Archive for the ‘Free Software’ Category

ExpressVPN TrustedServer – everything you need to know – TechRadar

Data security and users' privacy are the core elements that lie behind all the best VPN software. However, even the most top-notch security features can have some vulnerabilities at times.

Malicious actors can hack VPN servers to steal users' data, for example. Some governments are even passing invasive laws to force providers to hand over this information upon request - that's exactly what's happening in India at the moment.

It's in this context that our top-rated service ExpressVPN has developed its own TrustedServer technology to boost users' data protection. "Because of how it's engineered and the fact that it runs in RAM only, our VPN servers are built from the ground up to ensure no sensitive data is logged, even by accident, and thus not accessible by us or third parties, said ExpressVPN vice president Harold Li.

Let's have a better look at how ExpressVPN's TrustedServer tech works and how it differs from traditional servers.

ExpressVPN developed its own TrustedServer technology in 2019 with the aim of minimizing the risk of users' data being compromised.Not long after its release, independent audit professionals from PricewaterhouseCoopers (PwC) confirmed that the new platform works in compliance with ExpressVPN's Privacy Policy. This means that no connection logs nor activities logs are retained.

A VPN server - whether a physical or virtual one - is a combination of pieces of hardware and software that allow users to connect to a secure private network. It's the VPN server that masks your real IP address, replacing it with one of its own. It's the software running the server, together with the VPN protocol, that's responsible for encrypting your data and traffic.

An industry-first in the market, the top provider builds its very own secure VPN servers platform - all of its 3,000+ are developed upon this technology.

ExpressVPN TrustedServer technology has essentially brought two main important innovations that set them apart from traditional servers.

1. Servers running entirely on RAM: never keep logs

Traditional servers generally run via a hard-disk system. This means that the data is locally retained until it's erased and written over. If the servers are seized or hacked, there's a risk that third parties can access users' sensitive information.

In contrast, TrustedServer technology works on Random Access Memory (RAM). Also called volatile memory, RAM needs power to store data. This means that every time you shut down your device, all the information will vanish, and in the case of servers, nothing is stored on the server after a reboot.

2. Secure and up-to-date code stack: minimize risks of bugs

Another important innovation comes with the way TrustedServers are internally built. Normal servers have their operating system (OS) and software installed the first time these are set up. Every time there's a new update, this is added on top of the existing system. This creates opportunities for differences to arise among servers, meaning that developers cannot be 100% sure that all the servers run with the same secure code.

TrustedServer intends to fix these potential vulnerabilities by running its servers via a single cryptographically signed read-only image. So, every time the server is rebooted, the newest version of the stack (the OS and the VPN infrastructure above it) is loaded as a unique block. In this way, the risk of vulnerabilities and misconfiguration is eliminated. It also means that the server owner - in this case, ExpressVPN - knows exactly how each server is running at all times.

ExpressVPN is the only provider in the market that developed its RAM-only servers in a way that the entire software stack is reinstalled at every connection. However, other services are now running their servers with volatile memory instead of a hard-disk.

It was in 2020 that NordVPN, Surfshark and Private Internet Access upgraded all their servers to be RAM-only. They took further security measures, too. NordVPN is now shipping its own hardware to data centres, for example, while PIA's staff is no longer handling the server setup.

CyberGhost is another big name that made the change from hard-disk to RAM servers. The provider went even further, though. It also offers a few NoSpy servers for extra security. These are built in their Romanian headquarters so that its team manages them internally end-to-end.

Learn how to boost your streaming experience with ExpressVPN MediaStreamer

Get today's best pricing on ExpressVPN

See original here:
ExpressVPN TrustedServer - everything you need to know - TechRadar

The Best Mobile POS Systems Of 2022 – Forbes

Revel is a flexible mobile POS system for numerous reasonsnot just because it lets you manage multiple locations from one system. You can use it on an iPad to take orders tableside, set it up as a kiosk with an iPad stand for customers to place their own orders, or accept online orders. It also works well for several types of businesses, including retail stores and restaurants.

