Page 2,723«..1020..2,7222,7232,7242,725..2,7302,740..»

Cutting-edge research into quantum computing: BMW Group and Technical University of Munich agree to create an endowed chair in Quantum Algorithms and…

The BMW Group will in future be supporting research into quantum computing at the Technical University of Munich (TUM). Today, Prof. Thomas F. Hofmann, President of TUM, Frank Weber, Member of the Board of Management of BMW AG, Development, and Alexander Buresch, CIO of BMW AG, signed an agreement to establish an endowed chair in Quantum Algorithms and Applications. Over a period of six years, the BMW Group will make a fund of 5.1 million available to TUM for a professorship, equipment and personnel. By taking this step, the BMW Group and TUM are seeking to bridge the gap between the outstanding basic research carried out in Germany and its specific application in industry. The holder of the chair will conduct applied research into specific problems and issues in the field of quantum computing at the same time as establishing an ongoing exchange of knowledge and findings between TUM and the BMW Group.

It is clear to the BMW Group that quantum computing is a pioneering technology that holds great potential for a multitude of applications from materials research to battery cell chemistry and the future of automated driving using quantum machine learning,says Frank Weber. This technology is at an early stage of development and we want to provide the best possible support for cutting-edge research and its transfer into industrial applications.

Thanks to this collaboration, the BMW-TUM axis is set to further strengthen Munich Quantum Valleys reputation as Germanys leading ecosystem for quantum technologies, commentsProf. Thomas F. Hofmann. Quantum computing could hold the key to solving the sort of complex tasks that are beyond even todays supercomputers. The new endowed chair will focus on developing quantum algorithms for this and on trialling areas of application. The generous funding from the BMW Group will create the leverage needed to transfer the findings of quantum physics to industrial applications.

Close collaboration between research, industry and the startup landscape is a prerequisite for cost-effective implementation of our specific use cases,explains Alexander Buresch. The purpose of this is to relay the requirements of industrial applications so that they can be incorporated into the development of quantum computing demonstrators. Our team of experts is looking forward to joining forces with TUM and driving forward this important field of research while focusing on its practical application.

The creation of the endowed chair underlines how the BMW Group is endeavouring to further the sustained development of the Munich region as a high-tech industrial base and is also a key building block forMunich Quantum Valley, whose various initiatives have received 300 million in funding from the Bavarian state authorities.

TUM and the BMW Group already collaborate closely on a wide variety of other topics, with notable examples including battery research, circular economy, automated driving, artificial intelligence in production and mobility research. On the teaching side, the BMW Group helps to boost the practical relevance of courses with various guest lectures and project work, while the company also enjoys a close partnership with the TUM Institute for Lifelong Learning.

At the BMW Group, high-performance computers handle some 2,000 computing tasks a day such as high-end visualisations and crash/flow simulations for approximately 3,000 users from R&D. The bulk of the computing operations are processed on servers in Iceland and Sweden that run on hydroelectric and geothermal green energy, reducing CO2emissions by around 5,900 tonnes annually. Once a certain level of computational complexity is reached, however, even todays high-performance computers hit their limit, as they process information using a binary system, just as a laptop or smartphone would. Bits a contraction of binary digits have a value of 0 or 1. In the case of quantum computers, the smallest unit of information is called a quantum bit, or qubit for short. Qubits can be far more than simply 0 or 1. Phenomena of quantum mechanics, such as the tunnelling effect, quantum entanglement and quantum interference, are used to put qubits in superposition, a state in which they can also assume values between 0 and 1 and, theoretically, an infinite number of such values at the same time.

The BMW Group recognised the importance of quantum computing as a pioneering technology for the future back in 2017, prompting it to set up an interdisciplinary, cross-departmental project team with the task of identifying potential uses.

One of the BMW Groups first research projects involved calculating the optimum circuit to be followed by a robot sealing welding seams on a vehicle. The existence of highly complex parameters means that even the latest high-performance computers would take years to find the optimum solution. Quantum computers are capable of computing all the possible permutations in just a few seconds.

The high level of complexity in the automotive value chain gives rise to various multi-faceted optimisation problems in areas such as production, parts logistics and vehicle development. It will be possible to use quantum computers in materials research to simulate the behaviour of material compositions at a whole new level, for example when researching new types of battery.

Another field of research that is growing in importance is quantum machine learning, where quantum computers are used to speed up specific processes of traditional machine learning. These innovative learning processes for artificial intelligence could be particularly useful for automated driving, too.

SOURCE: BMW Group

Visit link:
Cutting-edge research into quantum computing: BMW Group and Technical University of Munich agree to create an endowed chair in Quantum Algorithms and...

Read More..

