Page 3,864«..1020..3,8633,8643,8653,866..3,8703,880..»

X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020 – Security Intelligence

The volume of threats that security teams see on a daily basis can make it especially difficult to look at the big picture when it comes to developing an effective cybersecurity strategy. To see through the flood of data and alerts, organizations depend on actionable threat intelligence to help them understand and mitigate risks. Looking at long-term trends can also help organizations make effective decisions for allocating resources to prevent costly breaches, ransomware and destructive attacks.

IBMs annual X-Force Threat Intelligence Index presents an overview of the threat landscape and cybersecurity risk trends of the past year, based on IBM X-Force analysis of data from hundreds of millions of IBM Security-protected endpoints and servers, spam sensors, IBM Security managed services, red team, and incident response engagements.

IBM X-Force research teams came together to look at the trends that shaped the information security landscape in 2019, following the data to highlight the most prominent trends that can help organizations better assess risk factors, understand relevant threats and bolster their security strategy in 2020 and beyond.

Among the findings in this years X-Force Threat Intelligence Index, a few stand out: the most common attack vectors, the evolution of ransomware and malware, and the risks posed by accidental breaches caused by factors such as misconfigurations, inadvertent insiders, and old, continually exploited software vulnerabilities. New data from 2019 also showed a trend toward attacks on operational technology (OT), posing threats to industries such as energy and manufacturing. Finally, this years report provides geographic insights to show how threats vary by country or region.

With access to billions of compromised records over the past decade, rampant credential reuse and an ever-growing number of unpatched vulnerabilities to prey on, attackers took the path of least resistance through a number of ways to gain access and compromise organizations security.

According to data in this years report, initial infection vectors used by attackers were fairly evenly divided between phishing attacks, unauthorized use of credentials and exploitation of vulnerabilities. Out of the top attack vectors in 2019, 31 percent of attacks relied on phishing (down from about half of attacks in 2018). The share of attacks using stolen credentials in 2019 was close behind at 29 percent. Meanwhile, attacks on known vulnerabilities increased significantly as a share of the top attack vectors, up to 30 percent in 2019 versus 8 percent in 2018.

Ransomware attacks have been an increasing issue in the past five years, and in 2019, this threat evolved into an all-out digital hostage crisis. When companies are not paying millions for a decryption key, they may see their data destroyed or published on the internet, or they may even become the victims of a destructive attack as retaliation for not paying criminals.

Our data shows a considerable rise in ransomware incidents in 2019, almost doubling between the second half of 2018 (10 percent) and the first half of 2019 (19 percent). Ransomware affected companies in a large variety of industries, in both the public and private sectors and 12 countries across the globe. Top targets for these attacks were retailers, manufacturing and transportation, sectors where downtime is detrimental to operations, which adds to the pressure to pay. Another potential reason could include the ease of exploitation of legacy systems and lax security programs in some sectors.

Healthcare organizations also faced the wrath of ransomware in 2019, and with attacks on the industry affecting a large number of facilities, the threat to human lives compelled organizations to pay to regain operational capabilities.

One of the biggest drivers of ransomware becoming a prolific threat to organizations in 2019 was the move of organized cybercrime gangs from the banking Trojan realms into the enterprise attack arena. Banking Trojan operators are already known to be professional, sophisticated attackers who operate as a business. These capabilities, combined with access to already-compromised networks and an ability to spread to pivotal assets, have given ransomware like Ryuk, DoppelPaymer, LockerGoga, Sodinokibi and MegaCortex the ability to extort victimized organizations for millions of dollars. Those who did not pay up often faced arduous recovery processes that were no less costly or faster.

Law enforcement continues to discourage companies from paying ransoms as a way to reduce the profitability of high-stakes attacks and deter attackers in the long run.

Of note in 2019 was code innovation in the malware arena. Attackers in this sphere constantly evolve their code to bypass security controls. According to data from Intezer, banking Trojans and ransomware showed the most innovation in their genetic code, with an increase in new (previously unobserved) code from 2018 to 2019. Some 45 percent of banking Trojan code was new in 2019, compared to 33 percent in 2018, while 36 percent of ransomware code was new in 2019, compared to 23 percent in 2018.

With over 8.5 billion records leaked or compromised in 2019, it was a big year for lost data. But could these numbers have been lower? Our analysis finds that of the more than 8.5 billion records breached in 2019, 86 percent were compromised via misconfigured assets, including cloud servers and a variety of other systems. The same issues affected only half of the records breached in 2018. As organizations move to the cloud, security must remain a high priority, especially when it comes to proper configuration, access rights and privileged account management (PAM).

More records exposed equals more credentials up for grabs that can be used as an initial entry point into businesses. It is high time for organizations to pay closer attention to these potential security gaps and favor automation to limit human error and misconfiguration.

OT attacks hit an all-time high. Malicious activity targeting operational technology assets, most notably industrial control systems (ICS), increased 2000 percent year-over-year in 2019, marking the largest number of attempted attacks on ICS and OT infrastructure in three years.

Tech and social media giants were the top spoofed brands in 2019, with attackers using various cybersquatting tactics to gain the trust of potential victims.

Nearly 60 percent of the top 10 spoofed brands identified were Google and YouTube domains, with Apple (15 percent) and Amazon (12 percent) coming in next. Facebook, Instagram, Netflix and Spotify were also among the top 10 spoofed brands.

With nearly 10 billion accounts combined, the top 10 spoofed brands listed in the report offer attackers a wide target pool, increasing the likelihood of credential theft and account takeover.

North America and Asia were the most targeted regions. For the first time this year, the X-Force Threat Intelligence Index included geo-centric insights on the threat trends weve seen on a regional basis. North America and Asia suffered the largest data losses, having seen 5 billion and 2 billion records compromised, respectively.

IBM X-Force research for this report has a truly global reach, based on insights and observations from monitoring over 70 billion security events per day in more than 130 countries. For more insights about the global threat landscape and the threats most relevant to your organization, download the X-Force Threat Intelligence Index and sign up for the webinar to dive deeper into the findings from this years report.

Download the X-Force Threat Intelligence Index 2020

See the article here:
X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020 - Security Intelligence

Read More..