The advanced inventory features by Revel let you manage complex inventories. So, you can manage multiple SKUs, variables, or raw ingredients. Similar to other top ranked POS systems with inventory management, youll get low-stock alerts, so you never oversell. Plus, you can turn your mobile POS system into a handheld barcode scanneruse your phone with the Revel inventory app to scan codes to update inventory quickly.

The price for Revel is a bit higher than other mobile POS solutions at $99 per month (if paid annually), but there are a few caveats. Youll have to sign a three-year contract to get that price. Plus, theres an onboarding fee that starts at $674. To be fair, Revel is a more complicated system, so youll likely be grateful for the installation and onboarding help. Revel offers its own payment processing solution, but despite what the company claims on its site, pricing isnt transparentno fees are published.

Who should use it:

Revel is a pricey mobile POS system, but it may be worth it if you have multiple stores with multiple inventories to manage. Youll have to contact them for a quote on pricing for hardware and payment processing.

See the article here:
The Best Mobile POS Systems Of 2022 - Forbes

‘software Quality Is Key To Success Of Digital World’ | Mint – Mint

VERY recently, India became home to a 100 Unicorns with a consolidated valuation of $332.7 billion.Unicorns are companies with over $1 billion valuation, and needless to say, this is anamazing feat considering India only had 10 Unicorns in total by the end of 2016. As a result of phenomenal innovation and continuous flow of funding within the Indian start-up ecosystem, India has marched ahead by building world-class companies. These start-ups are creating large-scale employment and providing breakthrough solutions and technologies. The future further looks bright with India being anticipated to be home to 60,000-62,000 start-ups, including more than 150 unicorns, by 2025.

Now, a majority of these Unicorns are built around high-quality software accompanied by a solid user base to help them attract worthy investment or persuade potential buyers. Quality being the key word here. Consumers, clients, users are hooked to quality products/services that work uninterruptedly, sans any issues. No Unicorn can afford a quality disaster, and the only way they are able to deliver great-looking error-free apps is by roping in the lesser known and appreciated heroes in software development, i.e. the software testers. And Manish Gupta, CEO of a specialist software testing company TestingXperts, believes that in the coming days, testing will play an even more crucial role with companies looking to deliver software to market faster.

With the pandemic accelerating the age of digitalization, software testing is a non-negotiable service to enable digital transformation in an error-free, accelerated manner. Software developers create programmes for digital applications. Its software testing companies who work continuously, stay ahead of the curve, pre-empting and detecting flaws to ensure a seamless user experience," explains Manish.

Nearly 87% of unicorns provide software products that need quality assurance, and hence hire independent software testing companies, treat them like an equal part of the internal team to prioritize customer experience and have a more robust chance of growing valuation.

For any business to scale, it has to validate and verify its product. The same applies to a high-quality application - there are multiple dimensions to be looked at. For instance, does the application perform the business function?Where does it stand on usability, stability and accessibility?Can it handle volumes, per second, per minute? Does it have the ability to function across hundreds of mobile device brands and versions? Most importantly, is it secure? Is the speed too slow or acceptable? In a digital world, where every second is valuable, any discrepancy only amplifies cost and affects efficiency and reputation of the app. Continuous testing, right from the nascent stage, is for these very checks and balances," says Manish. Tx has worked with leading Unicorns including Swiggy, Acko, Delhivery, to name a few, and helped them maintain high product quality, expand their products functionality, and increase customer satisfaction, customer loyalty and revenue.

Aniche player in establishing competitive standards in several testing areas, global research and analysts have recognized TestingXperts as a leader in Quality Assurance helping organizations with digital transformation and providing a flawless consumer experience, which, in turn, makes businesses grow.

We are surrounded by digital applications (web, mobile, smart devices etc.) and rely heavily on them for getting our small to big needs fulfilled. Right from simple things like ordering a snack or booking a movie ticket, to more complicated needs like banking or medical diagnostics, we take it for granted that these applications will do their job as they should be. Thats exactly the job software testing companies, and software testing functions within companies in general, perform. Imagine a world where the payment you made to a friend ends up not getting credited, or the flight tickets you just booked end up being booked for a wrong date even if these happen one in a million cases, it would severely impact our lives and the confidence with which we go about carrying out these tasks through software," explains Manish, rightly pointing to the criticality of error-free software.

