Page 3,035«..1020..3,0343,0353,0363,037..3,0403,050..»

Professional Diversity Network, Inc. Announces Partnership with Phala Network to Develop Privacy-Protecting Blockchain Application – GlobeNewswire

CHICAGO, Dec. 30, 2020 (GLOBE NEWSWIRE) -- Professional Diversity Network, Inc. (NASDAQ: IPDN), (PDN or the Company), a developer and operator of online and in-person networks that provide access to networking, training, educational and employment opportunities for diverse individuals, today announced its partnership with Phala Network, an innovative technology company that specializes in confidentiality-preserving and privacy-first blockchain application development.

Blockchain technology is known for its decentralization and irreversible features that guarantee secured transactions over consensus algorithms; however, the biggest pitfall is its lack of confidentiality. Phala Network uses the technology of Trusted Execution Environment (TEE) to create a Privacy Cloud Platform that could process general-purpose computing with Turing-completeness.

PDN being one of the largest diverse networks in the nation, how to improve the efficiency of matching qualified job seekers with employers and reduce the costs and resources for employers to find the right talent has always been its top priority. We are excited to partner with Phala Network to explore potential integration of substrate-based, confidential smart contract blockchain technology into our PDN network, which could potentially enhance our delivery rate and protect network users and clients privacy from data-mining,said Adam He, CEO of PDN.

Professional Diversity Network, Inc.

Professional Diversity Network, Inc. (PDN) is a developer and operator of online and in-person networks that provides access to networking, training, educational and employment opportunities for diverse professionals. Through an online platform and our relationship recruitment affinity groups, we provide our employer clients a means to identify and acquire diverse talent and assist them with their efforts to recruit diverse employees. Our mission is to utilize the collective strength of our affiliate companies, members, partners and unique proprietary platform to be the standard in business diversity recruiting, networking and professional development for women, minorities, veterans, LGBT and disabled persons globally.

For more information about PDN, please visit:

http://www.prodivnet.com

About Phala Network

Phala is a private computations cloud based company on Trusted Execution Environment and blockchain, which offers generalized compute at public cloud scale, with a property of base-layer privacy. For now, there are already multi applications built on Phala, including Web3 Analytics, a next-generation, cutting-edge data analysis tool that is able to analyze user data and output results without invading personal privacy.

https://phala.network

Forward-Looking Statements

This press release contains information about PDN's view of its future expectations, plans, and prospects that constitute forward-looking statements. These forward-looking statements are made under the safe harbor provisions of the U.S. Private Securities Litigation Reform Act of 1995. All statements other than statements of historical facts in this announcement are forward-looking statements, including, but not limited to: any projections of earnings, revenue, or other financial items; any statements regarding the adequacy, availability, and sources of capital, any statements of the plans, strategies, and objectives of management for future operations; any statements concerning proposed new products, services, or developments; any statements regarding future economic conditions or performance; any statements of belief; and any statements of assumptions underlying any of the foregoing. In addition, there is uncertainty about the continuous spread of the COVID-19 virus and the impact it may have on the Companys operations, the demand for the Companys products, and global economic activity in general. PDN may also make written or oral forward-looking statements in its periodic reports to the SEC, in its annual report to shareholders, in press releases and other written materials, and in oral statements made by its officers, directors, or employees to third parties. Statements that are not historical facts, including statements about PDNs beliefs and expectations, are forward-looking statements. Forward-looking statements involve inherent risks and uncertainties, whether known or unknown, and are based on current expectations and projections about future events and financial trends that the Company believes may affect its financial condition, results of operations, business strategy, and financial needs. Investors can identify these forward-looking statements by words or phrases such as may, will, will make, will be, expect, anticipate, aim, estimate, intend, plan, believe, potential, continue, endeavor to, is/are likely to, or other similar expressions. Further information regarding these and other risks is included in our annual report and other filings with the U.S. Securities and Exchange Commission (the SEC). All information provided in this press release is as of the date of this press release, and PDN undertakes no obligation to update any forward-looking statements, except as may be required under applicable law.

Press Contact for IPDN:

For further information, please contact:

Professional Diversity Network, Inc.Tel: (312) 614-0950Email:investors@ipdnusa.com

Source: Professional Diversity Network, Inc.

Read the original post:

Professional Diversity Network, Inc. Announces Partnership with Phala Network to Develop Privacy-Protecting Blockchain Application - GlobeNewswire

Read More..

Are Surgeons More Likely To Kill You On Their Birthday? – American Council on Science and Health

The paper is the work of two physicians trained in internal medicine and a health economist, so they are free of bias as well asany practical knowledge about how surgeons operate, literally and figuratively. They made use of Medicare's dataset of beneficiaries and considered the 30-day outcome for surgery performed on a surgeon's birthday. They found 2064 operations (0.2%) of 980,000 procedures performed by 45,000 surgeons that were performed on their birthdays. With lots of variables to choose from, they compared the results of those 2064 to all the surgery on the other days, 978,000 give or take a few. They limited themselves to 17 procedures, four cardiovascular ones, and 13 of the most common non-cardiovascular procedures among Medicare beneficiaries. The endpoint, how many of these patients, undergoing emergency surgery, died within 30 days of surgery. [1]

They found

"The overall unadjusted 30-day mortality of patients on the surgeon's birthday was 7.0% (145/2064), and that on other days was 5.6% (54,824/978,812)."

To be fair, they tested many variations and adjustments to make sure that they were comparing apples to apples and found a 1.6% increase in mortality for those patients, even with adjustments. For the mathematically inclined, you could say that emergency surgery on your surgeon's birthday was associated with a 29% greater risk of dying or 30 excessive deaths. You should also know that this was over three years, so we are talking about ten excess deaths per year.

Much of the article's red-meat is alluded to in the text but found in the supplements that accompany the article. Let me share some of my favorite findings:

My favorite part, though, was the connect the dots section, labeled discussion. What could have caused this to happen, other than finding a pattern in random data after careful statistical magic? The answer is the distracted surgeon. Included in their list of possible distractions,

These last two possible distractions get at an even bigger problem with the paper, none of the authors know anything about surgical care's practical realities. The heartbreaking problem is that this peer-reviewed paper will now wander in the medical literature and undoubtedly gather citations enforcing the concept of the distracted surgeon, too enamored with their upcoming birthday celebration to pay attention to caring for the life in front of them. It is demeaning. That it would be picked up by the media and further publicized is demoralizing.