The APAC data center market is expected to grow at a CAGR of over 3% during the period 20192025 – GlobeNewswire

New York, Feb. 14, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Data Center Market in APAC - Industry Outlook and Forecast 2020-2025" - https://www.reportlinker.com/p05830419/?utm_source=GNW Renewable Energy to Power Data Centers Increased Awareness to Improve Data Center Efficiency Growth in Data Center Traffic To aid in 200 GbE and 400 GbE Switch Procurement Increase in Submarine Fiber Cable Deployment

The APAC data center market is witnessing steady growth with continued investments from hyperscale and cloud service providers. In 2019, China and Hong Kong led the market in terms of data center development, followed by India, Australia, Japan, and Singapore. Apart from these countries, Indonesia, Thailand, and Malaysia made a sizable contribution toward growth. The implementation of 5G has commenced in several countries, which will have a significant impact on the market with telecommunication providers partnering with service providers in establishing edge data centers throughout the forecast period. The market is also witnessing significant investments in submarine cable projects from telecommunication service providers, and government entities with hyperscale operates are continuing to invest millions in improving submarine connectivity across regions aiding in the growth.

The introduction of artificial intelligence and machine learning workloads is expected to contribute over 40% in the infrastructure investment in APAC by 2025. Artificial intelligence and machine learning workloads will increase the demand for liquid-immersion and direct-to-chip cooling techniques that can support the density of up to 200 kW. Over 30% of Australian enterprises are involved in the use of AI-based infrastructure solutions as experimental as well as production workloads. The average size of a facility in the APAC region has increased considerably in the last two years. Several operators are involved in land acquisitions for future development, which, in turn, is propelling growth. ODM infrastructure solutions and all-flash storage arrays contribution to the market will continue to grow.

The report considers the present scenario of the APAC data center market during the forecast period and its market dynamics for the forecast period 2020?2025. It covers a detailed overview of several market growth enablers, restraints, and trends. The report profiles and examines leading companies and several other prominent companies operating in the market.

APAC Data Center Market: Segmentation

This research report includes detailed segmentation by IT infrastructure, electrical infrastructure, mechanical infrastructure, general construction, tier standards, and geography. With the adoption of IoT, artificial intelligence, and big data analytics, the demand for high-performance computing infrastructure is increasing. The demand for supercomputers is also increasing with the adoption increase in investment towards cryptocurrency mining. Moreover, the increasing development of facilities in China and Hong Kong and the implementation of a high-speed 5G network will boost the data center network market. Over 50% of the business IT budget is spent on the migration to cloud-based services in Australia, with IaaS spending leading the chart followed by SaaS. The Australian market will also witness the increased demand for managed data center services. IT infrastructure spending will be dominated by cloud-service providers.

The increasing adoption of IT infrastructure is a major driver in the data center market in India, with high adoption of servers, storage, and networking infrastructure. Around 70% of startups in India are adopting IoT in their business. Healthcare and manufacturing are popular verticals attracting a lot of investor interests. The IT Infrastructure market in Japan is gaining traction with the increasing popularity of cloud-based services, IoT, and AI. In Japan, the majority of facilities are having blade types of servers developed for the high-density computing environment. The increasing usage of social media platform in the region will lead to the development of new facilities to store data, which increase the demand for high-capacity storage solutions.

The construction of data centers with power capacity over 20 MW will increase the demand for high-capacity electrical infrastructure. Most facilities support rack power density of 5?10 kW; however, it is expected that new facilities will support a capacity of up to 20 kW during the forecast period. Multiple facilities with a power capacity of more than 10 MW are being implemented in Australia. Data center providers are investing in DRUPS systems with a capacity of around 1,500 kVA. Service providers are featuring lithium-ion batteries, which are likely to increase adoption in the market. The market in India has witnessed the installation of energy-efficient power infrastructure. The contribution of the power infrastructure segment is high because of the growth in the installation of 2N power infrastructure solutions among extensive facilities. The operators are also being prompted to support renewable energy sources to power their IT infrastructure.

Several APAC countries do not support the use of free cooling systems. The operators in this region are still highly dependent on traditional air-based cooling techniques in small facilities that are built as part of commercial complexes. The use of dual water feeds in data centers with on-site water treatment plants is fast gaining popularity in the region as a few countries such as India suffer from acute water shortage for cooling purposes. The increasing demand for ASHRAE and Uptime Institute certified infrastructure is likely to increase the importance of metrics such as power usage effectiveness, water-usage effectiveness, and carbon usage effectiveness during the forecast period. The use of air-based cooling will continue to co-exist in the APAC region because of the growth of small facilities.

China is leading in greenfield construction. There will be more likely to have brownfield developments in Hong Kong due to the space shortage during the forecast period. In terms of physical security, most service providers prefer four layers of safety, with a few engaging in the implementation of five-layer ones due to the increasing demand for colocation services. Australia is witnessing an increase in the construction of greenfield data center projects. Perth, Canberra, Brisbane, and Sydney are some of the major cities in Australia, where greenfield development is likely to increase. The need for DCIM software to monitor facilities will continue to grow as the need to improve operational efficiency is growing. The general construction market will witness an increased construction of data centers in Japan. However, the cost of developing new facilities in the country is high. The rest of the APAC market will witness the entry of new construction services providers with greenfield construction growing. Telecommunication service providers and government agencies are the major investors in Southeast countries.

Multiple facilities are being developed in this region as part of commercial buildings in major cities. This scenario will change in the future years as more standalone data center developments will be witnessed in regions such as Southeast Asia, India, and Rest of APAC during the forecast period. However, with the increase in greenfield development, the need for skilled labor will also grow. The labor shortage is not higher in APAC countries than in European and American regions. Mega data center development will provide a major boost to the revenue growth for local construction contractors and suppliers.

In the APAC region, several under-developed projects fall under the Tier III category. This trend is likely to continue during the forecast period, with many operators expected to move to the Tier IV category based on the growth in rack power density and critical applications. Data centers in Japan are likely to adopt the Uptime Institutes Tier III or Tier IV design with a minimum of N+N redundancy across infrastructures. Most facilities developed were Tier III and Tier IV standards in 2019.

