Navalnys election app last year, Western media coverage of internet repression and security threats still tends to focus on China. This penchant persists despite Russian developments that impinge on both the internet ecosystem and human rights in the countryand which constitute broader cyber threats and efforts to undermine the global internet.

In no small part, this pattern stems from the fact that Russian state control of the internet differs from that in China: It relies less on technical measures and more on traditional, offline mechanisms of coercion such as harassment, intimidation, and vague and inconsistently enforced speech laws. Notably, Russias domestic efforts to control the internet quite closely parallel its efforts overseas to shape information and to both weaponize the internet and undermine its global nature.

As the world watches Putins moves in and around Ukraine, these developmentswhile of course not comparable to the possibility of large-scale armed conflictare worthy of attention, given their impact on the Russian cyber and internet landscape more broadly.

The more the Kremlin cements its control over the internet, the more it can potentially suppress dissent and control information and data flows at home. And the more it slowly works on implementing the domestic internet law, the more it centralizes its control of the architecture of the internet in Russiawhich could also affect Russian cyber behavior abroad, such as by encouraging more assertive operations against global internet infrastructure. Though US policy debates often separate Russian internet governance and technology policy at home from Russian cyber behavior abroad, there is actually great interdependence and entanglement between the two.

As the Kremlin demonstrates and further develops a model of internet and information control that appeals to states without Chinas technical capacity, Moscows techniques may portend the future of internet repression elsewhere. Several recent, but largely overlooked, developments signal that the Kremlin may crack down on the internet more than ever in 2022while US tech companies and the US government increasingly have little room to push back.

Last year was a stifling one for Russian internet freedom. When citizens took to the streets to protest state corruption and the Kremlins jailing of Navalny, the government sent censorship orders to YouTube, Facebook, Instagram, Twitter, TikTok, VKontakte (Russias leading social network, also known as VK), and other domestic and foreign tech firms. Many caved and removed protest-related content. When Twitter refused to comply, the government leveraged newly deployed deep packet inspection capabilities to throttle it from within Russia. That was only partly successful, as many other websites were inadvertently affected by the traffic slowdown, but it still demonstrated to foreign technology firms that Moscow was expanding its censorship capabilitieswhich it also threatened to use again as desired.

The crackdowns hardly ended there. The government demanded that foreign tech companies set up local offices in Russia, and the Foreign Ministry called in the US ambassador to complain that US tech firms were not complying with the Kremlins censorship ordersdecrying the companies behavior as election interference and describing them as tools of the American state. The government blocked access to the website for TOR (short for the Onion Router), an anonymizing browser often used to bypass government restrictions when surfing the web. It also blocked access to six major virtual private network (VPN) websites, where citizens were accessing software to circumvent online censorship; set up a registry to track tech company compliance with censorship orders; blocked many other websites, including those for Navalnys campaign; and used its foreign agents designation to crack down on numerous online media.

As more and more Russians get their news from social media, and as internet mobilization and outreach become more important to protesters and opposition figures, the states crackdown on the web means citizens will have an even harder time accessing and sharing news that criticizes (or merely reflects poorly on) the Putin regime.

Several recent developmentsincluding official pressure on Google, the expansion of domestic software and a push for domestic internet, as well as local office requirements for tech firmsillustrate how both economic and security motivations drive Russias new campaign to control and shape the domestic internet environment. They also underscore just how wide-ranging this campaign is.

In September, when Apple and Google refused to delete Navalnys election app from their platforms, the Russian government threatened their employees in Russia and sent armed thugs to Googles Moscow office; both companies then removed the app. Since then, the State Duma (Russias lower house of parliament) met with Google to issue even more demands (for example, edit Google Maps in Russia to show illegally annexed Crimea as part of Russia), while a Moscow court fined it $40,400 for not removing content the Kremlin deemed illegalthen fined it a record $98.4 million for not complying with state censorship orders. Google was targeted again just last month, when another Moscow court upheld a ruling from last April that found Google-owned YouTube must restore the account for Tsargrad, the TV channel owned by sanctioned Putin ally and oligarch Konstantin Malofeev. Though unsurprising, the ruling nonetheless gives the state another reason to increase its pressure on Google.

Meanwhile, a recently published BBC analysis found that between 2011 and 2020, the Russian government had filed more than 123,000 individual requests to Google search or YouTube to delete contentmany times more than the number issued by Turkey (14,000), India (9,800), the United States (9,600), Brazil (8,000), Israel (2,000), or China (1,200). Moscow continued issuing those censorship orders in 2021, mostly focused on removing content related to Navalny. The Russian governments commitment to fining Google a percentage of its annual revenue in Russia for not removing content signals increased Kremlin frustration at Google not bending the knee and suggests the pressure will ramp up even further.