[1] Deaths, as a result of surgery, has multiple definitions. They can refer to deaths while hospitalized within the 30-day interval or during the hospitalization irrespective of its length. It can refer to deaths only in the hospital or those at home.

Source: Patient mortality after surgery on the surgeons birthday: observational study BMJ DOI:10.1136/bmj.m4381

The rest is here:

Are Surgeons More Likely To Kill You On Their Birthday? - American Council on Science and Health

Read More..

The platform reveals more than 550 technical vacancies with salaries ranging from R $ 3,000 to R $ 15,000 – Prudent Press Agency

The occupations involving technology areas are those that have grown the most during the pandemic. Due to digital acceleration, many companies have expanded their IT teams. A survey conducted by GeekHunter, a company that specializes in recruiting software developers and data science, indicates that job offerings brokered by the platform more than tripled throughout 2020. According to a study conducted by BrazilLAB in partnership with Fundao Brava and the Center for Public Impact (CPI), By 2024, it is estimated that more than 300,000 professionals will be needed in the region.

> Learn how to receive news from NSC Total on WhatsApp

> Are you looking for IT jobs in Santa Catarina? stay tuned!

On GeekHunter, December contains 552 job opportunities for developers from all over the country with salaries ranging between 3,000 and 15,000 BRL. The majority of vacancies, around 75%, are for home office work, which increases the chances of hiring candidates from anywhere in Brazil.

There are vacancies for full and advanced professionals, back-end, front-end and full-stack developers, from different programming languages, as well as opportunities for a data scientist and engineer, data analytics and business intelligence analyst. The companies with the largest number of open positions on the platform are Everis, Accenture, FCamara, Zup, IBM, and others.

Interested parties can register the curriculum at GeekHunter, Free and, in some cases, programming tests. Geek reverses the selection process, that is, after a candidate has approved the profile, companies have access to it and can contact him for interviews. However, a professional looking for a new job can show interest in the vacancy and receive recommendations from Geek according to their profile.

> The technology sector in the SC found an opportunity to grow during the pandemic

To an area Data Scientist He has remote job vacancies in PJ format and a salary between R $ 10,000 and R $ 12,000. Must have experience in Python, machine learning, data science, and desirable technologies in BigData, SCRUM, Python, Django, and Data Mining.

Another remote work opportunity is React front end developer Wages ranging from 6,000 R $ to 8,000 R $ under the Commercial Law System. You should have between two to four years of React language experience.

> 2020: A year of challenges and overcoming the tech sector in Santa Catarina

There are also job vacancies for Data Engineer The complete CLT system, in person or remotely, and a bonus ranging from R $ 4.5k to R $ 6.5k. In addition to advanced English for conversation, the candidate needs development experience in Python, Java or Scala programming languages, knowledge of the main tools of the Hadoop ecosystem, such as Spark, Hive, Impala, Kafka, HBase, and familiarity with the Linux environment, Shell Script and PySpark commands, software engineering and design patterns And data modeling.

Opportunity to Full-stack developer To Sao Paulo (SP). The vacancy is personal and the pay ranges between 9,000 Rials and 11,000 Rials under the tax law system. To apply, you must have built-in experience in JavaScript (ES6), React, Redux HTML / CSS, and Node.js to implement a REST API, as well as Git, SQL, and TDD. Practical knowledge in AWS, Firebase, and PostgreSQL services, experience in Agile / Scrum methodology, and knowledge in TypeScript are differences that can highlight the candidate.

> The legal framework for startups is essential for economic recovery

Already for Node.js backend developer There is an opportunity to work personally in So Paulo (SP), on a CLT system and a salary between R $ 9,000 and R $ 11,000. The company is looking for a high-level professional with extensive background development experience in Node.js, as well as cloud knowledge, with AWS and Elasticsearch.

> Public Tenders at SC: See December vacancies, salaries and how to apply

Read this article:

The platform reveals more than 550 technical vacancies with salaries ranging from R $ 3,000 to R $ 15,000 - Prudent Press Agency

Read More..

Quantum Computing And Investing – ValueWalk

At a conference on quantum computing and finance on December 10, 2020, William Zeng, head of quantum research at Goldman Sachs, told the audience that quantum computing could have a revolutionary impact on the bank, and on finance more broadly. In a similar vein, Marco Pistoia of JP Morgan stated that new quantum machines will boost profits by speeding up asset pricing models and digging up better-performing portfolios. While there is little dispute that quantum computing has great potential to perform certain mathematical calculations much more quickly, whether it can revolutionize investing by so doing is an altogether different matter.

Get the entire 10-part series on Seth Klarman in PDF. Save it to your desktop, read it on your tablet, or email to your colleagues.

Q3 2020 hedge fund letters, conferences and more

The hope is that the immense power of quantum computers will allow investment managers earn superior investment returns by uncovering patterns in prices and financial data that can be exploited. The dark side is that quantum computers will open the door to finding patterns that either do not actually exist, or if they did exist at one time, no longer do. In more technical terms, quantum computing may allow for a new level of unwarranted data mining and lead to further confusion regarding the role of nonstationarity.

ValueWalk's Raul Panganiban interviews George Mussalli, Chief Investment Officer and Head of Equity Research at PanAgora Asset Management. In this epispode, they discuss quant ESG as well as PanAgoras unique approach to it. The following is a computer generated transcript and may contain some errors. Q3 2020 hedge fund letters, conferences and more Interview . Read More

Any actual sequence of numbers, even one generated by a random process, will have certain statistical quirks. Physicist Richard Feynman used to make this point with reference to the first 767 digits of Pi, replicated below. Allegedly (but unconfirmed) he liked to reel off the first 761 digits, and then say 9-9-9-9-9 and so on.[1] If you only look at the first 767 digits the replication of six straight nines is clearly an anomaly a potential investment opportunity. In fact, there is no discernible pattern in the digits of Pi. Feynman was purposely making fun of data mining by focusing on the first 767 digits.

