Source code – Amity Source http://amitysource.com/ Tue, 28 Jun 2022 19:06:39 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://amitysource.com/wp-content/uploads/2021/07/icon.png Source code – Amity Source http://amitysource.com/ 32 32 AstraLocker Ransomware Spreads in “Smash and Grab” Attacks https://amitysource.com/astralocker-ransomware-spreads-in-smash-and-grab-attacks/ Tue, 28 Jun 2022 19:06:39 +0000 https://amitysource.com/astralocker-ransomware-spreads-in-smash-and-grab-attacks/ A new version of AstraLocker ransomware has been observed being distributed directly from Microsoft Office files sent via phishing emails, an unusually fast delivery method that leads researchers to believe the threat actor behind the ransomware is solely interested in making a big impact and receiving quick payout, or what they call a “smash and […]]]>

A new version of AstraLocker ransomware has been observed being distributed directly from Microsoft Office files sent via phishing emails, an unusually fast delivery method that leads researchers to believe the threat actor behind the ransomware is solely interested in making a big impact and receiving quick payout, or what they call a “smash and grab” approach.

The AstraLocker ransomware was first identified in 2021 and is a fork of the Babuk ransomware-as-a-service, which also appeared in early 2021. The latest version of AstraLocker, meanwhile, has been observed to the first time in March. Researchers said AstraLocker attacks are unique in that the ransomware is deployed to victims at a very early stage of the attack, immediately after the target opens the malicious attachment on the phishing email. , rather than the “weak and slow” methodology that is common among sophisticated ransomware groups.

“Typically, affiliate threat actors avoid pushing ransomware early, opting instead for files that allow them to extend their reach into the target environment,” said Joseph Edwards, senior malware researcher at ReversingLabs, in an analysis Tuesday. “Ransomware is almost always deployed last, after compromising the victim’s domain controller(s), allowing cybercriminals to use the domain controller (e.g. Active Directory) to deploy a GPO and encrypt all hosts in the affected domains. »

The new version of the ransomware uses an outdated packer in an attempt to make reverse engineering difficult; the packer injects indirect jumps every five to seven instructions to obfuscate program control flow, Edwards said.

It also takes several steps to evade detection, including checking if it is running in a virtual machine, checking the names of open windows to determine if any malware scanning tools are running, and checking for running processes to see if they are in a scanning environment. Once unpacked, the ransomware attempts to disable endpoint backup and anti-malware security tools, kill any applications known to block data encryption, and delete Volume Shadow Copies, an included technology that can create copies backing up files or volumes.

“What this attack makes clear is that the leak of Babuk source code and builders in 2021 allows cybercriminals of any sophistication to launch their own operations, simply by making small changes to existing Babuk code.”

The ransomware attack vector has potential weak points, as running the ransomware actually requires a significant amount of user interaction. After opening the malicious Word document attached to the email, the target is prompted to perform several additional clicks (including clicking an icon in the document and agreeing to run an embedded executable) to activate the embedded ransomware, which is stored in an OLE object.

“Needless to say, requiring so much user interaction increases the chances of victims thinking twice about what they’re doing,” Edwards said. “This is one of the reasons why OLE objects are used less in malware delivery, as opposed to the more popular VBA macro infection method, which only requires the user to enable macros to s ‘execute.”

The ransomware finally displays a ransom note which includes Monero and Bitcoin wallet addresses for payment. The ransomware variant’s wallet addresses are different from those used by earlier versions of the malware and in the Babuk ransomware.

The new variant also omits a functional email address to contact threat actors in the ransom note, which means the threat actor has no way to deliver the decryptor to the victims even if the ransom is paid, the researchers said. Researchers believe this is a mistake and reflects a drawback of the “crush and grab” approach in this attack; although AstraLocker 2.0 attackers were able to shorten attack time, “it’s easy for attackers launching such hasty efforts to make mistakes,” Edwards said.

Researchers said the threat actor responsible for this recent campaign likely obtained builders for AstraLocker 2.0 ransomware due to Babuk’s source code being stolen and leaked on a Russian hacking forum in September. This means that in addition to a shorter timeframe for attacks, actors also do not need to make large investments to infect victims.