Market Segmentation by IT Infrastructure Servers Storage NetworkMarket Segmentation by Electrical Infrastructure UPS Systems Generators Transfer Switches and Switchgears Rack PDU Other Electrical InfrastructuresMarket Segmentation by Mechanical Infrastructure Cooling Systemso CRAC & CRAH unitso Chiller Unitso Cooling Towers, Dry Coolers, & Condenserso Other Cooling Units Racks Others Mechanical InfrastructureMarket Segmentation by General Construction Building Development Installation and Commissioning Services Building Designs Physical Security DCIM & BMSMarket Segmentation by Tier Standards Tier I &II Tier III Tier IV

Insights by Geography

The deployment of data centers in China & Hong Kong is likely to exceed supply due to the increasing demand for cloud-based services, big data analytics, and IoT. China is the worlds largest IoT market, with 64% of the 1.5 billion global cellular connections. The market in Hong Kong is witnessing investments YOY, which is aiding the country to emerge as one of the major data center hubs in the world. The submarine cable deployment in Australia will boost facility growth. In 2019, submarine fiber cable projects were INDIGO-Central and INDIGO-West, which connect Australia, Indonesia, and Singapore will contribute to the increase in network traffic.

The data center market in India is one of the fastest-growing in the APAC region. India witnessed continuous investment in cloud adoption and big data analytics from small and medium-sized industries in 2019. Government initiatives such as Digital India are the major contributor to the data center investment growth in the market. The market has also witnessed an increase in the number of new service providers offering hosting, storage, colocation services, and disaster recovery services.

Key Countries China and Hong Kong Australia and New Zealand India Japan Rest of Asia Southeast Asia Singapore Malaysia Thailand Indonesia Other Southeast Asian Countries

Key Vendor AnalysisThe APAC data center market is witnessing a steady growth in terms of IT infrastructure procurement, greenfield, brownfield, and modular data center development as well as the high adoption of efficient, scalable, flexible, and reliable infrastructure solutions.

Moreover, the market has a strong presence of vendors in the three categories: IT infrastructure, support infrastructure, and data center investors. From the IT infrastructure perspective, the contribution from APAC based infrastructure providers as well as global providers is almost equal. The increasing competition will prompt vendors to reduce the price of solutions, namely, SSDs and Ethernet Switches to gain major shares. The market is witnessing the growth of data centers that are keen to reduce power and water consumption and decrease carbon dioxide emissions. This will increase the demand for energy-efficient and innovation power and cooling infrastructure solutions. Partnership with facility operators will play a vital role in gaining market share. It is because the majority of the providers in the regions have planned to invest millions of dollars in new facility development.

Key Data Center Critical (IT) Infrastructure Providers Hewlett Packard Enterprise (HPE) Cisco Dell Technologies Huawei IBM Inspur

Key Data Center Support Infrastructure Providers ABB Eaton Rittal Schneider Electric STULZ Vertiv Caterpillar Cummins

Key Data Center Contractors AECOM Arup Aurecon CSF Group DSCO Group M+W Group Nikom Infrasolutions NTT FACILITIES Group

Key Data Center Investors Apple AWS (Amazon Web Services) GDS Holdings Google Digital Realty Equinix NEXTDC NTT Communications ST TELEMEDIA GLOBAL DATA CENTERS (STT GDC)

Other Prominent Critical (IT) Infrastructure Providers Arista, Atos, Broadcom, Extreme Network, Hitachi Vantara, Inventec, Juniper, Lenovo, NEC, NetApp, Oracle, Pure Storage, Quanta Cloud Technology (Quanta Computer), Super Micro Computer, and Wistron (Wiwynn)

Other Prominent Support Infrastructure Providers Airedale Air Conditioning, Alfa Laval, Asetek, Bosch Security Systems (Robert Bosch), Cyber Power Systems, Delta Group, Euro-Diesel (KINOLT), Green Revolution Cooling (GRC), Hitech Power Protection, KOHLER (SDMO), Legrand, Nlyte Software, Mitsubishi, MTU On Site Energy (Rolls-Royce Power Systems AG), Socomec, and Trane (Ingersoll Rand)

Other Prominent Construction Contractors DPR Construction, Corgan, CSF Group, Cundall, Faithful+Gould, Flex Enclosure, Fortis Construction, Hutchinson Builders, ISG, Larsen & Turbo (L&T), Linesight, LSK Engineering, Nakano Corporation, Obayashi Corporation, and Red-Engineering

Other Prominent Data Center Investors - Bridge Data Centres, Canberra Data Centres, Chayora, China Unicom, CtrlS, FPT (Frasers Property Thailand), Global Switch, Internet Initiative Japan Inc. (IIJ), Keppel Data Centres, Neo Telemedia, Pi DATACENTERS, Reliance Communications (GLOBAL CLOUD XCHANGE), Sify Technologies, Space DC, Tenglong Holdings Group (Tamron), and Yotta Infrastructure

Key Market Insights IncludeThe report provides the following insights into the data center market in APAC during the forecast period 20202025.1. It offers comprehensive insights into current industry trends, forecast, and growth drivers in the APAC data center market.2. The report provides the latest analysis of share, growth drivers, challenges, and investment opportunities.3. It offers a complete overview of segments and the regional outlook of the APAC data center market.4. The study offers a detailed overview of the vendor landscape, competitive analysis, and key strategies to gain competitive advantage.Read the full report: https://www.reportlinker.com/p05830419/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

See the article here:
The APAC data center market is expected to grow at a CAGR of over 3% during the period 20192025 - GlobeNewswire

Read More..

Quantum Computing Market 2019 Analysis by Key Players, Share, Trend, Segmentation and Forecast to 2026 – Instant Tech News

Verified Market Research recently added a research report titled, Quantum Computing Market Size and Forecast to 2026. The research report represents the potential growth opportunities that prevail within the global market. The report is analyzed on the idea of secondary research methodologies acquired from historic and forecast data. The Quantum Computing market is expected to grow substantially and thrive in terms of volume and value during the forecast period. The report will provide an insight into the growth opportunities and restraints that construct the market. Readers can gain meaningful comprehension about the future of the market.

