Attempt to disrupt the sale of ARM. Unity trade Union and political forces they call the deal a disaster.

The UK’s largest trade Union, Unity, has strongly criticised the sale of ARM to NVIDIA. According to their assumptions, this will lead to the reduction of thousands of jobs.

 

Unity also appealed to the government to block the deal because of the potential threat of disrupting the growth of the country’s technology sector.

 

So do some politicians, in particular, and Edward Miliband.

 

 

 

Unions and politicians also don’t believe in NVIDIA’s long-term policy, with its promises to preserve the location of ARM’s headquarters and plans to build a research center in Cambridge with a supercomputer based on ARM processor systems.

 

They also suggest that after the full package of conditions for this deal comes into force, ARM’s UK operations will be curtailed and moved abroad.

 

“It would be crazy to put this at risk by allowing ARM to be put in the hands of a multinational Corporation that would benefit from its closure. Our members have serious concerns about the deal with Nvidia, which was not helped by the fact that ARM management kept them in the dark and deceived them, justifying that the sale is 18 months away, ” said Unite regional representative Matt Whaley.

Their opinion is also supported by Daniel Zeichner, the member of Parliament for the Cambridge district, and the issue has already been sent to the house of Commons.

 

UK laws can allow the country’s authorities to suspend any transactions with local companies for up to two months if they relate to national security. British Prime Minister Boris Johnson has stated his desire to preserve ARM as a company that makes a significant contribution to the country’s economy.

 

Historically, NVIDIA did not try to negotiate with ARM, the issue was resolved with their owner – Softbank.

The purchase amount will be $40 billion. Part of this amount Nvidia will transfer to the holding in the form of its shares ($21.5 billion), and part- ($12 billion) in cash, including $2 billion at the time of the deal with SoftBank. Further, the Japanese holding company may receive additional payments of up to $5 billion in cash or shares, taking into account ARM’s future earnings. Nvidia will pay the remaining $1.5 billion to ARM employees as an additional liability.

 

Its co – founder, British businessman Hermann Hauser, expressed his dissatisfaction with the transfer of ARM into the hands of Nvidia, and he did it in early August 2020. He said that Nvidia is not the right owner for ARM, and added that such a deal would inevitably lead to disaster in the industry. Hauser believes that the expected transition of ARM to NVIDIA ownership can radically change the situation and force developers to abandon the use of the ARM architecture. “Most licensees will become competitors of Nvidia, and in this case they will have to look for an alternative to ARM developments,” Hauser said.

 

What will it give to ordinary users? Participation in marketing wars does not threaten them; only the consolidation of a Corporation like NVIDIA by absorbing ARM will give the Corporation an opportunity to grow, and this may not always look like a blessing.

Copy time: Youtube launches Tiktok analog

In the official channel (blog) YouTube on September 14, it was reported that the video hosting company plans to launch the latest platform on which you can create and publish short videos.

 

 

 

This service, apparently, to some extent copies the functions of the TikTok app, and will be called Shorts.

 

It will be aimed at fans of recording short videos on a smartphone, and also as a bonus will give them the opportunity to overlay music, various special effects and develop networks of subscribers.

 

The experimental springboard of the service, where beta testing will take place, is planned in India-there is an atmosphere that is quite conducive to such tests – this means a direct ban on TikTok and many other Chinese social network applications.

 

That is, Youtube uses its capabilities to develop new markets, after the August launch of Facebook, which launched a similar service on TikTok Reels, where to publish the video length to 15 seconds to open the camera in Instagram, where after selecting the appropriate options – remove and publish it.

 

But the ban in India and the US on TikTok and WeChat, when finally completed, can most likely be circumvented, as it happened with Telegram-despite all the bans and blockages, it successfully held on to the market, working through both paid and free VPN systems…

At the moment, the existing requirements of the US government to transfer control of TikTok to Microsoft do not leave any reasonable user a chance to conclude that the development of any mass user services in the US is possible only if the share is sold to local companies.

 

At this time, after the refusal to provide the full algorithm for TikTok and the owners ‘ choice for sale is not Microsoft, but Oracle, it is difficult to fully imagine all the options for further development and distribution of the mobile application in this territory.

 

Opinions –

 

  1. Owner of Katkov & partners Pavel Katkov:

 

— In fact, before our eyes, the American Internet policy is changing: if there was minimal interference before, now I would call it the policy of the national protectorate;

 

  1. Director of the Institute of information technologies of synergy University Stanislav Kosarev:

 

– Recent decisions indicate that the trade war with China is gaining momentum and reaching a new level. The US is no longer satisfied with additional trade duties and restrictions, now they are looking towards the IT sphere.

