Page 2,674«..1020..2,6732,6742,6752,676..2,6802,690..»

IAI adds to conversion deals with Etihad Engineering pact – Asian Aviation

Etihad Engineering has signed a strategic partnership with Israel Aerospace Industries (IAI), to provide Passenger to Freighter (P2F) conversions on Boeing 777-300ERs. In 2019, IAI and GE Capital Aviation Services (GECAS) announced the launch of the Boeing 777-300ERSF, a programme which established a P2F conversion dubbed The Big Twin denoting its status as the largest ever twin-engine freighter. While the COVID-19 pandemic has taken its toll on the aviation sector, cargo operations are offsetting operators losses, as it continues to play a critical role in facilitating international trade. As a result, industry forecasts show an increase in demand for wide-body freighter aircraft with long-haul capacity.

Etihad Engineering will capitalise on its expertise and extensive capabilities for the specialised Boeing 777-300ERSF conversion. In the initial stage of the partnership, Etihad Engineering will facilitate towards two conversion lines accommodating multiple aircraft conversions per year.

Tony Douglas, group chief executive officer, Etihad Aviation Group, said: The Boeing 777-300ERSF is not only extremely attractive to customers but a technological breakthrough, given that its the first in its size category to offer extensive cargo solutions. Not only do we see the demand, but we view it as a greener, more profitable, highly innovative solution for our airline customers, and an excellent way to drive value for our business.

Abdul Khaliq Saeed, CEO, Etihad Engineering, said, We are delighted to announce our partnership with IAI which maximises the potential of our highly skilled workforce and reinforces Etihad Engineerings position as a centre of excellence in Abu Dhabi in line with Abu Dhabis economic vision 2030. Our commitment to the P2F programme demonstrates our confidence in the ability of IAI to deliver long-term value enhancement of the B777-300ERs in the global fleet.

Boaz Levy, president and CEO, Israel Aerospace Industries, said The Abraham Accords have given IAI the opportunity to expand its global activity to the Gulf region. IAI is active in over 100 countries across the world. Establishing the conversion site in partnership with Etihad Engineering is a testament to IAIs strong ties with the UAE and strengthens its foothold in the region. I am confident that this agreement will lead to many more partnerships with local companies in the Gulf States, which will grow our business in the region.

More here:

IAI adds to conversion deals with Etihad Engineering pact - Asian Aviation

Read More..

How have engineering courses adapted to the pressing need for sustainability? Are we engineering a better world? – EdexLive

Not that we were on the lookout for any more distressing news, in what is already a world ravaged by the pandemic, but the IPCCs sixth Assessment Report basically doomed us to a bleak future thanks to human-induced climate change and global warming. For a planet crumbling under environmental and socio-economic distress caused by thoughtless exploitation of precious resources, it's (and it has been) high time for us to take corrective action.

And there's hope. Gen-Z is considered woke. This is a generation that has a Swedish schoolgirl as their spear against climate change. This is also the generation that might have the last shot at saving us from apocalypse at the hands of a climate catastrophe. You would think that when we have reached what scientists are calling a 'state of climate emergency', the youngsters who are supposed to salvage this situation for us, are being given the ammunition they need in their education and in the industry.

As we explore various streams in the field of engineering in this context, it is likely that the situation in classrooms right now varies by quite a degree. How are engineering colleges coping with the need for change? Are we up to speed on enabling students to lead environment-conscious, sustainable industries in the future? Where do we stand on the skill gap between traditional methods of teaching and new-age technology suited for building better ecosystems?

Stream: Civil Engineering

Green building, as a concept, has been around since the late 1990s, when sustainable methods were employed at every stage of construction to create a settlement in Germany. The Indian Green Building Council (IGBC) was established in 2001 to regulate construction in the country, and provide certifications for green construction. Its plan was to ensure 10 billion sqft of land in the country is covered by green buildings by the year 2022. In August 2020, the IGBC announced that it had achieved 75 per cent of that goal, with around 7.50 billion sqft of land covered by green buildings. Matrusri Engineering College, Hyderabad, Telangana, is a member of the IGBC, and Prof G Manohar from the Civil Engineering Department of the college seconds the Councils claim that India is a top-tier participant of the green buildings initiative. If we speak about the syllabus in particular, the last three years have brought a lot of changes. We have started following the AICTE-approved syllabus that makes ample space for concepts such as environmental engineering, green building technology and disaster management, says Prof Manohar.

Professors Sugandhini HK and Nagabhushan B from the Department of Civil Engineering at Manipal Institute of Technology say that the shift in the use of sustainable building practices has indeed brought changes to the syllabus being offered to the students. Changes were implemented in areas such as 'reuse, reduce and recycle' of construction and demolition waste, fly ash bricks, green cement and industrial by-products. Institutes like IGBC and Green Rating for Integrated Habitat Assessment (GRIHA) are playing a pivotal role in building technical capability in India, they say.

