Home Blog Page 16

CISA sees adoption of zero trust become a priority in cybersecurity decree


Almost two months after President Joe Biden signed his executive order on cybersecurity implementing several sprints for agencies to strengthen their security posture, the Cybersecurity and Infrastructure Security Agency says a long-term vision for the adoption of zero trust between agencies is being focused.

Matt Hartman, CISA deputy executive assistant director for cybersecurity, said the cybersecurity executive order focuses on short-term sprints, but will result in strategies and roadmaps that will give cyber policy momentum in the rest of the Biden administration.

For example, he said the entire federal government should be able to make “significant progress” in implementing zero trust over the next three years.

“The administration fully recognizes that many of the fundamental issues that are addressed will only be resolved over time – literally years of focus and continued investment. It is my feeling, that as we come to the end of the 90 day EO calendar, we will have many lasting plans with additional milestones that the White House, OMB, CISA and others will continue to work on. lead over the next several years, for the duration of this administration, ”Hartman said last Wednesday, the Homeland Security and Law Enforcement Forum of the United States Council for Technology and Industry.

CISA, as part of the cyber executive decree Biden signed in May, implemented a zero trust maturity model that focuses on the five essential pillars for agencies – identity, device, network, application workload. and data.

Hartman said the transition to zero trust will partly hinge on agencies adopting automation solutions such as continuous validation and real-time machine learning analytics.

“As agencies move to optimal zero-trust implementations, their solutions will become more automated, they will integrate fully across the pillars, and they will become more dynamic in their policy enforcement decisions,” he said. -he declares.

But with more than 100 civilian agencies of varying sizes and maturity levels, Hartman said the executive order eschews a one-size-fits-all approach to moving to zero trust.

“For a lot of agencies, success will come down to starting small, not trying to boil the ocean all at once, staying nimble. Everyone to be successful here will need a top level champion, someone who is committed to overcoming obstacles and ensuring clear communications at all levels, ”he said.

Karl Mathias, chief information officer of the Marshals Service, said his agency and the rest of the Justice Department began to move towards zero trust long before the administration’s decree to better secure its operating environment. multi-cloud.

“The basic problem is that we’ve always been very network-focused on our security, so once you can penetrate the boundaries of the network, you tend to be able to move around. We like the idea that instead of depending on that network limit as your only defense, you go more to the application level, and you have this broker out there that says, “OK, I’m going to find out who you are. , and then I’ll make some decisions on where you’re from, and I’ll give you a score. And based on that score, we’ll decide whether you can access this app or not, ”Mathias said.

Later this month, agencies are due to submit plans to the OMB outlining how they plan to implement zero trust as a security infrastructure.

Meanwhile, the OE is asking the OMB and CISA, in collaboration with the General Services Administration and the Federal Risk Authorization and Management Program (FedRAMP), to develop a federal cloud security strategy focused on accelerating adoption of zero trust.

Iranga Kahangama, director of the National Security Council for Cyber ​​Incident Response, said the White House drafted the executive order in “direct response” to breach events such as the Solarwinds and Microsoft Exchange compromises.

“We have literally taken the hardships we have had as a federal government, trying to unbox and understand these incidents and really looking to lower the barrier in terms of information sharing, intelligence gathering and global detection. All of these lessons learned were applied very directly to this, ”Kahangama said.

CISA, under the executive order, recently submitted its recommendations for implementing enterprise-wide endpoint detection and response capabilities.

Hartman said CISA in the fourth quarter of fiscal 2021 is focused on purchasing capacity for agencies related to identity and access management. Deploy these capabilities via CDM and continue to work on an improved version of EINSTEIN One, which will provide a richer set of threat indicators.

“Speed ​​up some of these capabilities through CDM, which could have been useful in helping agencies detect accounts created that were not created by users in an appropriate manner,” Hartman said, referring to the detection of the breach. by SolarWinds.

Amid a growing array of cyber threats, Hartman said the CISA is well positioned to use its newfound authority to hunt down threats on agency networks. Congress authorized this capability in the National Defense Authorization Act last year.

“It’s CISA’s job and our responsibility to be able to bridge the gap between sectors and prevent threats from reaching their goals, or at least minimize the impact associated with those threats. So without the ability to detect threats at the host level, we just can’t do our jobs effectively, ”Hartman said.

Source link

Main commercial applications of the convolutional neural network


The main trends in business applications using convolutional neural network are mentioned here.

The convolutional neural network is a deep learning artificial neural network. The term “convolutional” designates a mathematical function derived by integration of two distinct functions. It is about grouping different elements into a coherent whole by multiplying them. Convolution describes how the other function influences the form of a function. CNN uses optical character recognition (OCR) to classify and group particular items like letters and numbers. Optical character recognition brings these elements together into a cohesive whole.

