True Influence Hires Data Strategist and Marketing Technology Visionary Ray Estevez as

first_img AcquisitionData Mentorsintent-based marketingMarketing TechnologyNewsRay EstevezTrue Influence Previous ArticleSauce Labs Named Gold Stevie Award Winner for Best Software Development Solution in 2019 American Business AwardsNext ArticleZendesk Unveils Next Generation of Conversational Messaging Experiences True Influence Hires Data Strategist and Marketing Technology Visionary Ray Estevez as Chief Data Officer PRNewswireMay 22, 2019, 8:05 pmMay 22, 2019 Estevez Will Be Responsible for Leading the Company’s Data Strategy and ImplementationTrue Influence, the technology leader of intent-based marketing and demand generation solutions, announced that data strategist and marketing technology innovator Ray Estevez has joined the company as chief data officer (CDO). Estevez will be responsible for leading the data strategy and data-driven product implementations for current and future products at True Influence.“As we continue to grow and evolve as the leader in intent-based marketing, it’s critical to our success that we have the best executive team with a proven track record of achievements leading the company,” said Brian Giese, CEO, True Influence. “We are extremely pleased to have an industry visionary such as Ray join our team to drive our data strategy.”Ray brings 29 years of experience in information technology with extensive expertise in email, database, and digital marketing, as well as data management, and software engineering.Before joining True Influence, Ray was co-founder and chief information officer (CIO) at V12 Group where he led the growth of the company to an acquisition by Data Mentors LLC. This new company was branded V12 Data where Ray was the CIO, providing strategic oversight of enterprise-wide information technology activities. Prior to that he was the chief technology officer (CTO) at ORB Digital where he managed the Information Technology division and re-engineered ORB’s core ad server product ORBit 4.0.Marketing Technology News: Amazon Dominates E-Commerce Share, Ebay and Walmart Less of a Focus, Feedvisor Study FindsPrior to ORB Digital, Ray served as the vice president of Information Technology at 24/7 Media Inc. He was instrumental in the development of ConsumerNet’s email database and delivery technology, which led to the email marketing company being acquired by 24/7 Media Inc., for $52 million dollars.“I’m excited to join the True Influence team where I believe my experience in developing and implementing the data strategy for information technology companies can further strengthen the company’s industry-leading B2B marketing and sales solutions,” said Ray Estevez.Marketing Technology News: ON24 Empowers Marketers with a 360-degree View of Customer EngagementRay has also served in various IT leadership positions at ConsumerNet, Time Inc. and Music Sound Exchange (both Time Warner Companies), and J.P. Morgan. He holds a Bachelor of Science degree in computer science from The City College of New York.Marketing Technology News: Vyond Announces End of Beta for Vyond Studio, Enhanced Security Featureslast_img read more