Another interesting paradigm is testing automation which forms the bed-rock of faster application delivery. Automation has emerged as a major success path for businesses to get their desired digital-first solutions. Businesses today need complex solutions at speed, and to combat the same, automated testing is the key to ensure repetitive tests can be carried out without manual intervention," adds Manish.

With software impacting every facet of our lives with more complex technology, it is evident that software testing will continue to thrive and help companies launch innovative solutions to market with ease and lead to more Unicorns, and in the near future, Decacorns.

Disclaimer: This article is a paid publication and does not have journalistic/editorial involvement of Hindustan Times. Hindustan Times does not endorse/subscribe to the content(s) of the article/advertisement and/or view(s) expressed herein. Hindustan Times shall not in any manner, be responsible and/or liable in any manner whatsoever for all that is stated in the article and/or also with regard to the view(s), opinion(s), announcement(s), declaration(s), affirmation(s) etc., stated/featured in the same.

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Continue reading here:
'software Quality Is Key To Success Of Digital World' | Mint - Mint

Intel Blazes Security And Software Trails At Intel Vision – Forbes

Intel shared details of some interesting software-based initiatives at its Intel Vision event in ... [+] Dallas. (Photo by Justin Sullivan/Getty Images)

For most people, the name Intel evokes hardware. Intel has played a pivotal role in the explosion and evolution of processor technology over the last 50 years, and remains a dominant player in the computer hardware arena. At Intel Vision in Dallas last week, though, the company shared an alternative version of Intel Insideembracing the software side of the equation as well.

In his keynote presentation on Day 2 of the event, Greg Lavender, Senior Vice President and Chief Technology Officer; General Manager of Intel Software and Advanced Technology Group, opened with a bit about his appreciation for the contributions of Michael Faraday and described himself as a software guycaptured in the electromagnetic field of hardware.

He talked about digital transformation and the benefits of new technologies but added a word of caution. Every innovation brings its own set of new challenges. It is true that the seamless integration of technology into our lives is allowing us to do more than ever. But at the same time, it's creating an attack surface and attack vectors at a scale that we've never seen before.

That set the stage to discuss the importance of Confidential Computing, and initiatives Intel is working on to enhance trust and improve cybersecurity for everyone.

I spoke with Lavender during the Intel Vision event about his keynote and Intel offering a software-as-a-service (SaaS) solution to help developers optimize application performance. Or, providing an easy button as he explained it.

Intel is in a unique position to understand how the hardware works. They engineered it. As such, Intel is also intimately familiar with what the hardware is capable of and how to optimize performance.

In contrast, Lavender noted that there are an estimated 25 million software developers, with about a million added just in the last year. Many are not deep, experienced programmers. The advent of low-code and no-code development tools has lowered the bar for entry. These developers want an application that works, is secure, and can scalebut they dont necessarily have the knowledge or skills to know how to make all of that happen.

Hence, the easy button.

There can also be significant costs associated with poor performance. Cloud platforms and services are typically billed based on consumption of resources. Applications that use those resources inefficiently can result in a shocking bill at the end of the month.

Intel acquired Granulatea company focused on optimizing cloud performance. Granulate automates the process of identifying issues and bottlenecks, and resolving inefficiencies to improve performance and reduce costs.

Intel provides an initial profile and recommendations for free. For most companies, though, software changes often. DevOps practices and CI / CD (continuous integration / continuous deployment) tools have accelerated the development lifecycle. To ensure optimal performance on a consistent basis, Intel is offering performance-analytics-as-a-service under a subscription license through the Intel Developer Cloud.

Another software-based initiative Intel shared at Intel Vision is Project Amber.

Trust makes the world go roundespecially online. Our world increasingly relies on and revolves around technology. Connecting to platforms and services, interacting with applications, and communicating between devices or individuals all require trusttrust that the entity on the other end is legitimate, and that any communications and data between Point A and Point B will be secure and protected from interception or unauthorized access.

The question is how to achieve that trust.