Using CNN in Image Classification

Image recognition and classification are the main area of ​​use of convolutional neural networks. CNN deconstructs an image and identifies its distinct characteristic. For this, the system uses a supervised machine learning classification algorithm. It reduces the description to its essential references. It is performed by an unsupervised machine learning algorithm. Image tagging algorithms are the most basic type of image classification. The image tag is a word or a combination of words that describes images and makes them easier to find. Google, Facebook and Amazon use this technique. It is also one of the founding elements of visual research.

Markup includes object recognition and even sentiment analysis of the tone of the image. The visual search technique involves matching an input image with the available database. Additionally, visual search analyzes the image and finds images with similar identifying information. For example, this is how Google can find versions of the same model but in different sizes. Recommendation engines are another area for applying image classification and object recognition. For example, Amazon uses CNN image recognition for the suggestions in the “You may also like” section. The basis of the hypothesis is the behavior expressed by the user. The products themselves are matched on visual criteria like red shoes and red lipstick for the red dress. Pinterest uses CNN image recognition in a different way. The business relies on visual identifier matching, which translates into a simple visual match supplemented by labeling.

Facial recognition app using CNN

The difference between direct image recognition and facial recognition is in the operational complexity, the extra layer of work involved. First, the shape of the face and its features are recognized. Then the characteristics of the face are analyzed further to identify its essential references. For example, it could be the shape of the nose, its skin tone, texture, or the presence of scars, hairs, or other abnormalities on the surface. The sum of these identifying information is calculated in the perception of the image data of the appearance of a particular human being. This process involves studying many samples that present the subject in a different form. For example, with or without sunglasses. In social media, facial recognition helps streamline the often dubious process of tagging people in the photo. In entertainment, facial recognition lays the foundation for further transformations and manipulations. Facebook Messenger filters and Snapchat Looksery filters are the most prominent examples. Filters jump from the automatically generated basic face layout and attach new elements or effects.

Optical character recognition using CNN

Optical character recognition was designed for processing written and printed symbols. Like facial recognition, it involves a more complicated process with moving moving parts. In this process, the image is scanned for items that look like written characters, they can be specific characters or in general. Then each character is broken down into critical identifying information that identifies it as such, such as a particular form of letters “S” or “Z”. Later, the image is matched to the respective character encoding. Recognized characters are compiled into the text according to the visual layout of an input image. Tagging images and additional descriptions of image content for better indexing and navigation use CNN. Ecommerce platforms, like Amazon, are using it for greater impact. Legal organizations, such as banks and insurance companies, use handwriting optical character recognition.

Share this article


About the Author

More info about the author

Source link

MyMobiForce Crowdsourcing Platform Raises $ 1.42 Million Pre-Series A Led By Bharat Inclusion Seed Fund


Read the article

Delhi-based MyMobiForce (Innotion Technologies Pvt. Ltd.) has raised $ 1.42 million (INR 10.3 crore) in a pre-Series A funding round led by Bharat Inclusion Seed Fund with the participation of Group of Angels led by Manu Iyer of Bluehill Capital, Acsys Investments and Ashutosh Agrawal (ex-urban enterprise).

MyMobiForce is an AI-powered crowdsourcing platform that enables businesses to scale efficiently by providing on-demand, on-demand technical workforce in a plug and play fashion. The company provides services to well-known brands and has so far achieved more than 2 million jobs through the platform. MyMobiForce has a pool of resources of 50,000 technical staff spread over 8,000 PIN codes in India.

MyMobiForce was created in 2018 by Dheeraj Khatter, Himanshu Kumar and Kshitiz Saini. The company is on a mission to transform the way technical field services are delivered globally. In this process, MyMobiForce helps concert workers with job opportunities, training that improves employment, and access to financial products such as insurance, savings and micro-loans.

The founder said in a joint statement: “MyMobiForce has doubled during the Covid period and has been successful in expanding operations to support 100 Plus customers. We will use the capital raised to train and empower 20,000 additional service technicians on 10,000 PIN codes. “

Commenting on the investment, Sanjay Jain, Partner at Bharat Inclusion Seed Fund, added: “India is still one of the least penetrated flexible workforce markets in the world, with only around 0.5% of the workforce. work used flexibly against 3 to 4% worldwide. With the increasing formalization of the economy, the GST, labor law reforms, Covid and the growing number of companies switching to flexi-staffing, Crowd Source platforms are ready for the next stage of long-term growth. We are really excited to partner with MyMobiForce; the company has built a world-class platform that enables businesses to digitally connect, train, monitor and empower workforce in the field to perform technical tasks ”.