Read More

Quantum Cryptography Demystified How It Works in Plain Language

first_img Movies That Hollywood Didn’t Want to Make Ginny From ‘Harry Potter’ Is 28 and Unrecognizably Gorgeous Jon Favreau Has a Funny Idea for ‘Iron Man 4’ The Transformation of Daisy Ridley Is Turning Heads Facebook Twitter Linkedin Pinterest Google Plus Reddit Hacker News Flipboard Email Copy 0shares This site may earn affiliate commissions from the links on this page. Terms of use. We Now Understand Why Sean Connery Has Disappeared Huge Scandals That Rocked The History Channel 10 Comments By David Cardinal on March 11, 2019 at 12:08 pm You Might Also LikePowered By ZergNet Completely Ridiculous Reasons Actors Were Denied Roles Tagged In extremetech explainsquantum computingcryptographyquantum cryptographyquantum key distributionpublic key cryptographyqkdasymmetric photographysymmetric cryptography Post a Comment 10 Comments Quantum Cryptography Demystified: How It Works in Plain Language We’ve already covered the basics of quantum computing in our article on How Does Quantum Computing Work, so now it’s time to dive into one of its most publicized applications: quantum cryptography. Quantum cryptography holds both promises and threats for our current cryptographic infrastructure. The most obvious threat is quantum computers could decrypt data that’s been encrypted using many of our current systems. But it also holds the promise of secure communications channels for key distribution. Eventually, using quantum technology, it may even be possible to build entire encryption systems that are considered unbreakable.Quantum Computing Decryption: Looming Crisis Or Another Y2K Blind Panic?Almost all widely used encryption systems rely on keys — typically large, random, numbers that can be used to encrypt or decrypt data. Current encryption packages are most often built using either symmetric or asymmetric keys — many using asymmetric keys to transmit a shared, symmetric key for doing the actual data encryption. Both types of keys would be vulnerable to hacking using quantum computers. Symmetric systems rely on a shared secret key, and cracking the key requires about double the computing work for each additional bit. With that kind of scaling, it’s been possible to keep using larger keys as computers get more powerful. However, by implementing Grover’s algorithm, quantum computers can essentially cut the key length in half — a nearly inconceivable reduction in the amount of time required to crack a key. The good news is that now that we’re aware of the challenge, doubling the key lengths in use should be an excellent defense.Asymmetric systems (like Public Key Infrastructure — PKI) use public/private key pairs that are mathematically generated. In the case of the widely-used RSA family of algorithms, the math is fairly complex. But it’s possible to crack if you can factor a very large number into its two prime number factors. If a key with enough bits is used, this is a nearly intractable problem for conventional computers, but quantum computers can use something called Shor’s algorithm to find the factors much more quickly. A rough estimate of the compute power needed is two qubits per bit length of the key. So a 1,024-bit key would require a quantum computer with 2,048 bits. Experts expect those to be possible within a decade, and some think sooner. Note that today 1,024-bit keys are already considered potentially unsafe, as they can be cracked given enough time on a large computer, but once a quantum computer can handle the task it will take very little time.Much like the situation with the software migration required by Y2K, there are other encryption techniques that aren’t easily cracked with quantum computers. Examples of (non-quantum) encryption systems resistant to quantum attacks include McEliece and NTRUEncrypt. That means the problem is migrating the large number of systems and data already in place to newer ones. Also, like Y2K, it remains to be seen how real, and how widespread, the threat will be, as sufficiently large quantum computers will be expensive when they are finally available. That means they’re unlikely to get used for trying to hack information unless it’s considered extremely valuable. To run all of Shor’s algorithm, a quantum computer also needs to be paired with a powerful conventional computer, which will drive the cost of a key cracking system up even further.Secure Communications Using Quantum Key DistributionWhen you hear the term quantum cryptography, more often than not what is being referred to is Quantum Key Distribution (QKD). QKD doesn’t actually encrypt user data but makes it possible for users to securely distribute keys to each other, which can then be used for subsequent encrypted communication.Whatever encryption system is used, there is almost always some type of private information that must be kept secret. For symmetric key systems, it is shared information in the form of a key, while in asymmetric systems each node has its own secret key while sharing a matching