Global Quantum Computing Market was valued at USD 89.35 million in 2016 and is projected to reach USD 948.82 million by 2025, growing at a CAGR of 30.02% from 2017 to 2025.

Request a Sample of this report @ https://www.verifiedmarketresearch.com/download-sample/?rid=24845&utm_source=OMR&utm_medium=005

Top 10 Companies in the Quantum Computing Market Research Report:

QC Ware Corp., D-Wave Systems, Cambridge Quantum Computing, IBM Corporation, Magiq Technologies, Qxbranch, Research at Google Google, Rigetti Computing, Station Q Microsoft Corporation, 1qb Information Technologies

Competitive Landscape

The insightful research report on the Quantum Computing market includes Porters five forces analysis and SWOT analysis to understand the factors impacting consumer and supplier behavior. It helps the reader understand the strategies and collaborations that players are that specialize in combat competition within the market. The comprehensive report provides a big microscopic check out the market. The reader can identify the footprints of the manufacturers by knowing about the worldwide revenue of manufacturers, the worldwide price of manufacturers, and production by manufacturers during the forecast period of 2015 to 2019.

Global Quantum Computing Market: Drivers and Restraints

The report offers underlying drivers that compel the consumers to take a position within the products and services. The detailed information assists readers in understanding the requirements of consumer demands. The report provides drivers at the local and global levels to assist determine the economic process . This information will help readers decide potential strategies that can help them stay ahead in the competitive industry.

Restraints provided in this section of the report contrasts the drivers segment as it explains the factors that can hamper the growth of the Quantum Computing market during the forecast period. Restraints play a pivotal role in the global and regional market as it bends the prospective opportunities in the market. Readers can weigh and asses the drivers and restraints before making any investments or strategies.

Global Quantum Computing Market: Segment Analysis

The report includes major segments like product type and end-user that provide an array of components that determine the portfolio of the Quantum Computing industry. Each type furnishes information regarding the sales value during the forecast period. The understanding of the segment directs the readers in recognizing the importance of things that shape the market growth.

Global Quantum Computing Market: Regional Analysis

This section of the report provides detailed information about each region and how numerous factors of that particular region affect the growth of the Quantum Computing market. The government policies, weather, politics, and other factors determine the longer term of the market differently in each region. The major regions covered in the report include North America, Europe, Asia Pacific, the Middle East, and Africa, and others.

Ask for Discount @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=24845&utm_source=OMR&utm_medium=005

Table of Content

1 Introduction of Quantum Computing Market

1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Quantum Computing Market Outlook

4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Quantum Computing Market, By Deployment Model

5.1 Overview

6 Quantum Computing Market, By Solution

6.1 Overview

7 Quantum Computing Market, By Vertical

7.1 Overview

8 Quantum Computing Market, By Geography

8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Quantum Computing Market Competitive Landscape

9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix

11.1 Related Research

Get a Complete Market Report in your Inbox within 24 hours @ https://www.verifiedmarketresearch.com/product/Quantum-Computing-Market/?utm_source=OMR&utm_medium=005

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

TAGS: Quantum Computing Market Size, Quantum Computing Market Growth, Quantum Computing Market Forecast, Quantum Computing Market Analysis, Quantum Computing Market Trends, Quantum Computing Market

Read more:
Quantum Computing Market 2019 Analysis by Key Players, Share, Trend, Segmentation and Forecast to 2026 - Instant Tech News

Read More..

Chinese researchers smash the record for realising two entangled quantum memories at maximum distance – www.computing.co.uk

Quantum entanglement is a phenomenon in which two particles become indistinguishably linked

A Chinese research team claims to have smashed the previous record for maintaining two quantum memories in an entangled state at maximum distance.

According to the researchers, they were able to realise entanglement of two quantum memories over 22 kilometres of field-deployed fibres via two-photon interference. With this feat, they smashed the 1.3-kilometre record achieved during previous quantum memory experiments.

The researchers said that they were also able to achieve entanglement over 50 kilometres of coiled fibres via single-photon interference.

The researchers used two quantum memories that were each made of about 100 million extremely cold rubidium atoms

Quantum entanglement is a phenomenon in which two particles become indistinguishably linked, and whatever happens to one particle instantly affects the other, irrespective of the distance between them.

According to the researchers, entanglement can be used to create encrypted communications channels that are secured against hacking by the laws of quantum physics.

Researchers earlier realised entanglement of individual photons across distances beyond 1,000 kilometres. But, entanglement becomes much harder to achieve for larger systems of particles.

In the current study, the researchers used two quantum memories that were each made of about 100 million extremely cold rubidium atoms.

The team entangled the quantum state of each system with the state of a single photon and then sent both photons through the fibre-optic cables

They encoded information onto the clouds of atoms and then extracted a photon from each cloud. The team entangled the quantum state of each system with the state of a single photon and then sent both photons through the fibre-optic cables.

When Bell measurement was performed simultaneously on two photons, the quantum memories with which the photons were paired became entangled to one another.

In this experiment, the entanglement of two quantum memories was maintained over 22 kilometres of fibre-optic cable, installed underground.

In another experiment, the team managed to entangle quantum memories across 50 kilometres using cables that were coiled up in the lab.

"Our experiment could be extended to nodes physically separated by similar distances, which would thus form a functional segment of the atomic quantum network, paving the way towards establishing atomic entanglement over many nodes and over much longer distances," the researchers said.

The study was jointly conducted by researchers from the University of Science and Technology of China (USTC), Shanghai Institute of Microsystem and Information Technology, and Jinan Institute of Quantum Technology.

The detailed findings of the study are published in journal Nature.

Originally posted here:
Chinese researchers smash the record for realising two entangled quantum memories at maximum distance - http://www.computing.co.uk

Read More..

Cyber Security Today The latest FBI Internet crime report, adware on the rise, attacks on Wi-Fi and more – IT World Canada

The latest FBI Internet crime report, adware on the rise, attacks on Wi-Fi and more.

Welcome to Cyber Security Today. Its Friday February 14th. Im Howard Solomon, contributing reporter on cyber security for ITWorldCanada.com.