Is quantum computing about to change the world? – BroadbandDeals

Quantum computing potential extends beyond simply processing things faster, offering scope to create entire new consumer services and product offerings

Neil Cumins Thursday, 17 June, 2021

Its common for new technologies to be treated with a healthy degree of scepticism when theyre first unveiled.

From the internet to social media, it often takes a while for potential to become reality.

Today, theres excitable talk about the blockchains potential, or how light-powered LiFi may supplant WiFi in the nations homes. Talk, but not much action as yet.

Quantum computing potential may be unmatched in terms of transforming our world even more so than the Internet of Things, or fully automated robotics.

And while you dont need a degree in quantum physics to understand quantum computing, its important to appreciate the basics of this highly complex (and unstable) technology.

Regardless of what theyre being asked to do, electronic devices only understand binary inputs. Zero or one, on or off. Thats it.

Every FIFA tournament, CAD package, Netflix marathon and email is composed of immense strings of zeroes and ones the binary data bits computers can process and interpret.

Quantum computing potentially subverts this by allowing bits to be both zeroes and ones at the same time.

This status fluidity involves holding data in whats called a superposition state a coin spinning on its side rather than landing heads-up or tails-up.

Superpositions grant a single bit far more potential, offering exponentially more processing power than a modern (classical) computer can deliver.

Quantum computers are theoretically capable of achieving feats todays hardware couldnt manage in a hundred lifetimes.

Google claims to own a quantum computer which can perform tasks 100,000,000 times faster than its most powerful classical computer.

Indeed, computer scientists have already demonstrated that quantum processing can encrypt data in such a way it becomes impossible to hack.

This alone could transform online security, rendering spyware and most modern malware redundant, while ensuring a far safer world for consumers and businesses.

Quantum computing may be able to process the vast repositories of digital information being generated by billions of AI devices, which would otherwise result in huge data siloes.

It could unlock the secrets of our universe, helping us to achieve nuclear fusion or test drugs in ways wed never be able to accomplish with classical computing and brainpower alone.

Unfortunately, there are certain obstacles in the way of achieving full quantum computing potential.

The molecular instability involved in superpositions requires processors to be stored at cryogenic temperatures as close to absolute zero (-273C) as possible.

Devices need to be stored and handled with exceptional care, which in turn makes them incredibly expensive and unsuitable for domestic deployment.

And while the ability to develop uncrackable encryption algorithms is appealing, a quantum processor could also unlock almost any existing encryption method.

The havoc that could wreak in the wrong hands doesnt bear thinking about, and scientists are struggling to develop quantum-resistant algorithms for classical computers.

Like all emerging technologies, quantum computing has some way to go before it achieves mainstream adoption and acceptance.

When it does, the world will be a very different place.

Read more here:
Is quantum computing about to change the world? - BroadbandDeals

Read More..

Google enables end-to-end encryption for Androids default SMS/RCS app – Ars Technica

Enlarge / If you and your chatting partner are both on Google Messages and both have RCS enabled, you'll see these lock icons to show that encryption is on.

Google

Google has announced that end-to-end encryption is rolling out to users of Google Messages, Android's default SMS and RCS app. The feature has been in testing for months, and now it's coming to everyone.

Encryption in Google Messages works only if both users are on the service. Both users must also be in a 1:1 chat (no group chats allowed), and they both must have RCS turned on. RCS was supposed to be a replacement for SMSan on-by-default, carrier-driven text messaging standard. RCS was cooked up in 2008, and it adds 2008-level features to carrier messaging, likeuser presence, typing status, read receipts, and location sharing.

Text messaging used to be a cash cow for carriers, but with the advent of unlimited texting and the commoditization of carrier messaging, there's no clear revenue motivation for carriers to release RCS. The result is that the RCS rollout has amounted to nothing but false promises and delays. The carriers nixed a joint venture called the "Cross-Carrier Messaging Initiative" in April, pretty much killing any hopes that RCS will ever hit SMS-like ubiquity. Apple executives havealso indicated internally that they view easy messaging with Android as a threat to iOS ecosystem lock-in, so it would take a significant change of heart for Apple to support RCS.

The result is that Google is the biggest player that cares about RCS, and in 2019, the company started pushing its own carrier-independent RCS system. Users can dig into the Google Messages app settings and turn on "Chat features," which refers to Google's version of RCS. It works if both users have turned on the checkbox, but again, the original goal of a ubiquitous SMS replacement seems to have been lost. This makes Google RCS a bit like any other over-the-top messaging servicebut tied to the slow and out-of-date RCS protocol. For instance, end-to-end encryption isn't part of the RCS spec. Since it's something Google is adding on top of RCS and it's done in software, both users need to be on Google Messages. Other clients aren't supported.

