Page 2,889«..1020..2,8882,8892,8902,891..2,9002,910..»

DHS studying ways to plug cyber blind spots, officials say – Roll Call

In an opinion column in the Washington Post on Sunday, former Defense Secretary Robert Gates wrote that in the Obama administration, Gates had proposed creating the position of a deputy director at the NSA who would be a DHS cybersecurity official. That official would have the legal authority to ask the NSA to conduct surveillance on domestic networks and defend against ongoing attacks, Gates wrote.

The new position would come with legal restrictions on how the new authority would be used and would be designed to safeguard Americans from unwanted, unauthorized surveillance, Gates said. The proposal was signed off on by then Homeland Security Secretary Janet Napolitano and receivedthe blessing of the Justice Department, but Gates wrote that the initiative came to naught, mainly because of bureaucratic foot-dragging and resistance.

Asked whether such a proposal was being considered now, the DHS officials who briefed reporters declined to address it specifically. One official said the administration is conducting an in-depth lessons-learned exercise on both the Russian and Chinese attacks and would offer recommendations once it has completed the review.

CISA, which is allowed by law only to provide advisory services to federal, stateand local government agencies and U.S. companies, is not in a position to demand any information from agencies and companies that are affected by a cyber attack, leaving that agency also in the dark about the extent of a major attack.

Lawmakers have called for expanding the powers and budget for CISA to make the agency in charge of all federal government networks that operate under the "dot gov" domain, similar to how the U.S. Cyber Command oversees cybersecurity for the U.S. military network.

See more here:
DHS studying ways to plug cyber blind spots, officials say - Roll Call

Read More..

These Highly-Rated VPNs are on Sale for an extra 30 Percent Off for a Limited Time – ExtremeTech

Just because we cant see the nefarious hackers trying to steal our data online, doesnt mean they dont exist. Unlike regular thieves,hackers can do serious damagewithout you having any idea until its too late. If youre ready to take your internet safety more seriously, its time to invest in a VPN. Not only will it help safeguard your important data, but it also comes with added perks like privacy, faster internet and no geographical restrictions.

Ready to find the right VPN for you? These VPN services are on sale during the Semi-Annual sale at 30 percent off for a limited time and are ready to help protect you and your familys precious data as your browse the web.

As you surf the web you can rest assured Surfshark VPN is protecting you from cyber threats. This 3-year subscription gives you over 500 torrent-friendly server options and unlimited data, so you can ditch geographic restrictions and stream speedily. Its the only VPN that offers unlimited simultaneous connections for unlimited devices, so your whole house can browse freely at the same time. And Surfshark comes equipped with a handy CleanWeb feature that blocks ads, trackers and malware as you spend time online.

Get the Surfshark VPN: 3-Yr Subscription for $83.99 (reg. $430) for savings of 80 percent.

Want to secure your online data forever? A lifetime subscription to VPNSecure will do the trick. This one offers you absolutely zero logs, so you can move about the internet privately, as the Smart DNS component lets you forget about geographical restrictions. This VPN is a go-to for a reason, and with this lifetime access youll be able to connect five devices at the same time with unlimited bandwidth. You can choose Data Cipher with VPNSecure and your traffic will be encrypted as you browse so those pesky hackers wont be able to get their hands on anything.

Get the VPNSecure: Lifetime Subscription for $13.99 (reg. $450) with code DOWNLOADIT.

Youll get bank-grade 256-bit encryption with ZoogVPN Lite, which means all of your digital data will be safe from would-be hackers and thieves. Get access to over 20 bare metal worldwide VPN servers so you can avoid geographical restrictions and bypass any internet censorship, while simultaneously ensuring your privacy with a trusted strictly zero log VPN service.

Get the ZoogVPN Lite: Lifetime Subscription (25 Devices) for $31.49 (reg. $710) with code DOWNLOADIT.

A lifetime subscription to SlickVPN gives you blazing browsing speeds, anonymous torrenting, a super secure encryption and 125 gateways available to use in over 45 countries. Hide your real IP address wherever you are, while enjoying the unthrottled speed it offers as you stay safe. Protect yourself while banking, browsing, chatting or gaming while youre on any type of device for a lifetime on up to 5 different devices.

Get the SlickVPN: Lifetime Subscription for $13.99 (reg. $1,200) with code DOWNLOADIT.

If youre looking for a VPN that offers lifetime protection on unlimited devices, Seed4.Me might be the right VPN for you. It gives you an internet without borders while hiding your IP and keeping your activities safe and secure forever. Youll only need one account for all of your familys devices, which will all have access to the servers in over 30 countries that help you bypass geographical restrictions.

Get the Seed4.Me VPN: Lifetime Subscription (Unlimited Devices) for $27.99 (reg. $432) with code DOWNLOADIT.

WifiMask VPN gives you the ability to browse quickly and away from prying eyes and nefarious intentions of hackers on an unlimited amount of devices. This 3-year subscription will let you unblock websites via 21 servers in 8 different countries, giving you a brand new IP-address from whatever countrys server you connect to to bypass annoying geographical restrictions. Aside from the usual VPN perks, it also gives you a speedy internet connection by blocking those annoying ads with a daily updated blocklist, and it activates firewall rules and prevents leaking your data when the app is reconnecting for extra security.

Get the WifiMask VPN Unlimited Devices: 3-Yr Subscription for $27.99 (reg. $143) with code DOWNLOADIT.

For those looking for a shorter commitment time, Goose VPN gives you a 2-year subscription for unlimited devices to give this beloved VPN a whirl. It redirects your internet traffic through a heavily encrypted tunnel, gives you different IP addresses that let you access websites from different locations and keeps all of your most personal, important data secure.