public key. In both cases, there are vulnerabilities when initializing communication. Symmetric key systems often rely on physical sharing of keys — some financial institutions use actual couriers with portable storage devices — to bootstrap. Or they may rely on a connection secured using an asymmetric system to share the encryption key needed for subsequent use. One reason for that is asymmetric systems like Public Key don’t require sending the secret (in this case private keys) over the channel, while symmetric systems are more efficient, and often more secure, for large volumes of data once keys have been exchanged.While QKD isn’t in widespread use, it has been in commercial use in Europe since 2007, and in the US since 2010. For high-value transactions like inter-bank communication and election result transmission, the benefits of QKD are sometimes worth the cost. Another impediment to the wider adoption of QKD is that current systems aren’t interoperable between different vendors. Fortunately, that’s starting to change. In a research effort directed at finding ways to secure the power grid, teams at Oak Ridge and Los Alamos National Laboratories have demonstrated the first successful use of QKD between different implementations. The University of Bristol has also just published research on doing something similar to help secure multi-vendor 5G wireless networks.But What About True Quantum Cryptography?While harder than QKD, it will eventually be possible to encrypt data using quantum computing techniques that are particularly resistant to eavesdropping and various other forms of hacking. The most popular approach currently is the Kak protocol. Essentially it’s a quantum version of the well-known double-lock algorithm, which allows two users to securely exchange data without sharing any keys.The double-lock protocol is remarkably simple. We’ll use common convention, and assume Alice and Bob want to exchange information, without it being modified by an eavesdropper, Eve. They also want to know if anyone is successfully eavesdropping on their communication channel. To do this they trade locks in a three-step process.In Kak’s protocol, Alice and Bob use encryption functions UA and UB as proxies for the physical locks of a traditional two-lock protocol.As the first step, Alice locks her data (in the digital case, encrypts it using a secret key), and sends it to Bob. Bob, in turn, adds his lock (encrypting Alice’s already encrypted data with his own secret key), and sends it back to Alice. Alice removes her lock and sends the result back to Bob. Bob can then remove his lock, and read the original data.This all works really nicely with physical locks and keys, but it’s a little more complex when digital encryption is involved. For the protocol to work, the encryption processes have to be commutative (because the encryptions are applied in the order Alice, Bob, but then Alice needs to be able to remove her encryption before Bob removes his). An example of one possible, and popular, encryption, is multiplying by a large number. So far, so good. But now imagine that Eve is listening. As the data goes back and forth, she will be able to see the data multiplied by Alice’s key, the data multiplied by both keys, and the data multiplied by Bob’s key. From that, she can compute the supposedly secret keys of Alice and Bob.Subhash Kak proposed using certain quantum rotations as a way to create a version of the double-lock protocol that couldn’t be eavesdropped. The rotations he proposed could be applied in either order, but any attempt to listen in by reading out intermediate data would result in corrupted data. Other researchers have continued to evolve the protocol with features to make it even more tamper-resistant, but unlike QKD, there aren’t any commercial implementations yet. While it is going to require much more powerful quantum computers to make true quantum-based encryption a reality, researchers are getting closer.Last fall, a team of Chinese researchers successfully used quantum-entangled photons to create and share one-time pads between a satellite and a ground station in Austria. Encryption using one-time pads is provably secure as long as the pad is not compromised, is random, is used only once, and is longer than the data being transmitted. Quantum technology helps with the first three of these, but its performance is still quite slow. Still, the team was able to encrypt, transmit, and decrypt over 2GB of data using their quantum system.In the meantime, quantum computers can do one simple task that’s important for encryption quite well: They can generate truly random numbers. It’s unlikely ultra-expensive quantum computers will be deployed just for that purpose, but once they’re in use, it will be a useful capability.Now Read:Quantum Computing Can Soon Help Secure the Power GridHow Does Quantum Computing Work?Google Announces ‘Bristlecone’ Quantum Computing Chip[Top Image Credit: iStock, Gauntman1, Museum of Science, Milan, Italy] Saying Goodbye to Johnny Depplast_img read more