The challenge then lies in creating an ecosystem for implementing green building in the country. Although the IGBCs projects do invite some cheer, and reports also suggest that the impact is extending into the residential sector. Incorporating a system for rainwater harvesting is compulsory in the state of Tamil Nadu, and all across India, 18 lakh homes are said to have received the green building rating from IGBC.

The synergy between the industry and education needs to be bolstered, believe the professors. They suggest measures to improve production, marketability and availability of green building products, so that such construction can happen at a large scale to gain the trust of the public. Massive awareness and training of field engineers and personnel in contemporary construction practices should be encouraged by offering certificate courses or short-term training programmes, they add.

Prof Manohar sends across an important message when he states that the changes in the way teaching civil engineering is approached in the last few years has contributed to creating an ecosystem for students to be more conscious about the importance of green building. We started off by providing these concepts as electives, but this is the need of the hour, and it cant be left up to the interest of the students anymore, says the professor.

Stream: Mechanical and Electrical Engineering

The internal combustion engines have been around for almost 150 years now. They have evolved over the years, and exist now in the form that we see in any petrol or diesel motor today. The concept of electric vehicles has also been around since the mid-1800s. However, as the world dove headfirst into fossil fuel consumption, the efforts put into developing the alternative (electric and hybrid automobiles) simply couldnt keep pace. However, in the 1990s, awareness about the impact on the environment of carbon emissions from vehicles began making a mark on the public conscience, driving interest in the EV market once again.

Today, EVs are said to make up around 6-7 per cent of the total sales of vehicles. Start-ups have cropped up by the dozen across the EV ecosystem, and governments are providing subsidies aplenty to boost research and infrastructure. Research in the field is still required because the current system of using lithium-ion batteries might not be sustainable given it is not a readily available resource, says Prof G Madhumitha, Assistant Professor in Department of Mechatronics Engineering SRM Institute of Science and Technology, Chennai.

Mechatronics is a hybrid stream of engineering that combines mechanical and electrical engineering. The department was first introduced at SRM in 2008, and it is a branch that facilitates the study of relatively new technology such as Robotics, Artificial Intelligence and Electric Vehicles. The study of technology involving EVs doesnt inspire confidence at this point, however. Prof Madhumita says that at this current stage, the inclusion and basics of the concept are restricted to interested students delivering projects on the tech, participating in competitions, and such extra-curricular activities. What is so far taught in engineering is very specific to the branch. But specialising in one particular field will not serve the purpose when it comes to Electric Vehicles, says the professor, adding that integrated engineering and a multidisciplinary approach is required. Battery management is a challenge when it comes to EVs, and therefore, the basics of electrical engineering are also required. As a core discipline, so far, it has only been provided as an elective. Designing a new course like how Automobile Engineering emerged from the umbrella of Mechanical Engineering would probably serve the purpose better, she explains.

For EVs to be a mature technology, it might take a couple more decades. However, Prof Madhumita believes that the study in the subject is catching up at a decent enough pace. Syllabi are dynamic in engineering. They are changed every three to four years based upon regulations. Initially, lab courses and electives are given for emerging technologies, and that is where we are at right now with EVs. There is, however, good demand from the students, requesting a proper structure for study and development in EVs right now, the professor shares.

Stream: Chemical Engineering

The curriculums have to train students so that they are employable. They come here to be able to find work. It is incumbent upon us to make sure they are employable tomorrow, says Prof Subbu Raman, from the Chemical Engineering department of a premier engineering college in Hyderabad. Research for fossil fuel alternatives is neither new nor nascent, according to the professor. The richest countries in the world are those that hold crude oil reserves.

These are the countries ready with viable energy alternatives once their reserves run dry. And therefore there can be no paradigm shift away from fossil fuels in the curricula for the next couple of decades at least, the professor says, adding that we can rely on solar energy and hydrogen-based energy alternatives for now, which are already being taught to the students.

Prof Gautham Jeppu, a Chemical Engineering professor from Manipal Institute of Technology, Karnataka seems to hold a similar viewpoint that one simply cannot deny market realities. In India, 70 per cent of energy comes from coal, 10 per cent comes from hydroelectricity projects, six to seven per cent from renewable sources, and just about three percent from nuclear power. The economy runs on it, and we simply cannot stop, says Prof Gautham

A peek at the CE syllabus of another leading engineering institution from the South reveals this past vs present paradox. Process Integration For Petroleum Industries and Environmental Impact Assessment And Management Plan are listed one after another in the course structure. Prof Gautham says that at MIT, students are offered minor specialisation in two fields: Petroleum Engineering and Environmental Pollution Control. Theres probably 40 per cent of the students who opt for the latter, says Prof Gautham, emphasising the fact that the students are ready to learn.