Google releasedawhitepaper detailing the feature's implementation, and there aren't too many surprises. The company uses the Signal protocol for encryption, just like Signal, Whatsapp, and Facebook Messenger. The Google Messages web app works fine since it still relies on an (encrypted) local connection to your phone to send messages. Encrypted messages on Wear OS are not supported yet but will be at some point (hopefully in time for that big revamp). Even though the message text is encrypted, third parties can still see metadata like sent and received phone numbers, timestamps, and approximate message sizes.

If you and your messaging partner have all the settings right, you'll see lock icons next to the send button and the "message sent" status.

Excerpt from:
Google enables end-to-end encryption for Androids default SMS/RCS app - Ars Technica

Read More..

Google open-sources tools to bring fully homomorphic encryption into the mainstream – The Daily Swig

John Leyden16 June 2021 at 13:46 UTC Updated: 16 June 2021 at 15:10 UTC

Cryptographic expertise not needed to enable computations on encrypted data, says tech giant

Google has released a set of coding utilities that allowfully homomorphic encryption (FHE) operations on encrypted data.

The open source collection of libraries and tools allow computational processes to be carried out on encrypted data without first having to decrypt it, offering security and privacy benefits as a result.

Homomorphic encryption and secure multi-party computation are known technologies. Googles release is largely focused on refining and making them suitable for wider deployment, rather than reinventing the basis for the technologies.

Catch up on the latest encryption-related security news and analysis

Our release focuses most on ease of use, cleanly abstracting the various layers of development between design (what the developer is actually trying to do) and implementation (what actually is performed), a Google spokesperson told The Daily Swig.

The transpiler offers a glimpse into all of these layers, allowing the combined expertise of the crypto, hardware, logical optimization and distributed computing communities to come together in one place.

The suite of tools is available on Github.

Use cases for homomorphic encryption range from spell checkers for an email, to updates from wearables, to medical record analysis to, further down the road, things like photo filters or genomic analysis, according to Google.

The more sensitive or identifying the use case might be, the more important it is that a developer is able to provide strong guarantees on data handling, the Google spokesperson added.

No special expertise in cryptography is required to make use of the search giants technology, which is geared towards overcoming a lack of crypto expertise amongst developers that has historically held back wider adoption of such tools.

DONT FORGET TO READComputer Fraud and Abuse Act: What the landmark Van Buren ruling means for security researchers

The trade-off for the privacy benefits of homomorphic encryption is that the mechanism can be more computationally intensive and slower than other methods an issue not immediately addressed in Googles release.

Performance remains a significant barrier (one we continue to work on) and so this wont be a drop-in replacement for all existing cloud services, the Google representative explained.

At the moment, this environment is aimed at well-scoped problems where data sensitivity is critical or where extra compute cost is worth the added privacy benefit.

Google's approach to fully homomorphic encryption in explained in more detail in a recent white paper (PDF).

Professor Alan Woodward, a computer scientist from the University of Surrey, said Googles FHE tools might be useful across a wide range of applications.

What Google appear to be doing is providing tools to enable FHE across a wide range of areas, he explained.

Bottom line is that anything where you want the dataset encrypted when in live use, not just encrypted at rest, then FHE could help.

RELATED GitHub changes policy to welcome security researchers

See the original post here:
Google open-sources tools to bring fully homomorphic encryption into the mainstream - The Daily Swig

Read More..

Bitcoin and Encryption: A Race Between Criminals and the F.B.I. – The New York Times

Law enforcement also has an advantage when it gets ahold of digital devices. Despite claims from Apple, Google and even the Justice Department that smartphones are largely impenetrable, thousands of law enforcement agencies have tools that can infiltrate the latest phones to extract data.

Police today are facing a situation of an explosion of data, said Yossi Carmil, the chief executive of Cellebrite, an Israeli company that has sold data extraction tools to more than 5,000 law enforcement agencies, including hundreds of small police departments across the United States. The solutions are there. There is no real challenge to accessing the data.

The police also have an easier time getting to data stored in the cloud. Technology companies like Apple, Google and Microsoft regularly turn over customers personal data, such as photographs, emails, contacts and text messages, to the authorities with a warrant.

From January 2013 through June 2020, Apple said, it turned over the contents of tens of thousands of iCloud accounts to U.S. law enforcement in 13,371 cases.

And on Friday, Apple said that in 2018, it had unknowingly turned over to the Justice Department the phone records of congressional staff members, their families and at least two members of Congress, including Representative Adam B. Schiff of California, now the chairman of the House Intelligence Committee. The subpoena was part of an investigation by the Trump administration into leaks of classified information.

Yet intercepting communications has remained a troublesome problem for the police. While criminals used to talk over channels that were relatively simple to tap like phones, emails and basic text messages most now use encrypted messengers, which are not.

Two of the worlds most popular messaging services, Apples iMessage and Facebooks WhatsApp, use so-called end-to-end encryption, meaning only the sender and receiver can see the messages. Not even the companies have access to their contents, allowing Apple and Facebook to argue that they cannot turn them over to law enforcement.