Read More

SnapLogic Launches AWS Quick Start Solution to Accelerate Big Data Initiatives

first_imgSnapLogic Launches AWS Quick Start Solution to Accelerate Big Data Initiatives Business Wire6 days agoJuly 17, 2019 AWSbig datacloudMarketing Technology NewsNewsRaj BabuSnapLogicTapan Parekh Previous ArticleActifio Showcases Industry’s First Multi-Cloud Copy Data Management SaaS Solution at Google Cloud SummitNext ArticleWelcome the New Kids on the Block: How Millennials and Gen Z Are Disrupting FinTech New out-of-the-box offering from SnapLogic and Agilisium Consulting automates the design, setup, and configuration of hardware and software to build and deploy cloud data lakes quicklySnapLogic, the #1 Intelligent Integration Platform provider, today introduced a new Quick Start solution to help enterprises build and deploy cloud data lakes on Amazon Web Services (AWS) with speed and confidence. Enterprises can now fast-track their cloud data lake projects by deploying SnapLogic components, AWS services such as Amazon Simple Storage Service (Amazon S3) and Amazon Redshift, and best practices from Agilisium Consulting.Marketing Technology News: Progress Named a Leader in the New 2019 Gartner Magic Quadrant for Multiexperience Development PlatformsTo generate business value from their data, organizations are implementing cloud data lakes or data warehouses to consolidate, store, and manage all their business-critical information assets — whether structured or unstructured, internal or external — which in turn enables business analysts and data science teams to mine and analyze the data to drive better business decisions and outcomes. Before a data lake initiative can produce value, organizations must first integrate, transform, and load large data sets, from multiple sources both on-premises and in the cloud, into the data lake. The new Quick Start solution from SnapLogic and Agilisium makes populating and getting a data lake up and running fast and easy.The new Quick Start provides the following capabilities:Enables self-service workflow by provisioning services and components required to build a data lake or data warehouseProvides flexibility to spin up environments for development, test, and productionIncludes an optional sample dataset and pre-built SnapLogic pipelines to help users understand the architecture and stages of the end-to-end data flowGlobal higher education company Kaplan Test Prep turned to SnapLogic to connect disparate systems used to gather and manage information on student performance, customer issues, product usage, and company financials. Kaplan successfully deployed the SnapLogic Intelligent Integration Platform to move data from 50+ apps and data sources into a cloud-based data warehouse on AWS Redshift. As a result, the company was able to enrich data reporting to fuel product and service innovation, reduce reporting time to value from weeks to days, and save hundreds of thousands of dollars in annual operating costs.Marketing Technology News: Introducing Shutterstock Elements, Thousands of Cinema-Grade Video Effects for Filmmakers“SnapLogic is a flexible, easy to use, visually appealing tool,” said Tapan Parekh, Director of Engineering and Architecture at Kaplan Test Prep. “Over the years, SnapLogic has helped us integrate data seamlessly from our current legacy systems with minimal effort and time. They’ve enabled us to provide self-service capabilities across the different data domains by establishing a central source of truth and essentially acting as an accelerator of productivity for our business consumers.”“Data is the new currency for business, and it must be made available on-demand to employees throughout the business without friction or limitation,” said Craig Stewart, SVP of Product at SnapLogic. “To architect the modern analytics stack, organizations are investing in cloud-native, self-service integration platforms, data lakes, and analytic tools that work seamlessly together and accelerate time-to-value. With a free-flow of data at their fingertips, workers across the business can uncover new insights, make faster decisions, and take swift action that drives the business forward.”“In line with Agilisium’s commitment to help organizations take the Data-to-Insight-Leap, we are thrilled to launch this Quick Start with SnapLogic which empowers businesses to set up the data lake and experiment with data, without the support of specialized IT skills,” said Raj Babu, Founder of Agilisium Consulting.Quick Starts help organizations deploy popular technologies on AWS based on best practices for security and high availability. These accelerators reduce hundreds of manual procedures into just a few steps so organizations can build production environments quickly and start using it immediately. Quick Starts include templates and other guides that provide organizations with step-by-step deployment instructions.Marketing Technology News: GCOM Software Announces Ernie Connon as New Chief Growth Officerlast_img read more

