Computing Result – Formes http://formes.asia/ Thu, 13 Jan 2022 22:22:16 +0000 en-US hourly 1 https://wordpress.org/?v=5.8 https://formes.asia/wp-content/uploads/2021/06/icon-1-150x150.png Computing Result – Formes http://formes.asia/ 32 32 Nvidia Responds to Deepening UK Probe Over Proposed $40 Billion Arms Acquisition https://formes.asia/nvidia-responds-to-deepening-uk-probe-over-proposed-40-billion-arms-acquisition/ Thu, 13 Jan 2022 21:52:39 +0000 https://formes.asia/nvidia-responds-to-deepening-uk-probe-over-proposed-40-billion-arms-acquisition/ GPU powerhouse Nvidia continues to try to keep its plans to acquire British chip supplier IP Arm Ltd. alive, despite continued concerns from several governments around the world. In its latest action, Nvidia filed a 29-page response to the UK government outlining a list of potential benefits from the proposed $40 billion deal. Nvidia’s response […]]]>

GPU powerhouse Nvidia continues to try to keep its plans to acquire British chip supplier IP Arm Ltd. alive, despite continued concerns from several governments around the world.

In its latest action, Nvidia filed a 29-page response to the UK government outlining a list of potential benefits from the proposed $40 billion deal. Nvidia’s response follows a November 2021 action by the UK’s Competition and Markets Authority (CMA), which unveiled its intention to conduct an in-depth 24-week ‘phase two’ investigation into the proposed merger. . This investigation follows the CMA’s earlier phase one investigation, which determined that more information was needed to fully investigate the matter.

Nvidia’s CMA response filing was first reported by SearchAlpha. The Nvidia report was released by the CMA for public inspection after it was received from Nvidia.

Nvidia’s filing argues the CMA was wrong to order a phase two investigation, saying the facts of the case so far support Nvidia’s position that the acquisition would be good for the chip market and for Arm.

“Arm’s vision that the [CMA] describes the decision – an entity that ignores its profit motive and has no competition – is a mirage,” Nvidia claims. “Arm is a private, for-profit company at a crossroads. After acquiring Arm several years ago, SoftBank increased Arm’s workforce, hoping to drive long-term growth in several markets, including data centers and personal computers, long dominated by Intel and x86. . SoftBank’s investment phase is over, and one way or another, SoftBank intends to exit Arm.

Prior to Nvidia’s merger proposal, Arm had already considered an IPO but rejected that option, Nvidia argued. “As a standalone company, Arm faces significant growth challenges,” Nvidia’s response said.

“Nvidia did not approach SoftBank to purchase Arm,” the Nvidia filing continued. “Nvidia is a strong supporter of the x86 ecosystem and has developed accelerated computing platforms for x86 PCs and data centers throughout its history.” Instead, it was SoftBank that approached Nvidia about such an acquisition, the company said.

“The parties realized that Nvidia would be uniquely positioned to help Arm create a new IP and develop a world-class ecosystem that could provide an alternative to x86, providing customers with more choice and growing markets around the world. whole”, continues the file.

The proposed transaction would “significantly change Arm’s incentives and opportunities”, giving the combined companies “all the incentives and the ability to significantly increase Arm’s R&D investments at all levels, rather than face the tough choices of where to divest and face additional pressures from customers and competition,” Nvidia’s response said.

Nvidia also challenges another premise of the CMA’s Phase One report, which argues that the acquisition would prevent competition in many downstream markets.

“The logic and conclusions of the decision are flawed,” Nvidia said in its response. “First, the decision ignores competition from Intel in all relevant markets. Antitrust law preserves competition – it does not give customers and competitors a veto over acquisitions. The decision appears to lose sight of this fundamental principle. , saying instead that if enough high-profile Arm customers oppose the deal, the deal must be anti-competitive and should be blocked. But even if some customers and competitors aren’t happy with Arm’s plans, the deal won’t not likely to prevent competition.

The deal, if approved, could have no antitrust implications for Intel, which has been the main processor supplier for more than 30 years, Nvidia argued. “Downstream customers have several Intel options – Intel not only offers its own processor designs, but now also x86 IP licenses for third parties to create their own custom processor and SoC designs. hundreds of RISC-V supporters as forever unable to compete with Arm No industry observer can seriously argue that Intel, AMD and other Arm competitors are so incapable that they can’t even compete with arm.

With or without the merger, Arm cannot hurt competition, Nvidia argued.

“Adversaries of Deal romanticize Arm’s past and ignore or denigrate Arm’s most powerful competition,” Nvidia continued. “But if Arm had market power, it would have tremendous revenue growth and be extremely profitable. Rejecting the prospect of any recourse, the [CMA] decision would not promote competition. On the contrary, it would prevent Arm from introducing competition into areas that have long been dominated by x86. The alternative outcome demanded by opponents of the deal would be a stand-alone, profit-maximizing company, with no guarantees regarding licensing policy or investments. This would likely mean less investment in the UK, less resources for Arm, less innovation and less competition globally.

In a written statement delivered to EnterpriseAI, Nvidia said it submitted the response to the CMA to share more information about its intentions.

“Our phase one submission explains that the transaction will help accelerate Arm and drive competition and innovation, including in the UK,” the statement said. “We continue to explain the benefits of the transaction and are working to address regulators’ concerns in phase two.”

Spokespersons for the CMA and the UK Secretary of State for Digital, Culture, Media and Sport could not be reached for comment on Nvidia’s response today.

Nvidia’s 15-month, $40 billion proposal to acquire IP chip supplier Arm has faced a series of potential regulatory hurdles since October.

In December, the United States Federal Trade Commission (FTC) filed an administrative complaint on December 2 in an attempt to block the blockbuster transaction. The administrative complaint, which will be heard by an administrative law judge in August 2022, alleges that if the merger is approved, it will give the companies “the means and the incentive” to stifle innovative next-generation technologies, including those used to manage the data. driver assistance centers and systems in cars, according to the FTC filing.

The FTC’s administrative complaint followed related actions by regulators for the UK government and the European Commission (EC), including the UK government’s phase two investigation announced in November.