Unexpected support for developers came from Russia, other countries are still preparing.

Owners of marketplaces (for example, such as Google Play and the App Store) can legally prohibit vicious internal policies that lead to antitrust violations and discrimination against business partners, which are SOFTWARE developers.

 

Having reasoned philosophically and applied the usual logic, Russian parliamentarians submitted one draft law to the State Duma of the Russian Federation on September 1, 2020.

 

The idea is to regulate the activities of marketplaces: in particular, to deprive companies that use app stores, including Google and Apple, of half of their profits by reducing the Commission for developers, as well as all additional quarterly payments.

 

 

Also, one of the provisions of the bill suggests that the owners of marketplaces will be required to allow users to install app stores from other companies on their devices.

 

About the logic:

 

Let’s analyze the example. You are, for example, Apple. You have an App Store. You invested money in creating:

 

  1. Devices (iMac, iPhone, iPad);
  2. Operating system (iOs);
  3. and, of course, to your crown of creation – the App Store.

 

Of course, You continue to support the development of devices and the operating system. In the App Store, you invite third-party developers to expand the features in the SOFTWARE part. You create a corporate internal policy that States that all SOFTWARE purchases and in – app deductions will then be charged 30% in Your favor.

But there are developers who say: this is too much. What do you say to them? Of course-see our policy: when you signed the agreement on the placement of your products, no one objected? And block dissenters.

 

And then-a karmic reaction-the state tells You: “You have created your environment and your policy. Of course, this is Your business. But, you see, you are in the legal field of States – and they, just imagine – also have their own policies! And the Antimonopoly services also exist”…

 

Curtain…

 

How do marketplaces work?

Unlike other stores, the marketplace does not sell anything: it provides space for sellers and owners of online stores, and not for free-marketplaces take a Commission and receive advertising revenue, and additional deductions may be provided in favor of the marketplace.

In short, it is often more convenient to search for and order products on the site of a large trading platform than on the sites of disparate online stores. Large sites usually support all payment methods for products and allow you to return money if the product is of poor quality.

To create a high-quality trading platform, you need large investments — both in technical solutions (servers, development team) and in marketing (finding partners and suppliers, attracting traffic). Therefore, only large companies can launch a full-fledged marketplace, which does not always contribute to the development of competition.

However, large Russian companies are also gradually launching their own marketplaces. From Yandex-in the fall of 2018, a full-scale launch of the Beru marketplace took place. Now this marketplace offers a variety of products-from food and medicine to computers and smartphones. In October 2018, the start of work across Russia was announced by the marketplace from “m”.Video” — Goods.ru…

 

The draft law “on the marketplace”, the initiative of which belongs to the Deputy head of the Fair Russia faction Fedot Tumusov, affects all companies that own branded marketplaces.

 

For example, the Commission in the Google Play store is 30%, but owners of Android devices can technically install a third-party store. This feature is completely absent on Apple’s mobile gadgets, which has its own store (App Store) it also requires 30% deductions from developers.

 

According to the Deputy, the problem with high commissions in marketplaces is discussed in many countries of the world, not only in Russia. “The appearance of such a rule would reflect Russia’s position in our jurisdiction,” Tumusov said.

 

By the way, at this time, similar initiatives are being worked out by many European countries and not only-Spain, great Britain and Australia are seriously conducting both legal and antitrust assessments of the activities of large companies in order to bring their activities in line with the norms of legislation and generally accepted commercial ethics.

Artificial intelligence prevents tracking browsers by “fingerprint”.

Developers of US universities from the States of California and Iowa, as well as from Mozilla Corporation, offered a program to a wide audience to determine whether the browser can be tracked by its “fingerprints”.

 

For information: now standard cookies are not the only way to identify a user and track their behavior.

Currently, many sites use the so – called “fingerprint” – a set of unique information about the browser configuration and settings to identify and track the user, even with cookies disabled.

The FP-Inspector program is designed to recognize site attempts to track the browser by its “fingerprint” and block such actions.

Machine learning technologies are used in combination with dynamic and statistical analysis methods, and the program is able to identify not only existing methods, but also is able to heuristically identify previously unknown ways to track users in the browser.

 

When conducting statistical checks of the program, the developers found that various methods of tracking “fingerprints” are used to some extent in at least 10% of the most popular sites out of the first 100,000…

News resources and online stores collect the most information, and educational portals and email services collect the least information.

 

In other words, such methods are most interesting for those structures that receive the bulk of financial resources from advertising.

However, it should be noted, in fairness, that such methods are sometimes simply necessary – this applies to tracking destructive logins through different accounts of individuals, when hacking attempts, and tracking and registering both bots and sources of DDOS attacks.

Facebook is prohibited from providing information about hidden payments to Apple.