The FBI this week released its annual statistics report for complaints about Internet-related crime. The biggest concern is the rise of business email compromise fraud. Thats fraud where an organization gets an email from what appears to be a legitimate firm asking to change the bank account funds are usually sent to. A new wrinkle on this scam is an email appears to come from an employee asking that their direct deposit switch to a different bank. Last year the FBI received over 23,000 complaints about these scams with adjusted losses of over US$1.7 billion. The agency reminds organizations of the importance of verifying bank account change requests coming by email or over the phone.

There are lots of ways to hack personal computers and smartphones, but malicious online ads, called adware, are increasingly being used by crooks. According to a recent report by security vendor Malwarebytes, seven of the top 10 threats against Windows users were delivered through adware. Adware is delivered in many ways, usually through popup ads that suddenly appear on your screen offering miracle weight loss programs, get rich quick schemes or phony warnings your device has been infected. Click on one of these and it likely leads to the downloading of serious malware. Often you get infected with adware by downloading a dodgy program perhaps offering a free app although you can also be infected by visiting a dodgy website. So be careful what you download and the sites you visit.

Adware also comes from downloading a bad browser extension. An extension is a plug-in to a browser that act as a utility. After an initial investigation by vendor Cisco Systems, Google this week said it removed 500 extensions for the Chrome browser from the Google Chrome Web Store. These extensions may have been downloaded by 1.7 million people. Some of them may have been available for download for over a year. Google has fraud detection mechanisms for bad extensions, but these got missed. Google is now using a Cisco tool created to detect bad extensions. It also has new data privacy guidelines for developers who want to put extensions in its store.

Its bad enough that hackers may be able to compromise business systems. A new report says one piece of malware can jump to a corporate Wi-Fi network and infect more devices. A security company called Binary Defense says malware known to experts as Emotet has the capability. After infecting a system it looks for Wi-Fi routers and tries to break into them by cracking their passwords. This may have been going on unknown by the security industry for two years. Network administrators must make sure corporate Wi-Fi routers are using strong passwords and monitor networks for suspicious behavior.

Finally, April 1st is census day in the United States. However, with six and a half weeks to go the Census Bureau isnt quite ready. A government watchdog reported this week that there are still a number of IT systems with high or very high-risk cyber security bugs. That can be expected in any system. The problem is staff arent meeting deadlines for fixing bugs. Some are taking more than 60 days, and there are less than 60 days to Census Day. The Census Bureau says its working to meet the deadlines for fixing vulnerabilities.

Thats it for Cyber Security Today. Links to details about these stories can be found in the text version of each podcast at ITWorldCanada.com. Thats where youll also find my news stories aimed at businesses and cyber security professionals. Cyber Security Today can be heard on Mondays, Wednesdays and Fridays. Subscribe on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker. Thanks for listening. Im Howard Solomon

See more here:
Cyber Security Today The latest FBI Internet crime report, adware on the rise, attacks on Wi-Fi and more - IT World Canada

Read More..

Antivirus Is Not Enough in 2020: Here is Why – laprogressive.com

The complexity of digital threats improves along with the advancement of security tools and vice versa. As we learn to protect our devices from attacks, hackers come up with more sophisticated ways of getting what they need. Therefore, its a never-ending war. And the worst thing is that the security industry doesnt quite manage to keep up with how fast hackers evolve.

So the best thing you can do now is to protect yourself from as many threats as possible. To do that you need to know what can actually threaten your privacy. Then you will be able to understand your security needs, and questions like is Avast good wont be on your agenda anymore. You will be able to figure out the answer by just quickly scanning the review.

A decade ago, we were talking about worms and Trojans; today, the variety of threats expands way beyond these two.

A decade ago, we were talking about worms and Trojans; today, the variety of threats expands way beyond these two. We have ransomware that is a pain to get rid of. There is phishing that also became more advanced thanks to the data we post on social media and web scraping. Cryptocurrency resulted in a new kind of threat called cryptojacking that allows hackers to use your device to mine crypto. And thats just a glimpse into all the kinds of cyber attacks you might encounter on your way.

A basic antivirus is unable to handle all the threats. Thats why cybersecurity companies create Internet security suites that offer many functions and can safeguard users from as many kinds of attacks as possible.

A zero-day exploit is the first use of a software flaw. For example, the developer introduces a new program everyone installs. Hackers inspect it to find any vulnerabilities they could use. And when they find one and they usually do they crawl through it into the users system to get the data they need. While theyre doing that, no one is quite aware of whats going on because no one knows about the vulnerability yet.

Another example of a zero-day threat would be new malware thats not registered in the database. Simple antiviruses rely solely on virus databases, and until the threat is not registered there, the program is unable to detect it.

Modern complex antiviruses can detect certain behavioral patterns and understand that something is wrong. Advanced security suites even use artificial intelligence to improve the detection of zero-day exploits. You cant trust the antivirus that depends only on the virus database anymore. You need smart programs that can analyze the system and detect threats without referring to databases.

Back in time, we had only a desktop computer to worry about. Now we have smartphones, tablets, smartwatches, fridges The list can go on for a long time. The Internet of Things is great and terrifying at the same time. Its amazing because we get to worry less about some small things tech can take care of them. But at the same time, such devices become new targets for hackers. They can use them to get into your home network or for any other purposes.

Therefore, ideally, the Internet security suite should defend the whole network, not just separate devices. And a simple antivirus cant do that.

Using public WiFi without any precautions is pretty much like using a public toilet without washing your hands afterward. Routers in cafes, airports, hotels, and other public places are rarely protected. No one takes care of the system updates or any security measures. Thus, such routers are easy for hackers to get into them. And once they do, they can see and crawl into every device thats connected to the network.

A VPN service is a tool that will help you here. It will hide your factual data. Therefore, malefactors wont be able to get into your device. They will see that someone who is using a VPN is connected to the network, but they will lack the information they need to hack the device.

Most Internet security suites offer a VPN feature because of that. And its nice to have all the protection tools in one place.

As you can see, you need to safeguard your devices much more thoroughly today using different instruments. You could assemble a hand-made security suite by getting all the tools separately. But many ready-to-use solutions will cover all your needs. We advise you to consider them because theyre easier to work with and because security companies made sure everything works efficiently in a suite.