On October 27, the EC unveiled its own “thorough investigation” into the proposed merger proposal, saying it wanted to determine whether the merger could stifle fair competition in the market. A first phase investigation by the EC determined that it needed more time to assess the proposed merger and its effects before issuing a final decision in the case.

The three agencies – the FTC, the UK’s CMA and the EC – say they are reviewing the proposed acquisition more thoroughly over various concerns, including how it could stifle competition, reduce innovation in the semiconductor industry and cause potential harm to the domestic market. Security.

Nvidia’s merger proposal for Arm was announced in September 2020 and has been met with controversy as well as praise. Several big tech companies, including Google and Microsoft, have strongly opposed the deal, raising repeated concerns about its negative effects on competition and pricing.

But in June 2021, three other chip companies – Broadcom, Marvell and MediaTek – backed the acquisition and began to publicly state that they viewed the move as one that could ultimately benefit their own businesses.

Nvidia’s acquisition of Arm was set up when Japanese technology investment firm SoftBank, which bought Arm in July 2016 in a $32.25 billion all-cash deal, chose to sell the company after hemorrhaging cash since the first quarter of 2020. SoftBank was looking to sell assets to raise cash after the company’s earlier bets on the rise of connected devices failed to pay off . The company’s Vision Fund, its artificial intelligence investment fund, suffered an annual loss of $13 billion in its fiscal year ending March 2020.

Acquiring Arm would strengthen Nvidia’s position as a major player in wireless and other markets, as it makes steady inroads into enterprise data centers. The graphics leader has released a stream of ever more powerful GPUs targeting machine learning and other AI workloads that now dominate enterprise data centers.

]]>
New Year, Better Being – The Suffolk News-Herald https://formes.asia/new-year-better-being-the-suffolk-news-herald/ Tue, 11 Jan 2022 21:33:59 +0000 https://formes.asia/new-year-better-being-the-suffolk-news-herald/ By QuaWanna Bannarbie School resumes, the vacation holidays being over. Before winter break started, my second-year student was studying two-digit addition and subtraction problems. When he got back to school we had to do some refreshments to remind him how to do this math, which meant that now I was taking a lesson in new […]]]>

By QuaWanna Bannarbie

School resumes, the vacation holidays being over. Before winter break started, my second-year student was studying two-digit addition and subtraction problems.

When he got back to school we had to do some refreshments to remind him how to do this math, which meant that now I was taking a lesson in new math terminology. I was introduced to the term “grouping,” which involves numbers greater than 10. The basis of grouping requires understanding place values ​​when adding or subtracting numbers to complete the vertical addition equation. using columns. Children of my generation and up learned this by “carrying or borrowing” the number from one column to another. Imagine me sitting next to my son trying to help him using terminology he is used to while remembering terms that taught me how to solve the same problems. New math seems to be the journey of this pandemic parenthood. Mothers and fathers are using new methods to help our children adjust to their new reality.

My son’s regrouping math problems taught me a lesson, which inspired a message for this New Year.

As we plan our resolutions, we often reflect on what happened in the past year and how we will adjust our actions and intentions to achieve the goals we have set for ourselves. For 2022, I’ve heard several posts about what to leave behind. Our nation’s retrospective on the events of 2020 and 2021 and this long-standing pandemic is dismal because they were so hard to bear. We are happy to leave it behind. However, the start of the year is not a blank slate.

In order to learn from the sum of 2020 and 2021, we need to do some consolidation. We need to know what to remember and what to borrow from the trip of the past two years. Some of these experiences and lessons are of greater place value than others. A good mathematician precisely adds components to the function to get the next right solution.

One of the worksheets my son’s teacher gave him explained a bit about how to group together when the same number is in place. For example, any number added to 29 or 79 would force it to regroup at the tens position. He mastered the task until the next worksheet changed the numbers that were in place of ones. He had gotten so used to seeing the 9th that the new issues actually slowed him down. The change helped him get better. He trained himself to calculate the result rather than depending on the familiar. This pandemic has taught us that we cannot depend on the familiar and that normalcy does not last. It can be good.

I’ve seen the slogans for 2022 that say New Years, even me. I would disagree with staying the same. Whatever new thing you are facing right now, a new SUM THING is taking hold within you. The evolution is a function of the addition. We are destined to evolve. The best of us improve in response to inputs from our individual experiences. The result of our learning and development is a novelty that brings us closer to the fullness of our being. Let us resolve that this year will be better than the previous ones because we will come together to find out what makes us better.

QuaWanna Bannarbie is a teacher, writer and affirmer of faith, identity, relationships and experiences. Connect with her via iamquawanna@thebiggerme.net.

]]>
Chinese Researchers Offer Pale-Shaped Self-Attention (PS-Attention) and General Vision Transformer Backbone, Called Pale Transformer https://formes.asia/chinese-researchers-offer-pale-shaped-self-attention-ps-attention-and-general-vision-transformer-backbone-called-pale-transformer/ Mon, 10 Jan 2022 01:47:54 +0000 https://formes.asia/chinese-researchers-offer-pale-shaped-self-attention-ps-attention-and-general-vision-transformer-backbone-called-pale-transformer/ Transformers have recently shown promising performance in a variety of visual tests. Inspired by Transformer success on a wide range of NLP tasks, Vision Transformer (ViT) first used a pure Transformer architecture for image classification, demonstrating the promising performance of the Transformer architecture for vision tasks. However, the quadratic complexity of global self-attention results in […]]]>

Transformers have recently shown promising performance in a variety of visual tests. Inspired by Transformer success on a wide range of NLP tasks, Vision Transformer (ViT) first used a pure Transformer architecture for image classification, demonstrating the promising performance of the Transformer architecture for vision tasks.

However, the quadratic complexity of global self-attention results in high computational costs and memory usage, especially for high resolution situations, making it unsuitable for use in various visual tasks. Various strategies limit the focus of attention within a local region to increase efficiency and reduce the quadratic computational complexity generated by global self-attention. As a result, their receptive fields in a single layer of attention are insufficiently large, resulting in poor context modeling.