Apple blocked a recent Facebook update on Thursday that revealed the payment structure for in-app purchases.

 

Thus, the opportunity to provide users with information about the 30% tax in the App Store for customer purchases via the social network was covered.

 

Facebook felt that, especially given the overall economic situation in the world due to the pandemic, it would be useful for people to find out exactly how their payments are spent – that is, where the funds actually flow.

“Now, more than ever, we need to be able to help people understand where money really goes. Unfortunately, Apple rejected our transparency notice regarding its 30% tax, but we are still working to make this information available inside the app, ” Facebook wrote.

Earlier this month, Facebook launched a new campaign to help entrepreneurs make up for lost revenue during the COVID-19 pandemic. Business owners were offered to hold paid online events on the social network platform. Facebook has called on Apple to waive the high Commission for paying for these events in order to transfer these funds to the owners of the affected business. The company refused. This year, Apple became the most expensive American company in history.

According to the internal rules of the App Store, Apple does not consider it necessary to disclose “irrelevant data” (that is, those that the user did not explicitly request from the company). The company believes that their customers are not interested in knowing unnecessary information, including information that reveals where their money goes when making payments.

 

Apple did not comment on the situation with the blocked Facebook update.

Trends in unauthorized corporate access in 2020, VPN errors and constant RDP leadership.

Despite massive attacks on Citrix and Pulse Secure VPN to hack corporate networks in the first half of 2020, however, the RDP remote desktop Protocol remains the undiminished leader.

 

 

 

Attacks on the corporate sector – became statistically record high until August 2020.

 

The three most exploited attack areas in 2020:

 

– to compromised RDP endpoints;

– email phishing and

– use of corporate VPN devices.

Thus, attacks on RDP today are switched from access to home computers and systems to corporate, which is quite natural: having received compromised access points to home computers, with the accumulation of information-the number has grown in quality-to corporate (including by extracting information about corporate RDP access points from home computers that have the corresponding data).

Of course, no one canceled mass scanning of ports on the Internet for open RDP ports with the organization of brutforce on these open ports. With frankly weak credentials information about compromised points is immediately available for sale…

 

The second major step for 2019-2020 is to use a variety of serious vulnerabilities in VPN devices from leading modern companies, including Pulse Secure, Palo Alto Networks, Fortinet, Citrix, Secureworks, and F5 – and other similar network devices to penetrate corporate networks.

 

It was in 2020 that the unpleasant truth about penetration into corporate networks through hacked VPN devices and deployment of their systems for additional useful load for hackers – for mining, managing the botnet network and any other necessities of their work was revealed…

 

Cybersecurity experts constantly remind us about timely installation of updates and attention to emerging news about exploits, multi-level protection of information systems – companies that save on information security specialists no longer have any excuses for hacking and, moreover, compromising the data of customers – other companies and individuals.

In the case of deception of a company employee with a qualitatively disguised bait for phishing, this is still understandable, and it is quite another matter to deliberately ignore or postpone for an indefinite time the presence of vulnerabilities in the systems and equipment of the corporate IT sector.

Symptoms of digital chording: about 70% of corporate data is not used.

“The most successful person is the one with the best information.”

 Benjamin Disraeli

 

 

Seagate Technology PLC has published a report on data usage. It was compiled after a survey of 1,500 leading companies in the world (500-Asia-Pacific region with Japan, 475-Europe, 375-North America and 150-China).

 

Data is a reusable representation of information in a formalized form suitable for transmission, communication, or processing (defined by ISO/IEC 2382-1:1993).

 

When increasing the accumulation of volumes of relevant data, the quality of management and their use is important. IDC estimates that company data will increase by 42.2% per year in the coming years.

 

 

What the study made clear: only 32% of the data is used by corporations to some extent – and the remaining 68% do not attract any attention.

 

What does the endless meaningless accumulation of data lead to? Psychologists call this either “pathological accumulation”, ” syllogomania “or, if figuratively,”Plyushkin’s syndrome”. The English version is hoarding (from the English hoard – “stock”).

According to the classification of diseases, hording is a mental disorder. Nowadays, digital Hoarding is added to traditional hoarding, which can affect both people and entire organizations.

Digital chording during Big Data affects almost all companies. They believe that it is possible to store everything that can be used, provided that the cost of storage is constantly reduced.

At the same time, the damage from redundant data is enormous and is not only related to the direct costs of energy, space, and maintenance, but, crucially, to the analysis of critically large data.

 

Recommendations:

 

* Develop regulations for the relevance of data – if they haven’t been used for several years, they probably won’t be needed;

  • Do not create isolated dumps from data;
  • Do not store raw and flawed, containing errors, the data;

* Develop methods for algorithmic formalization of archives (like two or three good thoughts from a book you read-it doesn’t matter how you came to the conclusion, it’s important to know what it is).