“What this attack makes clear is that the leak of Babuk source code and builders in 2021 allows cybercriminals of any sophistication to launch their own operations, simply by making small changes to existing Babuk code,” Edwards said. . “This is what we observe with the AstraLocker 2.0 malware.”

]]>
Researchers Present Machine Learning-Based Algorithm for Efficient Approximation of Matrix Multiplications https://amitysource.com/researchers-present-machine-learning-based-algorithm-for-efficient-approximation-of-matrix-multiplications/ Sun, 26 Jun 2022 23:37:34 +0000 https://amitysource.com/researchers-present-machine-learning-based-algorithm-for-efficient-approximation-of-matrix-multiplications/ One of the most important and computationally demanding processes in machine learning is matrix multiplication. As a result, much research has been done on matrix multiplications which can be approximated well. The researchers are trying to develop a learning-based system that works much better than the current approaches in this study. It runs 100 times […]]]>

One of the most important and computationally demanding processes in machine learning is matrix multiplication. As a result, much research has been done on matrix multiplications which can be approximated well. The researchers are trying to develop a learning-based system that works much better than the current approaches in this study. It runs 100 times faster than real matrix products and ten times faster than most popular approximate algorithms, based on experiments using hundreds of matrices from various fields. The approach also has the intriguing virtue of requiring no multiply-add when a matrix is ​​known in advance, which is a typical scenario.

These results indicate a more promising basis for machine learning than the sparse, factorized, and scalar quantized matrix products that have recently been the subject of intensive study and hardware investment: a combination of hashing, averaging, and rearranging d ‘bytes. The main difficulty is to minimize the computation time needed to approximate linear processes with a certain level of accuracy. When we obtain a data matrix A whose rows are samples and we want to apply a linear operator B to these samples, this situation naturally occurs in machine learning and data mining. B can be, among others, a linear classifier, a linear regressor or an integration matrix.

As a practical illustration, consider the approximation work of a softmax classifier trained to predict image labels using integrations obtained from a neural network. Here, the columns of B are the weight vectors for each class, while the rows of A are the embeddings for each image. By computing the product AB and obtaining the argmax inside each result row, the classification is accomplished. On the CIFAR-10 and CIFAR-100 datasets, our technique outperformed its best competitors. The results are shown in the figure below.

Source: https://arxiv.org/pdf/2106.10860v1.pdf

Instead, MADDNESS1 applies a nonlinear preprocessing function and simplifies the problem to table lookups. Also, when B is known in advance, such as when applying a trained linear model to new data, MADDNESS does not require any multiply-add operation. The approach is more closely related to vector similarity search methods. Instead of using an expensive quantization function with several multiple additions, a family of quantization functions without multiple additions has been presented.

The contributions of the document can be summarized as follows:

  1. A family of fast-learning vector quantization algorithms capable of encoding over 100 GB of data per second in a single CPU thread.
  2. A low-bandwidth integer summation technique that avoids upscattering, saturation, and overflow.
  3. An approximate matrix multiplication method based on these functions. Experiments on hundreds of different matrices show that our approach significantly outperforms existing options. It also includes theoretical quality assurances.

The critical empirical finding is that the proposed MADDNESS approach offers speedups of one order of magnitude over existing AMM methods and speedups of up to two orders of magnitude over the compact baseline. Up to three orders of magnitude can also compress matrices. These results are computed on a processor and are only available when a training set for a matrix exists. Researchers claim superior performance only when one array is larger than the other and both arrays are tall. This is the regime in which the fast (but less accurate) coding function is advantageous.

When the largest matrix is ​​known in advance, the approach loses its usefulness; this assumption is common in similarity search and eliminates the need for a fast encoding function. Approximate integer summation and merged table lookups are probably usable even without any of these assumptions, but establishing it is a task for the future. The MADDNESS source code is freely available on GitHub.

This Article is written as a summary article by Marktechpost Staff based on the paper 'Multiplying Matrices Without Multiplying'. All Credit For This Research Goes To Researchers on This Project. Checkout the paper, github.