A new Pale-Shaped Self-Attention (PS-Attention) method performs Self-Attention inside a pale-shaped area to resolve this issue. Compared to overall self-attention, PS-Attention can significantly reduce compute and memory expenses. Meanwhile, it can collect more fantastic contextual information while retaining the same computational complexity as previous local self-attention techniques.

A standard method of increasing efficiency is to replace global self-attention with local self-attention. A critical and difficult question is how to improve modeling capacities in local situations. Here, the local attention region was considered as a single row or column of the feature map in axial self-attention. A cross-shaped self-attention window has been proposed, which can be seen as an enlargement of several rows and columns of axial self-attention.

While these approaches outperform CNN equivalents in performance, the dependencies in each layer of self-attention are insufficient to collect adequate contextual information.

The suggested pale form self-attention (PS-Attention) effectively collects more prosperous contextual relationships. Specifically, the input feature maps are first spatially divided into many pale-shaped sections. Each pale-shaped region (abbreviated as pale) has the same number of interlaced rows and columns of the feature map. The distances between neighboring rows or columns are the same for all the blades. One of the pale, for example, is represented by the pink shadow in part e of the following figure.

Source: https://arxiv.org/pdf/2112.14000v1.pdf

Then, within each pale, self-attention is accomplished. Any token can directly interact with other tokens within the same blade, allowing the technology to capture deeper contextual information in a single PS-Attention layer. A more efficient parallel implementation of PS-Attention has been developed to further improve performance. PS-Attention surpasses existing local self-attention mechanisms due to larger receptive fields and higher context modeling capacity.

The mainstream research on improving the efficiency of Vision Transformer backbones has been divided into two parts: removing unnecessary stones through pruning procedures and creating more effective self-attention mechanisms.

The Pale Transformer, a generic vision transformer backbone with a hierarchical architecture based on the suggested PS-Attention, extends the technique to produce a set of models that surpass previous efforts, including Pale-T (22M), Pale- S (48M), and Pale-B (85M). The new Pale-T outperforms leading backbones by + 0.7%, + 1.1%, + 0.7%, and + 0.5% on ImageNet1k, 50.4% mIoU at single scale on ADE20K (semantic segmentation ), 47.4 mAP boxes (object recognition) and 42.7 mAP masks (instance segmentation) on COCO.

Based on the suggested PS-Attention, the Pale Transformer is a generic Vision Transformer backbone that provides cutting-edge image classification performance over ImageNet-1K. Additionally, Pale Transformer outperforms previous Vision Transformer backbones on ADE20K for semantic segmentation and COCO for object identification and instance segmentation.

Article: https://arxiv.org/pdf/2112.14000v1.pdf

Github: https://github.com/BR-IDL/PaddleViT


Source link

]]>
Crackdown in Kazakhstan hits crypto miners https://formes.asia/crackdown-in-kazakhstan-hits-crypto-miners/ Fri, 07 Jan 2022 23:04:23 +0000 https://formes.asia/crackdown-in-kazakhstan-hits-crypto-miners/ Kazakhstan’s recent internet shutdown in a deadly uprising hit the country’s growing cryptocurrency mining industry. As a result, the global computing power of the bitcoin network has dropped sharply. Tom Wilson, Reuters cryptocurrency correspondent: “So it’s fair to say that cryptocurrencies as a whole are becoming more sensitive to geopolitical factors than before.” Kazakhstan became […]]]>

Kazakhstan’s recent internet shutdown in a deadly uprising hit the country’s growing cryptocurrency mining industry.

As a result, the global computing power of the bitcoin network has dropped sharply.

Tom Wilson, Reuters cryptocurrency correspondent:

“So it’s fair to say that cryptocurrencies as a whole are becoming more sensitive to geopolitical factors than before.”

Kazakhstan became the world’s second largest bitcoin mining center after the United States last year

This was after China’s main hub clamped down on crypto mining activity.

As with everything in the cryptocurrency world, bitcoin mining is a rather opaque industry … That said, a Cambridge University report last year showed that in August Kazakhstan accounted for about 20% of the global bitcoin computing power. It’s up about eight percent in April, so there is a fairly rapid increase in the number of cryptocurrency miners in Kazakhstan. ”

Bitcoin and other cryptocurrencies are created or “mined” by powerful computers.

In different parts of the world, large data centers compete to solve complex mathematical puzzles in a very power-intensive process.

“Last year, China, which was the world’s largest cryptocurrency miner, launched a pretty sweeping crackdown on cryptocurrency mining. And that means many mining companies have fled China for other countries with cheap electricity. In Central Asia, Kazakhstan is one of the places. ”

A recent uprising in Kazakhstan began with protests against rising fuel prices on New Year’s Day.

On January 5, the internet was shut down across the country.

The move likely prevented Kazakhstan-based miners from accessing the bitcoin network.

“And with the internet shut down on Wednesday, the global computing power of bitcoin has dropped quite dramatically. In theory, this makes it easier for miners to produce bitcoin, and it could lead to more bitcoin on the market in the future, which in theory would put downward pressure on bitcoin prices. ”

On January 7, bitcoin fell 5% to its lowest level since late September, falling to less than $ 41,000 amid a broader sell-off in cryptocurrencies.

Security forces appear to have reclaimed the streets of Almaty, Kazakhstan’s main city, after days of violence.

“And it’s still not clear exactly how much geopolitical factors are really fueling this, but we can see from what has happened in Kazakhstan recently and also with the broader crackdown on cryptocurrencies by China. last year, that the attitude of governments and financial regulators towards cryptocurrencies can really impact the cryptocurrency markets. ”


Source link

]]>
Big Data is dead. Long live data on demand https://formes.asia/big-data-is-dead-long-live-data-on-demand/ Thu, 06 Jan 2022 09:03:03 +0000 https://formes.asia/big-data-is-dead-long-live-data-on-demand/ Big Data is dead. Long live Big Data? Or, if Sigma Computing CEO Mike Palmer – a self-proclaimed “big data man” who hates the expression – is right, maybe we need to call him something else before we hammer the last nail in the coffin. Call it data on demand, perhaps, as others have done […]]]>

Big Data is dead.