Audrey Sem

Sponsored

Read more:
Antivirus Is Not Enough in 2020: Here is Why - laprogressive.com

Read More..

Indias proposed internet regulations can threaten privacy everywhere – The News International

Indias proposed internet regulations can threaten privacy everywhere

ISLAMABAD: India this week is poised to unveil new rules that threaten encrypted communications around the world, it seems safe to say that the encryption fight is now fully underway, foreign media reported on Friday.

Messaging products that are end-to-end encrypted can be read only by the sender and the recipient. The encrypted platform itself such as Apples iCloud, or Facebooks WhatsApp cant read the message, because it doesnt have a key. This has led to periodic attempts from law enforcement agencies and lawmakers to force platforms to create so-called backdoors that would allow them to snoop on the contents of those messages. But the platforms have resisted, and the issue has generally been in a stalemate.

The Indian government has often taken a draconian approach to regulating the web shutting down internet access at least 95 times last year, including an indefinite shutdown in Kashmir that a judge called an abuse of power earlier this year.

Now a set of rules proposed a little over a year ago would force tech platforms to cooperate continuously with government requests, without requiring so much as a warrant or court order. Among the requirements is that any post be traceable to its origin. And in what is believed to be a world first, the rules would require tech companies to do the investigating to deploy their sophisticated tools to track a posts spread on their network back to its point of origin, and then turn that information over to law enforcement.

This is quite different from the current approach, in which law enforcement identifies a suspect and then asks platforms to supply information about them. Now tech companies could essentially be required to serve as deputies of the state, conducting investigations on behalf of law enforcement, without so much as a court order.

That almost certainly means breaking encryption how else could tech companies be expected to trace the source of a message? Imagine Clearview AI, but as a service tech companies are required to provide to law enforcement for free.

The final rules are expected to be released imminently, Saritha Roi reports in Bloomberg:

The Ministry of Electronics and Information Technology is expected to publish the new rules later this month without major changes, according to a government official familiar with the matter.

The provisions in the earlier draft had required platforms such as Googles YouTube or ByteDance Inc.s TikTok, Facebook or its Instagram and WhatsApp apps, to help the government trace the origins of a post within 72 hours of a request. The companies would also have to preserve their records for at least 180 days to aid government investigators, establish a brick-and-mortar operation within India and appoint both a grievance officer to deal with user complaints and a government liaison. The rules would apply to any app with more than 5 million users, including Facebook, YouTube, Twitter, and TikTok. Bloomberg reports that its not clear whether the identities of foreign users would be exempt.

The tech companies are fighting back. A trade group has argued that the rules would represent a severe violation of Indian citizens privacy, and they would almost certainly sue if the rules were implemented as written. But theres no guarantee that theyll win. And if these rules take effect India wont be the last democracy to implement them. Tech companies will come under increasing pressure to implement a similar system in other Western countries. (Australia seems poised to try to break encryption as well.)

What happens if encryption supporters lose? First, privacy is diminished for billions of users including for activists, dissidents, victims of domestic abuse, businesses, and even government workers who have come to rely on secure messaging.

Second, the move could hurt the tech sector both in India and abroad by making it prohibitively expensive to launch a new business. Who can afford to build a compliance regime that requires the company to accommodate any government request, no matter how small, from day one? In practice, the answer is likely to be only incumbents. Hannah Quay-de la Vallee makes this point here:

If this rule is implemented in India (and potentially copied by other nations) it could force companies to create two types of systems one that uses e2e and one that doesnt. Companies might well justifiably balk at the cost and complexity of that approach and simply build less secure systems. That would weaken the overall safety of the internet ecosystem, harming users around the globe. Alternatively they could remove themselves from the Indian market altogether, depriving 1.2 billion people of state-of-the-art internet security. Neither of these are good outcomes.

See the original post:
Indias proposed internet regulations can threaten privacy everywhere - The News International

Read More..

FBI: Cybercrime losses tripled over the last 5 years – We Live Security

On the upside, the Bureau recovered more than US$300 million in funds lost to online scams last year

In 2019, the United States Federal Bureau of Investigation (FBI) received more than 467,000 cybercrime complaints that caused an estimated US$3.5 billion in losses, according to the Bureaus annual 2019 Internet Crime Report (IC3). Last year saw both the highest number of complaints and the highest dollar losses on record; in 2015, for example, annual losses totaled only US$1.1 billion.

Business Email Compromise (BEC) fraud remains the costliest type of fraud on the list, accounting for more than half of the total losses and costing businesses almost US$1.8 billion. These schemes are constantly evolving, too. Back in 2013, scammers would typically hack or spoof the email account of a CEO or CFO to request a fraudulent transfer of funds to accounts under their control. Over the years the tactics have evolved to also include compromising personal or vendor emails as well as spoofing lawyers email accounts.

Payroll diversion emerged as a popular form of BEC fraud last year. Scammers target HR and payroll departments by acting as employees who want to update their direct deposit information for the current payment period. The updated information then usually directs the funds to a pre-paid card account.

Elder fraud is also an increasingly pressing issue. With 68,013 victims, this type of fraud had the highest number of victims; under-twenties claimed just 10,724 victims. The number of victims may not reflect the true extent of the problem since providing the age range is voluntary.

Seniors are often the targets of romance, tech support, government impersonation and lottery scams. Victims of these schemes have been defrauded out of over US$835 million. Romance and confidence fraud alone account for almost half a billion dollars in losses, with the FBI estimating that up to 30% of romance fraud victims had been used as money mules.

RELATED READING: Cybersecurity Barometer: Cybercrimes impact on privacy and security

Tech support fraud remains a growing problem as scammers attempt to defraud their victims by contacting them under the pretense of resolving a non-existing technical issue with their software licenses or bank accounts.

Recently, however, scammers have started impersonating representatives of well-known travel companies, financial institutions or virtual currency exchanges. Tech support fraud has claimed approximately US$54 million in losses in 2019, a 40% increase compared to the previous year, with most victims falling into the over-60 age category.

Meanwhile, losses emanating from ransomware reached around US$9 billion, almost triple the losses incurred in 2018. The number of reported victims also rose to about 2,000 compared to 1,500 from 2018. While phishing was still the most widespread problem claiming 114,072 victims last year, non-payment and non-delivery scams came in second with about half the number of victims being 61,832.