In a nutshell, there are three steps that have to happen for Confidential Computing. First, you request an instance from the cloud. Second, the instance is spawned within a Trusted Execution Environment (TEE). Third, based on that attestation and trust, you deploy sensitive workloads in the cloud.

Seems relatively simple, but there are issues. I spoke to Nikhil Deshpande, Director of Product Development at Intel, about the challenges of trust in online interactions. He pointed out that in many cases today the cloud platform you request the instance from is attesting to the trustworthiness of its own TEE. This self-attestation is a problem for some customersespecially in tightly regulated industries.

Another challenge organizations face is that many have hybrid environments that span multiple cloud platforms. They might get attestation from a cloud platform, but it is limited only to that infrastructure. If you are running workloads across three different cloud platforms, you end up with three different attestations, and no uniform way to assure trust across the complete environment.

Finally, Deshpande said that a third challenge is that some organizations attempt to solve the first two challenges by building their own framework for attestationbut that is complex. It costs a lot to build and maintain a functional system.

Intel hopes to address these challenges with Project Amber. Project Amber will be an independent, third-party trust authority. The simplest way I can explain this initiative is to compare it to a Certificate Authority (CA). A CA is an independent, third-party that provides assurance of certificates. Project Amber will do the same thing for trust.

Within a system, a TEE typically relies on a Trusted Platform Module (TPM)a physical or embedded technology that resides on the motherboard or in the processor. TPMs use cryptography to securely store essential and critical information and enable platform authentication. The main question I have regarding Project Amber is, How do you get that level of trust in the cloud? How do you know you can trust the Trust Authority?

Deshpande explained that one element of Project Amber is a feature called Verify Integrity of Trust Authority. We will have a verification ability for the end users to ensure that they can actually see how Project Amber has verified certain things. Our intention is to be very transparent, because security needs transparency, and we want to be transparent across all. So, there are features built into the service to provide assurance to the Project Amber user that this is how this attestation has been protected.

The initiative is in the early stages right now. Deshpande explained that Intel plans to launch a pilot of Project Amber by the end of this year, with a goal of moving to GA (general availability) by early 2023.

This is just the tip of the iceberg from Intel Vision. Intel execs shared tons more on the roadmap, andwell, vision for what lies ahead. These two aspects stood out to me, though, as examples of a company that is synonymous with PC hardware pursuing new horizons and exploring how software can make the hardware better and more secure.

Original post:
Intel Blazes Security And Software Trails At Intel Vision - Forbes

Faculty receive WARF Named Professorships, Kellett Fellowships, and Romnes Awards – University of Wisconsin-Madison

Thirty-two members of the University of WisconsinMadison faculty have been awarded fellowships from the Office of the Vice Chancellor for Research and Graduate Education for 2022-23. The awardees span the four divisions on campus: arts and humanities, physical sciences, social sciences and biological sciences.

These awards provide an opportunity for campus to recognize our outstanding faculty, says Steve Ackerman, vice chancellor for research and graduate education. They highlight faculty efforts to support the research, teaching, outreach and public service missions of the university.

The awards are possible due to the research efforts of UWMadison faculty and staff. Technology that arises from these efforts is licensed by the Wisconsin Alumni Research Foundation and the income from successful licenses is returned to the OVCRGE, where its used to fund research activities and awards throughout the divisions on campus.

Bell

Emirbayer

Gralnick

Jin

Kaeppler

Kenney

Saffman

Taber

WARF professorships come with $100,000 and honor faculty who have made major contributions to the advancement of knowledge, primarily through their research endeavors, but also as a result of their teaching and service activities. Award recipients choose the names associated with their professorships. Eight faculty are recognized this year.

Michael Bell, Philip D. Lowe Professor of Community and Environmental Sociology, whose work focuses on three themes: environmental sociology, agroecology and community, and is particularly centered on the social meaning of nature, especially its relationship to the social organization of inequality.

Mustafa Emirbayer, John Dewey Professor of Sociology and Social Thought, who joined the Department of Sociology at UWMadison in 1999. His career has focused on sociological theory building, influenced most deeply by the philosopher, psychologist and educational reformer John Dewey.