MyMobiForce has created customer delight for e-commerce, telecom, IT and networking, OEMs and system integrators by providing them with on-demand installation and fault repair capabilities across India. Some of the areas in which businesses and enterprises partner with MyMobiForce include: telecommunications and network infrastructure deployment and commissioning, installation and repair of white goods and electronics, installation and the commissioning of ATMs and points of sale, the installation of smart meters and utility products, inspection & audit among others.

If you have an interesting article / experience / case study to share, please contact us at [email protected]

The “most complicated machine” of the technological cold war beyond China’s reach


SAN FRANCISCO – President Biden and many lawmakers in Washington are concerned these days about computer chips and China’s ambitions with foundational technology.

But a huge machine sold by a Dutch company has become a key lever for policymakers – and illustrates how unrealistic any country’s hopes of building a completely self-sufficient supply chain in semiconductor technology are.

The machine is manufactured by ASML Holding, based in Veldhoven. His system uses a different type of light to define ultra-small circuits on the chips, providing more performance in small silicon wafers. The tool, which took decades to develop and was introduced for high-volume manufacturing in 2017, costs more than $ 150 million. Shipping it to customers requires 40 shipping containers, 20 trucks, and three Boeing 747s.

The complex machine is widely recognized as necessary to manufacture the most advanced chips, a capability with geopolitical implications. The Trump administration managed to put pressure on the Dutch government block shipments of such a machine to China in 2019, and the Biden administration has shown no signs of reversing that position.

Manufacturers cannot produce advanced chips without the system, and “it is only made by the Dutch company ASML,” said Will Hunt, research analyst at the Center for Security and Emerging Technology at Georgetown University. , who concluded that it would take China at least a decade to build its own similar equipment. “From China’s perspective, it’s a frustrating thing. “

ASML’s machine has effectively turned into a choke point in the supply chain for chips, which act as the brains of computers and other digital devices. The development and production of the tool on three continents – using expertise and parts from Japan, the United States and Germany – is also a reminder of how global this supply chain is, providing verification reality for any country wishing to take a leap forward in semiconductors itself.

That includes not only China but the United States, where Congress is debating plans to spend more than $ 50 billion to reduce reliance on foreign chipmakers. Many branches of the federal government, especially the Pentagon, have expressed concern about the United States’ dependence on Taiwan’s main chipmaker and the island’s proximity to China.

A study This spring, the Boston Consulting Group and the Semiconductor Industry Association estimated that creating a self-sustaining chip supply chain would cost at least $ 1,000 billion and sharply increase the prices of chips and products made with them.

That goal is “completely unrealistic” for anyone, said Willy Shih, a Harvard Business School management professor who studies supply chains. ASML’s technology “is a prime example of why you have global business.”

The situation underscores the crucial role played by ASML, a once obscure company whose market value now exceeds $ 285 billion. It’s “the biggest company you’ve never heard of,” said CJ Muse, analyst at Evercore ISI.

Established in 1984 by electronics giant Philips and another tool maker, Advanced Semiconductor Materials International, ASML has grown into an independent company and by far the largest supplier of chip-making equipment that involves a process called lithography.

Using lithography, manufacturers repeatedly project chip circuit patterns onto silicon wafers. The more tiny transistors and other components can be added to an individual chip, the more powerful it becomes and the more data it can store. The pace of this miniaturization is known as Moore’s Law, named after Gordon Moore, co-founder of chip giant Intel.

In 1997, ASML began to study a transition to the use extreme ultraviolet light, or EUV. Such light has ultra-small wavelengths which can create much smaller circuits than is possible with conventional lithography. The company then decided to make machines based on this technology, an effort that has cost $ 8 billion since the late 1990s.

The development process quickly globalized. ASML now assembles the advanced machines using German mirrors and hardware developed in San Diego that generates light by projecting tin droplets with a laser. The main chemicals and components come from Japan.

Peter Wennink, managing director of ASML, said that a lack of money in the early years of the company led it to incorporate inventions from specialist vendors, creating what he calls a “knowledge network. collaborative ”which innovates quickly.

“We have been forced not to do on our own what others do better,” he said.

ASML relied on other international cooperation. In the early 1980s, researchers in the United States, Japan and Europe began to consider the radical change in light sources. The concept was picked up by a consortium that included Intel and two other US chipmakers, as well as Department of Energy labs.

ASML joined us in 1999 after more than a year of negotiations, said Martin van den Brink, President and CTO of ASML. Other partners of the company included the Imec research center in Belgium and another American consortium, Sematech. ASML then attracted significant investment from Intel, Samsung Electronics, and Taiwan Semiconductor Manufacturing Company to help fund the development.