Please Don't Forget To Join Our ML Subreddit

]]>
How to install pip on Windows and start Python development https://amitysource.com/how-to-install-pip-on-windows-and-start-python-development/ Sat, 25 Jun 2022 11:00:00 +0000 https://amitysource.com/how-to-install-pip-on-windows-and-start-python-development/ Python’s pip is the command-line utility for installing PyPi-based libraries and frameworks. It also helps in aggregating them for reuse, so it’s an essential tool for every Python programmer. But how can you install pip on Windows? Do you need to install pip on Windows? New versions of Python come with the pip package by […]]]>

Python’s pip is the command-line utility for installing PyPi-based libraries and frameworks. It also helps in aggregating them for reuse, so it’s an essential tool for every Python programmer.

But how can you install pip on Windows?

Do you need to install pip on Windows?

New versions of Python come with the pip package by default. But you will need to install the pip package from scratch if you are using a Python version older than 3.4, or older than 2.7.9 if you are on Python 2.

USE VIDEO OF THE DAY

But pip can always disappear. This may be due to a faulty Python installation or an explicit uninstallation, even in supported versions. And even if your version of Python comes with pip, you’ll want to update it from time to time.

Check PIP and Python version on Windows

Although the latest versions of Python include pip, you should first check the Python and pip versions on your PC before attempting to install.

To check your Python version via the terminal:

python 

Regardless of your Python version, you also want to check your pip version:


py -m pip 

A “pip command not found” result indicates a missing pip packet. You will need a fresh install if you see this.

But if the command returns a pip version, you probably only need an upgrade.

How to install pip on Windows

The easiest way to install pip on Windows is to update to the latest version of Python.

However, if pip disappears, you can get the pip source code from the get-pip.py bootstrap page.

Copy the entire pip source code from this page and paste it into a new Python file using your favorite code editor. Name this Python file get-pip.py.

Then open the command prompt in the folder containing this file. Now run the following command:

py get-pip.py

The above command will install the pip package on Python site-packagepip phone book.

To confirm pip installation, run the version check command:

py -m pip 

Once installed, you can start using it to install Python dependencies, just like you would when using the npm package for JavaScript.

However, keep in mind that pip dropped support for Python 2, so using this method of installing pip may fail in lower versions of Python.

If you continue to receive an installation error after running the get pip script, download and install the latest version of Python to get pip.

If you already have pip installed

As mentioned, you probably already have pip on your PC if you’re using a newer version of Python (3.4 and later). However, upgrading pip often helps to eliminate bugs and prevent future download dependency issues.

Run the following command to update the version of pip on your PC:

py -m pip install 

If the output of the above command says “Requirement already met”, pip is already up-to-date on your Windows OS.


Manage Python dependencies with pip

The pip package makes it easy to access Python libraries and frameworks. It also keeps track of all dependencies during development, so none are missing during deployment. For example, freezing pip dependencies in a text file is common practice for many Python projects.

Pip is one of the most important tools available to Python programmers, but there are many more, with a range of uses.

]]>
The Ultimate Guide to Android Security: Everything You Need to Know https://amitysource.com/the-ultimate-guide-to-android-security-everything-you-need-to-know/ Thu, 23 Jun 2022 19:25:23 +0000 https://amitysource.com/the-ultimate-guide-to-android-security-everything-you-need-to-know/ Google and the company that made your phone are responsible for protecting your information, but so are you. Doing your part is quite easy; be diligent about the things you download and install, and make sure you have a secure lock screen with a strong backup password or PIN. Google and the company that made […]]]>

Google and the company that made your phone are responsible for protecting your information, but so are you. Doing your part is quite easy; be diligent about the things you download and install, and make sure you have a secure lock screen with a strong backup password or PIN.

Google and the company that made your phone don’t have it easy. They both have to make sure that bugs and vulnerabilities are found, fixed, and relevant software updates are filtered out so you can install them.

]]>
GitGuardian invests in developer experience for large-scale enterprise deployments | New https://amitysource.com/gitguardian-invests-in-developer-experience-for-large-scale-enterprise-deployments-new/ Tue, 21 Jun 2022 15:41:17 +0000 https://amitysource.com/gitguardian-invests-in-developer-experience-for-large-scale-enterprise-deployments-new/ PARIS, June 21, 2022 (GLOBE NEWSWIRE) — GitGuardian, the enterprise-ready secrets detection and remediation platform, announces a series of new features to improve the developer experience in securing the development lifecycle software. To reduce the risks of exposure of secrets in the software development lifecycle, GitGuardian is betting on what it has defined as the […]]]>

PARIS, June 21, 2022 (GLOBE NEWSWIRE) — GitGuardian, the enterprise-ready secrets detection and remediation platform, announces a series of new features to improve the developer experience in securing the development lifecycle software.