Get the Goose VPN: 2-Yr Subscription for $13.99 (reg. $349) with promo code DOWNLOADIT.

Looking for a 2-for-1 special? Get access to over 500 servers, site unblocking, high-speed connections and more with this KeepSolid Bundle. It includes the beloved KeepSolid VPN Unlimited, including protection for your online activity and letting you browse without restriction for a lifetime on up to 5 devices. And youll also get KeepSolid SmartDNS, an easy-to-use DNS Proxy App that lets you watch your favorite shows without annoying lags, delays or geo-restrictions.

Get The Ultimate KeepSolid Lifetime Subscription Bundle for $41.99 (reg. $438) with promo code DOWNLOADIT.

Top-rated KeepSolid VPN Unlimited has been featured on this list previously, but this time its for a solo lifetime subscription for five devices.

Get the KeepSolid VPN Unlimited: Lifetime Subscription for $28.94 (reg. $199) with code DOWNLOADIT.

You can keep yourself safe online and give the gift of internet security to a family or friend with this 2-pack of KeepSolid VPN Unlimited lifetime subscriptions for five devices each. This Top-Rated service provides you with speedy and anonymous online browsing.

Get the KeepSolid VPN Unlimited: Lifetime Subscription (2-Pack) for $30 ($399) with code DOWNLOADIT.

If youre on the move it might be time to get a private VPN server that lets you access the internet just like you do at home no matter where you go. This one cuts out the middle man, making sure those third-party VPN service providers arent inspecting your internet traffic and keeping things private. Youll be able to access sites without geographical restrictions and at the same speeds as your home internet even when youre away! This lifetime subscription can be used on up to five devices and makes sure hackers and snoops arent privy to your internet activity anywhere.

Get the Hop VPN: Lifetime Subscription for $27.99 (reg. $148) with code DOWNLOADIT.

Want to get your hands on Asias fastest-growing VPN service? Its VPN.asia, a VPN that provides military-grade security, wide device compatibility and the ability to use it on 10 devices. Just one click makes sure you have unrestricted online access, while 256-bit encryption protects your data from anyone trying to steal your precious info. It doesnt slow your internet speed and comes equipped with easy-to-use apps for whatever device youd like to use it on.

Get the VPN.asia: 10-Year Subscription for $55.99 (reg. $1,080) with code DOWNLOADIT.

If youre in need of a private VPN server that you dont have to share with the public, The UTunnel VPN Basic License + Cloud Server is a great option thats available now with a one-year subscription. Your user license will cover up to 5 devices.

Get the UTunnel VPN Basic License + Cloud Server: 1-Yr Subscription for $74.19 (reg. $120) with code DOWNLOADIT.

A lifetime license for FastestVPN ensures that five of your devices are safe from nefarious hackers and protected with military-grade 256-bit AES encryption on all of their over 350 servers.

Get the FastestVPN: Lifetime Subscription (5 Devices) for $13.99 (reg.600) with code DOWNLOADIT.

With the ability to use BelkaVPN on 10 devices simultaneously, you can make sure the whole family is protected online with a lifetime subscription to this VPN. This VPN protects you while youre on public WiFi and has over 120 VPN servers ready to help you surf the web safer and more anonymously

Get the BelkaVPN: Lifetime Subscription for $29.68 (reg. $719) with code DOWNLOADIT.

A lifetime subscription to iProVPN for 10 devices means your personal data and internet activities will be safe from prying eyes thanks to their AES 256-bit encryption.

Get the iProVPN: Lifetime Subscription for $29.68 (reg. $600) with code DOWNLOADIT.

With a lifetime subscription to Ivacy VPN you can safeguard up to 5 devices and ensure your vital information stays safe with bank-level 256-bit encryption. Their strict no logging policy means your information will be kept completely anonymous.

Get the Ivacy VPN: Lifetime Subscription for $29.68 (reg. $1,194) with code DOWNLOADIT.

VPN by VeePN has an incredibly impressive 2,500+ servers in over 48 locations ready to give you optimal connection speed, help you stay anonymous and dodge geographical restrictions and keep your information safe with 256-bit encryption.

Get the VPN by VeePN: Lifetime Subscription for $22.26 (reg. $659) with code DOWNLOADIT.

One of the worlds most popular VPNs, Hola VPN, already has an impressive 200 million users on the Chrome Web Store. It gives you all the perks of a VPN with ease of use and the ability to connect up to 10 devices at the same time with this one year subscription to test out how VPNs work for you.

Get Hola VPN: 1-Yr Subscription for $37.09 (reg. $179) with code DOWNLOADIT.

BulletVPN gives you access to high-quality, fast and secure internet connections around the world, helping you bypass geographical restrictions and stay safe online with this lifetime subscription for 10 devices.

Get the BulletVPN: Lifetime Subscription for $28.93 (reg. $540) with code DOWNLOADIT.

This Disconnect VPN Premium lifetime subscription is only for one device, but it provides an insane level of security by blocking tracking requests from connecting to your devices and keeping all your important information safe from not only would-be thieves but government entities and companies as well.

Get the Disconnect VPN Premium: Lifetime Subscription for $14.83 (reg. $300) with code DOWNLOADIT.

Snag access to worldwide servers to browse the web without any restrictions with LightyearVPN, a one-click to connect, no configuration VPN option. This one year subscription will give you a taste of this handy service with unlimited bandwidth and no log policy, and its available to use on up to five devices.