Long live Big Data?

Or, if Sigma Computing CEO Mike Palmer – a self-proclaimed “big data man” who hates the expression – is right, maybe we need to call him something else before we hammer the last nail in the coffin. Call it data on demand, perhaps, as others have done – real-time access to relevant and timely data that doesn’t involve a multitude of expensive middlemen to sort and sort it out. interpretation.

Whether customers are retailers looking to avoid stockouts and plan for better mixes of merchandise, or financial firms keen to make meaningful decisions emerge, the goal of their business – and platform providers as well. that service like this – is to help end users to forge one. a direct connection to the mountains of information they have in store.

As Palmer told Karen Webster, “Large amounts of data have created a certain separation between the decision maker and the data they need and want in order to make the best decision. We live in a world where businesses have billions and billions of records that are all useful to them, but usually not something you can run on your laptop.

Palmer explained that more and more companies are now using platform tools that can take tons of data from various sources – spreadsheets, SQL and Access databases and more – and bring up information in real time with high business value beyond the task at hand.

Cloud-native business intelligence and analytics (A&BI) platforms can break the grip of existing systems, freeing data for new uses and giving businesses of all sizes the processing capabilities they need for them. to understand. However, users who need this data must also access it on demand.

“These questions change all the time,” Palmer said. “This is really where we try to bring together the data, the curiosity of a lot of our professional audience and the technology to make them more self-sufficient. “

Related: Measure and improve customer satisfaction through behavioral analysis

Mentalities are changing

Storage is cheap, Palmer said, and as a result, many companies keep information just to keep it. The challenge today for CFOs and others is getting the right information to the right people in real time, without breaking the budget in the process.

Palmer explained that companies often give up on removing permissions altogether because they don’t have adequate processing capacity.

“They pull data from their data sources and distribute it by email or other sharing mechanisms, because business users need to be able to ask questions about the data and use it on their laptops,” Palmer said.

However, playing quickly and freely with data creates security, governance, and compliance challenges. Platforms like Sigma, he said, keep data secure, providing a middleman between cloud providers like Snowflake while still allowing users to access what they need without running into disruptions. security concerns.

With data more in demand than ever by the connected economy – and soon to be making exotic new connections in the metaverse – real-time database queries can cause a stir.

“We’re talking about giving people the responsibility, but also the empowerment, to ask a question about the data directly, to get a response on demand – that is, in seconds, no matter how small. this dataset – familiarizing them with the available data. to them in those data warehouses, ”Palmer said.

See also: Banks and Merchants Use Behavioral Analytics and Deep Learning to Control Holiday Fraud

The high cost of doing nothing

The connected economy is about uniting vertical sectors and adjacent ecosystems using data. However, speed and accuracy are key to driving more meaningful connections and conversions.

Finance teams tend to balk at all costs, Palmer said, but they are faced with the reality that “with more demand for data and more use of data comes higher costs and they will have to. reconcile return on investment [return on investment] on that.”

The question they need to answer internally is whether better decisions made with better data are worth the investment.

Commenting that old-fashioned data centers aren’t known to be vibrant, Palmer said those who are feeling the most pain because of it right now are involved in the hampered supply chain.

“They have very advanced point of sale systems, they know what’s going on in the store, but by connecting that with the inventory system that could have been built 20 years ago, the ever-changing situation with the “Inventory and distribution logistics, these people jobs have become immeasurably more difficult over the past two years,” Palmer said. “Corn, [it] can be facilitated with data.

This goes for retailers facing stockouts, just as it does for financial institutions with huge data operations that have been overtaken by technology and need to catch up.

Palmer said he often wants potential clients to ask him what they would risk if they didn’t modernize their approach to data access, continuing: What will my business be like in two or three years? What if I did the data better? What more competitive advantage could I have? ‘ “

For Palmer, it’s as simple and relevant as asking where his business would be if he hadn’t embraced e-commerce or the internet in the ’90s.

——————————

NEW PYMNTS DATA: AUTHENTICATION OF IDENTITIES IN THE DIGITAL ECONOMY – DECEMBER 2021

On:More than half of American consumers think biometric authentication methods are faster, more convenient, and more reliable than passwords or PINs, so why are less than 10% using them? PYMNTS, working with Mitek, surveyed over 2,200 consumers to better define this perception gap in usage and identify ways in which businesses can increase usage.


Source link

]]>
Law passed to give UK government stronger screening powers for M&A tech deals https://formes.asia/law-passed-to-give-uk-government-stronger-screening-powers-for-ma-tech-deals/ Tue, 04 Jan 2022 14:37:34 +0000 https://formes.asia/law-passed-to-give-uk-government-stronger-screening-powers-for-ma-tech-deals/ The National Security and Investment Act (NSI) is in effect from today (Tuesday, January 4, 2022), giving the UK government increased powers to review and stop technology-related acquisitions that could potentially present a risk to national security. The law is touted as the biggest overhaul of the UK’s national security screening regime in 20 years […]]]>

The National Security and Investment Act (NSI) is in effect from today (Tuesday, January 4, 2022), giving the UK government increased powers to review and stop technology-related acquisitions that could potentially present a risk to national security.

The law is touted as the biggest overhaul of the UK’s national security screening regime in 20 years and requires the Department for Business, Energy and Industrial Strategy (BEIS) to be made aware of certain acquisitions in 17 technology-intensive industries before the case ends.

Otherwise, any acquisition made without prior approval could be declared void and could also result in civil or criminal penalties for the purchaser, warns the government.

To avoid this, it is incumbent on the investors and companies involved in these transactions to report acquisitions to BEIS, the sectors covered by its scope including data infrastructure, artificial intelligence, communications, IT hardware and l quantum computing, to name a few.

“The NSI Act will give investors additional certainty and clarity, and solidify the UK’s leading global reputation as a global champion of free trade and investment, as well as an attractive place to invest, with more transparency and simpler and more efficient customs clearance processes for relevant acquisitions, ”the government said in a statement.