Read More

TechBytes with Stephen Cox VP and Chief Security Architect at SecureAuth

first_img Stephen is a technology veteran with nearly 20 years in the IT industry, including 10+ years leading Software Development teams in the Security industry. He is a key player with some of the most influential IT security firms in the world and recognized as an expert in systems architecture, threat intelligence, malware analysis, endpoint, and network forensics, and identity security. About SecureAuth Tell us about your role and the team/technology you handle at SecureAuth.I serve in a multifaceted role across Engineering, Marketing, Public Relations, and Sales. I have architected and developed solutions for SecureAuth’s Product Engineering department. I serve as a Subject Matter Expert and Content Developer for Marketing as well as being a spokesperson for the company. I often help the Sales department in terms of solutions architecture and high-level discussions with prospects.How did you arrive at SecureAuth?I arrived at the company in early 2015 during an initiative to expand innovation for SecureAuth, as it pivoted from being a multi-factor authentication and single-sign-on provider into being the leading provider of adaptive authentication technology. Our goal was, and is, to establish an identity as a pillar of security alongside other vitally important security technologies such as network and endpoint threat detection and vulnerability management.What is the current technology roadmap to build Identity Management solutions for employees and customers?SecureAuth’s goal has always been to provide the most flexible and secure identity and access management solution to our customers. We want to be able to support any deployment model customers need, whether they need on-premise, cloud or a hybrid of the two. Our current technology roadmap includes scaling out our Cloud operations, allowing customers even more flexibility in how they store customer identities and federate them to resources they wish to access.What key components make up modern Multi-factor authentication platforms?Modern multi-factor platforms must focus on user experience, easy to configure and use authentication workflows, and straightforward APIs that allow digital marketers to consume the full feature set from their own customer portals. They must allow for multiple authentication methods across various mediums such as email, user devices or hardware tokens. They must support a large number of third-party user data stores and federation protocols. These solutions must be easy to deploy and integrate across on-premise, cloud or hybrid environments.Tell us more about your ‘Passwordless’ solution. How can customers protect their identity with passwordless?Our passwordless solution eliminates passwords by shifting the multi-factor paradigm from “something you know” (a password) and “something you have” (a device) to “something you have” (a device) and “something you are” (a biometric). This has a number of benefits to the overall security posture and user experience of an organization. There is no longer a centralized database of passwords (or any access credentials) to steal as biometric profiles can be kept “on device”. Passwords that have been stolen in outside breaches can no longer be used against an organization if a user has reused passwords. Users get a delightful user experience that allows them to complete authentication with their thumb or via facial recognition. In fact, the overall user experience is improved and often faster than password use or other 2FA methods.Tell us more about your AI and Machine Learning initiatives in identity management and authentication.Our identity platform learns about how users access systems as they go about their daily work. After a period of time, a model is established that can be used to detect deviations from that normal user behavior. For instance, I normally log in at 9 AM, access email, then proceed to the source control repository and log in to pull down the latest code commits. If I am suddenly logging in at 2 AM on a Sunday morning and accessing multiple file shares, this would be a major deviation from my behavior and I should at the very least be prompted for a second factor, or possibly even blocked. The security operations center should be notified of this anomaly as well.How do you see the Access Management and Security Operations further disrupted with Blockchain, Big Data, and Cloud computing? Which of these technologies are you most excited about?I can’t understate that Cloud Computing and the resulting Digital Transformation being experienced by organizations today has created a “once in a lifetime” opportunity for us to get things right in how we interact with and authenticate our users. It opens up a lot of doors for us to break down some of the most long-standing and broken paradigms in authentication such as the password. TechBytes with Stephen Cox, VP and Chief Security Architect at SecureAuth Sudipto Ghosh8 hours agoJuly 23, 2019 SecureAuth eliminates identity-related breaches through the continuous assessment of risk and the enablement of trust across identities.The company is a leader in access management, identity governance, and penetration testing. SecureAuth’s highly flexible Identity Security Automation platform redefines security through identity making it easier for organizations to prevent the misuse of credentials. About StephenAbout SecureAuthAbout Stephen Access ManagementDigital TransformationSecureAuthStephen CoxTechBytesuser experience Previous Article3 Things to Know About Creating a High-Yielding Marketing DepartmentNext ArticleNote to App Makers: Avoid “Get Rich Quick” Thinkinglast_img read more