Not to end on a bleak note, the FBIs Recovery Asset Team (RAT) helped retrieve almost US$305 million lost in scams, giving it a 79% return rate of reported losses.

Excerpt from:
FBI: Cybercrime losses tripled over the last 5 years - We Live Security

Read More..

Indias proposed internet regulations could threaten privacy everywhere – The Verge

In December, after a somewhat bruising Senate hearing with Facebook, I argued that the fight over encryption was just beginning. This week, with India poised to unveil new rules that threaten encrypted communications around the world, it seems safe to say that the encryption fight is now fully underway.

First, some background.

Messaging products that are end-to-end encrypted can be read only by the sender and the recipient. The encrypted platform itself such as Apples iCloud, or Facebooks WhatsApp cant read the message, because it doesnt have a key. This has led to periodic attempts from law enforcement agencies and lawmakers to force platforms to create so-called backdoors that would allow them to snoop on the contents of those messages. But the platforms have resisted, and the issue has generally been in a stalemate.

In India, though, things are moving very quickly to make end-to-end encryption illegal. The country has sought to exert more control over the internet in the wake of lynchings committed after false rumors spread on WhatsApp. But the Indian government has often taken a draconian approach to regulating the web shutting down internet access at least 95 times last year, including an indefinite shutdown in Kashmir that a judge called an abuse of power earlier this year.

Now a set of rules proposed a little over a year ago would force tech platforms to cooperate continuously with government requests, without requiring so much as a warrant or court order. Among the requirements is that any post be traceable to its origin. And in what is believed to be a world first, the rules would require tech companies to do the investigating to deploy their sophisticated tools to track a posts spread on their network back to its point of origin, and then turn that information over to law enforcement.

This is quite different from the current approach, in which law enforcement identifies a suspect and then asks platforms to supply information about them. Now tech companies could essentially be required to serve as deputies of the state, conducting investigations on behalf of law enforcement, without so much as a court order.

That almost certainly means breaking encryption how else could tech companies be expected to trace the source of a message? Imagine Clearview AI, but as a service tech companies are required to provide to law enforcement for free, and you start to understand what the Indian government is asking for here.

The final rules are expected to be released imminently, Saritha Roi reports in Bloomberg:

The Ministry of Electronics and Information Technology is expected to publish the new rules later this month without major changes, according to a government official familiar with the matter. [...]

The provisions in the earlier draft had required platforms such as Googles YouTube or ByteDance Inc.s TikTok, Facebook or its Instagram and WhatsApp apps, to help the government trace the origins of a post within 72 hours of a request. The companies would also have to preserve their records for at least 180 days to aid government investigators, establish a brick-and-mortar operation within India and appoint both a grievance officer to deal with user complaints and a government liaison.

The rules would apply to any app with more than 5 million users, including Facebook, YouTube, Twitter, and TikTok. Bloomberg reports that its not clear whether the identities of foreign users would be exempt.

The tech companies are fighting back. A trade group has argued that the rules would represent a severe violation of Indian citizens privacy, and they would almost certainly sue if the rules were implemented as written.

But theres no guarantee that theyll win. And if these rules take effect India wont be the last democracy to implement them. Tech companies will come under increasing pressure to implement a similar system in other Western countries. (Australia seems poised to try to break encryption as well.)

What happens if encryption supporters lose? First, privacy is diminished for billions of users including for activists, dissidents, victims of domestic abuse, businesses, and even government workers who have come to rely on secure messaging.

Second, the move could hurt the tech sector both in India and abroad by making it prohibitively expensive to launch a new business. Who can afford to build a compliance regime that requires the company to accommodate any government request, no matter how small, from day one? In practice, the answer is likely to be only incumbents. Hannah Quay-de la Vallee makes this point here:

If this rule is implemented in India (and potentially copied by other nations) it could force companies to create two types of systems one that uses e2e and one that doesnt. Companies might well justifiably balk at the cost and complexity of that approach and simply build less secure systems. That would weaken the overall safety of the internet ecosystem, harming users around the globe. Alternatively they could remove themselves from the Indian market altogether, depriving 1.2 billion people of state-of-the-art internet security. Neither of these are good outcomes.

Given how many things Americans have to worry about domestically, I understand how a story about Indian internet rules can fly under the radar. But its important to recognize that the spirit thats animating the discussion in India is alive and well in the United States. Threats to privacy are multiplying faster than tech or society can deal with them. In such a world, encryption is one of the last and best tools we have to fight back.

Today in news that could affect public perception of the big tech platforms.

Trending sideways: Facebooks fundraising features, which have led to more than $3 billion in donations since 2015, have generated significant goodwill. But nonprofits are complaining they dont receive enough data about donors to form long-lasting relationships.

Mike Bloomberg is paying some of the biggest meme-makers on the internet to post sponsored content on Instagram promoting his presidential campaign. Hes working with Meme 2020, a company formed by some of the people behind extremely influential accounts, like Mick Purzycki of Jerry Media. Taylor Lorenz at The New York Times has the scoop:

The campaign, which launched this week, has already placed sponsored posts on Instagram accounts including @GrapeJuiceBoys, a meme page with more than 2.7 million followers; Jerry Medias own most popular account, with more than 13.3 million followers; and @Tank.Sinatra, a member with more than 2.3 million followers.

The accounts all posted Bloomberg campaign ads in the form of fake direct messages from the candidate.