Biofuels are being touted as an alternative to fossil fuels of late. In Europe, 50 per cent of the palm oil imports are for usage as biodiesel. However, both professors vehemently oppose the viability of this option. In order to produce one kg of oil, we need two to three kg of seeds. Plus, these crops have a long gestation period, and are likely to push countries into choosing between food and fuel cultivation, while depleting forest reserves, says Prof Gautham. Prof Subbu Raman adds that there is also the fact that biofuels do very little to help with the emissions, and simply burden the land. He cites hydrogen as a better alternative energy resource, while Prof Gautham, who is currently researching biogas himself, also believes in the efficiency of that technology, that will allow people to convert waste into fuel.

Stream: Agricultural Engineering

If you were to ask Dr GV Ramanjaneyulu, Director, Centre for Sustainable Agriculture, if the education in the stream has kept up with the need for upscaling and innovation, the short answer is, no. While we were a little taken aback by the prompt reply, Dr Raman goes on to explain that the agricultural education system in India is based on the land grant model of the United States. The government allots land to the university, which then works with the farmers to optimise technology for that particular area.

Dr Ramanjaneyulu says that the research system in this case was made accountable to the local farmers. In India, when this system was brought, the universities ended up copying the technologies that the US was developing. In the US, the average land area under cultivation is 100 hectares. In India, it is one hectare. Also, they have a shortage of labour, and they need large-scale machinery to make up for it. Shortage of labour was never an issue with India, he says.

The math definitely doesnt seem to add up. For Indias land size, smaller equipment that didnt consume too much power would have been ideal. The large equipment is contracting the land, he adds. They also contribute to the massive rates of pollution caused by burning stubs, because the harvesting systems simply arent made to clear out the crop in one go. There was also no focus in making chemicals relevant to the natural ecosystem here, claims Dr Ramanjaneyulu.

Also, India depends on its Monsoon heavily to irrigate the land. To support that, irrigation systems such as smaller water harvesting structures such as tanks and canals were required to increase the groundwater table, and instead, investment was pumped into large-scale dams, which environmentalists say has done more harm than good.

Irrigation-intensive agricultural systems are supported even now. Paddy gets subsidies, but millets don't. And there is a skewed bias towards certain technology. Households in Punjab and Haryana are in debt because of machines. Punjab has one of the lowest groundwater levels in the world, but we still don't move away from the wheat and rice system, says he says, calling it an institutional failure of the education system and public policy.

Feedback system has failed. We fail to consider what might work for the farmers and what doesnt because those who study Agricultural Engineering merely sell the technology to the farmers. They are unaware of the implications and ground realities, he says, rueing the resistance from agricultural universities in changing that.

If technological development in agriculture in India requires a rehash of the past, then what do we make of the current trends in farming such as organic and hydroponics? Dr Ramanjaneyulu believes that organic farming systems were developed by the farmers of India, with very little inputs from the universities. And hydroponics, he believes, are not exactly required or suited to the ecosystem of the country. While such methods have been gaining ground in the urban landscape, they have very little application in the larger agricultural sector.

So what next? Take away the monopoly of the Indian Council of Agricultural Research in education, and make it more open source, inviting feedback and knowledge from the farmers themselves, says Dr Raman.

Read more here:

How have engineering courses adapted to the pressing need for sustainability? Are we engineering a better world? - EdexLive

Read More..

Quest Engineering to break ground this week on new $14 million facility in Village of Richfield – washingtoncountyinsider.com

August 23, 2021 Village of Richfield, WI Quest Engineering is scheduled to break ground this week on a new 100,000-square-foot facility on 10.5 acres at Richfield Parkway and Endeavor Drive in the Village of Richfield.During a meeting August 19, 2021 the Village Board in Richfield voted unanimously to approve industrial development revenue bonds not to exceed $10 million to help finance the project.

Quest Engineering, currently headquartered on Helsan Drive in Richfield, is a family-owned wood products and custom cabinetry manufacturer thats been around for 20 years. It currently employs 44 people full time and operates out of four different facilities in Richfield and Jackson.

The new facility would act as a state-of-the-art manufacturing headquarters and office space and it would help serve the companys growth. The other sites would be consolidated so the business can run its office and manufacturing out of one location.

We should break ground next week, August 23, 2021, said Kris Aubrey with Quest Engineering management group. Construction is expected to take between six to nine months. We liked this spot because of its access to I41 to help with shipping and receiving.

It was March 2021 when representatives from Quest Engineering went before the Richfield Plan Commission with a design proposal.

On Thursday after closed session the Village Board approved the Developer Agreement with Quest.