To reduce the risks of exposure of secrets in the software development lifecycle, GitGuardian is betting on what it has defined as the shared responsibility model for application security. The company helps security teams partner with development teams to fix swaths of existing vulnerabilities and prevent those in the future. By providing a great developer experience, GitGuardian turns the problem of secret proliferation into an opportunity to break down organizational silos and infuse security into the software development lifecycle.

As development teams take more ownership of day-to-day application security issues, the security team must move away from tactics and seize the opportunity to play a more strategic role in product security. ” Forrester The State of Application Security, 2022

In addition to an integrated platform, GitGuardian comes with ggshield – an open-source command-line interface (CLI) designed for developers. Widely adopted by developer communities, ggshield helps thousands of DevOps developers and engineers keep secrets out of source code. It is the most effective solution to date to prevent secrets from leaving developer workstations and being exposed, saving security teams hours of investigation, correction and costly paperwork.

To help large organizations deploy secret detection and remediation across perimeters of thousands of developers, GitGuardian introduces:

  • A new developer onboarding experience with an automated API key provisioning mechanism as well as a browser-based authentication flow for ggshield (GitGuardian CLI) – removing all barriers to enterprise adoption.
  • Deeper integration with GitHub, to reveal the results of its security scans in the context of pull requests and provide developers with custom remediation guidelines.
  • Easier configuration of ggshield (GitGuardian CLI) for pre-receive hooks to implement preventative secret scanning (aka push protection) on self-hosted GitHub Enterprise and GitLab instances. This allows Version Control Systems administrators to deploy blocking checks for all incoming code contributions with a single configuration.
  • An improved RBAC system, supporting the creation of teams within the GitGuardian workspace to mirror security and engineering organizations. Each team will have a scope with its sources (e.g., GitHub, GitLab, or Bitbucket organizations or repositories) with team members having different levels of incident permissions, depending on their role in the organization.

Bad secrets management practices and hard-coded credentials, in particular, are pervasive in the DevOps and cloud-native era. GitGuardian research published earlier this year in March, The State of Secrets Sprawl 2022, shows that there are more hard-coded secrets than application security teams can manage. The data reveals that, on average, in 2021, a typical company of 400 developers would discover 1,050 unique hard-coded secrets when analyzing their entire codebase. With each secret having 13 different occurrences, the effort required for remediation exceeds the resources available within security teams (1 AppSec engineer for every 100 developers)1 hence the need for a shared responsibility model involving developers.

Additionally, when comparing public company codebases to private ones, GitGuardian found that the latter were four times more likely to leak a secret. The company concludes that, as it stands, private repositories imbue a false sense of security and are a ticking (ticking) bomb ready to go off at any moment. Further analysis by GitGuardian of the recent wave of source code leaks from companies like Twitch, Samsung, and Nvidia, and Microsoft confirms this.

To learn more about GitGuardian Internal Monitoring, the enterprise-ready secrets detection and remediation platform, please visit the official site.

About GitGuardian

GitGuardian is a global cybersecurity startup specializing in code security solutions for the DevOps generation. A market leader in secret detection and remediation, its solutions are already used by thousands of developers across all industries.

Media Contact

holly hagerman

Connect Marketing

(801) 373-7888

hollyh@connectmarketing.com


1 From TAG Cyber

Copyright 2022 GlobeNewswire, Inc.

]]>
How Choosing the Right Ecommerce Platform Can Set You Up for Success https://amitysource.com/how-choosing-the-right-ecommerce-platform-can-set-you-up-for-success/ Sun, 19 Jun 2022 23:01:34 +0000 https://amitysource.com/how-choosing-the-right-ecommerce-platform-can-set-you-up-for-success/ Even before the pandemic caused businesses to shut down, the world of e-commerce was booming. Today, it continues to be an incredibly powerful tool for growing your business. In fact, global e-commerce sales exceed $5 trillion for the first time in 2022. So, as merchants look to move their selling capabilities online, one of the […]]]>

Even before the pandemic caused businesses to shut down, the world of e-commerce was booming. Today, it continues to be an incredibly powerful tool for growing your business. In fact, global e-commerce sales exceed $5 trillion for the first time in 2022.