Read More

Return Your Attention to Black Mirror Season 5 as Netflix Releases 3

first_img Angourie RiceAnthony Mackiebandersnatchblack mirror bandersnatch First Published: May 22, 2019, 1:03 PM IST After teasing fans with a dark, critical and contemplative trailer of the upcoming season of Black Mirror, which will offer a contemporary look at the futuristic, sci-fi world of human-tech collision and its repercussions, Netflix unveiled new episode trailers, official titles and plot summaries about the upcoming outing. Created by Charlie Brooker, season 5 will offer three new stories, featuring stars like Anthony Mackie, Miley Cyrus and Topher Grace in lead roles, set to premiere on June 5.Read: Black Mirror Season 5 Trailer: The Evil Genius of Charlie Brooker is Back to Haunt Us About Smithreens, the official description reads: A cab driver with an agenda becomes the centre of attention on a day that rapidly spirals out of control. The episode features Andrew Scott, Damson Idris, and Topher Grace in lead roles.See Smithreens trailer here:Welcome to Smithereens. https://t.co/QDi1c2tPnG— Topher Grace (@TopherGrace) May 21, 2019About Rachel, Jack And Ashley, Too, the official description reads: A lonely teenager yearns to connect with her favorite pop star – whose charmed existence isn’t quite as rosy it appears. The episode features Miley Cyrus, Angourie Rice and Madison Davenport.See Rachel, Jack And Ashley, Too trailer here:Black Mirror Out June 5th @blackmirror pic.twitter.com/IE8HIdkABB— Miley Ray Cyrus (@MileyCyrus) May 21, 2019About Striking Vipers, the official description reads: Two estranged college friends reunite in later life, triggering a series of events that could alter their lives forever. The episode features Anthony Mackie, Yahya Abdul-Mateen II, Nicole Beharie, Pom Klementieff and Ludi Lin.See Striking Vipers trailer here:There is nowhere I would rather be on June 5th than watching #StrikingVipers https://t.co/rsQ3MnEoM1— Anthony Mackie (@AnthonyMackie) May 21, 2019Brooker came out with an interactive film Bandersnatch on December 28, 2018. It was directed by David Slade and written by Brooker himself. The film ushered in a new era of filmmaking, where watchers got to decide which path their character would follow. Bandersnatch was hailed for its innovative thought and creative storytelling.Follow @News18Movies for more last_img read more

Read More

Karnataka Congress MLAs Ask Rahul Gandhi to Continue as Party Chief

first_imgBengaluru: Congress MLAs in Karnataka on Wednesday urged party President Rahul Gandhi not to insist on his resignation offer following the Lok Sabha poll debacle and continue to lead the party.The Congress Legislature Party (CLP) at a meeting here passed a resolution to this effect. It was moved by CLP leader Siddaramaiah and seconded by Karnataka Pradesh Congress Committee President Dinesh Gundu Rao.Briefing reporters about the resolution, Rao said:”we want Rahul Gandhi to continue as the party president as his leadership is required for the Congress and for the country.””Yes the result may not have come in our favour, but Gandhi’s leadership is required for the organisation and in our way forward,” he said, adding the resolution will be sent to him.Siddaramaih said Gandhi should continue as the AICC president and he alone should not take the moral responsibility. “All of us will take moral responsibility.””In today’s situation, Congress and Rahul Gandhi’s leadership is needed for the country. In this election more than 12.5 crore voters have voted for Congress, nearly 20 per cent of voters have voted for Congress,” he said.Congress had lost many times in the past and had bounced back, the former chief minister said.Siddaramaiah and Rao said, Karnataka Congress was with Gandhi and trusts his leadership.In Karnataka, the Congress and JDS, running the coalition government, could win only one seat each with the BJP sweeping 25 seats. CM SiddaramaiahCong chief Rahul GandhiCongress legislature PartyKarnataka Congress First Published: May 29, 2019, 10:57 PM ISTlast_img read more