The government has said it expects that the “vast majority” of acquisitions within the scope of the law will require no intervention and will be completed without delay, and with “the confidence that the government will not reconsider a transaction once. authorized unless false or misleading information is provided ”about it.

As Computer Weekly reported, market watchers have previously expressed concerns that – due to the coming into force of the law – this could have a “chilling effect” on the pace of acquisitions in the 17 sectors that it is making. ‘she covers.

Business Secretary Kwasi Kwarteng said the law is designed to facilitate acquisitions, rather than delay them.

“The UK is globally recognized as an attractive place to invest, but we have always been clear that we will not hesitate to step in if necessary to protect our national security,” he said.

“The new investment screening process in place from today is quick and simple, giving investors and businesses the certainty they need to do business, and giving everyone in the UK the peace of mind of mind that their safety remains our number one priority. “

The government has released a series of guidance documents to help investors negotiate the content of the law and to help them determine whether acquisitions they plan to initiate are reportable under its terms.

Acquisitions are considered to be subject to notification if they have not been completed before November 12, 2020, i.e. the day after the draft law on the INS is tabled in Parliament.

Acquisitions to be notified must also involve a UK-based ‘qualifying entity’ that operates in one of the 17 relevant sectors, and result in the investor acquiring a stake in the company greater than 25%. .


Source link

]]>
Is a greener, faster and more decentralized alternative to Bitcoin possible? https://formes.asia/is-a-greener-faster-and-more-decentralized-alternative-to-bitcoin-possible/ Fri, 31 Dec 2021 21:59:54 +0000 https://formes.asia/is-a-greener-faster-and-more-decentralized-alternative-to-bitcoin-possible/ January 1, 2022 SAN FRANCISCO VSRYPTO IS THE key to paradise, especially financial. At least that’s what the fans claim. Greedy intermediaries, like banks, will be replaced by smart contracts (self-executing rules) that run on blockchains (distributed databases). This will give birth to efficient and innovative financial services, collectively referred to as “decentralized finance” (DeFi). […]]]>

VSRYPTO IS THE key to paradise, especially financial. At least that’s what the fans claim. Greedy intermediaries, like banks, will be replaced by smart contracts (self-executing rules) that run on blockchains (distributed databases). This will give birth to efficient and innovative financial services, collectively referred to as “decentralized finance” (DeFi).

Listen to this story

Enjoy more audio and podcasts on ios Where Android.

The foundations of this building are however fragile. Today’s blockchains may be coding masterpieces, but they’re also wickedly complex, power-hungry, and, perhaps counter-intuitively, centralized. Despite years of work, crypto developers are still trying to fully overcome the compromises inherent in technology.

You can think of banks as maintaining large, opaque databases that contain information about customers’ accounts and the money they contain. Depositors must have confidence that these institutions are acting in their best interests. Sometimes, however, banks may not: they may make bad investments and collapse; or they could freeze depositors’ accounts at the request of a government.

For their supporters, blockchains form the basis of a type of funding that avoids such problems. The account databases would be managed not by a central authority, but by the computers of those who use them. An account can only be frozen if a certain majority of those who maintain the blockchain commit to it.

For the system to work, publicly available blockchains have two special characteristics. One is a “consensus mechanism,” a way for users to agree on how to write new transactions to the database. The other is a set of incentives that keeps the system alive. The rewards must attract enough users to help maintain the blockchain. And the sanctions must deter them from attacking it, for example by impersonating many bogus users in order to overwhelm the system.

In the case of the Bitcoin blockchain, the carrot is a newly minted coin. Every ten minutes or so, hundreds of thousands of specialized computers called “minors” participate in a lottery to solve a mathematical puzzle. The computer that first finds a solution alerts the other miners and if they confirm the result, it updates the blockchain and gets paid (each puzzle solved is rewarded with 6.25 coins, which were worth at the time of writing. this item $ 308,270). Calculating the numbers also acts like a stick: the more chances minors want to win the lottery, the more money they have to invest in hardware and electricity. To rewrite the blockchain in their favor, for example by simulating a transaction, they would have to control more than half of the mining power. Yet designing such an attack would be expensive and likely bring down the system they seek to take advantage of.

This approach, called ‘proof of work’, is straightforward (when it comes to blockchains) and hasn’t really been hacked yet. But it has several big drawbacks. On the one hand, it does not evolve. Bitcoin can only handle seven transactions per second and the fees can be steep. The system has also developed certain forms of centralization. Most puzzle solving is done by a few large “pools”. These allow miners to combine their resources and increase the odds of winning the reward, but also give them the power to influence how the system evolves (as changes are often put to a vote). Plus, proof of work is energy intensive. By some estimates, Bitcoin’s power consumption is approaching that of Italy.

The thirst for power and centralization stem from the increasing returns to the proof-of-work scale. These push the miners to continue to develop. The more computing power they have, the more likely they are to win a reward. The bigger they are, the more they earn and the more they can develop.

Hence the quest for better blockchains. Chia, for example, is a system based on the “proof of space and time”. As with Bitcoin, the carrot is that participating users earn coins. Yet the stick is different: instead of wasting computing power, Chia wastes digital storage. However, it is not yet clear whether Chia will prove to be more sustainable and less centralized than Bitcoin if it becomes widely used.

Smart digital currency is therefore on another approach: proof of stake. Here, decisions about updating the blockchain are not made by a computer arms race, but by a vote among cryptocurrency holders. Voting power as well as the share of rewards depend on how much holders are willing to bet on the outcome. This stake can be destroyed if a participant misbehaves. In this system, the carrot and the stick are the cryptocurrency itself.

Proof of stake consumes much less energy. And its latest incarnations are much faster than Bitcoin: Avalanche, a blockchain that uses the approach, processes thousands of transactions per second. But he still has big problems. Coders have attempted to move Ethereum, the preferred blockchain for DeFi applications, from proof of work to proof of stake. Even Vitalik Buterin, one of the inventors of Ethereum, admits that the proof of stake is “surprisingly complex.” This means that a lot can go wrong, especially when nearly $ 100 billion of capital in DeFi applications has to tip over. After several delays, the coders hope to pass the milestone in 2022.