3 .1 4 1 5 9 2 6 5 3 5 8 9 7 9 3 2 3 8 4 6 2 6 4 3 3 8 3 2 7 9 5 0 2 8 8 4 1 9 7 1 6 9 3 9 9 3 7 5 1 0 5 8 2 0 9 7 4 9 4 4 5 9 2 3 0 7 8 1 6 4 0 6 2 8 6 2 0 8 9 9 8 6 2 8 0 3 4 8 2 5 3 4 2 1 1 7 0 6 7 9 8 2 1 4 8 0 8 6 5 1 3 2 8 2 3 0 6 6 4 7 0 9 3 8 4 4 6 0 9 5 5 0 5 8 2 2 3 1 7 2 5 3 5 9 4 0 8 1 2 8 4 8 1 1 1 7 4 5 0 2 8 4 1 0 2 7 0 1 9 3 8 5 2 1 1 0 5 5 5 9 6 4 4 6 2 2 9 4 8 9 5 4 9 3 0 3 8 1 9 6 4 4 2 8 8 1 0 9 7 5 6 6 5 9 3 3 4 4 6 1 2 8 4 7 5 6 4 8 2 3 3 7 8 6 7 8 3 1 6 5 2 7 1 2 0 1 9 0 9 1 4 5 6 4 8 5 6 6 9 2 3 4 6 0 3 4 8 6 1 0 4 5 4 3 2 6 6 4 8 2 1 3 3 9 3 6 0 7 2 6 0 2 4 9 1 4 1 2 7 3 7 2 4 5 8 7 0 0 6 6 0 6 3 1 5 5 8 8 1 7 4 8 8 1 5 2 0 9 2 0 9 6 2 8 2 9 2 5 4 0 9 1 7 1 5 3 6 4 3 6 7 8 9 2 5 9 0 3 6 0 0 1 1 3 3 0 5 3 0 5 4 8 8 2 0 4 6 6 5 2 1 3 8 4 1 4 6 9 5 1 9 4 1 5 1 1 6 0 9 4 3 3 0 5 7 2 7 0 3 6 5 7 5 9 5 9 1 9 5 3 0 9 2 1 8 6 1 1 7 3 8 1 9 3 2 6 1 1 7 9 3 1 0 5 1 1 8 5 4 8 0 7 4 4 6 2 3 7 9 9 6 2 7 4 9 5 6 7 3 5 1 8 8 5 7 5 2 7 2 4 8 9 1 2 2 7 9 3 8 1 8 3 0 1 1 9 4 9 1 2 9 8 3 3 6 7 3 3 6 2 4 4 0 6 5 6 6 4 3 0 8 6 0 2 1 3 9 4 9 4 6 3 9 5 2 2 4 7 3 7 1 9 0 7 0 2 1 7 9 8 6 0 9 4 3 7 0 2 7 7 0 5 3 9 2 1 7 1 7 6 2 9 3 1 7 6 7 5 2 3 8 4 6 7 4 8 1 8 4 6 7 6 6 9 4 0 5 1 3 2 0 0 0 5 6 8 1 2 7 1 4 5 2 6 3 5 6 0 8 2 7 7 8 5 7 7 1 3 4 2 7 5 7 7 8 9 6 0 9 1 7 3 6 3 7 1 7 8 7 2 1 4 6 8 4 4 0 9 0 1 2 2 4 9 5 3 4 3 0 1 4 6 5 4 9 5 8 5 3 7 1 0 5 0 7 9 2 2 7 9 6 8 9 2 5 8 9 2 3 5 4 2 0 1 9 9 5 6 1 1 2 1 2 9 0 2 1 9 6 0 8 6 4 0 3 4 4 1 8 1 5 9 8 1 3 6 2 9 7 7 4 7 7 1 3 0 9 9 6 0 5 1 8 7 0 7 2 1 1 3 4 9 9 9 9 9 9

When it comes to investing, there is only one sequence of historical returns. With sufficient computing power and with repeated torturing of the data, anomalies are certain to be detected. A good example is factor investing. The publication of a highly influential paper by Professors Eugene Fama and Kenneth French identified three systematic investment factors, which started an industry focused on searching for additional factors. Research by Arnott, Harvey, Kalesnik and Linnainmaa reports that by year-end 2018 an implausibly large 400 significant factors had been discovered. One wonders how many such anomalies quantum computers might find.

Factor investing is just one example among many. Richard Roll, a leading academic financial economist with in-depth knowledge of the anomalies literature has also been an active financial manager. Based on his experience Roll stated that his money management firms attempted to make money from numerous anomalies widely documented in the academic literature but failed to make a nickel.

The simple fact is that if you have machines that can look closely enough at any historical data set, they will find anomalies. For instance, what about the anomalous sequence 0123456789 in the expansion of Pi.? That anomaly can be found beginning at digit 17,387,594,880.

The digits of Pi may be random, but they are stationary. The process that generates the first million digits is the same as the one which generates the million digits beginning at one trillion. The same is not true of investing. Consider, for example, providing a computer the sequence of daily returns on Apple stock from the day the company went public to the present. The computer could sift through the returns looking for patterns, but this is almost certainly a fruitless endeavor. The company that generated those returns is far from stationary. In 1978, Apple was run by two young entrepreneurs and had total revenues of $0.0078 billion. By 2019, the company was run by a large, experienced, management team and had revenues of $274 billion, an increase of about 35,000 times. The statistical process generating those returns is almost certainly nonstationary due to fundamental changes in the company generating them. To a lesser extent, the same is true of nearly every listed company. The market is constantly in flux and the companies are constantly evolving as consumer demands, government regulation, and technology, among other things, continually change. It is hard to imagine that even if there were past patterns in stock prices that were more than data mining, they would persist for long due to nonstationarity.