Read More

Former Teacher at RSSaffiliated School Ukhands Nishank Now Human Resource Development Minister

first_imgNew Delhi: Ramesh Pokhriyal Nishank, who started his career as a teacher in Rashtriya Swayamsevak Sangh-affiliated Saraswati Shishu Mandir is the new Human Resource Development Minister of India.Nishank came to limelight when he defeated five-time Congress MLA and education minister from Karnaprayag, Shivanand Nautiyal, to win the seat for the BJP in undivided Uttar Pradesh in 1990. Nishank replaces Prakash Javdekar, who moves to Information and Broadcasting Ministry.Nishank’s nomination comes in the wake of RSS’s continued efforts for changes in curriculum and policies which could not be undertaken during Prime Minister Modi’s first five years in office. The sangh, especially its chief Mohan Bhagwat, has made no bones about introduction of the new Education Policy and reforms in higher education system.A committee headed by former ISRO chief K Kasturirangan was formed to draft the new education policy. The report is yet to be submitted to the government. Nishank’s choice to head the HRD in the second term of the NDA government is being seen as a precursor to possible changes in the education policy as is being pushed by the sangh. He has had more that two decades of administrative experience as a minister in undivided UP when he served as a minister in Kalyan Singh government.He also had a short stint as the chief minister of Uttarakhand. He was elected to the Lok Sabha in 2014 from Haridwar, a seat he has managed to retain in 2019. Modi Govt 2.0Prakash JavdekarRamesh Pokhariyal Nishankuttar pradesh First Published: May 31, 2019, 1:49 PM ISTlast_img read more

Read More

Hindutva Threat TMCs Mistakes Mamatas Former MP Lists Out Things That Went

first_img bengalBharatiya Janata PartyBJPHindutva First Published: June 15, 2019, 10:52 AM IST Kolkata: Former Trinamool Congress (TMC) MP and Gardiner Professor of History at Harvard University, Sugata Bose, said that there is a need to revive the political traditions of West Bengal which are under threat.“We haven’t seen this degree of religious polarisation in Bengal since 1947 and you know the bigotry of that period led to a huge human tragedy. So we have to avoid that kind of attitude. We must stress equality and unity at this point,” he said. On the context of BJP’s major political success in Bengal after winning 18 out of 42 Lok Sabha seats in Bengal, he said, “I do believe that the forces of Hindutva pose a major threat even if Trinamool has made mistakes which need to be corrected.”“I personally feel that the Bengal government should not have given the allowance to Muslims. Rather they should have given equality, housing and credit banking. I do believe that something needed to be done for the Muslims in Bengal who have been left behind as shown in the Sachar Committee report but I would have wanted the government to concentrate on equality of opportunity in education and the employment and also making sure that there was fair access to housing and bank credit. That is what should have been done,” he added.Once again hinting at allowance to Muslims by Mamata Banerjee led government in Bengal, he said, “There is no reason to accept religious leaders as representatives of an entire community. This is my view.”On Ram Navami controversy, he said, “First of all Bengal has its own cultural tradition and secondly you know.. you don’t fight the force of Hindutva on their own terrain. We have a long cultural tradition flowing down from Tagore and Nazrul and we have a political tradition which we have inherited from Deshbandhu Chittaranjan Das and Netaji Subhash Chandra Bose which has been based on Hindu-Muslim unity and equality. If someone is celebrating Ram Navami, it’s not necessary you have to follow that too. Gandhi ji had said — Ishwar allah tere naam, sab ko sanmati de bhagwaan. I hope good sense will prevail and peace will return to Bengal”.“In fact, I have been speaking quite a lot in Bengal and I have been preaching the ideal of what is called in Bengali is ‘Samya’. Poet Nazrul has a famous poem (Samyabad). That should be the ideal and I basically feel that if we follow the ideal of ‘Samyabad’ then all the other ‘Sankirnabad’ (the Narrowism) that has now suddenly sprung up in Bengal can be defeated,” he added. last_img read more