Get LightyearVPN: Fast & Safe Internet for $37.09 (reg. $119) with code DOWNLOADIT.

personalVPN Pro was built by network security experts and it shows, with features like its proprietary super-optimized FreeBSD bare metal servers and 4096-bit connecting and 256-bit AES-streaming encryption.

Get the personalVPN Pro for $24.96 (reg. $69) with code DOWNLOADIT.

Note: Terms and conditions apply. See the relevant retail sites for more information. For more great deals, go to our partners atTechBargains.com.

Now read:

Read more:
These Highly-Rated VPNs are on Sale for an extra 30 Percent Off for a Limited Time - ExtremeTech

Read More..

The Hosting Heroes today announced the combining of CyberHostPro, EZPZ Hosting, Reyaltec, Bargain Hosting, UK Web Hosting Services and Yeti Host into…

The Hosting Heroes is about delivering the best possible technology and support to our customers. By bringing these companies together we can deliver on that promise better than ever, said CEO Chris Danks

LISCARD, UK (PRWEB) April 01, 2021

The Hosting Heroes today announced the combining of CyberHostPro, EZPZ Hosting, Reyaltec, Bargain Hosting, UK Web Hosting Services and Yeti Host into a combined brand named The Hosting Heroes. This exciting development consolidates six of the United Kingdoms most trusted infrastructure providers into one entity. Based in Liscard, Merseyside, The Hosting Heroes focus will be on high-performance hosting technology, premium support, and delivering a wide range of solutions to serve a variety of customer needs. From domain names to cloud servers, customers with wide-ranging needs will now be able to find complete solutions from one partner at The Hosting Heroes instead of having to rely on multiple different vendors.

The Hosting Heroes is about delivering the best possible technology and support to our customers. By bringing these companies together we can deliver on that promise better than ever, said CEO Chris Danks. Hosting and infrastructure become more and more mission critical by the day. Your choice in hosting partner can be a make-or-break decision for the company, Danks continued.

With a rich history in supporting small and mid-sized businesses as well as individual customers, the combined resources of the The Hosting Heroes promise to provide a premium hosting experience for customers that demand the best infrastructure, uptime, and support. For years, each of these companies brought unique offerings and strengths to the hosting market. Bringing them together will be a force-multiplier for customers and partners around the world.

When asked about the new brand and the combined companys mission, Danks was quick to reply, Honestly, that is why we put it right there in the name. We want our team members, our partners, and our customers to know what our focus is. Who says your hosting provider cant be heroic?

The Hosting Heroes provide infrastructure based in the United Kingdom and 24/7 support. Continual investments in leading-edge technology combined with managed applications offer customers confidence in their chosen hosting partner. From WordPress to Windows, The Hosting Heroes offer robust solutions for every market need.

For more information about The Hosting Heroes visit http://www.thehostingheroes.com.

Share article on social media or email:

Continued here:
The Hosting Heroes today announced the combining of CyberHostPro, EZPZ Hosting, Reyaltec, Bargain Hosting, UK Web Hosting Services and Yeti Host into...

Read More..

How Open Source is Driving the Future of Data Science – RTInsights

With its reliance on a community of physically dispersed individuals and flexibility of adoption, open-source data science is becoming an even more attractive choice among cash-strapped governments, non-profits, and businesses.

Over the past decade, data science and machine learning have made their way from an obscure academic discipline to widespread corporate adoption. The academic community has a natural preference towards open source. Science is a collaborative effort, and its advancement is best served by enabling as large a community as possible to build upon existing research.

Private companies, on the other hand, have a much stronger incentivefor proprietary technology. Developing software systems is an expensiveendeavor. Naturally, a business wants to make a return on this investment.Making the results of your work freely available to competitors doesnt seemlike the smartest choice if you are a business owner.

Still, in data science, several powerful incentives pull corporateinterests in the direction of favoring open-source implementations.

Open source tools offer a lower barrier to entry thanlicensed software. Companies can experiment more easily and with fewerconstraints. They are also more likely to find talent for programming languagesand data science tools that are freely available to everyone.

A case in point is Python, the dominant programming languagefor data science, which happens to be open source. It has the most versatileand extensive capabilities for manipulating data and building machine learningmodels. Python has even superseded commercial tools like MatLab in terms ofcapabilities for data science applications.

Most data science and machine learning frameworks such asTensorFlow, SciKit-Learn, or PyTorch build directly on Python and are also open-source.

Often, their creators are large companies that are alreadydominant in their respective markets. Evidently, the benefits of making alibrary like TensorFlow open-source outweigh the costs for its creator Google.

While Google gave potential competitors a powerful deeplearning tool, it probably benefits more from the massively expanded talentpool, the sprawling deep learning innovation, and the widespread adoption ofthe framework by other companies that open-sourcing TensorFlow entailed.

Other machine learning libraries, such as XGBoost,originatedas research projects in universities. For these institutions, the benefits ofopen-source software are overwhelming for the reasons discussed above.

Most machine learning models require large amounts of datato train. Modern machine learning models, especially deep neural networks usedin computer vision and natural language processing, require vast amounts ofcomputational resources to train. This would present an almost insurmountablechallenge for smaller organizations and individuals, who simply do not havethis amount of data internally, nor the budget to run expensive model trainingexperiments. If it werent for open source data, machine learning would bealmost exclusively the domain of large corporations. This may be in theinterest of the shareholders of said corporations, but certainly not of societyat large, which benefits from the innovations produced by startups andindividuals.

Even for large corporations, the widespread availability of open-sourcedata and pre-trained machine learning models has benefits.

Many of the cutting-edge models developed by researchers atcompanies like Google and Facebook have been open-sourced. Anyone can downloadthese models from Github and use them in their custom data science projects.