In the finance arena, computers and artificial intelligence work by using their massive data processing skills to find patterns that humans may miss. But in a nonstationary world the ultimate financial risk is that by the time they are identified those patterns will be gone. As a result, computerized trading comes to resemble a dog chasing its tail. This leads to excessive trading and ever rising costs without delivering superior results on average. Quantum computing risks simply adding fuel. Of course, there are individual cases where specific quant funds make highly impressive returns, but that too could be an example of data mining. Given the large number of firms in the money management business, the probability that a few do extraordinarily well is essentially one.

These criticisms are not meant to imply that quantum computing has no role to play in finance. For instance, it has great potential to improve the simulation analyses involved in assessing risk. The point here is that it will not be a holy grail for improving investment performance.

Despite the drawbacks associated with data mining and nonstationarity, there is one area in which the potential for quantum computing is particularly bright marketing quantitative investment strategies. Selling quantitative investment has always been an art. It involves convincing people that the investment manager knows something that will make them money, but which is too complicated to explain to them and, in some cases, too complicated for the manager to understand. Quantum computing takes that sales pitch to a whole new level because virtually no one will be able to understand how the machine decided that a particular investment strategy is attractive.

This skeptics take is that quantum computing will have little impact on what is ultimately the source of successful investing allocating capital to companies that have particularly bright prospects for developing profitable business in a highly uncertain and non-stationary world. Perhaps at some future date a computer will development the business judgment to determine whether Teslas business prospects justify its current stock price. Until then being able to comb through historical data in search of obscure patterns at ever increasing rates is more likely to produce profits through the generation of management fees rather than the enhancement of investor returns.

[1] The Feynman story has been repeated so often that the sequence of 9s starting at digit 762 is now referred to as the Feynman point in the expansion of Pi.

Link:

Quantum Computing And Investing - ValueWalk

Read More..

2020 in Review: 10 AI-Powered Tools Tackling COVID-19 – Synced

Over 82 million people have been infected worldwide, and the number of new COVID-19 cases has continued to climb in recent months. As we anxiously await vaccines, artificial intelligence is already battling the virus on a number of fronts from predicting protein structure and diagnosing patients to automatically disinfecting public areas.

As part of our year-end series, Synced highlights 10 AI-powered efforts that contributed to the fight against COVID-19 in 2020.

To help the global research community better understand the coronavirus, UK-based AI company and research lab DeepMind in March leveraged their AlphaFold system to releasestructure predictions for six proteins associated with SARS-CoV-2, the virus that causes COVID-19. In August, DeepMind released additional SARS-CoV-2 structure predictions for five understudied SARS-CoV-2 targets.

AlphaFold was introduced in December 2018. The deep learning system is designed to accurately predict protein structure even when no structures of similar proteins are available, and can generate 3D models of proteins with SOTA accuracy. On November 30, the latest version of AlphaFold was recognized for solving the biennial Critical Assessment of Protein Structure Prediction (CASP) grand challenge with unparalleled levels of accuracy. DeepMind says AlphaFolds success demonstrates the impact AI can have on scientific discovery and its potential to dramatically accelerate progress in some of the most fundamental fields that explain and shape our world.

CT (computed tomography) lung scans and nucleic acid tests are the two main diagnostic tools doctors use in confirming COVID-19 infections, and CT imaging is crucial for lung infection diagnosis verification and severity assessment.

In January, the Shanghai Public Health Clinical Center (SPHCC) partnered with Chinese AI startup YITU Technologys healthcare division which provides AI-powered medical imaging solutions for lung cancer diagnosis to build an AI CT image reader.

By February 5, the AI diagnostic system had been deployed in four Hubei province hospitals struggling with ongoing doctor and supply shortages. Functionalities catering to the specific needs of clinical departments such as radiology, respiratory, emergency, intensive care, etc., were built into the system.

In response to the COVID-19 pandemic, the US White House joined with research groups in March to announce the release of the COVID-19 Open Research Dataset (CORD-19) of scholarly literature about COVID-19, SARS-CoV-2, and the coronavirus group. The release came with an urgent call to action to the worlds AI experts to develop new text and data mining techniques that can help the science community answer high-priority scientific questions related to COVID-19.

The online ML community Kaggle is hosting a CORD-19 dataset challenge that defines 10 tasks based on key scientific questions developed in coordination with the WHO and the National Academies of Sciences, Engineering, and Medicines Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats.

Developed by the Pande Laboratory at Stanford University in 2000 as a distributed computing project for simulating protein dynamics including the process of protein folding and the movements of protein implicated in a variety of diseases the Folding@Home project aims to build a network of protein dynamics simulations run on volunteers personal computers to provide insights that could help researchers develop new therapeutics.

The current focus of Folding@Home is modelling the structure of the 2019-nCoV spike protein to identify sites that can be targeted by therapeutic antibodies. Coronaviruses invade cells via spike protein on their surfaces, which binds to a lung cells receptor protein. Understanding the structure of viral spike protein and how it binds to the ACE-2 human host cell receptor can help scientists stop viral entry into human cells. Anyone who would like to donate their unused computing power can join Folding@Homes fight against the coronavirus.

In March, Canadian startup DarwinAI released COVID-Net, an open-sourced neural network for COVID-19 detection using chest radiography (X-Rays). Company CEO Sheldon Fernandez says COVID-Net has been leveraged by researchers in Italy, Canada, Spain, Malaysia, India and the US.

Fernandez explains that rather than treating AI as a tool, his company reimagines AI as a collaborator that learns from a developers needs and subsequently proposes multiple design approaches with different trade-offs in order to enable a rapid and iterative approach to model building.

In response to the COVID-19 pandemic, Andrej Karpathy director of artificial intelligence and Autopilot Vision at Tesla and developer of the arXiv sanity preserver web interface introduced Covid-Sanity, a web interface designed to navigate the flood of bioRxiv and medRxiv COVID-19 papers and make the research within more searchable and sortable.

Covid-Sanity organizes COVID-19-related papers with a most similar search that uses an exemplar SVM trained on TF-IDF feature vectors from the abstracts of the papers. This is similar to the Google search engine, which responds by finding the relevance of a query in all texts, ranks by similarity scores and returns the top-k results. Based on paper abstracts, the web interface returns all papers similar to the best-matched paper result to a query.