On Thursday the Village Board also approved to limit parking on both sides of Pleasant Hill Road just east of STH 164. Village Administrator Jim Healy said the parking restrictions would run 500 feet east of STH 164. The new Pleasant Hill Pub & Grill has expanded its parking lotand there will be parking across the street.

The Village indicated the restrictions were implemented for safety reasons. One neighbor spoke Thursday night encouraging the board to restrict the parking because some of the people who park along the road use his property as a way to relieve themselves before getting in their vehicles to drive home.

The board also took no public action with respect to a proposal to sign a sewer/water agreement with the Village of Germantown. Click HERE to read about the issue discussed in closed session.

Like Loading...

Related

More here:

Quest Engineering to break ground this week on new $14 million facility in Village of Richfield - washingtoncountyinsider.com

Read More..

The adoption of multi-cloud drives the need for better data protection and management of encryption keys an… – Security Boulevard

Enterprise adoption of multiple cloud platforms continues in earnest, whether its aimed at improving collaboration, reducing data center footprint, increasing customer response times, or any number of other business goals. As organizations advance their multi-cloud strategies, they are tasked with applying consistent security configurations across workloads and applications. They must also implement data protection that addresses todays threat vectors and aligns with stringent compliance and audit requirements.

Encrypting cloud data is essential to protecting sensitive information and workloads but it needs to be done correctly to be effective and meet compliance mandates. A recent report from Forrester, Best Practices: Cloud Data Encryption, articulates several important recommendations, notably:

These security measures are critical to protecting your cloud data and workloads, and its vital to get them right from the outset.

Multi-cloud computing is here to stay and so are the complexities associated with protecting your data and workloads.

Administrative challenges of managing cloud environments

While cloud service providers continue to enhance their built-in security capabilities, the teams tasked with managing cloud environments face a constant battle to fine-tune their configurations and permissions. As exemplified by numerous data breaches over the past few years, misconfigured cloud storage settings are a common, yet often unidentified, trouble spot.

Each cloud platform is unique and, even if you manage to get a handle on who has access to which data and workloads, keeping up with providers updates and new controls requires constant vigilance. And as the shortage of skilled security professional persists including those with expertise working across multiple cloud platforms these challenges arent going away.

Demonstrating compliance

Identifying and implementing the right security controls is one challenge, while demonstrating compliance with data privacy regulations and industry mandates is another. Security teams cite specific concerns about being able to verify controls and how to report compliance in an auditor-approved format.

As compliance and audit requirements continue to get more stringent, nearly every enterprise is now subject to at least one mandate that calls for the use of data encryption. And as the Forrester report discusses, data encryption is a must-have for cloud workloads. This necessary security measure comes with its own administrative upkeep that can be difficult to handle without the right tools in place.

Cloud data encryption: Getting it right

Workloads go through many lifecycles, from staging to deployment to backup, and eventually have to be securely decommissioned. Each stage poses different risks of potential data theft or other misuse. Managing workload encryption from each clouds management platform is complex and further increases the risk of inconsistent policies and mistakes.

Additionally, an encryption strategy that aligns with compliance mandates requires robust key management. Unfortunately, key management is not universal across cloud platforms so the security team must contend with key storage, distribution, rotation, and revocation in multiple environments.

Whats more, when encryption keys are not completely separated from the workloads and data they protect, the potential exists for a security incident that compromises both, leaving data exposed to a breach. Best practices call for the use of certified HSMs to protect your encryption keys.

Entrust can help

Entrust offers a robust set of security solutions to help you protect workloads and data across your multi-cloud infrastructure, including enhanced protection of your encryption keys that supports compliance with data privacy mandates.

The post The adoption of multi-cloud drives the need for better data protection and management of encryption keys and policy controls appeared first on Entrust Blog.

*** This is a Security Bloggers Network syndicated blog from Entrust Blog authored by Jim Delorenzo. Read the original post at: https://blog2.entrust.com/blog/2021/08/the-adoption-of-multi-cloud-drives-the-need-for-better-data-protection-and-management-of-encryption-keys-and-policy-controls/

View post:
The adoption of multi-cloud drives the need for better data protection and management of encryption keys an... - Security Boulevard

Read More..

Cryptomator Vs. BoxCryptor: Which One Is The Best Encryption Software? – Analytics Insight

Cryptomator Vs. BoxCryptor: Which One Is The Best Encryption Software?

Cyberattacks are increasing every day. Thats why people use encryption software to safeguard their data from threats. Nearly everybody utilizes cloud storage administrations like Dropbox, Google Drive, or OneDrive, however, they dont ensure additional security to your data. It is important to add more layers of safety to these storage services. This is the place where Cryptomator and Boxcryptor enter. Best known for adding secure encryption to your cloud information. Cryptomator and Boxcryptor are two best encryption software used to perform encryption on the records before it is sent to the cloud. This way, the information in the document is protected from any type of cyberattack.