So, as merchants look to move their selling capabilities online, one of the most important decisions is choosing an e-commerce platform. After all, you need one that’s secure, customizable, and scalable for long-term growth. Here’s what you need to do before committing to a platform.

Top Considerations When Choosing an Ecommerce Platform

There is no one-size-fits-all solution when it comes to choosing your e-commerce platform. With a multitude of products on the market, it is essential that you do your due diligence and check the features of each platform against your specific needs.

More generally, five main considerations should influence your decision, according to Shannon Ingrey, vice president and general manager – APAC at BigCommerce:

  • Budget: Paying more doesn’t always equate to the best experience. However, choosing the cheaper option will often leave a business looking for additional features elsewhere. Bundling charges from various providers is usually the most expensive solution. Instead, decide on a budget for features like web design, programming and functionality, security, monthly hosting, and maintenance.
  • Integration compatibility: Nothing is more frustrating than migrating to a new platform and having to start from scratch. Make sure the e-commerce platform you choose can easily integrate with your existing solutions and systems at no additional cost.
  • Personalization: Open source software gives you full control over the source code to customize every aspect of your site. However, you will need extensive coding experience and the budget to account for programming costs. Alternatively, Software as a Service (SaaS) platform customization is more limited, meaning you don’t have as much freedom to customize your site. The middle ground is in an open SaaS platform like BigCommerce, where merchants get all the benefits of SaaS plus the flexibility and functionality of open source.
  • Scalability: It’s important to consider a platform that can grow with you. When you’re just starting out, you may not need a host with high traffic capabilities. But if you focus on growth, an e-commerce business could scale quickly.
  • Platform customer service: When you need technical support, it’s important that you have access to a real person who can help you solve the problem, whether that’s by phone, email or live chat. Some platforms outsource their customer service and make it difficult, if not impossible, to get help when you need it most. Be sure to look for personalized 24/7 customer support, as well as a dedicated help center and an active community of merchants.

The right e-commerce platform can help you create, innovate, and grow your business online. So when looking for the most appropriate solution, consider the value of sophisticated enterprise-level features, customization and performance, coupled with simplicity and ease of use. You can get all of these things and more with BigCommerce.

The biggest challenges to overcome when building your online store

Anyone can have an online store. But only the most knowledgeable operators can offer their customers a simplified and enjoyable sales experience. Being able to deliver a great shopping experience is key, and that includes everything from intuitive website design to smooth checkout.

In contrast, many business owners fall into common e-commerce pitfalls when getting started, Ingrey says. The top of the list does not include your product or your audience.

“‘If you build it, they will come’ is not good advice for business owners – it’s the exact opposite of best practice,” he says. “If a company doesn’t understand its product or its audience, it assumes the customer wants the product. Simply put, conduct market research to identify the target audience and their needs. By learning what audiences want and their frustrations with existing options, you can give customers what they really want.

It’s also easy to make missteps when developing the user experience. An inappropriate tech stack can lead to customer frustration, for example, while issues with product pages make it easy for users to skip your online store and seek out that same product or service from a competitor.

“User experience is paramount, and website design impacts conversion rates as well as search engine rankings, so it’s important for marketers to get it right,” Ingrey says. “Whether it’s categorizing products so potential customers can find them, leveraging analytics to improve marketing efforts, having service and contact information clearly accessible to good user, all of these play a crucial role in providing enjoyable user experiences to boost customer loyalty.

Build, innovate, grow

For BigCommerce, a leading open SaaS e-commerce platform for fast-growing and established B2C and B2B brands, their goal is to enable merchants of all sizes to create, innovate and grow their businesses online. . This three-pronged approach means merchants have the freedom to choose the solutions that work best for them at each stage of growth.

“BigCommerce is designed to allow anyone, regardless of technical background, to build an online store,” Ingrey says. “Our mission is to help merchants of all sizes sell more at every stage of their growth, from small startups to midsize companies to large enterprises.

“We are seeing merchants taking an increasingly hybrid approach to retail. So having a solid omnichannel strategy is essential for merchants looking to scale. BigCommerce helps merchants integrate with major marketplaces, social commerce platforms, and more to reach a wider audience and get your product discovered around the world.