Google matters as a stand-alone issue here because YouTube is the most widely used social media platform in Russia. It also provides cloud and other services to Russian citizens, while opposition leaders have used Google services as wellsuch as when the Navalny campaign used Google Docs to share a list of opposition candidates. Moreover, how the Kremlin treats Google, and its mixed record of compliance with the Russian government, could foreshadow how the state will treat other foreign tech companies facing similar demands.

The Russian government has increasingly been pushing the development and use of domestic software. Driven by economic and security factors, Russia aims to replace Western software with its Russian versions where possible. (However, if forced to choose between those two considerations, security would likely win out: While the Russian government doesnt want to undermine the operations of Russian tech firms, the Putin regime has demonstrated increasing concern about Western espionage through Western technologies.)

Moscow has been making this push on multiple fronts. For one, it has been updating its domestic software registry, established in 2015, which lists government-approved software that state bodies and companies should use when replacing foreign software. It also implemented a law requiring that smartphones, laptops, smart TVs, and many other consumer devices sold in Russia have state-approved, Russian software preinstalled. This is primarily economically drivena way to theoretically give domestic firms a leg up against foreign software developers and big US tech companiesbut security factors (like Moscow wanting to secure backdoor access to Russian phones) may play a role as well.

The Russian government also updated its tax incentives for domestic technology production, making Russian companies with at least seven employees and 90 percent or more of their revenue from information technology (IT) eligible for reductions in their social security and corporate profit taxes. Given broader issues in Russian tech production (such as the quality of domestic hardware and the brain drain of IT talent to foreign countries), the effectiveness of this initiative seems questionable.

Overall, there has been mixed success in Moscows push to develop domestic tech. While some Russian companies have made small gains as Western technology is expelled from government and business systems, in many cases Chinese firms take slightly more market share in Russia. Chinese telecom company Huawei Technologies, for instance, has played into Kremlin fears of Western espionage to accelerate expansion in Russia.

It remains to be seen whether Russias increased use of domestic software will better protect the state against espionage or end up undermining the cybersecurity of Russian citizens and the Russian internet ecosystem.

On January 1, a new law came into effect requiring any foreign internet company with five hundred thousand daily Russian users to open an office in Russia. This is a blatant tool of coercion which fits neatly into the Russian governments internet control model. Technical measures play a part, but traditional forms of physical, offline coercionsuch as stalking and intimidation by the security services, including the Federal Security Service (or FSB, the KGBs successor) in the digital sphereare a means of scaring citizens, keeping tech firms in check, expanding surveillance, and generally controlling the shape of internet conversation.

The Kremlin demonstrated the power of this tool when it sent armed, masked thugs to Googles Moscow office: When a company has employees on the ground, those are people who can be stalked, harassed, intimidated, threatened, jailed, or even killed. As of a few months ago, Google and Apple had complied with the local-office law; other major companies with users in Russia, such as Facebook and Twitter, have not.

Russian authorities have said they will not begin fining companies immediately for noncompliance if they demonstrate they are working on setting up an office. The list of companies which are required to open offices is notable: Facebook, Twitter, Telegram, TikTok, Zoom, Pinterest, and Spotify. It will be key to watch if they complyand whether doing so would create any new legal or jurisdictional challenges amid any Kremlin censorship or data-access requests.

In December 2021, a law came into effect mandating that only Russian entities can own cross-border communications lines. While many telephone and internet cable systems in Russia are already owned by Russian entities (and, often, by state-owned firms such as Rostelecom), its unclear what this means for the undersea cables that link the Russian internet to the global internet and are owned by multiple companies, some of them foreign.

The government also set up a registry of autonomous systems (routing internet traffic) that would be critical to the operation of the planned domestic internet, as well as mandated that internet providers work on countering Kremlin-defined threats on their networks.

In short, the Russian government continued building out components of the domestic internet law this year and has slowly started centralizing control over internet infrastructure in Russia.

While its a very different internet and political environment, Western tech companies are at least generally familiar with a similar story in China: Companies wanted to enter the market and remain in the country to provide services and make moneyyet they all reached a point at which the Chinese government was cracking down harder on the internet, and at which compliance with Beijings demands was simply too much. Many US tech companies exited the market, or at least closed their local offices. The Russian government has far less technology leverage than Chinas vis--vis market size and power, as well as its chokehold on the global tech supply chain; but it has also demonstrated a considerable willingness to use outright force against foreign companies.