But why are these corporations so generous in sharing theirmodels and their data?

From the perspective of an established corporation, it makessense to avoid risky ventures and instead aim to expand market share throughmore traditional strategies.

Startups tend to be better suited for engaging in novelhigh-risk ventures because they are smaller, more agile, and have nothing tolose.

If a large company wants to enter a novel market, or obtainnew technology, acquiring a successful startup in the desired field may be asmarter move than trying to do everything from scratch in-house.

For example, Google acquired Deep Mind in 2014 for thepotential it saw in DeepMinds research in reinforcement learning andgeneral-purpose AI.

To maximize the potential for the emergence of innovativedata science and artificial intelligence startups, it makes sense to giveambitious new upstarts the tools and data they need.

Furthermore, many of the researchers working on commercialprojects come from academic settings. They bring with them a culture ofcollaboration based on open source.

Researchers and developers are naturally inclined toshowcase their work. Therefore, a commitment to open source and the opportunityfor employees to participate in open source projects can go a long way to makea company a more attractive employer for highly coveted data science talent.

The foundational knowledge for data science includesadvanced skills in mathematics, statistics, and programming. Until a few yearsago, this knowledge was deeply buried in academic textbooks and usuallyacquired by obtaining a technical university degree.

Today, an ambitious self-starter can learn all of thesethings via resources that are freely available on the web. An army of Youtubeeducators and bloggers has emerged that makes previously dry and highlyacademic topics accessible in a fun and easy-to-digest way.

These new educational resources grow the talent pool bymaking data science more accessible for a larger group of people, which alsobenefits companies.

Without open-source software and open-source data, offeringthis type of education for free would be much more difficult.

Online education platforms offer academic curricula that often match or exceed traditional university courses in terms of quality. In many cases, these courses are accompanied by Github repositories full of open source code.

Developing and maintaining a custom data science solutionfrom scratch in-house presents a major challenge to most companies. The largera software system grows, the more susceptible it is to bugs and the moredifficult it is to find problems in the source code and deploy the system intoproduction.

Building on open source software and models cansignificantly alleviate these burdens and speed up time to market. Bugs inwidely used open-source libraries are likely to have been discovered byprevious users. If bugs do occur,developers are free to go into the code and fix them without having to worryabout violating licensing agreements. If the open-source tool turns out to notbe a good fit, no money has been sunk on a failed trial.

Even for private businesses who have a commercial interestin protecting their software, there are strong incentives for using andbuilding open-source data science solutions.

More recently, the Covid-19 pandemic has put many organizations under enormous pressure to digitize data-heavy processes as quickly as possible while physically scattering technical talent. With its reliance on a community of physically dispersed individuals and flexibility of adoption, open-source data science is becoming an even more attractive choice among cash-strapped governments, non-profits, and businesses.

Read the original:
How Open Source is Driving the Future of Data Science - RTInsights

Read More..

Space Regime in Deep Distress: Experts The Diplomat – The Diplomat

Advertisement

The following is based on excerpts from the March 2021 Diplomat Risk Intelligence Monthly Report An Asian Space Odyssey. The full report is available here.

After a relative lull following the end of the Cold War, space is back with a vengeance, along with geopolitical rivalry and accelerated defense modernization plans. What is new and an additional complicating factor, this time around, is the realization that space exploration and presence may be intimately tied not only with national prestige and military gains (its principal drivers during the Cold War) but also with an economic edge for those invested in it. However, technical advances that have contributed to civilian, military and commercial space capabilities in, and aspirations of, key Asia-Pacific powers have not been matched with commensurate shared understanding on how these capabilities are to be put in to play in a way acceptable to all.

In a new Diplomat Risk Intelligence, five prominent experts on space issues examined among many other key issues related to Asia-Pacifics outer space engagement how the space security regime, and capabilities and intent, have not tracked each other, with geopolitics and national economic aspirations introducing further complications.

Australian Strategic Policy Institute scholar Malcolm Davis writes:

The 1967 Outer Space Treaty (OST) bans the deployment or use of nuclear weapons in space. It doesnt ban the development, testing and deployment of non-nuclear ASATs [anti-satellite weapons]. Efforts since the OST to prohibit ASATs, such as the Russian and Chinese proposals for a Prohibition on the Placement of Weapons (PPWT) in space, and the Prevention of an Arms Race in Outer Space agreement, as well as an EU Code of Conduct for Outer Space activities, have failed in part due to challenges in defining what constitutes a space weapon and challenges associated with verification and monitoring. The Russian and Chinese efforts with PPWT sought to ban co-orbital ASATs, but did nothing to constrain either direct-ascent ASATs or ground-based counterspace capabilities. Defining what constitutes a co-orbital ASAT is becoming increasingly difficult as a grey zone in orbit emerges due to the blurring between commercial space capability and potentially hazardous or malign rendezvous and proximity operations.

Interestingly, as Secure World Foundation analyst Victoria Samson points out in her contribution to the report:

An added complication is that Russia historically has not accepted that commercial space exists. When negotiations were underway in the 1960s for the Outer Space Treaty (OST), Soviet negotiators wanted it enshrined in the treaty that space would be for nation-states only. Finally, as a compromise, Article 6 of the OST requires nations to provide continuing supervision of any space activities by its citizens. Right now, there are roughly 3500 active satellites. Looking at filings with the FCC for spectrum, there could potentially be 107,000 active ones by the end of this decade. They will not all come to fruition but a lot of them will, and with that will solidify a fundamental change in the space domain, as it is commercial actors launching these mega-constellations, not nation-states. With the space domain shifting from one dominated by nation-state actors to one that is dominated by commercial actors, Russias lack of true commercial space very well may contribute to its drop in space stature.