However, this system would still tend towards centralization. Bigger holders can reap more rewards, further increasing their holdings. This concentrates power among the early buyers of a cryptocurrency and could allow them to take control of the blockchain. Newer projects that use proof of stake try to find ways to avoid this. Hedera Hashgraph is governed by a consortium, much like the one that runs Visa, a credit card network. Avalanche and Tezos seek to ensure decentralization by facilitating the membership of “validators”, the participants who maintain the blockchain.

For critics, centralization is inevitable, even if energy inefficiency and complexity are not. The problem of increasing returns to scale will raise its head for any popular blockchain, predicts David Rosenthal, an early practitioner. “You’re wasting all of those resources to end up with a system controlled by people you have even less reason to trust than those who run mainstream financial institutions,” he says.

For others, a degree of centralization may simply be a price to pay for the other benefits of blockchains. Emin Gün Sirer of Cornell University, who co-founded Ava Labs, which created Avalanche, says the main benefit is that governments will have a harder time influencing blockchains than conventional banks. Kevin Werbach of the Wharton School at the University of Pennsylvania says the openness of blockchains facilitates the development of innovative financial services. Yet if the quest for better blockchains shows one thing, it’s that even in crypto-paradise, there is no free lunch.

For a more in-depth analysis of the biggest stories in economics, business and markets, sign up for Money Talks, our weekly newsletter.

This article appeared in the Finance & economics section of the print edition under the title “Build block better”


Source link

]]>
Two new health-related Apple patents cover gait analysis and aerobic fitness detection in athletic users https://formes.asia/two-new-health-related-apple-patents-cover-gait-analysis-and-aerobic-fitness-detection-in-athletic-users/ Fri, 24 Dec 2021 17:35:18 +0000 https://formes.asia/two-new-health-related-apple-patents-cover-gait-analysis-and-aerobic-fitness-detection-in-athletic-users/ Yesterday, the US Patent and Trademark Office issued two patent applications relating to Apple’s work on user health monitoring features. Our report focuses on one of the patents relating to systems, methods and techniques of electronic monitoring of the health of a user by analyzing his approach. Apple’s invention is more applicable to the sporting […]]]>

Yesterday, the US Patent and Trademark Office issued two patent applications relating to Apple’s work on user health monitoring features. Our report focuses on one of the patents relating to systems, methods and techniques of electronic monitoring of the health of a user by analyzing his approach. Apple’s invention is more applicable to the sporting spirit.

Human gaits are the different ways in which a human can move, either naturally or as a result of specialized training. The human gait is defined as a bipedal and biphasic propulsion towards the front of the center of gravity of the human body, in which there are alternating sinuous movements of different segments of the body with minimal energy expenditure. Different gait patterns are characterized by differences in limb movement patterns, overall speed, forces, cycles of kinetic and potential energy, and changes in contact with the ground.

According to Apple, the advantages of this invention are to help users determine the characteristics of their gait more precisely. Based on this information, computing devices can determine the physical health of a patient and monitor the health of the patient over time. In some implementations, this also enables computing devices to identify health conditions associated with a user and, in response, to take appropriate action to treat those conditions.

In one aspect, Apple’s invention covers a method that includes obtaining, at a computing device, sensor data generated by one or more accelerometers and one or more gyroscopes over a period of time. The sensor data includes an acceleration signal indicative of an acceleration measured by the one or more accelerometers over a period of time, and an orientation signal indicative of an orientation measured by the one or more gyroscopes over the period of time.

The accelerometer (s) and the gyroscope (s) are physically coupled to a user walking along a surface. The method also includes identifying, by the computing device, one or more portions of the sensor data based on one or more criteria; and determining, by the computing device, characteristics relating to a user’s gait based on the one or more portions of the sensor data, the characteristics including a walking speed of the user and an asymmetry of the gait of the user. user.

Apple’s patent FIG. 2A below is a diagram showing examples of positions of a mobile device on the body of a user. Specifically, the user (# 200) can position a mobile device (# 100, an iPad) at a location (# 202a) along their thigh. This could correspond, for example, to the fact that the user places the mobile device (an iPhone) in the pocket of a pants, a dress, a skirt, a shorts, a jacket, a coat, shirt or other clothing.

As a second example, a user can position a mobile device at the location (# 202b) along their hip. This could correspond, for example, to the fact that the user places the mobile device on a support structure fixed to the hip, such as a belt clip or a holster; Orientations 204a and 204b may refer, for example, to a vector projecting from a vertex of the device (for example, the y axis shown in Figure 2B).

In some implementations, the mobile device may be positioned asymmetrically on the user’s body relative to the user’s left and right directions (eg, relative to a central plane, such as a sagittal plane. ). For example, the mobile device can be positioned closer to a right side of its body than to its left side, or vice versa.

Apple’s patent FIG. 3 above is a diagram showing an example of an acceleration signal versus examples of walking phases; FIG. 5 below is a diagram showing an example process for estimating an acceleration experienced by a mobile device relative to a fixed frame of reference.

3 APPLE PATENT FIGURES 5 & 11

Apple’s patent FIG. 11 above is a diagram of another exemplary process for estimating a user’s walking speed and / or other measurements relating to a user’s gait.

For athletes or those in sports medical clinic related fields who would like to explore more details behind Apple’s patent application 20210393166, click here.

Electronic devices with improved detection of aerobic capacity

Apple’s second health-related patent application published yesterday is entitled “Electronic devices with enhanced sensing of aerobic capacity.”

Apple patent summary: “One or more electronic devices may use motion and / or activity sensors to estimate a user’s maximum volumetric oxygen flow, or VO2 max. In particular, although a correlation between heart rate and VO2 max may be linear at high heart rate levels, there is no linear correlation at lower heart rate levels. Therefore, for users without extensive training data, motion sensors and activity sensors can be used to determine the maximum number of calories burned by the user, training data including rate data. heart rate and body metric data. Based on these parameters, a personalized relationship between the user’s heart rate and oxygen pulse (which is a function of VO2) can be determined, even in the absence of high-intensity training data. this way a maximum heart rate and therefore a VO2 max value can be approximated for the user. “

Click here to view patent application 20210393162.