The Kremlins escalating pressure on Google portends a growing intolerance of Western technology companies that dont comply with its demands. Importantly, the states will and ability to crack down will not apply equally or identically to all firms. Twitter, for instance, has been resisting the Russian governments local office requirementwhich meant the Kremlin had no Twitter employees in Russia to threaten when it wanted the company to censor protest content in March 2021. Still, companies are likely to face even more Kremlin pressure in 2022, and there is increasingly little that they can do to push back.

Filing appeals in the Russian courts is not a viable option, nor is looking for market leverage to negotiate with Russian officials. The US government is likewise in a tricky position, because any efforts to support Internet freedom in Russia will only exacerbate Moscows accusations, as conspiratorial and deluded as they are, that the internet and US tech firms are tools of the CIA and American subversion. If the Russian pressure campaign on tech companies ramps up further, as appears highly likely this year, it may prompt some (especially smaller) foreign tech companies to contemplate exiting the market altogether.

Many factors will influence whether and how the Kremlin will act, including traditional political considerations. Tech-company actions or inactions that intersect with high-priority issue areas for the Russian government, such as election opposition and mass demonstrations, are likely to continue receiving Kremlin attention (and therefore more coercive force). Conversely, it remains to be seen if historically lower-priority areas, such as enforcing Russias 2015 data-localization law, will get any more buy-in amid the domestic internet push.

Website or platform popularity and the reach of particular content may also be factors in the Kremlins response. YouTube, for instance, is the most widely used social media platform in Russia (with 85.4 percent penetration versus VKs 78 percent penetration), whereas Twitter is much less popular among Russians. Even if Russian tech companies can functionally operate without YouTube in the Russian market, a severe crackdown on it would still be a serious decision given the platforms immense popularity with Russians.

Notably, this campaign marks a departure from years past, when laws were enacted (such as on encryption, source code inspections, or data localization), but not necessarily enforced with high-level political buy-in. So while the pressure now seems like a means for the Kremlin to achieve compliance with its wishes, there is no guarantee it will stop there. Companies may find themselves facing a regime willing to use these tools for outright punishment as well.

Justin Sherman is a nonresident senior fellow at the Atlantic Councils Cyber Statecraft Initiative. Follow him on Twitter: @jshermcyber

Wed, Jan 12, 2022

UkraineAlertByHarley Balzer

While Russia has attempted to reduce its dependence on the SWIFT payment system, it remains vulnerable to a sanctions cut-off in the event of a new Kremlin offensive in Putin's eight-year undeclared war against Ukraine.

Image: Russians attend a rally to protest against tightening state control over internet in Moscow, Russia, on March 10, 2019. Photo by Shamil Zhumatov/REUTERS

Read more here:
This year, Russia's internet crackdown will be even worse - Atlantic Council

Read More..

Continuous security and compliance for hybrid cloud, the Red Hat way – The Register

Paid feature Assessing what can go wrong in a hybrid cloud environment can be daunting. Applications can be poorly coded, security vulnerabilities may be present but hard to detect or manage, and applications and the IT infrastructure may not be designed for DevSecOps.

Security layers designed to shield them can be misconfigured or not exist at all. Perhaps a developer or IT operations misunderstands and blindly trusts the default controls on a cloud platform and leaves valuable data exposed, and thats before factoring in the danger from shadow IT.

Its not that developers or employees are always being willfully careless - mistakes are inevitable in a complex IT environment. But human errors have become a big enough issue that Gartner has estimated that between now and 2025 99 percent of cloud security failures will be the customers [rather than the service providers] fault.

That might sound like an exaggeration today but theres no doubt the rise of cloud and hybrid cloud have expanded the number of points of failures. Meanwhile, in the background is the troubled issue of maintaining compliance, and the need to dodge either delays to projects while software is fixed or fines for breaches after the fact.

Security controls are safeguards or countermeasures that organizations utilize to avoid, detect, counteract, or minimize security threats. Unfortunately, cloud compliance has always been a complex process and keeps becoming more so. The number of security controls that organizations must take account of is growing and their demands are becoming more onerous across multiple geographies.

In addition, many compliance frameworks were created 20-plus years ago and have older compliance requirements that do not apply to new cloud technologies (containers, Kubernetes, public cloud, etc.). Many of these older compliance frameworks assume that you are doing the security work after the server is deployed, and therefore focused on things like patching, vulnerability scanning, etc.