This development was made trickier by the quirks of extreme ultraviolet light. Lithography machines typically focus light through lenses to project circuit patterns onto wafers. But the small EUV wavelengths are absorbed by the glass, so the lenses will not work. Mirrors, another common tool for directing light, have the same problem. This meant that the new lithography required mirrors with complex coatings that combined to better reflect small wavelengths.

ASML therefore turned to Zeiss Group, a 175-year-old German optics company and long-time partner. His contributions included a two-ton projection system to handle extreme ultraviolet light, with six specially shaped mirrors that are ground, polished, and coated for several months in an elaborate robotic process that uses ion beams to remove defects.

Generating enough light to quickly project images also caused delays, van den Brink said. But Cymer, a San Diego company bought by ASML in 2013, ultimately improved a system that directs pulses from a high-powered laser to strike tin droplets 50,000 times per second – once to flatten them and one time. second time to spray them – to create intense light.

The new system also required redesigned components called photomasks, which act like stencils in projecting circuit designs, as well as new chemicals deposited on wafers that generate these images when exposed to light. Japanese companies now supply most of these products.

Since ASML introduced its EUV business model in 2017, customers have purchased around 100. Buyers include Samsung and TSMC, the largest service producing chips designed by other companies. TSMC uses the tool to manufacture processors designed by Apple for its latest iPhones. Intel and IBM have said the UVV is crucial to their plans.

“It is certainly the most complicated machine humans have built,” said Darío Gil, senior vice president of IBM.

The Dutch restrictions on the export of these machines to China, which have been in place since 2019, have not had much financial impact on ASML as it has a backlog of orders from other countries. But about 15% of the company’s sales come from the sale of older systems in China.

In a final report to Congress and Mr Biden in March, the National Artificial Intelligence Safety Commission proposed extending export controls to other advanced ASMLs. machines too. The congress-funded group seeks to limit advances in artificial intelligence with military applications.

Mr Hunt and other political experts argued that since China was already using these machines, blocking additional sales would hurt ASML without much strategic advantage. The company too.

“I hope that common sense will prevail,” said Mr van den Brink.

Source link

5G private networks – Flexible and adaptive paths for operators and businesses • Registration


Sponsorship The concept of 5G private networks is gaining attention in many parts of the world. Existing wired networks, Wi-Fi, 3G, 4G and traditional private sector networks have not been able to adapt to the digital changes of the Industry 4.0 era. Instead, the accelerating digitization of industry is driving the adoption of 5G and the Internet of Things (IoT) in industrial networks.

With the advent of 5G, high bandwidth, low latency, and high capacity connections have been achieved. It supports cutting-edge technologies required by vertical industry, such as network slicing, artificial intelligence (AI), big data, advanced computing and cloud computing platforms.

A new generation of private 5G networks is emerging to meet critical wireless communication requirements. These private networks (physical or virtual cellular systems) support mission or business critical use cases in industries such as smart cities, utilities, healthcare, agriculture, and business. mining, transportation and manufacturing.

5G network slicing using Network Function Virtualization (NFV) and Software Defined Networking (SDN) Automated end-to-end orchestration technology enables operators to leverage the resources of the public network to customize their private networks for thousands of businesses.

“Before 5G, dedicated mobile networks could build dedicated physical networks using only dedicated mobile frequencies and dedicated physical devices,” said Jason Tu, chief scientist at NFV / SDN of ZTE Corporation. I go. “Not only is it very expensive, but in most countries small and medium-sized enterprises (SMEs) may not have access to mobile frequencies.

Rather than waiting for killer apps to emerge, 5G creates the potential for new revenue opportunities to lay the strategic foundation for operators today and sell custom private networks and edge cloud services to businesses. .

Smart in the city

ZTE is currently using four private network models (5G private line, 5G virtual private network, 5G hybrid private network, 5G physical private network) to develop an end-to-end 5G private network plan for precise industry empowerment. It offers. Different industries and specific customers.

This is important because thousands of private networks with completely different requirements require a lot of manpower and experience in O&M. With the introduction of AI and big data tools, operators can coordinate and precisely guarantee multiple service level agreements (SLAs) for different vertical applications on different private networks.

“For example, network slicing allows us to create private 5G networks for businesses from the core to the edge,” says Tu. “Some factories have low latency and security requirements that require traffic to flow locally on the premises. Operators can use ZTE solutions such as base stations and core network transmissions in the factory. Operators are able to provide top quality services with the resources, expertise and experience to keep their network deployed. “

Service levels or KPIs for these custom networks include number of users, reliability, bandwidth, security, and latency. For SMEs looking for more agility and efficiency, homebrew data centers are gradually being replaced by public cloud services. Likewise, private corporate networks are gradually being replaced by private network services provided by operators.