Read more:
Bitcoin and Encryption: A Race Between Criminals and the F.B.I. - The New York Times

Read More..

How To Enable End-To-End Encryption In Zoom On Windows 10 – Wccftech

The pandemic has made Zoom one of the most popular video conferencing applications. When it comes to video conferencing apps, we always try to make sure our privacy settings are up to the mark to keep the communications secure.

Zoom is trying to ensure that users get the security they deserve, and it has an essential encryption feature that many people dont know about.End-to-end encryption ensures that even if you are hacked, the hacker will not be able to make any sense out of your data. It also keeps your data safe from the company itself.

How to Password Protect Google Search History

Zoom initially only encrypted data on its own servers, but with the end-to-end encryption feature, an encrypted key will be generated on the users computer, making your data truly secure. In today's tutorial,I will show you how to enable end-to-end encryption in Zoom on Windows 10 computers in just a few simple steps.

Step-1: Open Zoom App and sign in.

Step-2: Click on the settings cog on the top right corner of the app.

Step-3: Click on View More Settings at the bottom of the settings window.

How to Record FaceTime Calls on iPhone and iPad [Tutorial]

Step-4: You will be directed to the settings in your browser. Click on the Settings tab on the left side of your screen.

Step-5: Click on the Meeting tab.

Step-6: Scroll down till you reach the toggle switch for Allow use of end-to-end encryption. Turn it On. [If it is grey, it is Off. If it is blue, it is switched On]

Step-7: You will be asked to verify your number. After you enter your phone number. Click on Send Verification Code. You will then be sent a 6-digit code on your given number. Enter that code and then move on to the next step.

Step-8: After verification, your settings will be updated. Click on End-to-end encryption in the Default encryption type section.

Step-9: Click Save.

After following these steps, your Zoom will be end-to-end encrypted.

See original here:
How To Enable End-To-End Encryption In Zoom On Windows 10 - Wccftech

Read More..

We’ve been shown time and again that strong encryption puts crims behind bars, so why do politicos hate it? – The Register

Column Back in October, a call by spy agencies to weaken end-to-end encryption "because of the children" provoked a bit of analysis on how many times UK Home Secretaries had banged the same drum. All of them, it turned out. All of the time.

The argument is a bit beyond Priti Patel, alas, as she ran the threadbare rag up the flagpole yet again in April, presumably on the grounds that the 50th time's the charm.

The real world has not done her argument any favours in the weeks since. Last Wednesday, law-abiding citizens around the world enjoyed hearing about a massive collar-feeling spree courtesy of Operation Trojan Shield. This was a sting that did better than many a startup: it flogged a respectable 12,000 custom messaging devices to the, if you will, crimmunity before using the intercepted data to reel in getting on for a thousand of its least attractive members.

Not enough? You'll have to go back to, oh, the day before, when the great Colonial Crypto Cashback scheme was revealed. Here, the ransomware'd fuel pipeline saw $2m returned from the maw of the malware mob after the Feds not only intercepted the blaggers' Bitcoin wallet but also the keys. You know, the stuff built from unbreakable, completely secure encryptonium.

Finally, because we must Think Of The Children, we can skip back into the distant days of last month, when the German police closed down the world's biggest paedophile picture palace, despite it being on what the world calls the Big Scary Darknet and what we know as the internet but with extra relays. That has rather a lot of encryption. Yet again, though, the ringleaders got their doors dismantled by size 13s at dawn while the punters nervously await their own disk scan delights.

All these things and so, so many more have happened in spite of not having the ability to break strong encryption. It's not as if these were heroic, decade-long one-off events either. They've delivered exactly the sort of results that we're told are impossible, and delivered them spectacularly. These are arrests at scale: welcome to the world of the kiloscrote bust.

We're familiar with the marketing message that the internet scales, that with the right techniques and planning, you can have a good idea in the morning and half a billion users by teatime. The idea that this applies to policing as well is harder to take onboard, but the same drivers apply and the same benefits accrue to the police, admittedly, rather than their customers.

The reason so many cloud services are possible and profitable is that they easily match the technology to the market. Most of the hard work's been done for you: your customers are familiar and at ease with internet technologies. They trust them. They may not trust you, but that's your job. If you deliver a good service, you'll get a useful group of regulars who'll reward you, perhaps with money but more often with data.

Guess what. Criminals are people too. What they do generates data, exactly as your Aunty Heather does as she goes online shopping, only with more guns, drugs, and fraud. Or maybe not, depending on your family. Persuade criminals to use a particular service, and you can literally sit on your blue-trousered behind drinking institutional coffee and watch them send you all their secrets. Because it's the internet, you can do all this with a very small team running the system minimising the chances that mobster counter-intelligence will bribe their way into, steal, or spot what's going on.