However, in a cloud environment, you have an immutable infrastructure so once you deploy, you dont make changes. If changes are needed, you re-deploy vs directly change the systems. Security work that needs to be done is done before deployment (at the application lifecycle pipeline).

JavaScript Disabled Please Enable JavaScript to use this feature.

Compliance has become so demanding in cloud deployments that many organizations have moved from manual security checks to procedures based on continuous automated monitoring and compliance, notes Lucy Huh Kerner, Red Hats Director of Security Global Strategy and Evangelism.

This makes sense. Too many things change, not only between audits but from day to day and hour to hour. Misconfigurations and human errors can strike at any moment. Continuous security and compliance are how these issues can be prevented for better security and not merely for check-the-box compliance. Compliance is expensive and difficult but so too is non-compliance or real-world breaches.

A lot of security checks in compliance frameworks were written 20-plus years ago and assume you are securing the system after the fact, once it has already been deployed, says Kerner. But a lot of compliance controls from this long-ago era dont apply to cloud technologies or take DevSecOps practices into account.

You cant deploy some of the recommended controls in a cloud or containerized immutable infrastructure, says Kerner. For example, a common recommended security control is to install third party security agents, such as anti-virus. However, in a containerized environment that is immutable, these types of policies dont make sense.

Therefore, security teams need to educate the compliance teams and auditors that this defend the castle perimeter based security model is no longer sufficient and may not apply in an immutable cloud environment. Organizations also need to automate their continuous security and compliance to handle the scale that cloud technologies bring to detect and fix issues in an automated and repeatable way. Done properly, continuous security and compliance should be a constant iterative process of detecting and fixing issues rather than manually detecting and fixing issues in a reactive way.

The whole objective of continuous security and compliance is to minimize manual processes because these slow everything down. The question is how to make this work using automation, continuous integration/continuous deployment (CI/CD), and DevSecOps practices. This has given rise to the compliance-as-code concept which turns the prevention, detection, and remediation of non-compliance into a programmatic, automated process for consistency and repeatability to do security and compliance at scale.

At Red Hat, the ComplianceAsCode upstream project is used to codify and create security policy content for various platforms as well as products. Using this content, provided as both Security Content Automation Protocol(SCAP) and Ansible content, you can do automated security scanning and remediations for both compliance and vulnerabilities.

OpenSCAP, which is included in a Red Hat Enterprise Linux subscription, can perform compliance and vulnerability scanning on Red Hat Enterprise Linux systems and help teams identify and remediate problems as they crop up. OpenSCAP is a SCAP compliant scanner. SCAP scanners are driven by several different industry policies, profiles, and rules.

The SCAP Security Guide, which is based on the ComplianceAsCode project, includes Red Hats interpretation of the policies, rules, and related Ansible playbooks for remediation to facilitate automation of configuration and auditing.

Because this is integrated into Red Hat products, OpenSCAP allows for vulnerability and compliance from the get-go, right from when the system is first installed. In addition, scanning for a compliance standard is not just a one-off task. You need to scan your systems regularly to ensure that you are maintaining compliance with the standard and any deviation from the policy will need to be remediated.

With OpenSCAP and Red Hat Ansible Automation Platform, you can automate security and compliance scans and remediations at scale in hybrid environments. This means that you can use OpenSCAP using several products in Red Hats portfolio, including Red Hat Ansible Automation Platform, Red Hat Smart Management with Red Hat Satellite, and Red Hat Insights to scan across your deployment portfolio.

Just as youve made an automated pipeline to create your applications, you need to embed compliance automation into your lifecycle, says Kerner. You dont want to be carrying out checks and remediations manually since this will lead to human errors.

You are using automation to save time and effort while removing human errors from the equation.

And you want to automate not only the compliance and security checks, but you want to automate the remediations of these issues as well, stresses Kerner. The big thing the auditors want is for organizations to prove that their systems and applications have passed those security and compliance checks. Logically, this must be done on a continuous basis rather than at the point of deployment at which point checking and fixing things becomes a major undertaking.

The customer can use the OpenSCAP tool to scan all their Red Hat Enterprise Linux systems for vulnerabilities and compliance, while also getting scan reports for audits and Ansible playbooks for remediations.