]]>
Facebook accused of taking patient data from hospital sites https://amitysource.com/facebook-accused-of-taking-patient-data-from-hospital-sites/ Fri, 17 Jun 2022 23:36:00 +0000 https://amitysource.com/facebook-accused-of-taking-patient-data-from-hospital-sites/ By Hailey Konnath (June 17, 2022, 7:36 PM EDT) — Facebook is reportedly using its Pixel tracking tool to collect data from millions of hospital patients without their permission or knowledge across the country, according to a proposed class action lawsuit filed Friday in California federal court. The complaint was filed by an anonymous patient […]]]>
By Hailey Konnath (June 17, 2022, 7:36 PM EDT) — Facebook is reportedly using its Pixel tracking tool to collect data from millions of hospital patients without their permission or knowledge across the country, according to a proposed class action lawsuit filed Friday in California federal court.

The complaint was filed by an anonymous patient at the Maryland hospital, identified only as John Doe, who claims the Pixel tool redirects patient communications from hospital websites to the social media giant .

“When a patient contacts a healthcare provider’s website where the Facebook pixel is present on the patient portal login page, the source code of the Facebook pixel causes the exact content of the…

Stay one step ahead

In the legal profession, information is the key to success. You need to know what’s going on with customers, competitors, practice areas and industries. Law360 provides the intelligence you need to stay an expert and beat the competition.

  • Access to case data in articles (numbers, filings, courts, nature of lawsuits, etc.)
  • Access to attached documents such as briefs, motions, complaints, decisions, motions, etc.
  • Create custom alerts for specific article and case topics and more!

TRY LAW360 FREE FOR SEVEN DAYS

]]>
Openness in technology: an explainer without technical jargon | of Christmas Macé | blind net | June 2022 https://amitysource.com/openness-in-technology-an-explainer-without-technical-jargon-of-christmas-mace-blind-net-june-2022/ Wed, 15 Jun 2022 21:46:54 +0000 https://amitysource.com/openness-in-technology-an-explainer-without-technical-jargon-of-christmas-mace-blind-net-june-2022/ What openness means at blindnet, and why we care Photo by Martino Pietropoli In its broadest sense, openness is primarily defined by negation. “To be open” means “not to be” closed, because borders help define proximity more clearly. The same idea applies to the more specific sense of openness that we find in computing. Computing […]]]>

What openness means at blindnet, and why we care

Photo by Martino Pietropoli

In its broadest sense, openness is primarily defined by negation. “To be open” means “not to be” closed, because borders help define proximity more clearly.

The same idea applies to the more specific sense of openness that we find in computing. Computing primarily took shape during the Cold War with the emergence of a “closed world discourse¹” emphasizing security through obscurity and global surveillance. This speech strongly influenced our vision of computing, and continues to do so today. We still tend to view code, innovation, and information as something we need to protect. We still think we can harness the benefits by keeping some kind of magic secret.

But the era of secrets is long gone. Today, people expect to be able to access all the information they need, when they need it. Secrecy in business and technology is considered suspect. Transparency is essential.

And it goes both ways. Customers now use social platforms daily, constantly sharing and collaborating with their peers. Again, secrecy is a distant memory, but without necessarily bringing privacy to an end. Modern users share a large volume of data. They logically expect proportional control over this data. They can no longer accept being passive. Businesses now need to offer everyone both control of their data and the ability to actively contribute.

In short, the public now expects transparency and collaboration. This is precisely what the opening is for.

Openness is a broad and fundamental idea that developed on the basis of free software before extending to all areas of information technology, then to society, with open content, open science, open data, open education, etc.

To understand open-source software is to understand openness. But this designation itself is misleading. “Open source” is not so much a matter of opening up (i.e. sharing) the source code. Putting the source code of a software online does not make it “open-source.” As we have shown previously, openness is strongly linked to collaboration. Share your code, ideas, etc. It’s no use if you don’t engage people to challenge them and improve with you.

To quote the Journal of Information Technology, Openness is the association of “the accessibility of knowledge, technology and other resources; the transparency of the action; the permeability of organizational structures; and inclusiveness of participation” ². All of this, and more, helps us build engagement and drive innovation.