Lisa Gralnick, Fred Fenster Professor of Art, whose work explores the use of jewelry as a conceptual reference point. She mines the history and cultural contexts of both adornment and gold, and as a goldsmith and sculptor, she has explored issues related to value and economics, intimacy and preciousness, and material culture in world history.

Song Jin, Francis J. DiSalvo Professor of Physical Sciences, whose research is focused on the chemistry, physics, and technological applications of nanoscale and solid-state materials. His research team is interested in the use of nanomaterials in renewable energy conversion, including photovoltaic and thermoelectric energy, and the applications of nanomaterials in biotechnology.

Shawn Kaeppler, Ransom A. Moore Professor of Agronomy, whose career has focused on crop breeding, genetics, genomics and biotechnology. Much of his research has been on maize, including research on the mechanisms of crop efficiency and productivity, and refinement of plant breeding methodology.

Shannon Kenney, Eva Therman Professor of Oncology, Wattawa Bascom Professor in Cancer Research and Professor of Oncology and Medicine, studies the molecular regulation and pathogenesis of Epstein-Barr virus (EBV), a virus that causes human cancers. Her research serves as a basis for potential new treatments of EBV-induced tumors.

Mark Saffman, Johannes Rydberg Professor of Physics and director of The Wisconsin Quantum Institute, who first began work on atomic physics and initiated a long-term effort to develop quantum computers. He is known for his research as a leader in the ongoing development of atomic quantum computers based on the Rydberg blockade mechanism.

Christopher Taber, James J. Heckman Professor of Economics and Walker Family Distinguished Chair in Economics, whose research focuses on the economics of education, earnings inequality and on non-experimental methods for policy evaluation. He is currently focused on the determinants of college dropout decisions and the market for teachers.

Alcal-Galn

Baird

Fawaz

Kats

Lopez

McCulloh

Mehle

Padilla

Roy

Sherer

Toma

Vlach

Zavala

The Romnes Fellowships recognize faculty with exceptional research contributions within their first six years from promotion to a tenured position. The award is named in recognition of the late WARF trustees president H.I. Romnes and comes with $60,000 that may be spent over five years.

Mercedes Alcal Galn, professor of Spanish literature and culture and president of the Cervantes Society of America. Her most recent book explores the sexual and reproductive bodies of women in early modern Spain, while her research has also been oriented toward visual culture in Spain during that time period.

Ian G. Baird, professor of geography and director of the Center for Southeast Asian Studies. Most of his research, focused on fisheries and fish ecology, is centered in Laos, Thailand and Cambodia.

Ramzi Fawaz, professor of English and affiliated faculty in the Department of Gender, Womens and Sexuality Studies. He explores the relationship between popular culture and social movements in the modern U.S. and is interested in the ways that movements for womens and gay liberation, Black power, AIDS activism, and the third world left have used literature, film and visual media as vehicles for giving voice to commonly marginalized groups.

Mikhail Kats, professor of electrical and computer engineering. His research include optics and photonics, device physics, nanoscale science and quantum technologies, especially geared toward creating next-generation optical components to emit, modulate and detect light across the visible and infrared spectra.

Lori Kido Lopez, professor of communication arts and director of the Asian American Studies Program. Her research examines the way minority groups use media in the fight for social justice, and especially the ways grassroots/activist media, digital media and consumer culture play a role in transforming identities and communities.

Kate McCulloh, professor of botany. As a plant physiological ecologist, her research focuses on how trees tolerate stresses. Her projects have explored what factors cause the worlds tallest trees to stop growing and why some species die in severe droughts more than others.

Andrew Mehle, associate professor in medical microbiology and immunology. His lab studies the battle between cells and influenza virus, and in particular, how the virus exploits cellular processes, evades cellular defenses, and repurposes cellular machinery.

Darcy Padilla, professor of art. As a documentary photographer, she focuses on narrative and works on long-term projects about struggle and its trans-generational effects.

Sushmita Roy, associate professor of biostatistics and medical informatics and faculty at the Wisconsin Institute for Discovery. Her research focuses on computational methods to advance our understanding of the molecular basis of processes such as development, disease and evolution.