Like all e-commerce, this depends on trust. As with all of us upstanding incorruptibles, the underworld does its research. It reads technical reportage, and it knows, as we know, that the basic mechanisms of standard encryption are mathematically secure for now and never without caveats, but good enough. So they happily assemble themselves in large groups of self-incriminating naughty people while Plod does the paperwork to swoop in and enjoy that 800-arrests-for-the-price-of-one online offer.

If they didn't trust the internet's encryption because of laws ensuring its insecurity, they wouldn't do this. They wouldn't stop being criminals, but they'd move on to doing something safer and more profitable most likely finding ways to jemmy open the state-mandated back doors and make off with all our transactions. Not so much win-win but the other thing, oh, what is it ah yes, lose-lose.

The evidence piles up day after day, week after week, world-weary Reg column after world-weary Reg column.

State-mandated insecure encryption is a very bad idea. You can't make anything more secure by making it less secure.

Good old-fashioned policing backed up by well-funded technical expertise and lots of human intelligence works just fine, and it bolsters, rather than threatens, the rights and protection of citizens. Yes, even the children. Think about that, Priti.

Visit link:
We've been shown time and again that strong encryption puts crims behind bars, so why do politicos hate it? - The Register

Read More..

WhatsApp to Enable Multi-Device Support With End-to-End Encryption: Report – Gadgets 360

WhatsApp will make its multi-device support available with end-to-end encryption, according to a report. The Facebook-owned instant messaging app has marketed its privacy-focussed encryption for some time. It is claimed to protect text and voice messages, photos, videos, documents, and calls in a way that they aren't accessible by anyone except the sender and receiver. However, enabling the same level of protection on multiple devices alongside syncing communication between them is not that easy and involves technical challenges in its implementation.

Although WhatsApp is yet to provide official details, WhatsApp beta tracker WABetaInfo has reported that the end-to-end encryption available on WhatsApp will be compatible with its upcoming multi-device support.

Earlier this month, Mark Zuckerbergmentionedin an alleged conversation with WABetaInfo that chats when using multi-device support on WhatsApp will still be end-to-end encrypted. Screenshots shared by WABetaInfo showed that the Facebook CEO stated that the company solved the challenges involved in implementing end-to-end encryption in an elegant way to make sure that the chats between users are protected even when using the messaging app on multiple devices.

WhatsApp was thought to be working on enabling multi-device support since at least July 2019. The feature lets users simultaneously access the app on up to four devices. It seems to be at a final stage of its internal testing as screenshots detailing the new addition appeared online in the recent past. WhatsApp Head Will Cathcart also purportedly noted in the messages exchanged with WABetaInfo that the new addition could be provided in a public beta in the next month or two.

Alongside enabling end-to-end encryption when using multi-device support, WhatsApp is said to be bringing end-to-end encrypted backups. There is, however, no exact timeline on when it would be available even for public beta testers.

WhatsApp uses Signal's encryption protocol for offering end-to-end encrypted communication experience on its app. Competitors including Google Messages also embraced the same protection method to address privacy concerns raised by digital activists. However, since end-to-end encryption limits traceability on platforms, governments and regulators in some countries including India have demanded ways to get a backdoor entry.

Does WhatsApp's new privacy policy spell the end for your privacy? We discussed this on Orbital, the Gadgets 360 podcast. Orbital is available on Apple Podcasts, Google Podcasts, Spotify, and wherever you get your podcasts.

Read more:
WhatsApp to Enable Multi-Device Support With End-to-End Encryption: Report - Gadgets 360

Read More..

Pepperdine Graziadio Business School Taps Data Science to Help Prospective MBA Students Project Their Career and Earnings Potential – PRNewswire

MALIBU, Calif., June 16, 2021 /PRNewswire/ -- Pepperdine Graziadio Business School today announced the launch of a new initiative that will enable students to forecast the labor market value of earning a graduate business degree. In collaboration with Seattle-based data science startup AstrumU, the Pepperdine Graziadio Business School is pioneering the use of a new machine learning tool to help each prospective student estimate their return on investment from full-time and professional MBA degree programs at the front end of the enrollment process.

"As MBA candidates navigate an ever-changing world of work and a more competitive job market, it's critically important that business schools demonstrate the lasting relevance and return on investment that our alumni can expect after graduating," said Deryck J. van Rensburg, dean of the Pepperdine Graziadio Business School. "This work is about providing prospective MBA students with tangible insights based on alumni employment outcomes. It's about getting more transparent about how the MBA experience connects them to real-world opportunities for growth and advancement."