But when it comes down to Cryptomator and BoxCryptor, which one is the best encryption software?

Cryptomator is one of the numerous TrueCrypt forks in Git that positions among the best TrueCrypt options. Cryptomator does not have certain elements like Boxcryptor, however, it compensates with its fantastic multi-usability and robust security. Assuming you need free encryption software, Cryptomator is intended for you. Dissimilar to Boxcryptor, Cryptomator is completely free. You can decide to give it to the organization, however, its not required.

Cryptomator is not difficult to utilize; but free things do come with certain limitations, especially when it comes to features. The full-disk encryption might be missing in Cryptomator, but as far as free file encryption goes, Cryptomator is difficult to beat. Where Cryptomator gives you open-source, private, end-to-end encryption and over 20 supported cloud services, there are certain drawbacks like no sharing functionality and no contract options.

Where you find almost every software for free in a market of encryption software, Boxcryptor adopts a more flighty business strategy. Boxcryptor is a weighty software with lots of components but it may seem to be firm. It compensates for some credits in the isolated framework that works in each situation in a cyberattack.

Software is available at an affordable price and its cost-friendly subscription plan does not put a burden on your pocket. Boxcryptor can be utilized free if only one cloud administration is utilized to access two gadgets for one account. Boxcryptor makes a statement with its accessibility and UX. It takes whats typically a specialized and complex piece of programming or procedures and makes it easy to understand.

Hassle-free sharing that supports more than thirty cloud companies integration (something that lacks in Crypotmator), but you can also share encrypted files directly. The end client will need a Boxcryptor account to get to the encrypted information. Since Boxcryptor upholds a restricted free plan, sharing individual information isnt an issue.

What are the major differences between Cryptomator and BoxCryptor?

Dropbox, OneDrive, Google Drive, and WebDAV-based cloud storage are supported cloud providers for both Cryptomator and Boxcryptor. All though Boxcryptor supports over 30+ cloud service companies in total, such as iCloud and SharePoint.

Cryptomator: The information stored in the encryption vault is then consequently scrambled. The client can determine the area of the vault, for instance, a cloud supplier.

Boxcryptor: Here, each record is scrambled independently. In this way, if a document is changed, the entire substance need not be re-encoded and synchronized similarly as with numerous other encryption tools however, Boxcryptor can change just that specific record.

Cryptomator: In Cryptomator, you can impart documents to other Cryptomator clients by giving them admittance to your vault by sharing your password.

Boxcryptor: In Boxcryptor, clients can share singular documents safely and explicitly through email addresses, like Dropbox and the standard cloud suppliers. Still, the beneficiary needs to make or have a Boxcryptor account (i.e., free to utilize)

Account Security and Language Options

Cryptomator currently does not offer 2-factor authentication and it is available in many languages like English, German, Dutch, Russian, and Chinese.

Boxcryptor: Boxcryptor offers 2-factor authentication (2FA) with Authenticator Apps (TOTP) on all platforms and it is available in languages like English, German, French, Italian, Spanish, and Russian.

In conclusion, Boxcryptor and Crytomator apply to any individual who needs to protect their records or information on cloud storage. These two programmings are implied for security concerned people as well as for any individual who wants to ensure information, whether in their smartphone, desktop, or cloud. The utilization of both these encryption tools is boundless. Data encryption is the selective reason for these two cloud encryption devices. Boxcryptor and Cryptomator are utilized to guarantee the information has remained safe in the cloud.

This load of components has been made conceivable because of their most recent AI-drove cybersecurity with cutting-edge encryption advancements. The data encryption qualities given by the two encryption tools are hearty. So, both encryption software has certain limitations but are the best when it comes to protecting your data.

Share This ArticleDo the sharing thingy

Visit link:
Cryptomator Vs. BoxCryptor: Which One Is The Best Encryption Software? - Analytics Insight

Read More..

Video end-to-end encryption on Ring to be available worldwide – ITP.net

Ring, the Amazon-owned home security and smart home company, announced that it is moving video end-to-end encryption out of technical preview stage and expanding the features availability to customers around the world.

By default, Ring already encrypts customer videos when they are uploaded to the cloud (in transit) and stored on Rings servers (at rest). Now, customers with eligible Ring devices, can opt into video end-to-end encryption, to add an extra layer of security that only allows their videos to be viewed on their enrolled mobile device.

This advanced security option is simple to set up via the Control Centre in the Ring App, and offers additional peace of mind and protection.

In a blog post, Josh Roth, CTO, Ring, said: Were always looking at how we can continue to innovate for our customers, and security and privacy sit at the core of that. We build privacy and security into the process - designing our devices and services with these pillars front of mind, while putting our customers in control.

Earlier this year, we announced a technical preview of in the US. Today, were proud to announce that we're moving it out of technical preview and expanding the feature's availability to customers around the world. We believe that our customers should control who sees their videos.