Disinfection of public areas is a challenging but crucial process in the fight to stop the spread of the COVID-19. In China, ad hoc teams of DJI drone hobbyists sprung up nationwide to provide this service for free. By February, total DJI agricultural drone disinfection coverage had exceeded 600 million square meters across more than 1,000 villages including schools, isolation wards, food waste treatment plants, waste incineration plants, livestock and poultry epidemic prevention centres and more.

Shenzhen-based DJI is a leading drone and associated technologies company. In February they launched the DJI Army Against the Virus project, providing subsidies to support working pilots, with provisions for pilot protective kits and assistance to villages who perform drone disinfection. Spare parts and drone repair services were also provided during the missions.

Many AI-powered autonomous vehicles navigated Chinese streets in response to the COVID-19 outbreak. Developed and modified for the purpose by Chinese O2O local life service company Meituan, Modai (Magic Bag) vehicles delivered much-needed groceries to communities in Beijings Shunyi District.

Self-driving delivery vehicles like Modai were an effective solution to the COVID-triggered surge of online grocery orders and the need to reduce interpersonal contact to slow disease spread. The urgent needs and empty streets drew many companies into autonomous delivery JD Logistics developed self-driving delivery vehicles in Wuhan and for the first time delivered medical supplies to the Wuhan Ninth Hospital, and the Suning Logistics 5G Wolong self-driving car delivered its first orders in Suzhou.

Japans Fujitsu Ltd developed an artificial intelligence monitor to ensure healthcare, hotel, and food industry workers wash their hands properly, according to a Reuters report. The system is based on crime surveillance technology that detects suspicious body movements, and can recognize and classify complex hand movements. It checks whether people complete a Japanese health ministry six-step hand washing procedure similar to guidelines issued by the WHO (clean palms, wash thumbs, between fingers and around wrists and scrub fingernails). The monitor can even tag instances of people not using soap.

Fei-Fei Li, Stanford computer science professor and co-director of Stanfords Human-Centered AI Institute (HAI), shared her thoughts on AI technologies that could help seniors during the coronavirus pandemic in Aprils COVID-19 and AI: A Virtual Conference. Li identified AI-powered smart home sensor technology as a way to help families and clinicians remotely monitor housebound seniors for infection symptoms or symptom progression or regression and potentially also help manage their chronic health issues.

Research institution Strategy Analytics predicts the smart home market will resume in 2021 and consumer spending will increase to US$62 billion. The post-pandemic global smart home device market is expected to maintain a compound annual growth rate of 15 percent.

As efforts to control the spread of COVID-19 continue, contact tracing has emerged as a public health tool where ML can play an important role in optimizing systems. Various countries have developed digital contact tracing processes with mobile applications, utilizing technologies like Bluetooth, the Global Positioning System (GPS), social graphs, network-based API, mobile tracking data, system physical addresses, etc. These apps collect massive data from individuals, which ML and AI tools analyze to identify and trace vulnerable people.

A study published by the US National Library of Medicine shows that by June, over 36 countries had successfully employed digital contact tracing systems using a mixture of ML and other techniques.

Reporter: Yuan Yuan | Editor: Michael Sarazen

Synced Report |A Survey of Chinas Artificial Intelligence Solutions in Response to the COVID-19 Pandemic 87 Case Studies from 700+ AI Vendors

This report offers a look at how China has leveraged artificial intelligence technologies in the battle against COVID-19. It is also available onAmazon Kindle.Along with this report, we also introduced adatabasecovering additional 1428 artificial intelligence solutions from 12 pandemic scenarios.

Clickhereto find more reports from us.

We know you dont want to miss any news or research breakthroughs.Subscribe to our popular newsletterSynced Global AI Weeklyto get weekly AI updates.

Like Loading...

Read the original:

2020 in Review: 10 AI-Powered Tools Tackling COVID-19 - Synced

Read More..

Data Warehouse As A Service Dwaas Market 2020 Global Trends, Market Share, Industry Size, Growth, Opportunities Analysis and Forecast to 2026 : IBM,…

The Data Warehouse As A Service Dwaas Market report classifies the market into different segments based on the application, technique and end user. These segments are studied in detail incorporating the market estimates and forecast at the regional and country level. The segment analysis is useful in the understanding the growth areas and credible opportunities of the market. In the end, the report makes some important proposal of the new project of Data Warehouse As A Service Dwaas industry before evaluating its feasibility. The report provides an in-depth insight of global market covering all important parameters.

Key focus of this research report presentation on global Data Warehouse As A Service Dwaas market is to highlight specific expansion interests and subsequent developments, market size analysis on the basis of value and volume as well as assessment of additional factors such as drivers, threats, challenges and opportunities are thoroughly mitigated in this illustrative report offering to optimize business discretion aligning with growth prospects in global Data Warehouse As A Service Dwaas market

Some of the Important and Key Players of the Global Data Warehouse As A Service Dwaas Market:

IBM, AWS, Google, Snowflake, Teradata, Microsoft, SAP, Micro Focus, Cloudera, Actian, Pivotal Software, Hortonworks, Solver, Yellowbrick, Panoply, MemSQL, Netavis, LUX Fund Technology & Solutions, MarkLogic, Transwarp Technology

Get PDF Sample Report of Data Warehouse As A Service Dwaas (COVID-19 Version) Market 2020, Click Here @ https://www.adroitmarketresearch.com/contacts/request-sample/1719?utm_source=Pallavi

Segment Overview: Global Data Warehouse As A Service Dwaas MarketThe report is not just limited in examining regional developments but also fosters effective country-wise inputs to ensure unbiased assessment and subsequent investment decisions.The report minutely observes the various market segments and their potential in steering favorable growth and subsequent revenue generation, positioning an optimistic outcome despite stark odds and challenges.This detailed research report on global Data Warehouse As A Service Dwaas market is committed to demonstrate favorable outlook, accurately identifying prominent factors, growth influencers as well as other relevant information which lead to a favorable growth outcome in the global Data Warehouse As A Service Dwaas market.