With AstrumU's Enrollment Marketing Toolkit, staff, and administrators can analyze labor market, alumni, and employer data to demonstrate the economic and career trajectories of Pepperdine Graziadio Business School MBA alumni to prospective students. The technology will enable the business school to use sophisticated data science models to match course-level outcomes, academic performance, and extracurricular experiences with salary and job placement outcomes from data verified by employers. Students then receive a personalized prediction for their desired industry, based on how alumni with comparable career backgrounds and goals fared in the labor market.

Using the same data, admissions counselors can easily personalize their communications with prospective students and enhance conversations regarding how degree programs can help to facilitate their personal and professional aspirations.

"With an increasingly competitive landscape for graduate programs and a rapidly changing labor market, students are becoming more and more discerning about the programs they select and are hungry for better information on how their educational experiences will translate into economic opportunity in the workforce," said Adam Wray, founder and CEO of AstrumU. "Forward-thinking institutions like Pepperdine Graziadio Business School are designing new ways to build transparency around tangible employment outcomes into the admissions process itself. It's helping to not just improve enrollment outcomes, but ultimately give students a greater degree of choice and agency as they chart their educational and career future."

The Pepperdine Graziadio Business School is one of the first graduate schools of business to pilot the new program. A total of twenty universities will form an initial cohort of pioneering institutions who will gain early access to the tool to boost student enrollment and retention using insights from the platform's analysis of millions of student educational and career journeys.

Founded in 1969, the Graziadio Business School offers a variety of business degree programs including full-time and part-time MBA programs, joint degree programs, as well as other executive doctorate, master's, and bachelor's degree programs. Programs are offered both online and across Pepperdine University's five California campuses.

About AstrumU: AstrumU translates educational experiences into economic opportunity. We are on a mission to quantify the return on education investment for learners, education providers, and employers. We help institutions measure the value created for incoming and returning students, while assisting them in securing industry partnerships that lead students seamlessly into high-demand career pathways. Institutions partner with AstrumU to drive enrollment and increase alumni and corporate engagement, while extending economic mobility opportunities inclusively to all learners.

About Pepperdine University Graziadio Business School: For more than 50 years, the Pepperdine Graziadio Business School has challenged individuals to think boldly and drive meaningful change within their industries and communities. Dedicated to developing Best for the World Leaders, the Graziadio School offers a comprehensive range of MBA, MS, executive, and doctoral degree programs grounded in integrity, innovation, critical thinking, and entrepreneurship. The Graziadio School advances experiential learning through small classes with distinguished faculty that stimulate critical thinking and meaningful connection, inspiring students and working professionals to realize their greatest potential as values-centered leaders. Follow Pepperdine Graziadio onFacebook,Twitter,Instagram, andLinkedIn.

SOURCE AstrumU

Read more here:

Pepperdine Graziadio Business School Taps Data Science to Help Prospective MBA Students Project Their Career and Earnings Potential - PRNewswire

Read More..

What Data Scientists Learned by Modeling the Spread of Covid-19 – Smithsonian Magazine

In March 2020, as the spread of Covid-19 sent shockwaves around the nation, integrative biologist Lauren Ancel Meyers gave a virtual presentation to the press about her findings. In talking about how the disease could devastate local hospitals, she pointed to a graph where the steepest red curve on it was labeled: no social distancing. Hospitals in the Austin, Texas, area would be overwhelmed, she explained, if residents didnt reduce their interactions outside their household by 90 percent.

Meyers, who models diseases to understand how they spread and what strategies mitigate them, had been nervous about appearing in a public event and even declined the invitation at first. Her team at the University of Texas at Austin had just joined the city of Austins task force on Covid and didnt know how, exactly, their models of Covid would be used. Moreover, because of the rapidly evolving emergency, her findings hadnt been vetted in the usual way.

We were confident in our analyses but had never gone public with model projections that had not been through substantial internal validation and peer review, she writes in an e-mail. Ultimately, she decided the public needed clear communication about the science behind the new stay-at-home order in and around Austin.

The Covid-19 pandemic sparked a new era of disease modeling, one in which graphs once relegated to the pages of scientific journals graced the front pages of major news websites on a daily basis. Data scientists like Meyers were thrust into the public limelightlike meteorologists forecasting hurricanes for the first time on live television. They knew expectations were high, but that they could not perfectly predict the future. All they could do was use math and data as guides to guess at what the next day would bring.

As more of the United States population becomes fully vaccinated and the nation approaches a sense of pre-pandemic normal, disease modelers have the opportunity to look back on the last year-and-a-half in terms of what went well and what didnt. With so much unknown at the outsetsuch as how likely is an individual to transmit Covid under different circumstances, and how fatal is it in different age groupsits no surprise that forecasts sometimes missed the mark, particularly in mid-2020. Models improved as more data became available on not just disease spread and mortality, but also on how human behavior sometimes differed from official public health mandates.