Larry Ellison, the founder of Oracle and one of the worlds richest men, is throwing a fundraiser for Donald Trump. Its the most significant display of support from a major tech titan for the president, by far. (Theodore Schleifer / Recode)

Senator Kirsten Gillibrand (D-NY) released a proposal to overhaul the way the US government regulates privacy. Her new Data Protection Act would create an independent agency to protect consumer data at large. (Makena Kelly / The Verge)

A court in Moscow fined Twitter and Facebook 4 million rubles each (a piddling $63,000) for refusing to store the personal data of Russian citizens on servers in their home country. Its the largest penalty imposed on Western technology companies yet under Russias new internet laws, which are designed to give the government more control over peoples online activity. (Associated Press)

A network of news sites is expanding across the country. Nearly 40 websites masquerading as conservative local news outlets were discovered in Michigan in October. Now, additional statewide networks have sprung up in Montana and Iowa. (Katherina Sourine and Dominick Sokotoff / The Michigan Daily)

A mobile voting app used in West Virginia has basic security flaws that could allow someone to see and intercept votes as theyre transmitted from mobile phones to the voting companys server. Its the latest evidence that digital voting solutions are not secure. (Kim Zetter / Vice)

Facebooks dataset of anonymized URLs, which is meant to help researchers study the impact of social media on democracy, is finally live. The project, which allows approved researchers to see every link shared on Facebook, is part of a research partnership with Social Science One. Gary King and Nathaniel Persily of Social Science One talk about why the launch took so long:

When Facebook originally agreed to make data available to academics through a structure we developed (King and Persily, 2019, GaryKing.org/partnerships) and Mark Zuckerberg testified about our idea before Congress, we thought this day would take about two months of work; it has taken twenty. Since the original Request for Proposals was announced, we have been able to approve large numbers of researchers, and we continue to do so. When this project began, we thought the political and legal aspects of our job were over, and we merely needed to identify, prepare, and document data for researchers with our Facebook counterparts. In fact, most of the last twenty months has involved negotiating with Facebook over their increasingly conservative views of privacy and the law, trying to get different groups within the company on the same page, and watching Facebook build an information security and data privacy infrastructure adequate to share data with academics.

Facebooks New Product Experimentation team released a Pinterest-like app for saving and sharing photos of activities like cooking and home improvement projects. The app, called Hobbi, is meant to help you document and remember the things you love to do. Pinterest stock dipped on the news. (Alex Heath / The Information)

Teens are creating thrifting communities on Instagram where they buy and sell clothes in photos and comments. Its like a modern-day eBay. (Mia Sato / Input)

Jeff Bezos bought the most expensive property in LA with an eighth of a percent of his net worth. It is literally impossible to imagine just how rich the wealthiest people on the planet are. (Bijan Stephen / The Verge)

Amazons first employee, Shel Kaphan, says breaking up the company could potentially make sense. In an interview for a new PBS Frontline documentary about Amazon, Kaphan said hes proud of what the company has become, but also conflicted. (Jason Del Rey / Recode)

In 2019, YouTube dominated 70 percent of the total time people spent on their phones watching the top five entertainment apps. Its success is something that companies like Netflix, WarnerMedia, NBCUniversal, and Disney will have to take into account as they compete for peoples attention. (Julia Alexander / The Verge)

The CEO of an AI startup with deep ties to the University of Michigan just stepped down from the company amid allegations of sexual misconduct. But hes still a professor at the school. (Zoe Schiffer / The Verge)

Ezra Kleins new book, Why Were Polarized, charts 50 years of American history to figure out why our political climate is the way it is. It turns out the answer is a lot more complicated than just social media. (Nicholas Thompson / Wired)

New social media advice when going through a breakup: Deactivate your accounts, have a trusted friend change the passwords, and avoid looking back for as long as you can stand it. (Katie Way / Vice)

Im sure theres relevant context here, but Ive decided that I dont care to look it up.

Send us tips, comments, questions, and your WhatsApp user ID: casey@theverge.com and zoe@theverge.com.

See the rest here:
Indias proposed internet regulations could threaten privacy everywhere - The Verge

Read More..

AIoT Convergence of Artificial Intelligence with the Internet of Things – EnterpriseTalk

Even though the full optimization of AI and the IoT is relatively far away, the two technologies are now being combined across industries in scenarios where problem-solving and information can improve outcomes for all stakeholders.

Last such great convergence occurred in the late 1990s as mobile phones and the internet collided to change the course of human history. The convergence of AI and the IoT will bring in a similar revolution on an even grander scale.

AIoT Helps Companies Garner the Real Value of IoT Data

The ability to capture data through IoT is a large scale evolution that has exploded on the scene over the past five years. These new advancements have been accompanied by new concerns and threats associated with privacy and security. Large volumes of confidential company information and user data are tempting targets for dark web hackers as well as the global government entities. The high level of risk has also brought in newer and more responsibilities that accompany the increased capability.

Sensors are now applied to almost everything. This indicates that infinitely more data can be collected from every transaction or process in real-time. IoT devices are the front line of the data collection process in manufacturing environments and also in the customer service departments. Any device with a chipset can potentially be connected to a network and begin streaming data 24/7.

Complex algorithms allow performing predictive analytics from all conceivable angles. Machine learning (ML), a subset of AI, continues to upgrade workflows and simplify problem-solving. Companies now capture all the meaningful data surrounding their processes and problems to develop specific solutions for real challenges within the organization, improving efficiency, reliability, and sustainability.

While IoT and AI are impressive superpowers in their own capacity, thanks to the concept of convergence, their power doubles as IoT enhances the value of AI allowing real-time connectivity, data exchange, and signaling. AI enriches the capabilities of the IoT by applying ML to improve decision making.

Artificial Intelligence Trends for the Modern Enterprise

Industries are now referring to this convergence as AIoT. Presently, many AIoT applications are relatively massive, as companies build the expertise and required systems to deploy for supporting these powerful technologies across their organizations. The future will witness this convergence allowing more optimization and networking, creating even more value.

Experts have predicted a full digital integration between computers and humans by the year 2030. Between this and ongoing advances in robotics and automation, up to 40% of the current workforce could be replaced by technology in the next 10-15 years, by 2023. The predictions continue as:

Hardware manufacturers and solutions providers are already in full swing to leverage this tech convergence and position themselves in a position of favor in the evolving industrial landscape. Innovative companies like Amazon are offering training and re-education opportunities for employees in soon-to-be-obsolete job functions with such technology convergence hitting the market.

IoT Technologies Drive Digital Transformation Strategies of Enterprises

Convergence is a concept everyone should become familiar with, as every technology, discoveries, and advances will witness convergence in the future to innovate and disrupt the way the industries function.

Originally posted here:
AIoT Convergence of Artificial Intelligence with the Internet of Things - EnterpriseTalk

Read More..