For smart city use cases such as street lighting networks, flexibility, security, and cost are more important considerations than delays. Due to the large number of them, the cost of connecting each floor lamp should be economical and safe. Each streetlight in a private private network can have its own IP address and only connects to a central server protected by a firewall and a high level of robust security. However, cost and performance requirements may also depend on the number and sophistication of data acquisition devices that can be installed on the street light pole.

Another 5G use case is a smart water meter. The key requirements for a water meter network are low power consumption to support a runtime of 10 years or more and a good signal to reach the water meter, which is often found in basements and outbuildings. exterior walkways, gardens and sidewalks. Includes blanket. With 5G network slicing and unique radio frequencies, you can manage smart power consumption on a single private network.

These use cases are driving IoT adoption and demand for cloud and mobile computing (MEC). “5G networks are seen as more important applications that run in the cloud,” says Tu. “The core network side and the transmission side are already cloud-based or software-defined. Faced with the upheavals caused by the current pandemic, this transformation applies to the benefit of all vertical industries. can do.”

Operators and integrators

Operators with edge data centers close to industry verticals are well positioned to move from communications service providers (CSPs) to digital service providers (DSPs). After all, a private 5G network that connects water meters to street lights complements edge cloud services as well as integrated services.

“For example, manufacturers need 5G connectivity and cloud-based systems to control robots and AGVs, and DSPs that help integrate robots and AGVs into production systems,” says Tu. ..

ZTE also worked with OEM Sany Group and China Mobile unit Beijing Mobile Communications Co Ltd to launch an integrated cloud network solution aimed at increasing the use of 5G technology in manufacturing. This solution facilitates the innovative integration of 5G and the industrial Internet.

Using China Mobile’s private network, the integrated cloud network solution is designed to best match the business scenario of the industrial park and enable the use of applications such as data acquisition, machine vision and digital twins. . I go. cycle of life.

Meanwhile, 5G industry innovator ZTE launched an all-in-one private 5G solution for the vertical market, offering end-to-end 5G products such as access networks, carrier networks and core networks (i5GC stands for industry core 5G). I am. ), And MEC brings cloud computing and on-demand communications network capabilities to vertical industrial applications.

Other innovations from ZTE that allow operators to differentiate their private 5G network services include the node engine. NodeEngine is a base station integrated mobile edge solution with compute, storage and offload capabilities that tightly integrates edge computing with industrial applications for industrial park deployments. In addition, the Precise RAN solution enables operators to deliver private 5G networks that can be deployed quickly, meet extreme service requirements and be cost competitive.

ZTE and its network operator partners have accumulated valuable experience in innovating 5G business models by implementing 5G applications in various industries. ZTE and operators can work together to replicate this expertise and experience to monetize 5G investments and improve ROI while leading digital transformation initiatives in the industry vertical.

Sponsored by ZTE

5G private networks – Flexible and adaptive paths for operators and businesses • Registration

Source link Private 5G networks – Flexible and adaptive paths for operators and businesses • Registration

Source link

Bishop Ishizo urges communicators to show their passion for the work.


Catholic Church and Religious Directors for Social Communication in Nigeria have been tasked by the Bishops’ Conference of Catholics (CBCN) in Nigeria to show more commitment and passion to their apostolate.

Nigerian Catholic Information Service – Abuja

Bishop Dennis Chidi Ishizo shows more commitment and passion for their mission as communicator of the Church, and all the means at their disposal to grow and make their functions more effective. Challenge the country’s Catholic director of social communications to make sure he looks for him.

Bishop Ishizo delivered a speech at a recent three-day media workshop in the capital, Abuja. This workshop was organized by the National Office of Social Communication of the Catholic Secretariat (CSN) of Nigeria for parish and religious communication directors of the Catholic Church in Nigeria.

Towards an integrated and effective Catholic media

Under the theme “Director Empowering the Integrated and Effective Catholic Media Apostolate of Nigeria” The workshop was said to have taken place in a colorful ceremony hosted by Ignatius Ayau Kaigama, Archbishop of Abuja.

“As you know, the voice of social media is hardly real. Therefore, we must strive to convey the naked truth to society and practice unified journalism. While the bishop speaks from the altar of the church. , You are a church infantryman. You have to go out to meet people and be accountable for their plight. He challenged the Director of Catholic Communications to be the voice of the church, of society and especially of the poor.

The poor must also find space on your home page

In line with a similar policy, Archbishop Onitsha’s Deputy Bishop told workshop participants that the Catholic Church in Nigeria urgently needs a selfless, duty-bound communications director.