Now all businesses need to make money of course. For this, we must meet the needs of our customers. And in an ever-changing world, knowing what the public really wants is a real challenge³. Building a successful product requires extensive investigation and testing (aka “crowdsourcing”) to improve market fit.

Openness provides a framework to greatly reduce these needs. By building a project and business with constant input from outsiders, we are guaranteed to get most of the feedback we need without the extra effort or expense. Even better, openness builds strong, authentic, long-term relationships, where crowdsourcing relies only on short-term self-interested inquiries.

But that doesn’t answer the main question everyone asks when talking about Open Business: how can we make money if we share our product with everyone? After all, companies like Louis Vuitton don’t provide open specs to show how to make my own luxury bag. There should be a good reason behind that, right?

Right. And that reason is called branding. Luxury brands like Louis Vuitton must guarantee a certain level of quality to their products, because it is linked to their brand image. Manufacturing control is their only option⁴.

Openness in technology is the opposite. First, because software is, by definition, immaterial. Copying it does not detract from its quality. And secondly because by adopting the principles of openness, you can demonstrate to your clients your mastery of related subjects.

Again, Open Source is not enough on its own. We must maintain a constant flow of collaboration with the community to guarantee a better brand image and innovate faster than the competition.

With this image and constant innovation, a company can offer a wide range of offers around its Open Source productions:

  • Software As a Service, to make the software easier to use, more stable, more efficient, etc.,
  • proprietary (i.e. “closed”) extensions on top of an open “core” to meet more specific needs,
  • Professional services, such as advice, support and training,
  • and more.

Some companies can still make money selling proprietary software.

First, there are the Big Corps, like Microsoft or Oracle. Their first common denominator is a very strong and well-established brand. A brand they can use to build trust with customers and associates, reducing their need for collaboration⁵. Today, blindnet does not fit into this category. We are the new challenger who is here to disrupt the market with innovation and an outside perspective. We must use weapons suitable for this challenge.

Then there are products for non-technical people, where branding and market fit can be built with traditional marketing tools like ads and surveys.

At blindnet, our first objective is to meet the needs of developers. This audience is insensitive to traditional marketing but has high expectations for openness and collaboration.

In addition, we work on data privacy, which is strongly related to information security and trust. And no one yet believes that these topics can be discussed in secret. Everyone (especially developers) is aware that computers are not trustworthy. We have to open the hood and check the operation of the engine. To ensure that the security software we use can guarantee security on its own, using solutions such as end-to-end cryptography.

At blindnet, we firmly believe this is the only option because we empower developers to build software that users love and trust. That openness and confidentiality are two sides of the same coin. People’s trust in us is based on facts, and nothing else.

]]>
KNIME Improves Data Science Democratization Through Snowflake Collaboration https://amitysource.com/knime-improves-data-science-democratization-through-snowflake%ef%bf%bc-collaboration/ Mon, 13 Jun 2022 23:40:00 +0000 https://amitysource.com/knime-improves-data-science-democratization-through-snowflake%ef%bf%bc-collaboration/ We’re excited to bring back Transform 2022 in person on July 19 and virtually from July 20-28. Join leaders in AI and data for in-depth discussions and exciting networking opportunities. Register today! KNIME, which offers a no-code/low-code toolset that allows, so to speak, square datasets to fit into round storage holes, has announced a new […]]]>

We’re excited to bring back Transform 2022 in person on July 19 and virtually from July 20-28. Join leaders in AI and data for in-depth discussions and exciting networking opportunities. Register today!


KNIME, which offers a no-code/low-code toolset that allows, so to speak, square datasets to fit into round storage holes, has announced a new partnership with lac provider Cloud Data Center, designed to democratize access to data analytics across business roles within an enterprise.

Using KNIME, Snowflake customers can now use any data stored in a Snowflake node, whether structured or unstructured, to build predictive machine learning models in a low-code/no-code environment, Paul Treichler , vice president of global partnerships at KNIME, says VentureBeat. Business users can access Snowflake data and build models without writing code; However, data scientists and power users have the option to also code in Python, R or JavaScript via built-in integrations in KNIME if they wish, Treichler said.

This is important news for users of the Snowflake Data Cloud, which has more than 6,300 enterprise customers, including 506 of the Forbes Global 2000, and continues to grow rapidly.