Get briefed on the story of the week, and developing stories to watch across the Asia-Pacific.

The result? Russia could very well like to make up for the lack of its commercial/civilian space heft by doubling down on its military counterspace capabilities, adding further stress on the extant space security regime.

Growing interest in space-resource extraction too is increasingly playing a large role in pushing the edges of the OST. Consider the fact that in April last year, then-U.S. President Donald Trump signed an executive order that allowed the United States to mine the moon and otherwise extract resources from outer space. While his administration had argued at that time that this order was not in violation of the OST and keep in mind that the U.S. is not a signatory to the 1979 Moon Treaty, which the order would have run afoul of had the U.S. been a party analysts have pointed out that Trumps moon-mining plans (and the Artemis Accords that buttress it) run against the spirit of the outer space as a global commons.

Chinas space ambitions too have a significant economic bent. Scholar Namrata Goswami writes in her contribution:

For China, investing in outer space moves beyond prestige and reputation, beyond a flags and footprints model of the Cold War. Instead, China aims to develop capacity for establishing permanent space presence, from which it would economically benefit in the long term. The global space economy today is worth $350 billion but is predicted to be worth between $1.2 trillion to $3 trillion by 2040. The economic returns from future mining of space-based resources like titanium, platinum, water-ice, thorium, Helium-3, iron-ore, are several trillions. By 2050, China aspires to return $10 trillion annually from investments in the Earth-moon economic zone.

Observer Research Foundation scholar Rajeswari Pillai Rajagopalan flags that the problem with the existing space security regime and the supporting legal treaties is even deeper and foundational. She writes:

There are also definitional issues with the existing treaties. For instance, the understanding of key terms such as militarization of space has undergone important changes over the decades. In the 1950s, the U.S. and the Soviet Union emphasized the peaceful uses of space, at least in their official rhetoric. This, in the initial years, meant non-military uses. But once they launched their own satellites, they began to interpret the term more broadly to suggest non-aggressive actions. By the 1960s, both the U.S. and the USSR were launching many satellites with direct military uses. This was a slippery slope, with the distinction between militarization and weaponization of space becoming vaguer. Today, this understanding has become even broader to mean non-destructive uses. So, while OST has prevented states from placing WMD in space, development of counter-space capabilities with an apparent non-destructive use is considered acceptable. Therefore, in the absence of clarity of what constitutes peaceful use of space or a space weapon, the effectiveness of existing mechanisms is questionable.

It is of course tempting to put the blame for the fraying space security regime on growing capabilities as well as intent especially when it comes to new space military technologies, including the development of co-orbital ASATs and other weapons. But the fundamental issue is that increasingly and quite naturally, as a matter of fact intense geopolitical rivalries are also manifesting themselves as hindrances in further developing new norms and regimes, including those for the outer space. As Carnegie Endowment for International Peace researcher Ankit Panda writes in the concluding section of the DRI report:

While certain technological developments especially in the military realm have stymied progress on governance (for instance, disagreements between the United States on the one hand and China and Russia on the other), technologies in and of themselves are not the source of the continued dearth of institutions and mechanisms to manage the safe and sustainable use of space. With the major powers still divided on space, the obstacles today to better and more robust space governance are largely political. New initiatives, such as the United Kingdoms submission of a resolution at the U.N. General Assembly in 2020, could enhance common understanding among states. Absent major systemic shifts in how the main space powers relate to each other, technological progress is likely to continue to outpace progress on space governance over the next decade.

DRI Monthly Reports are rigorous research investigations that go beyond reportage and commentary to add permanent value for clients. Access previous reports here.

Go here to see the original:
Space Regime in Deep Distress: Experts The Diplomat - The Diplomat

Read More..

Gulf News webinar to focus on fasting with health conditions during Ramadan | Uae – Gulf News

Image Credit: Shutterstock

Fasting during Ramadan comes with great health benefits, but for those with chronic conditions, it can be a challenging time to navigate. So, how can you make the most of Ramadan, while also making sure that your health doesnt suffer?

Gulf News presents Healthy Ramadan Fasting with Health Conditions, a webinar in partnership with Fakeeh University Hospital that will delve deep into ways people suffering from chronic conditions can ensure a safe Ramadan.

Whether you are newly diagnosed with diabetes and unsure how to go about fasting, or a cardiac patient wondering if you should fast, or have concerns about high blood pressure, you can get all your doubts cleared during the webinar.

Join us on April 8 at 11am as Dr Khaldoun Taha, Consultant Cardiologist, Dr Ahmed Hassoun, Consultant Endocrinologist, and Clinical Dietician, Rashma Devjani cover a wide range of topics during the webinar including:

Precautions people with chronic conditions need to take

How critical it is to get the go-ahead from your doctor before fasting

Steps for diabetics to ensure safe fasting

Things cardiac patients need to keep in mind

Implications for people with high blood pressure

Dos and donts of iftar and suhour

The best foods to eat to help you maximise the health benefits of fasting

How to stay active during Ramadan

Experts from Fakeeh University Hospital will also take questions from the audience during the webinar. So be sure to register in advance.

Built on an integrated healthcare model, Fakeeh University Hospital brings you the legacy of more than four decades of compassionate care drawn from the renowned Fakeeh Care group based in Saudi Arabia. Fakeeh University Hospital is also a world-class academic centre committed to excellence through research, education, and clinical care.

Find all the information you need to enjoy a healthy Ramadan with top healthcare experts from Fakeeh University Hospital by tuning into our webinar on April 8th at 11am.