“We need a director who is passionate about effective communication and able to use media tools correctly. We must project the message of the bishop and the church, but go to the village and report on the struggles and heroic activities of the poor. It is also essential. People. You should also leave room for them on the cover of your newspaper. “

Challenges and successes of Catholic media in Nigeria

From the three published articles and the two training components of the workshop, the first article was published by Father Mike Nshikaku Umo on the following topics: “The Church Spirit on Social Communication”. The other two articles were written by Reverend Patrick Almuk of the Archdiocese of Abuja and Martin Anushi of the Diocese of Awka. Father Alumuku gives his experience “The Challenge of Managing a Media Office in a Catholic Church in Nigeria” Diocese of Awka, Bro. Told the director of communication Anus, “Prospects for a Successful Catholic Media Office in Nigeria. “ He challenged his fellow filmmaker to “think outside the box and on the water”.

How to set up a basic parish media facility on a low budget

In the exercise, Father Paulinus Andien, deputy director of communications in the Diocese of Uyo, showed other directors how to set up a basic audio and video recording and editing studio on a low budget. He explained the differences and the use of different microphones and devices. Meanwhile, ICT expert Godwin Onyekwere presented the Board of Directors with a groundbreaking new digital networking app created by the National Communication Agency of the Catholic Church in Nigeria.

Thanks to the former officer

At the closing ceremony, Father Chris Anyanu, the last national communications director, was recognized for his many years of service in church communications in Nigeria. The directors also thanked Otumba Gide Vincent Faduguba Pinheiro for leaving the country’s Social Communication Office after 17 years of service.

Bishop Ishizo urges communicators to show their passion for the work.

Source link

BoltBus, favorite of frugal drivers, suspends service indefinitely


BoltBus, the bus service known for offering its passengers Wi-Fi and $ 1 lottery seats, is shutting down operations indefinitely after months of low traffic during the pandemic, according to Greyhound, its parent company.

The discount bus operator ad last month he was moving most of his routes to Greyhound so that he could “undergo renovations.” BoltBus had suspended service earlier during the pandemic, but its parent company said this week that the operator had no plans to put its buses back on the road.

“Currently, there is no timetable for the return of BoltBus operations,” said Emma Kaiser, a spokesperson for Greyhound. Seattle weather.

Greyhound did not respond to emails or phone calls seeking comment on Saturday.

Greyhound, which operates the largest fleet of intercity buses in North America, partnered with Peter Pan Bus Lines in 2008 to launch BoltBus. Companies wanted to provide an affordable ride for people turned off by dirtier alternatives on the market.

At least one seat on each BoltBus route sold for $ 1 plus a reservation fee. Passengers could reserve seats, unlike Greyhound. BoltBus offered passengers Wi-Fi, individual power outlets and extra legroom, according to its website.

The company shuttled between cities in the Northeast and the Pacific Northwest. Greyhound took sole ownership of BoltBus in 2017.

In May, Greyhound announced it was shutting down its remaining Canadian operations.

Other inexpensive intercity bus operators that are still operating, including FlixBus, Peter Pan and Megabus, could see an increase in passenger numbers as domestic travel increases as pandemic restrictions relax.

Source link

Why I pressed the social media pause button – News


At the time, I was working for a 24/7 English TV news channel.

I was very early converted to social networks. I joined Orkut in 2006, shortly after its inception in 2004. For uninitiated millennials, Orkut was a social networking service, the forerunner of Facebook, owned by Google later, which went offline on September 30. 2014: It was created to help digital native users make new friends and stay in touch with old ones.

Soon I became obsessed with notes – which were “notes” that users wrote on each other’s Orkut pages at the start of spotty internet service in India. It started to consume a lot of my waking hours and impacted my daily work schedule.

At the time, I was working for a 24/7 English TV news channel. I was often busy posting notes frantically between bulletins and breaking news.

I vividly remember that I had missed a major international news clipping on December 30, 2006. Former Iraqi President Saddam Hussein had been executed, and the live stream was coming to the wires at a breakneck pace as I furiously posted inept tracks to my New York based cousin. I was unaware of what was going on in a newsroom that gave off high octane energy, until one of my fellow producers, and a dear friend, shaken me off my chore. foolish.

It was an epiphanic moment of achievement and also a date with social media disengagement. I had to jump off the bandwagon to preserve my sanity.

I am happy to report that I managed to hold on. Luckily, shooting ‘against the grain’ had no impact on my professional career as a journalist (full disclosure: WhatsApp is good enough for that).

Initially, colleagues and friends made efforts to encourage me to join social media. In mid-2007, one of my colleagues opened an account for me on Facebook, which is still dormant to this day.

Likewise, in December 2013, I made my debut on Twitter, thanks to another former colleague; the handle remains inactive, as I get periodic reminders from Twitter to log in once every six months (I was also warned that I will be permanently deleted due to prolonged inactivity).