10.51FX - Patent Application Bar


Source link

]]>
Collaboration obtains quantum view of superconducting junction https://formes.asia/collaboration-obtains-quantum-view-of-superconducting-junction/ Wed, 22 Dec 2021 19:04:13 +0000 https://formes.asia/collaboration-obtains-quantum-view-of-superconducting-junction/ A crystal structure that combines a semiconductor and a superconductor is a tantalizing prospect for creating energy efficient computers, or quantum computers, which harness the unique quantum mechanical properties of superconductors. Superconductors carry current with little or no energy loss, while semiconductors offer the control and versatility that has made them a hallmark of transistor […]]]>

A crystal structure that combines a semiconductor and a superconductor is a tantalizing prospect for creating energy efficient computers, or quantum computers, which harness the unique quantum mechanical properties of superconductors. Superconductors carry current with little or no energy loss, while semiconductors offer the control and versatility that has made them a hallmark of transistor technology.

The challenge is to combine the two states and make sure you get the best of both electric worlds – and can still isolate them.

A collaboration between researchers at Cornell and the Paul Scherrer Institute in Switzerland has made it possible to grow a thin layer, only a few atomic layers thick, of one of the oldest known superconductors, niobium nitride, on gallium nitride, a semiconductor which over the past decades has become an essential component of optics and power electronics. For the first time, researchers have successfully measured the electronic properties of the junction between the two materials, a crucial step towards the creation of hybrid superconductor-semiconductor quantum devices.

The group’s article, “Pulse-resolved electronic structure and band shifts in an NbN / GaN superconducting / semiconductor epitaxial heterojunction,” was published on December 22 in Science Advances. The main co-authors of the article are Cornell doctoral student John Wright and Tianlun Yu with the Paul Scherrer Institute.

“We have very different electronic systems that now coexist in the same materials platform. Knowing more about the interface between these two materials and the electronic properties at the interface could allow us to design applications that take advantage of the unique electronic properties of both materials, ”said Wright. “Sometimes the separation between the states of the two materials is the property we would like. And sometimes we may actually want an interaction between electronic states.

The Cornell team was led by Debdeep Jena, David E. Burr Professor of Engineering at the School of Electrical and Computer Engineering and Department of Materials Science and Engineering, and Huili Grace Xing, William L. Quackenbush Professor of Electrical and Computer Engineering and of Materials Science and Engineering, both at the College of Engineering.

The Jena-Xing lab has previously demonstrated that it can integrate niobium nitride with gallium nitride into epitaxial structures and in so doing take advantage of exciting quantum properties. For their new project, they wanted to understand the electronic properties of the two materials independently, as well as the properties at the junction, or interface, where the materials meet.

The group used molecular beam epitaxy to grow a high-quality, precisely controlled crystalline superconducting sample only a few nanometers thick – in itself a significant achievement. Then, they developed a complex capping procedure to preserve the quality and purity of the sample and sent it to their partners at the Paul Scherrer Institute, who used angular-resolution soft X-ray photoelectron spectroscopy ( ARPES) to measure electronic properties both at the surface of the material, as well as deep inside it.

“Historically, niobium nitride was one of the oldest known superconductors. Yet people had failed to measure its complete quantum mechanical electronic structure, ”Jena said. “The experience that was initiated with this collaboration has indeed succeeded in achieving this.

While the Paul Scherrer Institute team carried out their ARPES measurements, the Cornell Group manufactured test devices at the Cornell NanoScale Science and Technology Facility (CNF) and conducted their own electron transport measurements to gain a macroscopic view of the electrons being moving through the material interface and the energy barriers they encounter there.

“The beauty of this work is that when you put gallium nitride with niobium nitride, the fundamental properties of each of these materials don’t change,” said research associate Betul Pamuk, who led the computer modeling. and was one of the co-authors of the article. .

The researchers were surprised to find that the electronic states of niobium nitride differed slightly from what modeling and theory had suggested – a difference that would have been impossible to discover without the combination of ARPES measurements and the high crystal quality and purity. chemical of the sample they cultured. .

One of the most promising applications of the superconductor-semiconductor is in high-quality crystalline Josephson junctions, which can enable non-linear electrical behavior and, therefore, stimulate electronics at high speeds and create qubits – or bits. quantum – for quantum computing.

The impact of the project extends beyond gallium nitride and niobium nitride.

“What’s really good here is that, because gallium nitride is so well studied as a Group III nitride semiconductor, by understanding this information for this set of materials, we can figure out how to design. interfaces with other materials, such as aluminum nitride, indium nitride and their combinations, ”said Guru Khalsa, research associate and co-author of the article.

The main co-author of the article was Vladimir N. Strocov of the Paul Scherrer Institute. Other co-authors include David Muller, Samuel B. Eckert professor of engineering in the School of Applied and Engineering Physics; Celesta Chang, Ph.D. ’20; and researchers from the Paul Scherrer Institute, the German Electron Synchrotron and the Shanghai Research Center for Quantum Sciences.

The research was supported by the National Science Foundation through the Cornell Platform for Accelerated Completion, Analysis and Discovery of Interface Materials (PARADIM) and the Office of Naval Research. The CNF is a member of the National Coordinated Nanotechnology Infrastructure of the NSF.


Source link

]]>
Are you accumulating technological debts? – Gadget https://formes.asia/are-you-accumulating-technological-debts-gadget/ Tue, 21 Dec 2021 07:12:40 +0000 https://formes.asia/are-you-accumulating-technological-debts-gadget/ Every business must manage and mitigate the impact of technical debt. Technology debt is the exponential accumulation of technology problems and the resulting impact of outdated practices, methodologies, processes, applications, legacy hardware, and IT infrastructure on businesses. The result is organizational inertia, exposing the company to internal risks in terms of sustainability, security and customer […]]]>

Every business must manage and mitigate the impact of technical debt. Technology debt is the exponential accumulation of technology problems and the resulting impact of outdated practices, methodologies, processes, applications, legacy hardware, and IT infrastructure on businesses.