Modelers have had to play whack-a-mole with challenges they didnt originally anticipate. Data scientists didnt factor in that some individuals would misinterpret or outright ignore the advice of public health authorities, or that different localities would make varying decisions regarding social-distancing, mask-wearing and other mitigation strategies. These ever-changing variables, as well as underreported data on infections, hospitalizations and deaths, led models to miscalculate certain trends.

Basically, Covid threw everything at us at once, and the modeling has required extensive efforts unlike other diseases, writes Ali Mokdad, professor at the Institute for Health Metrics and Evaluation, IHME, at the University of Washington, in an e-mail.

Still, Meyers considers this a golden age in terms of technological innovation for disease modeling. While no one invented a new branch of math to track Covid, disease models have become more complex and adaptable to a multitude of changing circumstances. And as the quality and amount of data researchers could access improved, so did their models.

A model uses math to describe a system based on a set of assumptions and data. The less information available about a situation so far, the worse the model will be at both describing the present moment and predicting what will happen tomorrow.

So in early 2020, data scientists never expected to exactly divine the number of Covid cases and deaths on any given day. But they aimed to have some framework to help communities, whether on a local or national level, prepare and respond to the situation as well as they could.

Models are like guardrails to give some sense of what the future may hold, says Jeffrey Shaman, director of the Climate and Health Program at the Columbia University Mailman School of Public Health.

You need to sort of suss out what might be coming your way, given these assumptions as to how human society will behave, he says. And you have to change those assumptions, so that you can say what it may or may not do.

The Covid crisis also led to new collaborations between data scientists and decision-makers, leading to models oriented towards actionable solutions. When researchers partnered with public health professionals and other local stakeholders, they could tailor their forecasts toward specific community concerns and needs.

Meyers team has been an integral part of the Austin areas Covid plans, meeting frequently with local officials to discuss the latest data, outlook and appropriate responses. The municipal task force brings together researchers with the mayor, the county judge, public health authorities, CEOs of major hospitals and the heads of public school systems. Meyers says this data-driven approach to policy-making helped to safeguard the citycompared to the rest of Texas, the Austin area has suffered the lowest Covid mortality rates.

In the last year, we've probably advanced the art and science and applications of models as much as we did in probably the preceding decades, she says.

At the heart of Meyers groups models of Covid dynamics, which they run in collaboration with the Texas Advanced Computing Center, are differential equationsessentially, math that describes a system that is constantly changing. Each equation corresponds to a state that an individual could be in, such as an age group, risk level for severe disease, whether they are vaccinated or not and how those variables might change over time. The model then runs these equations as they relate to the likelihood of getting Covid in particular communities.

Differential equations have been around for centuries, and the approach of dividing a population into groups who are susceptible, infected, and recovered dates back to 1927. This is the basis for one popular kind of Covid model, which tries to simulate the spread of the disease based on assumptions about how many people an individual is likely to infect.

But Covid demanded that data scientists make their existing toolboxes a lot more complex. For example, Shaman and colleagues created a meta-population model that included 375 locations linked by travel patterns between them.

Using information from all of those cities, We were able to estimate accurately undocumented infection rates, the contagiousness of those undocumented infections, and the fact that pre-symptomatic shedding was taking place, all in one fell swoop, back in the end of January last year, he says.

The IHME modeling began originally to help University of Washington hospitals prepare for a surge in the state, and quickly expanded to model Covid cases and deaths around the world. In the spring of 2020, they launched an interactive website that included projections as well as a tool called hospital resource use, showing at the U.S. state level how many hospital beds, and separately ICU beds, would be needed to meet the projected demand. Mokdad says many countries have used the IHME data to inform their Covid-related restrictions, prepare for disease surges and expand their hospital beds.

As the accuracy and abundance of data improved over the course of the pandemic, models attempting to describe what was going on got better, too.

In April and May of 2020 IHME predicted that Covid case numbers and deaths would continue declining. In fact, the Trump White House Council of Economic Advisers referenced IHMEs projections of mortality in showcasing economic adviser Kevin Hassetts cubic fit curve, which predicted a much steeper drop-off in deaths than IHME did. Hassetts model, based on a mathematical function, was widely ridiculed at the time, as it had no basis in epidemiology.

But IHMEs projections of a summertime decline didnt hold up, either. Instead, the U.S. continued to see high rates of infections and deaths, with a spike in July and August.

Mokdad notes that at that time, IHME didnt have data about mask use and mobility; instead, they had information about state mandates. They also learned over time that state-based restrictions did not necessarily predict behavior; there was significant variation in terms of adhering to protocols like social-distancing across states. The IHME models have improved because data has improved.

Now we have mobility data from cell phones, we have surveys about mask-wearing, and all of this helps the model perform better, Mokdad says. It was more a function of data than the model itself.