 

Main obstacles to effective data management:

1) inability to use the received data;

2) inability to manage stored data;

3) collecting not all potentially available data;

4) insufficient security of the collected data;

5) uneven availability of disparate databases.

 

And this is not even touching the security of the data…

 

Forecast-the main challenge in the near future is managing data in cloud and hybrid environments.

 

According to forecasts, the main challenge that companies will face in the field of data management in the next two years will be.

 

As a result, companies that can effectively use their data will become competitive in the next 2-3 years.

Artificial intelligence has exhausted the computing power of humanity

Artificial intelligence began to be actively developed about ten years ago, when the power of computers allowed us to conduct large — scale calculations and engage in so-called deep machine learning-to download large amounts of information and calculate them.

 

However, now the development of neural networks is under threat. The University of Massachusetts found that to increase the productivity of existing models of artificial intelligence only 10 times will require a total of 100 quintillion (10 to the 20th degree) dollars — this is 100 million times more than all the money in all countries of the world combined (according to various calculations, this is about 60-80 trillion (10 to the 12th degree) dollars).

 

Scientists found that from 2012 to 2019, the performance of existing neural networks increased by 35 times, while the computing power that provided it increased by an average of nine orders of magnitude (a billion times).

 

Currently, the neural network error rate for image recognition is 11.5%. This is a fairly large margin of error. At the same time, tens of millions of dollars are spent on their work (10 to the 6th degree).

 

To reduce the number of errors by 10 times — up to 1% – you will need computing power of 10 to the 28th power of gigaflops (10 undecillions of operations per second!). This is 100 trillion times more than it is now.

 

Recognizing images with such accuracy will cost humanity 10 to 20 dollars and will lead to an increase in carbon emissions into the atmosphere by 14 orders of magnitude (by a quadrillion times).

 

It is clear that no one is going to spend such resources. Most likely, researchers will accept the large errors of neural networks or will use other ways to teach machines non-standard solutions.

 

In addition, researchers hope that with the advent of quantum computers and neuromorphic systems, the energy consumption for conducting powerful calculations will decrease significantly. But when it will happen, no one knows.

“We won’t do it again… and we won’t… wait, the changes are coming…” – BigTech about voice message privacy.

Since the summer of last year, the voice assistants of the IT industry giants have begun to undergo changes after several major data leaks.

It is no secret that companies such as Microsoft, Google, Amazon, Apple and Facebook have recently passed “deanonymized” voice message data to their contractors for processing.

As we have already found out, this deanonymization of messages is very superficial – that is, with minimal analytical abilities and basic knowledge in the field of IT, it is quite possible to fully authenticate each individual user – whether it is Siri, Cortana, Skype, Alexa or Google Assistant.

All this data, as previously reported, contains a set of data that is not processed properly: that is, knowing the IP address, time of purchase in the same Amazon store, link with the address and Bank card data-the contractor of the Corporation does not have any difficulty in authenticating any particular user.

All of these large corporations conduct voice message checks to debug speech recognition systems, including using artificial intelligence – all to improve the service.

However, only now they have introduced the real possibility of explicitly disabling the functions of storing audio recordings on company servers. However, these functions are quite difficult to use for a simple layman – to make the correct configuration, the user will have to spend a lot of time studying the delights of corporate lawyers, delve into the depths of operating systems and the wilds of confusing settings, even for specialists.

The main joke of the same Google is that you can only disable these features in full for accounts created after June 2020. And those that were created earlier will store data for the last 18 months, but you can disable them later.

In addition, due to many investigations, recordings of voice messages of the same Google and others, for example, in some European countries and for the time being suspended or to some extent limited.

TWITTER GAVE ITS OUTSOURCERS FULL ACCESS TO USER ACCOUNTS…

Against the background of high-profile fraud on the accounts of celebrities in last week’s hacker campaign to collect cryptocurrency-additional research has shown serious vulnerabilities in the security of the social network.

It turned out that, first of all, many employees, including those who are not directly employees of Twitter, that is, hired by third-party organizations (that is, at the second level of outsourcing!), had access to the level that allows you to change user privacy settings.

New details are constantly emerging about potential security breaches, including the FBI investigation.

That is, in fact, thousands of employees not only had access to account privacy settings, but could also change their access level when transferring their accounts in the course of their work.

However, according to the management of the social network, access of this level is only transferred “for good reasons”, and there are no reliable signs that this method of transferring authority led to hacking.

However, third-party experts do not exclude the possibility of intercepting high-level access accounts transmitted by Twitter employees.