This content comes from Reach by Gulf News, which is the branded content team of GN Media.

Excerpt from:
Gulf News webinar to focus on fasting with health conditions during Ramadan | Uae - Gulf News

Read More..

When it rains, it floods, and you better know what to do – Columbia Daily Herald

I think it's fair to assume the first sign of spring in Columbia is whenever the Duck River becomes a little too big for its britches.

At least that seems to bethe case every year, although the past few major flooding incidentsseemed to occurin February. Perhaps our local waterway is a bit winded and worn out from the past year, andneeded a month off.

Or maybe it was just the time it needed to fester one of the worst Middle Tennessee flooding incidents in more than a decade one that caused several deaths, including a Maury County woman, who was swept up by the rushing waters, while trying to clear debris at her residence.

The Tennessee Emergency Management Agency called last weekend's weather the worstsince the historic 2010 floods, which destroyed much of the Middle Tennessee area, including a large chunk of lower Broadway in Nashville. I remember Opry Mills also being a major victim, along with all of the homes and lives lost during that time.

It could nothave been a more awkward time (well, it could have been worse) to get flooded.

I was in my early 20s, living in Murfreesboro going to school at Middle Tennessee State University, and was smack dab in the middle of moving into a new home when the first round of stormshit.

It was as if the sky was a giant bucket full of water that had been turned upside down. There was no gradual buildup. It wasan instant soakage that gave no warning.

It was as if you turnedyour back for one second and suddenly found yourself standing in a foot of water, and it was rising fast.

When weather like that comes in an instant, there's sure to be panic. And boy was there, especially from myself who still had a few more trips to make before the move was complete.

Fortunately, my home and the rest of the movedidn't experience any real damage, other than a few sketchy roads that came close to swallowingup my Subaru.It was surreal driving around town that day, seeing so many cars submerged in the water, people running about and boarding up their windows.

"Apocalyptic" seems to be the word that comes to mind when thinking back to those crazy times.

Bad weather is something we've all encountered in our lives, especially if you've been a Tennessean for a while, whether it's flooding, the softball-sized hailstorms or tornadoes that make their way through yearly. Yet, every now and again, a cluster of storms comes along that's, as they say, "a real doozy."

Seeing the Duck River flood every year is always concerning, partly because being a Riverside resident gives you a front row seat to the party, and the stress. Major flooding incidents are also events a journalist doesn't necessarily look forward to, this one at least.

Sure, the opportunity to take really great photos, which capture the damage and devastation can be somewhat fascinating. There issomething about seeing the places you've been to, walked on and enjoyed,nowdeep underwater. It's why traffic always seems to back up around Riverside Drive whenever there's a new flood to check out.

But there's the other side of it, the one in which you're stuck waiting to hear about the people and places that were damaged,harmed or possibly killed. In a small town like Columbia, it could very likely be your neighbor, a family member or friend. There aren't very many degrees of separation if you've been here long enough.

It's nothing compared to the first-responders whose job is to suit up and put themselves in harm's way, the ones who volunteer to come face-to-face with death and danger to protect the citizens.

Perhaps the hardest part about dealing with a natural disaster, at least on the mental side, is accepting that it's a force of nature out of your control.The best thing you can do is bunker down, have an emergency plan in placeand pray for the best.

As tragic as discovering the aftermath of a severe weather incident can be, it can also serve as a valuable lesson. Not to make light of those who losttheir homes or, God forbid, their lives, Mother Nature can raise a lot of awareness when it come totaking the proper safety precautions during a storm.

For example,we've covered several stories over the years aboutfamilieswhose homes were damaged after a large tree fell on their house. There is also the tragic death of Spring Hill firefighter Mitchell Earwood last May, who was killed by a fallen tree during a severe storm at his home while off duty.

Seeing and hearing about those incidents forces you to consider what you would do if a similar situation were to happen at your home, where the safest places are and if you're prepared to handle the worst.

For me, I began to pay more attention to the massive tree in my front yard, which wouldcrash directly into my bedroom if it were to tip over. That's a pretty scary thought considering a lot of the really bad storms seem to happen during the overnight hours.

Living in a city with a major Tennessee river prone to flooding every year is another obvious reason it's important to become more aware of your surroundingsand how to take precautions in the event of an emergency.

Not every town floods like Columbia does, and that's an important thing to keep in mind.

I suggest at the very least, reachout to organizations like Columbia Fire & Rescueor our local Maury County Emergency Management team. They deal with the worst of it all. It never hurts to get a refresher course every now and again, because it's easy to forget it's not just your property, but your life and your loved ones'lives that are at stake.

If those old Chiffon margarine advertisements evertaught us anything, "It's not nice to fool Mother Nature."

Jay Powell is a reporter for The Daily Herald. Contact him at jpowell@c-dh.net or follow him on Twitter @JayPowellCDH.

More here:
When it rains, it floods, and you better know what to do - Columbia Daily Herald

Read More..

Strengthening technology through computer science – Study International News

Technology has profoundly changed the way people live their lives. Today, its hard to imagine an existence without online shopping, smart home devices, dating apps, studying, social media, gaming, Clubhouse and more.

As more people spend more time online, the amount of data they generate grows. Computers are central to all aspects of our digital lives; as the range of industries, from communications to banking, that relies on them grows, so too do the list of miscreants targeting to misuse or steal their data.

With the Internet of Things fusing computers with objects that can interact with the physical world, cybersecurity attacks threaten to endanger life and property too. Imagine driverless cars or insulin pumps being hacked.

If individuals, governments and companies do not have secure information systems, data falling into the wrong hands can lead to potentially dangerous results. With new solutions to real-world and business-related problems being released on a regular basis, studying a Computer Science degree could put you at the forefront of developing the next big and potentially life-saving thing.