The result is organizational inertia, exposing the company to internal risks in terms of sustainability, security and customer loyalty. Fortunately, there are ways to mitigate tech debt risk and, with focused management, to minimize and recover from it.

Similarities can be found in the premise of technological debt similar to financial investments. As an individual, if we had invested in the right stock (in this case, IT and cloud hosting), at the right time (say the last on-premise renewal cycle of the company), we could have had gains of up to 100% (considered in terms of the real cost of ownership [TCO]) within the past five years. Instead, the business is still struggling with legacy IT issues.

  • Use of financial resources for server rooms, power, outdated backups and disaster recovery practices, incompatible with business needs.
  • Manually apply governance and security to the level of sophistication required for today’s cybersecurity challenges.
  • Manually correct, manage and maintain infrastructure as well as operating systems, increasing inefficiencies alongside the pressures of maintaining scarce skills and escalating labor costs.
  • Overprovisioning the 24/7 server infrastructure for worst-case scenarios equates to unnecessarily higher costs. Because this availability scale is only required for 5% of the year.
  • Missed opportunities to refactor renewal cycles and reallocate IT technology and licensing resources due to outdated operating models.

At the same time, technology continued to evolve.

  • Most software updates are iterative.
  • Operating systems no longer support legacy technologies.
  • The world has shifted to a hybrid work model, and with it, the habits of the workforce have changed to become predominantly digital.
  • Consumers’ engagements with businesses have evolved to become increasingly digital.
  • Smart companies have reinvested, redeployed and upgraded their workforce for the digital economy.

Lagging behind or ahead of the curve?

As such, the role of IT has mutated to become a critical business catalyst, providing the infrastructure on which the digital economy relies. As each engagement is increasingly realized thanks to this digital economy, it is poignant to question the strategic positioning and the use of IT within the company as well as its ability to achieve business objectives?

1. Broaden the company’s understanding of the role of IT in the stakeholder experience.

As technology evolves, the way businesses and consumers interact and use digital assets organically changes in response. As a result, the technology shifted from something the IT department manipulated to the underlying architecture of business activation.

Today, each department works on some form of software application that enables it to perform its business function. In turn, these applications must integrate or be updated manually to achieve business goals.

A well-architected cloud ecosystem will position a business to deliver strategic value to all stakeholders while creating business agility and resilience.

2. Align technology choices with business strategy by investing appropriately from the start.

Invest strategically with the end state in mind. If a company’s goal is to increase workforce efficiency, cybersecurity, governance automation, and compliance while enabling a smoother customer experience. Company plans and resources should reflect this by investing in technology to enable this state.

It also means taking a measured and pragmatically divergent approach to ICT. Reassessing the current environment and thinking differently is essential for development. The digital economy is driven by new technologies, methodologies, practices and processes. Therefore, a company’s ICT strategy must follow suit.

3. Redefine the legacy understanding of IT costs and operational management.

By redefining the department’s strategy, the IT funding method will evolve organically. Reallocating funds from an outdated hosting model to an automated and scalable hosting model adds value in two ways. First, by reducing onerous financial demands, and second, by redistributing saved funds.

The reinvestment and updating of IT technology renewal cycles will better position the company’s competitiveness within the digital economy. An economy based on instantaneous delivery and rich in similar possibilities.

Outdated technology and operating models are some of the root causes of tech debt. Due to budget constraints, companies try to extend the life of the hardware they use but ultimately end up costing the company more due to technical debt.

4. Implement a cloud-centric operating model and prepare legacy applications for the cloud.

Enterprises are at a point where implementing a strong cloud operating model is imperative for business continuity, agility, security, and resiliency. This readiness should be deployed sooner to avoid further risks and losses associated with tech debt. Implementation based on industry best practices in the form of proven solutions is essential whether a business is currently in the cloud, uses on-premises servers, or operates a hybrid model.

Developing a cloud-centric, forward-thinking business requires a pragmatic culture, as well as a knowledgeable and knowledgeable team that can properly navigate and implement the elements of a business-centric approach. cloud.

One of the main challenges in this process is how a business can handle the migration of legacy applications (systems) to the cloud. Mismanagement of this component could set a business down further. Simply moving a legacy system to the cloud will only exacerbate the current system problems. Also, to do it right, it’s important to remember that this iterative process is a relay, not a sprint.

The continued inertia of legacy applications can be avoided by preparing the ecosystem for decoupling from legacy systems. Using a measured migration and modernization process, such as implementing a ring-fenced API environment, allows a business to start reaping the benefits of a cloud environment as soon as possible. The business can then strategically and systematically upgrade business systems to meet the organization’s strategic cloud goals.

5. Choose an expert partner who meets the critical strategic requirements of the business.

There are several ways a business can migrate its operations to the cloud. While not all methodologies add value, in fact some will increase technical debt and continue to rise, decreasing the ROI potential offered by the cloud. It is therefore essential to selectively partner with experts who focus on achieving the identified strategic business outcomes.

As a result, the right partner is a critical consideration in achieving ROI. In addition, the right partner will also contribute to effective cost management and ensure the long-term business benefits of all cloud computing “ity”.

The cumulative effects of technological debt

Uncontrolled technical debt and the choice of short-term gains over quality, agility and sustainability ultimately prevent a company from being able to compete, innovate and adapt to changes in the industry. But the greatest cost of technical debt is performance and growth, as well as unrealized potential and lost opportunities.

By using Microsoft Azure, properly architected, our customers are assured of better delivery, faster turnaround time, improved flexibility, disaster recovery and security.

Ultimately, technical debt, with all its nuances and impact on velocity, builds up very quickly for businesses of all sizes. It’s about making informed decisions and investing in the right technology at the right time.

As a solution provider, Tangent encourages companies to invest in DevOps technologies and methodologies that allow them to stay competitive. It’s time to think outside the box when it comes to a company’s cloud computing infrastructure, because adopting a legacy operating model, without challenging traditional practices, has negative long-term consequences.


Source link

]]>