I’m not on Instagram and Snapchat either, although I tried WeChat – a versatile social media and mobile payment app – during my brief stay in Hong Kong a few years ago.

I’m happy to have a minimum of digital fingerprints.

I check the following boxes to underline my aversion to social media:

a) I don’t like the medium because people generally indulge in trivialities.

b) I don’t have time for exercise.

c) I don’t want others to know about my personal stuff.

The last piece is significant and reminds me of the 2009 documentary We Live In Public, which portrayed private investor Josh Harris and his manic obsession at the height of the dot-com bubble: loss of privacy at the Internet age. It’s a truism that wreaks havoc in human relationships, studies show.

But despite my loathing for social media, I had voluntarily signed up for LinkedIn, an online job-oriented platform, in 2010, and at last count 2,160 connections, even though I didn’t update. update my profile since early 2014.

Why LinkedIn? It is perhaps the healthiest of all the social media platforms that I have been a part of because it has a professional and business approach.

To hell with social media, because it finds echoes in the prophetic 1983 issue of The Police Every Breath You Take:

“Every Breath You Take

Every move you make

Every link that you break

Every step you take

I will look at you … “

Was Sting referring to social media in that number of years before the medium’s maturity?

[email protected]

Joydeep Sengupta

Source link

The best AI tools to boost your social media strategy


Do you use Instagram, Facebook, Twitter, etc. to build an audience, generate interactions with your business and products, and turn leads into leads and sales?

If so, you should think about how artificial intelligence can help you increase social media revenue while reducing planning, development, and management expenses.

Read on to find out more about it in detail.

What is Artificial Intelligence (AI)?

Artificial intelligence (AI) is a broad term that encompasses a wide range of technologies such as machine learning, image processing, speech recognition, deep learning, etc. However, at its most basic level, AI technology allows computers to perform particular cognitive tasks on par or better than humans.

For example, AI-powered object detection algorithms in autonomous vehicles can detect obstacles in the same way humans do, allowing the machine to take control.

Your favorite voice assistant, like Alexa or Siri, interprets your statements as if they were spoken by someone else, then responds in kind, all powered by artificial intelligence. Amazon and Netflix use AI recommendation algorithms to suggest items and movies you might enjoy, making an assumption about your tastes the same way any other product or movie fan would.

Why is AI relevant for social media

AI technology is a big part of most social media sites. As a result, AI is fueling the world’s most popular social media platforms behind the scenes. To increase user engagement, social media networks use modern technologies and upgrades.

  • Facial recognition in posts and powerful machine learning technologies are used by Facebook to target people with advertising.
  • Instagram uses artificial intelligence to recognize various images. Snapchat uses artificial intelligence to monitor features and create an overlay that lets you move your head in real time.
  • LinkedIn uses artificial intelligence (AI) to provide job suggestions and to feature specific items in your feed.

For social media marketers, artificial intelligence improves social media marketing in two main ways:

  1. Reduce costs: AI can help your team focus on more important tasks by partially or fully automating some of the most labor-intensive processes that consume their time. This covers things like scheduling and posting shares, fetching relevant links and tags, and simplifying and speeding up the process of finding what to post.
  2. Increase income: AI can also improve the effectiveness of your social media posts and strategy, which translates into more engagement and return on your social media efforts. AI can help you determine the most effective content, the most appropriate audiences, and the best channels to use. It can even create more effective advertising for you.

9 AI tools to streamline your social media strategy

1. Yotpo

Another time-consuming chore that can now be handled with smart technologies like Yotpo is customer review management. Its moderation tool analyzes consumer reviews and attitudes, giving you information on how to improve your goods and services. It can also be used to increase sales by collecting important data from previous reviews and providing it to potential customers.

2. AI-Writer

AI is not just a data processing technology that delegates creative work to people; it can also be used to create content. With just a title, AI-Writer can produce complete blog entries. While the material isn’t crisp and the text output often needs some tweaking, this program can still save content producers a lot of time when it comes to producing a new blog.

3. Exceed.ai

Exceed.ai is an artificial intelligence (AI) -based sales tool that automates email communication and personalized conversation. This marketing automation technology tries to mimic human discussions by giving potential customers a natural experience, conversing with them, and learning their product needs before transferring the discussion to a real sales professional.

4. NetBase

Listening to social media has been used by brands for decades, but NetBase takes it one step further by including machine learning and artificial intelligence. Its artificial intelligence (AI) -based system monitors millions of social media threads in real time to give real-time feedback on the audience’s reaction to the latest news and changes from your brand. This information can help marketers defend their brands, improve crisis management, and increase campaign results.