Computer science covers vast swaths of terrain coding, technical engineering, business processes and communications among just a few. Here are four universities that will help you crack the code to success.

Source: Western Michigan University

Western Michigan University (WMU)s Computer Science Department is at the forefront of international excellence and leadership in education for the computer science professions. The Department is a leading powerhouse of research and teaching activity spanning the breadth of Computer Science, and their coursesinclude Master of Science; Master of Science: Accelerated; Master of Science: Cybersecurity; Doctor of Philosophy.

Keeping computer systems secure is one of the most challenging tasks. On the BSc Cybersecurity course, youll study how computers can be used to prevent and solve cyber-crime. To help you rise to the challenge, this BSc provides knowledge in the very latest security

The Department encompasses a wide range of disciplines within the computer science hemisphere including undergraduates courses such as Bachelor of Computer Science; Bachelor of Data Science; and Bachelor of Science: Cybersecurity as well as postgraduate principles, tools and techniques taught by specialist staff. It is designed to train tomorrows security professionals, combining fundamental concepts and principles with exposure to new technologies and solutions.

With the dramatic increase in high-profile cyber security incidents reported in the media, the demand for highly skilled security professionals is growing significantly as businesses across the globe seek to protect their networks and data. WMUs MSc Cybersecurity aims to provide you with the knowledge and practical expertise to evaluate, design and build computer security systems that protect networks and data from cyber-crime or terrorist attack. The Cybersecurity programmes are available online and designed to allow students to work full time while pursuing their degrees.

Source: Dalhousie University

Dalhousie University boasts the largest Computer Science and Technology education and research centre in Eastern Canada and is part of Canadas U15 research intensive universities. Founded in 1997, the Faculty of Computer Science, a premier research institution in IT in Atlantic Canada, is where students develop the deep technical, problem-solving and leadership skills needed to create or leverage new computing technologies to empower people, organisations and society.

The facultys research strengths in AI, machine learning, big data, human-computer interaction, visualisation, graphics, systems, networks and cybersecurity are present in its undergraduate programmes, such as Applied Computer Science and Computer Science. The latter focuses on the theory, design and application of Computer Science by exploring a wide range of areas including software development, algorithms, networking and artificial intelligence, while the former fuses a deep understanding of technology with in-demand skills such as communications and project management.

At the graduate level, you can opt for flexible and multidisciplinary programme: two research-focused degree programmes (Master of Computer Science and PhD in Computer Science), three interdisciplinary programmes (Master of Digital Innovationand Master of Health Informatics), as well as an applied programme offering three degree stream options (Master of Applied Computer Science).

Both undergraduate and graduate programmes are taught by award-winning professors in a varied and extensive lineup of expertise, such as Big Data Analytics, Artificial Intelligence & Machine Learning; Human-Computer Interaction, Visualisation & Graphics; Systems, Networks & Security; Algorithms & Bioinformatics; and Computer Science Education.

These programmes can be customised to personal and career goals. With a location in Halifax one of Canadas fastest growing tech hubs and home to tech giants such as IBM, CGI, and Ubisoft students have access to invaluable experiential learning such as co-ops and internships and employment opportunities too.

Dalhousie University believes Computer Science is for everyone here, the learning, social and working environment is respectful and bias-free; scholarships and programming have been developed to support underrepresented groups within the university. To learn more about the facultys education with impact, click here.

Source: UT Dallas

The University of Texas at Dallas is known for academic rigour, career focus and social opportunities. It has one mission: to prepare undergraduate and graduate students for productive careers in industry, academia, and government through an outstanding environment for teaching, learning, and research in the theory and applications of computing.

UT Dallass Department of Computer Science offers Bachelor of Science (BS) degrees in Computer Science and Software Engineering based on a solid foundation of mathematics that includes calculus, linear algebra, and discrete mathematics. Students are equipped with knowledge in modern programming methodologies, the analysis of algorithms and data structures, and the study of operating systems.

For the graduate programmes, students can choose from a variety of concentrations including operating systems, computer architecture, computer graphics, pattern recognition, automata theory, combinatorics, artificial intelligence, machine learning, internet of things and so forth. These concentrations develop knowledge, technical skills and self-directed learning skills in data science, providing an excellent grounding for working as a data scientist or analyst in industry.

Source: Getty Images via AFP

Founded in 1897, San Diego State University provides research-oriented, high-quality education for undergraduate and graduate students through its many diverse departments and interdisciplinary programmes in the creative and performing arts, the humanities, the sciences, and the social and behavioral sciences.

The Department of Computer Science offers a BS degree in Computer Science, a Computer Science minor and Geographic Information Science certificate programmes that emphasise the use of information technology in organisations, and aim to empower people with the technical and management skills required to succeed in a competitive market place. The Master of Computer Science programme is underpinned by the latest technologies and strengthened by active collaborations with industry leaders providing practical experience through placements as well as educational partnerships.

At SDSU, these programmes are delivered by highly qualified staff with a long-standing reputation for excellence in teaching in an exciting and challenging environment for learning with modern, well-equipped facilities.

*Some of the institutions featured in this article are commercial partners of Study International

Read this article:

Strengthening technology through computer science - Study International News

Read More..