“Snowflake seems to be running the table lately,” ALTR CEO Dave Sikora told VentureBeat in a separate chat.

Data centralization a major trend

As data warehouses and data lakes become more common in today’s trend for businesses to centralize their data stores, there is a growing opportunity for organizations to utilize the value that has been hidden in their data. . However, not all teams within a company have developers or data scientists to unlock this value. Visual programming or low-/no-code tools like KNIME help fill this gap and democratize access to and use of locked data in massive platforms like Snowflake, Treichler told VentureBeat.

KNIME Analytics Platform is based on open source code and used by 250,000 community members and 4,000 commercial organizations in 60 countries. It connects Snowflake to thousands of other features, and it’s free to use. The same capabilities elsewhere would require multiple tools or cost thousands of dollars per user, Treichler said. KNIME’s business model is based on enterprise services that it sells beyond the core software platform.

Data creates business value

Understanding data is key to creating business value. With a global data analytics market worth over $200 billion, there is a need for as many people as possible across all roles, departments and industries to have access to analytics in their daily work. for better overall productivity, Treichler said.

“Many of our customers rely on Snowflake to power virtually any large-scale data workload, while using KNIME to leverage that data,” Treichler said.

How do users facilitate the integration of these two tools?

“In KNIME parlance, we have a ‘node,’ which is an individual piece of functionality that can be dragged and dropped into a data process,” Treichler said. “This node contains the connectors between KNIME and Snowflake. This means you don’t need to code any connections and can immediately access anything you have in Snowflake in a visual environment. You can explore your data, prepare and blend your data, use it to train a machine learning model, or create a web service, visualization, or data application for less technical team members to contribute or consume.

KNIME Product Manager Tobias Koetter wrote a blog post on Medium that discusses these processes.

“There is a strong global ecosystem of consulting and implementation partners who have the domain knowledge, local capability, and technical capability with KNIME and Snowflake to help teams leverage the full capabilities of these tools in a broader business context,” Treichler said. .

KNIME is flexible and extensible, giving data scientists the freedom to work in their preferred environment. Users can build sophisticated analytical models in its low-code/no-code environment or script custom algorithms in the language of their choice with built-in integrations with R, Python, Java and others, Treichler said.

KNIME, headquartered in Zurich with offices in Austin, Texas and Berlin, competes in a market that includes Alteryx, RapidMiner, Orange, R Studio, SAS and SPSS.

VentureBeat’s mission is to be a digital public square for technical decision makers to learn about transformative enterprise technology and conduct transactions. Learn more about membership.

]]>
“Is this a movie theater?” : Patna judge rebukes bureaucrat https://amitysource.com/is-this-a-movie-theater-patna-judge-rebukes-bureaucrat/ Sun, 12 Jun 2022 05:25:00 +0000 https://amitysource.com/is-this-a-movie-theater-patna-judge-rebukes-bureaucrat/ “At least, which means the coat and collar must not be open,” Judge said. Patna: On Friday, a Patna High Court judge arrested a senior IAS officer for “inappropriate” dress when he appeared in court. As the officer tried to make it clear that he was unaware of any dress code to follow in court, […]]]>

“At least, which means the coat and collar must not be open,” Judge said.

Patna:

On Friday, a Patna High Court judge arrested a senior IAS officer for “inappropriate” dress when he appeared in court. As the officer tried to make it clear that he was unaware of any dress code to follow in court, the judge reprimanded him asking if he thought he had come to the cinema .

The incident, a video of which is going viral on social media, comes from court PB Bajanthri. The officer in question is Anand Kishor who is the Principal Secretary for Housing and Urban Development in the Government of Bihar. He is also considered very close to Bihar Chief Minister Nitish Kumar.

In the viral video clip, the judge can be seen scolding him for more than two minutes as he showed up for a hearing in a white shirt with his collar buttons open and without a blazer. The judge disputed the apparent casual dress and asked Mr Kishor whether he had attended the Mussoorie Civil Service Training Institute.

As the officer struggled for words, mostly standing and listening to the judge, Judge Bajanthri looked visibly upset and asked, “Do you think this is a movie theatre?”

“You don’t know in what dress you have to appear in court?” he asked further, as the officer looked at the lawyers surrounding him in bewilderment.

“At least, which means the coat and collar must not be open,” Judge said.

]]>