We are always looking at ways to empower our customers with greater choice when it comes to their privacy and security, without compromising convenience. This week, we are rolling out a range of features that do just that.

Ring customers can choose a compatible authenticator app, in addition to existing methods like SMS, as their second method of verification when logging into their Ring accounts. The company is also starting to roll out CAPTCHA in the Ring App and Neighbors App as another safeguard that helps prevent automated login attempts from bad actors, providing yet another layer of security.

Ring will also be launching a new, automated self-service process to allow customers to securely and conveniently transfer ownership of used Ring devices without having to make a call to Customer Support. Now, the new device owner can simply scan the device during setup, and follow the instructions on the Ring App, which will also alert the previous owner.

This process ensures that all videos and events from the previous owners account are no longer linked to the device before the ownership is transferred to the new customer.

Read this article:
Video end-to-end encryption on Ring to be available worldwide - ITP.net

Read More..

Why you should encrypt your data on your computer and how to do it – The Star Online

In the face of identity theft, online threats related to viruses and other ransomware, it is important to protect your personal data on your computer. The most effective way to do this is to encrypt the data, which is easy to do on both Windows and MacOS.

Data encryption: essential...

Encrypting your data is essential if you dont want a third party to get their hands on it. Hackers can indeed copy your data and even block access to it remotely. And keep in mind that even data that has been deleted can be recovered by ill-intentioned people.

Whether its sensitive (administrative documents, medical files, private photos, etc) or not, data must be encrypted to prevent it from falling into the wrong hands one day. A properly encrypted hard disk is completely unreadable by anyone who does not have the decryption key, usually the administrators password. Once encrypted, the data becomes truly private and cannot be read properly.

... and easy!

Encrypting your computer is relatively simple, whether you have a PC running Windows or a Mac running macOS. If not proposed by default, encryption is relatively simple to activate on a recent machine.

Under Windows, you have to connect to your Windows administrator account then go to the Settings of your computer. Then you have to select Update & Security and activate Device encryption. If this feature does not appear, you have to type Manage BitLocker in the search field of the taskbar, open it, then Enable BitLocker.

On a Mac, you need to go to System Preferences and then go to the FireVault tab in Security & Privacy. To activate this option, click on the lock icon and enter your administrator name and password. From then on, the encryption operation will take place in the background, without the user noticing anything. Note that Apple provides you with a backup key if you ever lose your password.

Check out our other tips on how to choose the right password, boost your WiFi connection and secure your connected devices. AFP Relaxnews

See the original post:
Why you should encrypt your data on your computer and how to do it - The Star Online

Read More..

What is a Vocoder? How an audio encryption device used in WW2 became the sound of electro and modern pop – Mixdown

Words by Sam McNiece

From their humble beginnings as a way of condensing the human voice for transmission through cables underseas, the vocoder has had a long and storied history which included use in World War Two as a form of cryptography before it made Kraftwerk and Bambaataa sound like futuristic robots and spur on the creativity of millions. Lets dive into the vocoder, how it works, what it does, and how its been used in pop and electro music today.

The vocoder was invented in the 1930s by Homer Dudley of Bell Labs, as a means of compressing the human voice into something more easily transmittable to conserve bandwidth. The basic idea behind his work was to separate the human voice before it was sent through telephone lines so it could be reconstructed when it reached the intended destination.

During World War Two, the use of a vocoder was taken to the next level as Bell Labs were enlisted to provide a speech-encoding technology to encrypt Winston Churchill and Franklin D. Roosevelts conversations. Utilising this technology, only the envelopes of specific bandwidths were sent after they had been encoded by a secret record, and had to be reconstructed at the receiving end by vocoder experts, utilising the same record to decode the speech. The vocoder provided a way for signals to be transmitted without a need for codewords as the sheer amount of equipment required to reproduce the transmitted signals was enough to fill a room; the SIGSALY devices weighed over 55 tons a piece!

In laymans terms, a vocoder encodes or synthesises human speech, hence the term vocoder (voice encoder). An input signal of your choosing is named the carrier and another audio signal youre going to manipulate it with is called a modulator. Resonant band pass filters are set at specific frequency intervals by the modulator which the carrier signal activates, shaping frequency bands through the envelope of that specific frequency band.

For instance when you say but, the b sound is quite low in frequency and will activate the lower frequency bands and pronouncing the t sound will result in mid-high frequency bands being activated. You can imagine the low frequency bands reproducing more tonal sounds and higher frequency bands producing consonants and sibilance.

In music, typically a synthesiser is used as the modulator (more specifically an open sawtooth sound with short attack and a long decay) and a voice as the carrier. This creates that classic robot voice heard over countless track from Daft Punk to Herbie Hancock by making the voice have similar timbral qualities to a synthesiser while maintaining its amplitude and formants.