Teaching Faculty (Open Rank) – Computer Science-The Grainger College of Engineering, UIUC job with University of Illinois Urbana Champaign | 329826 -…

The Department of Computer Science (CS) at the University ofIllinois Urbana-Champaign invites applications for multiplefull-time teaching faculty positions at all levels and in all areasof computer science. Special areas of focus include informationretrieval, data mining, and artificial intelligence. We seek highlyqualified applicants with a strong commitment to excellence inteaching and the ability to teach at all levels.The University of Illinois is an Equal Opportunity, AffirmativeAction employer that recruits and hires qualified candidateswithout regard to race, color, religion, sex, sexual orientation,gender identity, age, national origin, disability or veteranstatus. For more information, visit http://go.illinois.edu/EEO.Teaching faculty positions are renewable, career-oriented,non-tenure-track positions. Initial appointments are typically atthe rank of Instructor or Teaching Assistant Professor, with thepossibility of promotion to the ranks of Senior Instructor orTeaching Associate Professor and Teaching Professor. Applicants forInstructor positions must have at least a B.S. (M.S. preferred) andapplicants for Teaching Professor positions (all ranks) must have aPh.D. or equivalent degree in CS or a closely related field.Competitive applicants will show the promise of excellence inclassroom teaching and will demonstrate strong CS and teachingknowledge, as well as demonstrate evidence of a commitment todiversity, equity, and inclusion. Senior-level appointments areavailable for candidates with significant additional experience,stature, and demonstrated teaching excellence. Multi-year contractsare available for all positions.Successful applicants will join the department's thriving communityof creative, passionate, and innovative teaching faculty whocontribute to high-quality instruction, curriculum development, andstudent mentoring. Many faculty also engage in other studentengagement activities and outreach activities. Teaching Professorsare expected to have a deep interest in improving pedagogy beyondthe CS department, may take on leadership roles on campus, and manyengage in research in computer science education or other areas ofcomputer science.The University of Illinois has one of the strongest CS departmentsin the country, with more than 100 faculty and nearly 2000undergraduate majors and 1900 graduate students across eighteendifferent degree programs. In addition to our flagshipundergraduate program in the College of Engineering, which includesmore than 30% women in our freshman class, our innovative CS+Xprograms incorporate a strong grounding in CS with technical orprofessional training in the arts and sciences across 13 differentdisciplines. Both our undergraduate and graduate programs areranked in the top five in the country by US News & WorldReport. We are also one of the leading teaching units on campus,offering computing education to students in every discipline. Wewelcome applicants that will contribute to the diverse and vibrantatmosphere in the department as we seek to make computing'sremarkable opportunities available to everyone through thecontinued expansion of our programs and offerings inUrbana-Champaign, in Chicago and online.The start date for these positions is flexible. Application reviewand interviews will begin immediately. In order to ensure fullconsideration for a Fall 2021 start date, applications must bereceived by April 1, 2021. Salary will be commensurate withqualifications. Applications should be submitted by visitinghttp://jobs.illinois.edu anduploading a cover letter, curriculum vitae, teaching statement, astatement on commitment to diversity, and the names and contactinformation for three references. Applicants may also submitsupporting material relevant to evaluating their teachingabilities. For inquiry, please email HR@cs.illinois.edu.The University of Illinois conducts criminal background checks onall job candidates upon acceptance of a contingent offer.The University of Illinois System requires candidates selected forhire to disclose any documented finding of sexual misconduct orsexual harassment and to authorize inquiries to current and formeremployers regarding findings of sexual misconduct or sexualharassment. For more information, visit Policy on Consideration ofSexual Misconduct in Prior Employment."As a qualifying federal contractor, the University of IllinoisSystem uses E-Verify to verify employment eligibility. TheUniversity of Illinois must also comply with applicable federalexport control laws and regulations and, as such, reserves theright to employ restricted party screening procedures forapplicants.

Go here to read the rest:

Teaching Faculty (Open Rank) - Computer Science-The Grainger College of Engineering, UIUC job with University of Illinois Urbana Champaign | 329826 -...

Read More..

UMass Amherst’s College of Information and Computer Sciences Continues Its Winning Streak with Iyyer and Domke’s NSF CAREER Awards – UMass News and…

Mohit Iyyerand Justin Domke, both of UMass Amhersts College of Information and Computer Sciences (CICS), have just received CAREER grants from the National Science Foundation (NSF), among the most prestigious grants that the NSF offers. This makes four CAREER awards for CICS this yearso far.

The NSFs CAREER program is intended to provide junior scholars who have the potential to serve as role models, both in their research and teaching activities, with significant funding. The ultimate goal of the grant program is to help cement the foundation for a lifetime of integrating research and teaching activities. Iyyer and Domke join Mohammad Hajiesmaili and Cameron Musco, also of CICS, as winners of 2021 CAREER grants.

Iyyers research specialty is natural language processing, or the study of how to make computer languages understand human language. Iyyer will spend the next five years building text generation systems that interact with people. Think of these so-called machine-in-the-loop writing assistants as digital TAs that can help those who are seeking to learn to write or to improve their writing skills. Iyyer will be working with Protagonist Labs, a private company that runs online platforms for collaborative storytelling, to help generate publicly released models and open-sourced code for other researchers working on natural language generation.

Domkes work also engages machine learning, but is more focused on probabilistic models, or models that combine data with an experts background knowledge to make reliable predictions. These models are used widely across science, government, and business. However, such automatic methods work well for only relatively modest problemsthe more data there is, the more need there is for an algorithmic expert to manually design an algorithm. This is difficult and reduces the scope of the problem to which probabilistic models can be applied. Domke will spend the five years of his CAREER grant refining and automating the techniques needed for the probabilistic models to work with ever-larger amounts of data.

Read the original post:

UMass Amherst's College of Information and Computer Sciences Continues Its Winning Streak with Iyyer and Domke's NSF CAREER Awards - UMass News and...

Read More..