Better data is having tangible impacts. At the Centers for Disease Control and Prevention, Michael Johansson, who is leading the Covid-19 modeling team, noted an advance in hospitalization forecasts after state-level hospitalization data became publicly available in late 2020. In mid-November, the CDC gave all potential modeling groups the goal of forecasting the number of Covid-positive hospital admissions, and the common dataset put them on equal footing. That allowed the CDC to develop ensemble forecastsmade through combining different modelstargeted at helping prepare for future demands in hospital services.

This has improved the actionability and evaluation of these forecasts, which are incredibly useful for understanding where healthcare resource needs may be increasing, Johansson writes in an e-mail.

Meyers initial Covid projections were based on simulations she and her team at the University of Texas, Austin, had been working on for more than a decade, since the 2009 H1N1 flu outbreak. They had created online tools and simulators to help the state of Texas plan for the next pandemic. When Covid-19 hit, Meyers team was ready to spring into action.

The moment we heard about this anomalous virus in Wuhan, we went to work, says Meyers, now the director of the UT Covid-19 Modeling Consortium. I mean, we were building models, literally, the next day.

Researchers can lead policy-makers to mathematical models of the spread of a disease, but that doesnt necessarily mean the information will result in policy changes. In the case of Austin, however, Meyers models helped convince the city of Austin and Travis County to issue a stay-at-home order in March of 2020, and then to extend it in May.

The Austin area task force came up with a color-coded system denoting five different stages of Covid-related restrictions and risks. Meyers team tracks Covid-related hospital admissions in the metro area on a daily basis, which forms the basis of that system. When admission rates are low enough, lower stage for the area is triggered. Most recently, Meyers worked with the city to revise those thresholds to take into account local vaccination rates.

But sometimes model-based recommendations were overruled by other governmental decisions.

In spring 2020, tension emerged between locals in Austin who wanted to keep strict restrictions on businesses and Texas policy makers who wanted to open the economy. This included construction work, which the state declared permissible.

Because of the nature of the job, construction workers are often in close contact, heightening the threat of viral exposure and severe disease. In April 2020, Meyers groups modeling results showed that the Austin areas 500,000 construction workers had a four-to-five times greater likelihood of being hospitalized with Covid than people of the same age in different occupational groups.

The actual numbers from March to August turned out strikingly similar to the projections, with construction workers five times more likely to be hospitalized, according to Meyers and colleagues analysis in JAMA Network Open.

Maybe it would have been even worse, had the city not been aware of it and tried to try to encourage precautionary behavior, Meyers says. But certainly it turned out that the risks were much higher, and probably did spill over into the communities where those workers lived.

Some researchers like Meyers had been preparing for their entire careers to test their disease models on an event like this. But one newcomer quickly became a minor celebrity.

Youyang Gu, a 27-year-old data scientist in New York, had never studied disease trends before Covid, but had experience in sports analytics and finance. In April of 2020, while visiting his parents in Santa Clara, California, Gu created a data-driven infectious disease model with a machine-learning component. He posted death forecasts for 50 states and 70 other countries at covid19-projections.com until October 2020; more recently he has looked at US vaccination trends and the path to normality.

While Meyers and Shaman say they didnt find any particular metric to be more reliable than any other, Gu initially focused only on the numbers of deaths because he thought deaths were rooted in better data than cases and hospitalizations. Gu says that may be a reason his models have sometimes better aligned with reality than those from established institutions, such as predicting the surge in in the summer of 2020. He isnt sure what direct effects his models have had on policies, but last year the CDC cited his results.

Today, some of the leading models have a major disagreement about the extent of underreported deaths. The IHME model made a revision in May of this year, estimating that more than 900,000 deaths have occurred from Covid in the U.S., compared with the CDC number of just under 600,000. IHME researchers came up with the higher estimate by comparing deaths per week to the corresponding week in the previous year, and then accounting for other causes that might explain excess deaths, such as opioid use and low healthcare utilization. IHME forecasts that by September 1, the U.S. will have experienced 950,000 deaths from Covid.

This new approach contradicts many other estimates, which do not assume that there is such a large undercount in deaths from Covid. This is another example of how models diverge in their projections because different assumed conditions are built into their machinery.

Covid models are now equipped to handle a lot of different factors and adapt in changing situations, but the disease has demonstrated the need to expect the unexpected, and be ready to innovate more as new challenges arise. Data scientists are thinking through how future Covid booster shots should be distributed, how to ensure the availability of face masks if they are needed urgently in the future, and other questions about this and other viruses.

We're already hard at work trying to, with hopefully a little bit more lead time, try to think through how we should be responding to and predicting what COVID is going to do in the future, Meyers says.

View original post here:

What Data Scientists Learned by Modeling the Spread of Covid-19 - Smithsonian Magazine

Read More..