There were early uses of the vocoder in music by Bell Labs but none appeared to penetrate the mainstream or serve as anything other than an advertisement of what their product could do.

It wasnt until Wendy Carlos utilised a spectrum follower in her Moog rig, which is inherently the same technology as the modern vocoder, on Stanley Kubricks A Clockwork Orange, that it hit the mainstream. It is regarded as the first time a vocoder had been used in a widely successful release. The cover of Beethovens Ninth Symphony set the tone for electronic music for years to come, albeit after a short hiatus.

No doubt, the electronic music pioneers Kraftwerk had been influenced by this revelation in technology, first utilising their customised vocoder onAutobahn,which marked one of the first uses of the technology on vocals. This record was a landmark for many reasons and the vocoder was a staple from this point on throughout their incredible discography.

Throughout the late 70s, the vocoder was used by a few acts, including Herbie Hancock on his record Sunlight.Herbie, who definitely has been an early adopter of music technology, perhaps from his Jazz upbringing, created quite a tacky record inSunlight, but none the less laid a foundation for other artists to come through and produce full records with vocoder lines in place of the human voice.

Fast forward a couple years and Afrika Bambaataa sampled the legends Kraftwerk on potentially the best electro record ever, Planet Rock. The vocoder action on this record was actually performed by the recording engineer, stealing a vocal line from The Strikers, and it displayed to the hip hop and funk heads what the future of those genres would be, electronic.

Fast forward to the 90s and newer electro music was bubbling in the underground of Detroit as a consequence of their funk and techno backgrounds. Artists such as Aux 88, Underground Resistance and the legendary Drexciya and all their side projects utilised vocoders to hide their identity, sound otherworldly, or in Drexciyas case, harness their underwater aesthetic.

After this influence on underground electro, the effect was clear, vocoders were here to stay. Looking forward in electro, Anthony Rother is among the top users of the vocoder, using it in his recorded music and in live performances. Check this video below for a masterclass on vocoder use.

The vocoder was used by a large swathe of musicians aiming for a futuristic sound which today may actually sound dated in certain genres. That hasnt stopped modern pop producers using modern advanced vocoders on their records as well as vintage units. Products such as the free TAL Vocoder and Abletons built in Vocoder stay true to the original hardware units allowing some flexibility but producing relatively similar results to what youd expect from 80s vocoders.

Vocoders become extremely enticing once you reach further developments in their technology, including vocoder plugins, VocalSynth 2 by iZotope and OVox by Waves. These two plugins allow the human voice to function more like a synthesiser than having to be shaped by one. They combine synthesis into a vocoder and add FX to become all in one machines, which you can hear across various pop modern pop records alongside pitch correction software.

You dont have to look far to see tracks like Pony by Ginuwine and its iconic yeah, yeah, yeah, which forms the backbone of the whole track. Imogen Heaps Hide and Seek transforms her vocal performance into a full ensemble through the use of the vocoder among other vocal effects. And how could this be a discussion about vocoders without talking about Kanye Wests incredible Vocoder solo on his nine minute epic Runaway.

Without the amount of money invested into research by Bell Labs, its unsure if wed have the vocoder today, in all its funky and transformative vocal modulation. We as musicians and listeners to music have them to thank as I personally cant imagine where pop and electro would be if it werent for the humble vocoder.

If you found this article interesting, check out this video by Doctor Mix playing 10 famous songs on a vocoder.

Here is the original post:
What is a Vocoder? How an audio encryption device used in WW2 became the sound of electro and modern pop - Mixdown

Read More..

Privacera partners with StreamSets to strengthen data security for ETL processing in the cloud – Help Net Security

Privacera announced a technology partnership with StreamSets. This new integration ensures joint customers data is secured whether accessing it for data processing, or migrating it from on-premises data repositories to the cloud.

When moving to the cloud or preparing for ETL (extract, transform, and load) processing, data is often sourced from a myriad of applications and systems. These systems are often managed and operated by different employees across the organization who all require varying degrees of access to different datasets based on their roles, responsibilities, or analytical needs.

When data teams access data to build data integration pipelines, sensitive data within those disparate systems and files must be encrypted to protect it throughout all stages of the ETL process to prevent misuse by unauthorized users and to avoid privacy or compliance violations.

Privacera provides StreamSets users powerful column-level encryption to ensure sensitive data, such as personally identifiable information (PII), Payment Card Information (PCI), or Protected Health Information (PHI), is secured end-to-end throughout the ETL process. Whether data is at rest or in flight, Privacera enables customers to safeguard against unauthorized use and ensure compliance with stringent privacy regulations like CCPA, GDPR, LGPD, HIPAA, and more.