5. Knot

Node is an AI platform that uses data from people and organizations to anticipate how a business could more effectively engage its customers, employees, investors, and partners. The program first makes connections between online things like people, goods, and businesses, and then uses its algorithm to identify which ones are most likely to convert or buy. Marketing automation, management consulting, candidate monitoring, and other applications can all benefit from this prognostic information.

6. Atomic range

Atomic Reach’s AI technology is like having a content marketing assistant on staff. Its content failover platform uses conversion optimization and business analytics to help organizations convert their content into sales. While it can help SEO, its results are significantly more focused on ROI, detecting what drives conversions and providing transparent improvements to blogging titles and tone.

7. Seamless.ai

Seamless.ai is a marketing platform that allows users to quickly search and browse large databases of contacts. Without the laborious process of list building, contact tracing, data entry, and other types of busy work, this business intelligence app helps stack contact information (emails, cell phone numbers, etc.)

8. Pencil

Crayon uses artificial intelligence to automate competitive analysis. Its technology visualizes competitive data in a single panel to keep advertisers up to date with the latest market news and developments, enabling them to spot trends and make quick, informed decisions.

9. Scroll

Unscreen uses artificial intelligence to completely remove backgrounds from videos. Video without a background required complicated procedures, but with Unscreen you can capture your movie anywhere and then easily remove the background. Once you have removed the backdrop, Unscreen allows you to replace it with a new static or video wallpaper.


AI helps measure performance, as well as track and analyze every action taken on social media, such as recitals, customer engagement, and news. As a result, companies have a clear vision of what customers want and how they make decisions. Search history and buying habits are tracked by AI. Search engine optimization is also based on performance indicators. With its ability to properly assess user profiles and personalize the overall user experience, AI offers flawless personalization for many social media platforms.

Source link

A new wave of ransomware has been triggered by a cyberattack on tech vendor Kaseya


Kaseya, whose VSA software platform is used by other tech companies to monitor and manage customers’ computer networks, has been the victim of a daring cyberattack. On July 2, the company issued a security advisory urging customers to immediately shut down versions of VSA running on their own servers. It also suspended its own cloud-based VSA service.

The company is at the epicenter of a security crisis that combines two of the most devastating tactics currently deployed by hackers: supply chain attacks and ransomware. The first is to target companies whose software is widely used by other companies. Once inside the provider’s system, attackers use it as a starting point to gain access to its customers’ networks as well. Then, they install ransomware, which locks down victims’ data, only freeing them after a ransom payment has been made (usually in cryptocurrencies that cannot be found).

Hackers targeting Kaseya managed to compromise her VSA platform and then use it as a jumping off point to find their way into other companies’ systems. Once inside, they deployed ransomware.

It is still not clear exactly how much damage this cyber punch caused. In a security notice Posted on his website, Kaseya, who is US headquartered in Miami, said he currently believes the risk is limited to companies running VSA on their own servers rather than those using the cloud service it provides. “Only a very small percentage of our customers have been affected,” he added, “currently estimated at less than 40 worldwide”. The company’s board says it has more than 36,000 customers in total.

Chain reaction

However, some of the companies involved appear to be Managed Service Providers, or MSPs, that handle IT services, such as software upgrades and network monitoring, on behalf of a wide variety of other organizations. MSPs are popular targets for hackers, who use access to their systems and then gain access to those of MSP customers.

Cybersecurity firm Huntress Labs said it believes eight MSPs have been compromised using the VSA platform – and three it works with directly saw at least 200 customers in total affected by ransomware. The security company, which did not name the MSPs involved, believes a Russian-based hacking group known as REvil is behind the attack.

In the statement posted on its website, Kaseya said she learned of a potential security incident around noon on Friday and quickly called forensic security experts to assist her with her internal investigation and notified the FBI and the Cybersecurity Infrastructure. and Security Agency (CISA), which is part of the Department of Homeland Security. It has also issued advisory warnings to its customers.

CISA said in a report published Friday night that it “is taking action to understand and resolve the recent supply chain ransomware attack against Kaseya VSA and the multiple Managed Service Providers (MSPs) that use the VSA software.” He also urged organizations to follow Kaseya’s advice to shut down their own servers running the company’s software.

Ransomware targets

This new incident is the latest in a wave of ransomware attacks against U.S. companies, including meat-processing giant JBS and oil-haulage company Colonial Pipeline, that have alarmed business and more high levels of government.

The United States is also recovering from a supply chain attack on networking software company SolarWinds that compromised the systems of hundreds of organizations, including businesses and government agencies. In a recent meeting with Vladimir Putin, President Joe Biden called on the Russian president to crack down on Russian-based groups involved in ransomware attacks and other cybercrimes.