The market is broadly classified into:1.Segmentation by Type2.Segmentation by Application3.Segmentation by Region with details about Country-specific developments

Browse the complete report Along with TOC @ https://www.adroitmarketresearch.com/industry-reports/data-warehouse-as-a-service-dwaas-market?utm_source=Pallavi

Applications Analysis of Data Warehouse As A Service Dwaas Market:

by Application (Customer Analytics, Risk, And Compliance Management, Asset Management, Supply Chain Management, Fraud Detection and Threat Management, and Others), Usage (Analytics, Reporting, Data Mining), End-Use (Retail & E-Commerce, Manufacturing, BFSI, IT & Telecom, Media & Entertainment, Energy And Utilities, Travel & Hospitality, Others)

Section-wise Break-up: Global Data Warehouse As A Service Dwaas Market

1.A complete reference and description of the entire series of events dominant in global keyword market across regional growth spots and specific countries have also been thoroughly touched upon in the report.2.A complete outlook entailing vital details pertaining to the competitive landscape has been minutely assessed and crucial conclusions have also been pinned in this section.3.The report also serves as a reliable information source for leading players as well as emerging ones seeking for dependable investment guide in the volatile Data Warehouse As A Service Dwaas market.4.Other relevant information citing developments in the product and service offerings improvisation makes up for significant business decision amongst investment enthusiasts.5.Additional details inclusive of the holistic growth scope, market size and dynamics as well as threat evaluation and untapped market opportunities in the global Data Warehouse As A Service Dwaas market also form significant sections in the report.

Analyzing the Investment Potential of the Global Data Warehouse As A Service Dwaas Market Report1.The report hovers across the past and current dynamics to deduce significant developments in the aforementioned market, thus effectively encouraging agile business outcome2.The report also is a ready-to-refer documentation that entails substantial information featuring the developments across segments and their role in growth optimization3.Systematic R&D activities and concomitant resource planning are thoroughly touched upon in this report featuring the development graph in global Data Warehouse As A Service Dwaas market.4.The report also ensures investor participation towards directing manufacturer and vendor activities in a bid to achieve significant competitive edge.5.Market based developments are also accurately sectioned in both value-based volume-based calculations to thoroughly encourage reader understanding and subsequent growth potential in global Data Warehouse As A Service Dwaas market.

If you have any questions on this report, please reach out to us @ https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/1719?utm_source=Pallavi

About Us :

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

See original here:

Data Warehouse As A Service Dwaas Market 2020 Global Trends, Market Share, Industry Size, Growth, Opportunities Analysis and Forecast to 2026 : IBM,...

Read More..

SolarWinds Attack: ‘This Hit the Security Community Hard’ – BankInfoSecurity.com

3rd Party Risk Management , Application Security , Cybercrime as-a-service

The SolarWinds breach is a case study in how attackers can subvert a widely used piece of software to turn it to their advantage, says Lou Manousos, CEO of RiskIQ.

See Also: The SASE Model: A New Approach to Security

"The magnitude of this attack is hard to overstate," Manousos says. "Having a supply chain vendor like this - with a legitimate program that is trusted - used to carry out an attack, it's just unprecedented.

"The number of organizations that have been hit, the types of organizations - some really advanced security programs - I think we're all shocked to see how the traditional protection that has been put in place just wasn't as effective as we would have liked when we have trusted software like this."

In this video interview with Information Security Media Group, Manousos discusses:

Manousos is CEO and co-founder of RiskIQ. As CEO, he has spearheaded a new approach that helps internet, financial services, healthcare, media and consumer packaged goods companies protect their brands from online fraud. Manousos is a recognized expert in internet security and fraud prevention who has been developing and delivering enterprise protection technologies for more than 15 years.

Original post:
SolarWinds Attack: 'This Hit the Security Community Hard' - BankInfoSecurity.com

Read More..

Internet of Medical Things: Combatting Connected Health Security Threats – IoT For All

The healthcare industry increasingly relies on IoT networks to securely connect a growing variety of medical devices and equipment. These connected devices are transforming processes and the continuum of care in applications ranging from a hospitals consignment inventory management to remotely controlling insulin pumps, heart-rate monitors, and other implantable devices using smartphones.

In these and other Internet of Medical Things (IoMT) applications, device security is often neglected. Some solution providers mistakenly believe that security cannot be implemented cost-effectively, which is hazardous thinking. The industry moves to a command-and-control model using commercial smartphones whose built-in security mechanisms are generally not adequate for safety-critical applications. These and a wide variety of other IoMT challenges can be solved through a three-tiered security-by-design strategy that protects all communication between system elements, brings trust to each system element, and ensures always-on connectivity between smartphone apps, the IoMT devices, and the cloud.

Cyberattacks or IoMT integrity issues for connected implantable medical devices have unfortunately become more and more prevalent. One of the first examples occurred in May 2019 when a Type 1 diabetes patient re-programmed his insulin pump to customize his treatment and landed in the hospital. He had exploited a security flaw in his commercially available, FDA-authorized device that, according to the FDAs safety warning, could pose significant risks if patients did not correctly implement their own treatment customization.

This same type of safety flaw also provides an open door to hackers, enabling them to access a device whether to cause harm or steal sensitive health information. Some of these same devices require the patient to change a device component, or consumable, over the devices lifetime. The consumable itself poses a new threat opportunity in terms of counterfeit replacement or integrity.

Another popular application for IoMT solutions is hospital asset tracking so that equipment is always available and accessible, and one of the most promising is consignment inventory management. Vendors increasingly sell products, equipment, and associated consumables to hospitals on consignment, issuing invoices only when items are used. Further, OEMs need to ensure that the consigned inventory is maintained to the OEM requirements such as temperature, humidity, and other environmental factors before being utilized in inpatient care.

In the past, all information about these items was manually entered, from their receipt at the hospital to their use and re-stocking. Adopting an IoMT solution for these processes reduces errors while improving efficiency, but security is critical for ensuring the integrity of the supply chain and all financial transactions.