The combination of Privacera and StreamSets enables our customers to accelerate digital transformation by providing a centralized solution for data integration and governance across the open cloud no matter where data resides, said Vincent Goveas, Director of Product Management at Privacera.

Privacera Encryption Gateway (PEG) is a robust, scalable API gateway that extends Apache Rangers Key Management Services (KMS) and policy engine to offer precise policy-based encryption and decryption schemes for fine-grained, column-level data protection. StreamSets users can define how to encrypt sensitive data using various schemes, enabling them to encrypt whole elements or selected parts of a field. PEG automatically finds the scheme mappings and encrypts either entire elements in bulk, or encrypts all the relevant content from sensitive fields, as specified in the schemes.

As companies aim to deliver continuous data, StreamSets and Privacera keep pace with our joint customers needs by providing a seamless, centralized data integration and governance solution that secures data across multi- or hybrid-cloud architectures, said Mary Berg, VP of Worldwide Business Development at StreamSets.

The StreamSets DataOps platform is the multi-cloud DataOps platform for modern data integration, helping enterprises to manage data drift, frequent and unexpected changes to upstream data that break pipelines and damage data integrity.

With Privaceras integrated encryption and decryption capabilities, more data is made accessible to a greater number of StreamSets data engineers without risking exposure of sensitive elements. This accelerates secure, efficient data analysis and provides safe democratization of data across various business units, so enterprises can save time and resources when performing data analytics.

See the original post:
Privacera partners with StreamSets to strengthen data security for ETL processing in the cloud - Help Net Security

Read More..

R400m cocaine-in-a-boat accused used encryption app to communicate – TimesLIVE

The investigating officer said if released on bail, the suspects would likely try to dispose of evidence.

There is evidence out there. There are exhibits out there that we are tracking and some of the accused have knowledge of where the evidence is. The first thing they would do is to dispose of that.

Investigations were ongoing and at a sensitive stage, he said.

The investigating officer told the court bail conditions would not make a difference as bail money meant nothing to the suspects.

It will not be in the interests of justice to grant the accused bail.

It also emerged in court that Norman was allegedly part of the management of a syndicate.

It was determined he is part of the management structures of the syndicate. He together with accused four [Rashied Baderoen], were in Gauteng and were monitoring the load that was being moved. We identified them when they were going to meet their lawyer, who was also in possession of an encrypted device, he said.

He told the court the state had a strong case and said the evidence against Rashied was overwhelming.

The bail application continues.

During the court proceedings on Tuesday, the investigating officer gave the court background on how the suspects were linked to the cocaine bust and subsequently arrested.

He said the five men were linked through the encrypted cellphones, created by the FBI to monitor criminal syndicates.

I received the information together with the information received from Australian federal police (AFP). The information was related to a syndicate operating internationally as well as in SA in relation to drugs, in particular cocaine.

The syndicate members would make use of encrypted devices known as Anom. The FBI in 2018 created these devices with the assistance of criminals they had arrested. These criminals assisted the FBI in creating a platform as well as a platform for these devices to operate from or through. From 2018 the FBI was listening to encrypted conversations and communications from criminals across the world, he said.

He said they were able to use the Anom devices' GPS and physical surveillance to link the accused to the devices.

The accused were communicating at some stage, he said.

There were communications about a meeting between Norman, Rashied and De Kock to discuss what went wrong after the drug bust and how information was leaked. There were communications where it was specifically mentioned that they must change their operation style as they might get caught.

The investigating officer said De Kock was in constant communication with members of the syndicates.

The investigating officer said a normal person cannot buy such a device from a shop.

The accused have gone to great lengths to conceal their identities. A typical cost for a device like this would range from R15,000 to R25,000. The device comes with a handle name so you will not have to expose your identity, he said.

He said on June 2 from the information received from a source, surveillance was conducted at a premises in Kyalami, Gauteng, that Van Zyl was renting.

He said Van Zyl left the property in a bakkie towing a ski boat.

Van Zyl was later arrested on the N1 near Pretoria on 2 June after being found in possession of a large quantity of cocaine.

He had four cellphones in the vehicle, of which I suspect one is the Anom device. This will be verified by the FBI.

He said it was extremely difficult to arrest the suspects and it was a timely process.

The investigating officer said if released on bail, the suspects would likely try to dispose of evidence.

There is evidence out there. There are exhibits out there that we are tracking and some of the accused know where the evidence is.

He said no bail conditions would be a deterrent to the accused as they have access to funds and the means to relocate.

For them to disappear is very easy. This is definitely part of a syndicate with involvement in Europe and in Australia there are other role players. It's an international matter. We have an extremely strong case against all accused in court, he said.

The matter was postponed to October 15, 18 and 19 for continuation of the bail applications.

TimesLIVE

Read this article:
R400m cocaine-in-a-boat accused used encryption app to communicate - TimesLIVE

Read More..