Nathan Sherer, professor of oncology and molecular virology and director of the UWMadison Molecular and Cellular Pharmacology Graduate Program. He studies the cell biology underpinning the replication of HIV and other viruses.

Catalina Toma, professor of communication arts and co-chair of UWMadisons Teaching Academy. She examines the implications of new communication technologies on the interpersonal relationships of users and on their psychological wellbeing.

Haley Vlach, professor of educational psychology and director of the Learning, Cognition & Development Lab. Her research examines childrens cognitive development, including their ability to remember information, acquire language and construct concepts.

Victor Zavala, professor of chemical and biological engineering. His research focuses on computational mathematics and their application to energy, agriculture and sustainability. He is also working to foster more diverse, inclusive and equitable academic environments within the College of Engineering.

Baker

Burden

Choi

Dharwadker

Friedrich

Gopalan

Gray

Jha

Kendziorski

Nemet

Townsend

Eleven faculty have been honored with Kellett Mid-Career Awards to support those promoted to tenured positions seven to 20 years ago and who have made key research contributions in their fields. The award, named for the late William R. Kellett, a former president of the WARF board of trustees and president of Kimberly-Clark Corporation, provides support and encouragement to faculty at a critical stage of their careers and comes with $75,000 to be spent over five years.

Bernadette Baker, professor in the Department of Curriculum and Instruction. Her work draws upon multiple disciplines as they intersect with past-present curriculum debates, conceptions of knowledge, and social and educational inclusion/exclusion. Her research utilizes a variety of approaches in curriculum studies, educational history and philosophy, and contemporary policies and practices focused on well-being. She received a Fulbright fellowship and has led major national and international curriculum associations.

Barry Burden, professor of political science and director of the Elections Research Center. He studies electoral democracy and representation in the United States and his research examines the individual and systemic factors that influence voter turnout, the effects of election rules on campaigns and voters, and how the public understands the political world.

Kyoung-Shin Choi, professor of chemistry and co-founder of ChloBis Water, Inc. Her research integrates electrochemistry and materials chemistry and focuses on design, synthesis and characterization of semiconducting and metallic crystals and electrodes for use in the production of clean fuels using solar energy, (photo)electrochemical biomass conversion, and water treatment.

Aparna Dharwadker, professor of English and interdisciplinary theatre studies. She has expertise in British, postcolonial, modern Indian and contemporary world theatre. Her scholarship and teaching have focused on the complex effects of European colonialism in South Asia, Africa and the Caribbean.

Thomas Friedrich, professor of pathobiological sciences. Friedrich studies how RNA viruses like HIV, influenza, Zika, and SARS-CoV-2 overcome evolutionary barriers to jump between species, spread, and cause disease. His work has helped reveal the evolutionary forces that affect the emergence and spread of new viral variants, and he is working to track the patterns of SARS-CoV-2 transmission in Wisconsin.

Padma Gopalan, professor of materials science and engineering. She works on developing materials and strategies to address problems that reside at the interface of materials science, chemistry, chemical engineering and biology. This includes fabricating very small features for microelectronics, as well as materials for rapid expansion of therapeutic cell lines.

Jonathan Gray, Hamel Family Distinguished Chair in communication arts and professor of media and cultural studies. His work examines how audiences interact with entertainment media, paying particular attention to television as a cultural entity. He is also interested in audience dislike for specific media.

Somesh Jha, professor of computer sciences. He studies information security and the intersection of adversarial machine learning and privacy. He is also involved in the Center for Trustworthy Machine Learning at Penn State University.

Christina Kendziorski, professor of biostatistics and medical informatics. She develops statistical methods and software for genomic based studies of development and disease and is known for her widely used methods for RNA-sequencing studies. Kendziorski has also collaborated with a number of companies, including Nimblegen, ThirdWave Technologies, Eli Lilly and Merck Pharmaceuticals.

Read the original here:
Faculty receive WARF Named Professorships, Kellett Fellowships, and Romnes Awards - University of Wisconsin-Madison