Equally, if not more, important is the authenticity of this hospital inventory. Johnson & Johnson said in its June 2020 document, Position on Counterfeit Healthcare Products, that Counterfeits cover the spectrum of medicines, both prescription and OTC, as well as different forms of medical devices and surgical instruments and a range of consumer products The company went on to say that, in many cases, the fake or counterfeit productsare indistinguishable to patients, consumers, and healthcare professionals, so detection by specialists is needed.

A high-profile example is personal protective equipment (PPE), whose supply has been plagued by counterfeiting during the global pandemic. Healthcare providers must defend themselves against this risk while also ensuring the proper use of all legitimate medical equipment and consumables, whether they be controlled substances that must be correctly dosed to the intended individual or x-ray plates that must be used with a given imaging system for a specified patient.

Every piece of connected equipment inside the hospital is also a cybersecurity threat surface. Cybercriminals can use legacy equipment like MRIs and other wired Ethernet medical systems ranging from anesthesia machines to ventilators and infusion pumps as a means into the hospitals core communications network. Many of these systems were produced long before cybersecurity was a critical consideration. Connecting them to the hospital network can open the door to a variety of cybersecurity attacks.

The danger grows with the adoption of commercial smartphones for controlling connected-health solutions. The devices Bluetooth wireless connection does not provide adequate security. Mitigating these threats requires a multi-layered, security-by-design approach that minimizes cost while simplifying deployment.

Each of the applications described thus far requires multiple layers of protection, especially those that use smartphones for command and control in life-critical situations. While it is true that Bluetooth, NFC, LTE, Ethernet, and other protocols mitigate some breaches, they do not defend against all threats. Therefore, it is necessary to start at the application layer, protecting the communications channel between the smartphone app, the medical device, consumable (if applicable), and the cloud from various malware and wireless channel cybersecurity attacks.

Unlike typical transport layer security that only protects the message payload as it moves down the OSI stack and back, application-layer security creates a secure tunnel between the sender and receiver. It essentially enables the application to natively build its own security rather than rely solely on the lower stack levels. The session can be authenticated and require all messages to be encrypted before they leave the app. Robust key exchanges and key management functions enable the recipient to decrypt and validate these messages before utilizing the recipient app.

The second layer of security, for authentication, is essential for smartphone-based control of implantable devices. It helps protect both the application and the platform upon which the app is running, mitigating the risk of attack through connectivity to the solutions cloud services, smartphone apps, and other IoT devices. This layer can handle authentication of the user, the smartphone app, cloud, consumable, and any associated devices connected to the solutions communication system while validating their integrity to ensure hackers cannot gain root access to privileges that enable them to do harm. The authentication layer is particularly important for connected-health solutions that are at risk of counterfeiting. It brings trust to each thing in an IoT solution to protect patient safety and the privacy and integrity of their information.

To implement the authentication layer, each system element must have a unique digital cryptographic identity and have attestation capabilities so it can validate the authority and privileges of the other elements. This ensures there is a root of trust within and between all components in the system so all remain uncompromised and invulnerable to the latest cyber threats. The authentication layer thus ensures that only authorized and trusted sources can send information and issue commands. It can also prevent reverse engineering by obfuscating the application code and ensures other smartphone applications cannot interfere with the connected-health application.

The authentication layers root of trust needs to be established on each system element, including the device, cloud, consumable, and smartphone. Depending on the element, either software or hardware may be used to establish the root of trust. In the factory, Hardware Security Modules, or HSMs, may be used to provide both the medical device and the consumable with cryptographic keys and digital certificates to behave like secure elements (SE) in the system. The trusted cloud issues digital certificates over the air that identify the apps and devices as trusted and handles all the solutions identity lifecycle management. Lastly, even the user may be authenticated based on third party databases and phone resources to verify fingerprints, facial images, document scans, and the like.

The last layer of this three-tiered security-by-design architecture addresses the challenge of ensuring seamless connectivity. Whether its an asset tracking and consignment inventory management or wearable injection device, it is critical to have always-on connectivity between the Thing and the Cloud to exchange data, change operating profiles, and update firmware over-the-air, or administering alerts. Too often, solutions depend exclusively on a handheld device or smartphone for cloud connectivity and cannot ensure that the system always has the most recent device data and can immediately change device performance.

One way to solve this problem on the smartphone is with security software that runs in the OS background. After the smartphone user starts the app and configures it for continuous operation, this layer can continue to harvest the devices IoT data whenever the devices are in proximity to the smartphone.

A second solution for this layer takes a hardware-based approach to the problem. A small-form-factor bridge can implement one communications protocol for interaction with the IoT device and another to communicate with the cloud. The first protocol usually features only personal area coverage. This solution can be configured either for continuous operation or only when the primary IoT-to-cloud path is unavailable.

The third approach to implementing this authentication layer is protecting legacy equipment such as MRI machines and other wired Ethernet medical systems. In this case, a hardware gateway is used to connect to the Ethernet network. It is placed in front of this vulnerable medical equipment to provide a separate channel for communicating only with authenticated devices.

A system that combines the capabilities of smartphones, bridges, and hardware gateways, as described above, ensures the always-on feature that most IoMT deployments need.

Connected-health security solutions were previously built from the ground up. Todays offerings can still be implemented in a modular fashion to meet a wide range of application scenarios using third-party software developer kits (SDKs). This provides users with a building-block approach to adding security at a lower cost and greater flexibility than in the past. The approach also makes it possible to retrofit robust security measures into legacy designs and infrastructures as needed and continuously improve them, up to and including incorporating HSMs later in a solutions lifecycle to optimize how the application layers root of trust is implemented.

Solutions like these add small incremental cost to IoMT-based consignment inventory management systems, connected legacy medical equipment, and smartphone-controlled implantable healthcare devices, but the benefits they deliver are manifold. They significantly improve security while providing the opportunity to differentiate IoMT offerings based on the incalculable benefit of protecting patients from injury or death.

Read more:
Internet of Medical Things: Combatting Connected Health Security Threats - IoT For All

Read More..

Stay Safe Online: What You Need To Know About Digital Distancing – MakeUseOf

The more you use digital devices and the internet to access, manage, and store your personal files, the higher the risk of a hacker accessing them remotely.