Since acquiring StackRox in early 2021, Red Hat now also has the ability to carry out Kubernetes cluster-wide compliance. Red Hat Advanced Cluster Security, powered by StackRox technology, will assess compliance across hundreds of controls for Center for Internet Security (CIS) benchmarks, payment card industry (PCI), Health Insurance Portability and Accountability Act (HIPAA), and NIST SP 800-190.

It will deliver at-a-glance dashboards of overall compliance across each standards controls with evidence export to meet auditors needs. In addition, it will provide a view of compliance details to pinpoint clusters, nodes, or namespaces that dont comply with specific standards and controls across your Kubernetes clusters.

The world Kerner outlines is one in which robot sysadmins and automation do almost everything and humans are only engaged to oversee the admin function or to deal with unusual exceptions. Compliance and security are simply turned on all the time, running in the background.

Sponsored by Red Hat.

View post:
Continuous security and compliance for hybrid cloud, the Red Hat way - The Register

Read More..

Eckerd computer science professors ‘think outside’ to boost wildlife research – Eckerd College News

That collaboration is on full display at Eckerd College, where two computer science professors are helping to make animal research quicker, easier and more precise. Kelly Debure, Ph.D., professor of computer science, is the driving force behind software used in research on marine mammals and, most recently, Alaskan brown bears.

And Mike Hilton, Ph.D., assistant professor of computer science, has developed software used in research on gopher tortoises and frogs. He has released it as an open source, so other wildlife researchers can work with him.

Over the past 20 years, Debure has supervised scores of Eckerd students who have maintained and enhanced DARWIN (Digital Analysis and Recognition of Whale Images on a Network). That software, initially implemented under the direction of former Eckerd faculty member John Stewman, has been downloaded thousands of times. It is designed to help researchers identify bottlenose dolphins, but it also has been used by research groups on spinner dolphins, fin whales, basking sharks and other related species.

Nicks and notches along the edge of a dolphins dorsal fin, along with scratches and other markings that an animal acquires, are features that can be used to uniquely identify an individual dolphin, Debure says. DARWIN uses the edge markings to compare the dorsal fin outlines for similarity.

The software can help wildlife scientists do something vital to their researchidentify individual animals. Debure says researchers who are monitoring certain animal species need to identify specific individuals in order to perform tasks such as making population estimates, determining home ranges and modeling association patterns.

Visit link:

Eckerd computer science professors 'think outside' to boost wildlife research - Eckerd College News

Read More..

Could artificial intelligence help predict Louisiana floods better? This LSU prof thinks so. – The Advocate

Using artificial intelligence and machine learning, LSU professor Hartmut Kaiser is joining up with a team of scientists to help communities near the coast better prepare for flooding.

Kaiser, an adjunct professor in the Division of Computer Science, is working with scientists from three other universities on a project titled 'MuSiKAL' that will help predict coastal flooding with better accuracy.

Kaiser said the Gulf of Mexico is ideal for research on protecting coastal watershed parishes and counties. More than half the U.S. population lives in those areas, and they generate about 58 percent of the country's gross domestic product, he said.

The Gulf of Mexico coast along Texas, Louisiana, and Mississippi is home to important U.S. energy hubs but is also home to socially vulnerable populations, Kaiser said in a statement. This proposed effort contributes to bringing science and knowledge discovery toward minimizing flood damage exposure and improving socioeconomic stability in the region.

MuSiKAL, which stands forMultiphysics Simulations and Knowledge discovery through AI/ML,is one of three projects funded by the Department of Energys Office of Advanced Scientific Computing Research.

Twice daily we'll send you the day's biggest headlines. Sign up today.

Each of the projects will bereceiving $15.1 million over three years from the Department of Energy.

Collaborations between scientific disciplines like those created through this program pave the way for the future of scientific discovery by combining diverse knowledge, skills and tools in new ways to approach a variety of critical problems, DOE Associate Director of Science for Advanced Scientific Computing Research Barbara Helland said in a statement. These projects can revolutionize the scientific productivity of our facilities while working towards solving some of Americas big problems.

Kaiser is collaborating with scientists Clint Dawson fromthe University of Texas, Austin, Joannes Westerink from the University of Notre Dame and Ruby Leung of the Lawrence Berkeley National Laboratory.

The team will couple the DOE's Earth physics model with a model measuring coastal circulation to develop more specified ways to predict flood behavior and solidify plans to mitigate damage.

The well-being of all Americans depends on the environmental integrity and sustainable productivity of the ocean, our coasts and coastal watersheds, Kaiser said.

View original post here:

Could artificial intelligence help predict Louisiana floods better? This LSU prof thinks so. - The Advocate

Read More..