But in a world where it's necessary to digitize every aspect of your life, how do you keep yourself safe from the inevitable cyberattack or data leak?

Digital distancing is the practice of limiting communication and access between different digital accounts, devices, or apps.

Think of it as a simplified version of network segmentation, where the network is broken into several independent units to minimize damages in case of a cyberattack or a data breach and makes them easier to protect individually.

To digitally distance your accounts and devices is to create protective distance between them. That way, if an attacker manages to break into one device or account, they dont have access to all of your data, but only a part of it.

Related:What Is a Data Breach and How Can You Protect Yourself?

In addition to minimizing the damages of a malicious cyberattack, practicing digital distancing also makes recovery easier. After all, youd only need to change the credentials of a few accounts, not all of them.The same goes for data recovery and mitigating social damages to your character and reputation.

You often hear phrases like "network segmentation" and "digital distancing" in business-centric cybersecurity conversations, rarely regarding internet security for the individual user. That's because the average user wasnt as big a target as they are now. But, since you might be working remotely from home, studying online, or working on a personal project, your data is much more valuable than it used to be10 years ago.

Applying digital distancing to a single user instead of a business corporation with dozens of employees differs in execution but not in concept.

Security measureslike this used to demand exceptional levels of skill and expertise, making it unavailable to the average user.Now that technology has became more wide-spread, anyone can implement a degree of digital distancing that best works for them.

Digital distancing forindividualsdoesntrequire technical elementsit's about behavioral changes and rules you set for your online activity to ensure maximum security.

Separating your devices and accounts doesnt need to have any specialized monitoring software as its easy to do it manually using readily-available tools.

If possible, use separate work/school and entertainment devices. This helps keep your most valuable data isolated in case of an attack, which is more likely to originate from the device you use for casual browsing than work orstudying.

You should use separate accounts for separate purposes. While those dont have to be strictly separated by the type of use, they limit the damages if your logins happen to be in a data leak.

A VPN doesnt only come in handy when watching Netflix. Learn how to use your VPN as it encrypts the data leaving your device into the open internet and masks your IP address.

Not to mention, most VPNs now come with built-in malware and spyware detectors, creating an additional layer of security while browsing even the most suspicious of websites.

One key element of digital distancing is using different passwords between accounts to keep them secure in case one is breached. A password manager keeps all of your passwords locked securely behind a single master password.

You might be worried that a cybercriminal can use a brute-force attack or similar to effectively guess your password andgain access to all of your logins. You could use two password managers if this concerns you; however, you need to make sure youuse multiple password vaults under different credentials. Otherwise, the risk is still there.

Nonetheless, a sole password manager should be fine.

MFA is your failsafe if one of your passwords is stolen. Using MFA is akin to implementing an additional login requirement that a hacker won't be able to bypass as easily. MFA comes in the form of text messages, emails, physical keys, or on-device authentication apps.

Using one or more authentication method should correlate to your threat model and how valuable an account or device is.

The goal of digital distancing is to limit communication betweenservicesto isolate them. Regular cross-device and cross-account syncing does the exact opposite. It links and shares data between devices and accounts openly and regularly.

Instead ofstopping synchronization altogether, limit it to a smaller number of accounts and devices and use it only when necessary. You can also replace direct file syncing with using secure cloud storage where you manually input a passwordand preferably an additional authentication methodto access data.

An Internet of Things (IoT) device is any device that connects to the internet. This could be a printer, thermostat, or smart assistant.

While most IoT devices promise maximum security, according to NETSCOUTSs Threat Intelligence Report, it takes an average of five minutes for an IoT device to get attacked after it goes online.

You should aim to keep your IoT devices offline as often as possible. Otherwise, heres what you can do:

The kill-switch could be automatic; for instance, after a certain number of failed login attempts, using geographical location boundaries, or manual through remote access. These methods allow you to permanently dispose of private data stored on a lost or stolen device.

That way, you can eliminate the trails a hacker or thief can follow to your other devices and accounts through crumbs you might have accidentally left behind as well as keep your personal files private.

Just be careful your information isn't completely lost,so back them up regularly.

The more secure your files are, the less convenient using your accounts and devices becomes. Thats why instead of going overboard and exhausting yourself with strict security measures, start slow and do what's necessary to your situation.

Secure your most valuable accounts first, such as your email, cloud storage, and password manager.

Image Credit: Unsplash.

You need specialized search engines to find legal torrents, foreclosed houses, public records, and even UFOs. Enter the dark web.

Anina is a freelance technology and internet security writer at MakeUseOf. She started writing in cybersecurity 3 years ago in hopes of making it more accessible to the average person. Keen on learning new things and a huge astronomy nerd.

Join our newsletter for tech tips, reviews, free ebooks, and exclusive deals!

Please confirm your email address in the email we just sent you.

Continued here:
Stay Safe Online: What You Need To Know About Digital Distancing - MakeUseOf

Read More..

Local Governments and States of the United States Solar Winds | Now – DodoFinance

The US Internet Security Agency (CISA) says a recent cyber attack on the US government has hit private US and local governments.

Hackers were able to hijack Solar Winds security software and hack into the federal governments network. The breach affected networks within the federal government, individual states and local governments, and within key infrastructure and business organizations, CISA wrote in a statement on its website.

U.S. The company announced last week that government agencies and critical infrastructure were affected, but did not name individual states or local governments at the time. Sisa did not immediately respond to requests for further details.

Intelligence MPs, Foreign Secretary Mike Pompeo and Justice Secretary Bill Barr have blamed Russia for the attack. However, some officials believe it is too early to say for sure who carried out the cyber attack.

Future US President Joe Biden has warned that those behind cyber attacks could face severe punishment. As President I want our adversaries to know that I do not see cyber attacks on our nation.

Explorer. Devoted travel specialist. Web expert. Organizer. Social media geek. Coffee enthusiast. Extreme troublemaker. Food trailblazer. Total bacon buff.

See the rest here:
Local Governments and States of the United States Solar Winds | Now - DodoFinance

Read More..