Read More

Over 7000 Students Protest Mizoram Govts Inaction in Sorting Out Boundary Issue

first_imgAizawl: More than 7,000 students from 20 colleges and institutions held a rally in the state capital of Aizawl on Friday protesting against the state government’s inaction on the Assam border issue with Assam. The agitation was spearheaded by the state’s apex student body, Mizo Zirlai Pawl (MZP). The students burnt a map of the state in protest and said it displayed an inaccurate depiction of its boundary. They also asked the Mizoram government needs to take action to resolve the issue by outlining the map as per the agreement made during a meeting of the Mizoram Council of Ministers in 1875. The meeting then had released a notification outlining the Mizoram-Assam boundary as per the Bengal Eastern Frontier Regulation 1873, which has allegedly not been adopted. The MZP on Friday announced a resolution demanding that the state government occupy the 509 sq miles in the Inner Line Reserve Forest Area, currently under the jurisdiction of the Assam Forest Department. The students said such an action can be taken as per the Scheduled Caste and Scheduled Tribe Prevention of Atrocities Act.”The student body looks forward to the state government taking action with regard to the settlement of the Mizoram and Assam border issue to avoid losing our land and to protect our forefathers’ land,” said MZP chief L Ramdinliana Renthlei. “While it has been three months since a core committee was formed to look into the matter, no action has been taken so far.” In March last year, tension erupted when MZP members tried to construct a resting shed in the Zophai area near Bairabi to mark the state’s boundary, but they were met with hostility from the Assam Police. Many students and journalists were injured in a lathi-charge.Tension erupted again this year when on July 6, the Assam forest department re-occupied an old building of security forces near Lailapoor on the disputed land. aizawlAssamMizo Zirlai PawlMizoram First Published: July 19, 2019, 7:23 PM ISTlast_img read more

Read More

China has plans to build an orbital solar plant that beams energy

first_imgMdmi/GettySolar energy is all well and great, but it’s not immune to weather conditions. On days with thick cloud cover, power production will be far lower than on days in which the skies are clear and cloud-free. How do you get around this problem? If you’re China, the answer is simple: You build an orbiting solar power station which can tap the sun’s rays without having to worry about inconveniences like seasonal changes or day and night cycles. It could then beam this solar energy down to Earth wherever it is required. The hope is that such a power station could receive 6 times the energy intensity of a facility built on the ground — and in the process provide an “inexhaustible source of clean energy for humans.”It might sound like a James Bond movie plot, but just such a solar power station is currently in the early stages of development. It will reportedly orbit the Earth at a height of 22,500 miles, and will be able to reliably produce solar energy 99 percent of the time. “This is not posturing; this is a real plan from serious organizations with revered scientists in China,” John Mankins, a former 25-year veteran of NASA and CalTech’s Jet Propulsion Laboratory, recently told CNBC. “They have a perfectly good technical plan, and they can do it [the megawatt-level station] by 2030.”China’s scientists aim to build and launch small to medium-sized solar power stations into the stratosphere as early as 2021. After that, they plan to start building the aforementioned megawatt-level space solar power station in 2030, just over a decade from now. According to the China Academy of Space Technology vice-president Li Ming, it is part of China’s goal to establish itself as the first country to construct a space solar power station with practical value.As you might imagine, this isn’t a straightforward proposition. Challenges involved in building this power station will center around its sheer size, which is expected to be in the vicinity of 1,000 tons. If accurate, that makes it approximately twice the weight of the already sizable International Space Station. One method being considered for the construction process involves 3D printing and robots. This would allow the solar power station to be built entirely in space, rather than constructed on Earth and then transported to orbit.Can China deliver on these ambitions? We’ll have to wait and see. Whatever happens, it’s definitely an intriguing story to follow. Bill Nye the Science Guy talks “solar sailing” and the new space race Life after launch: Inside the massive effort to preserve NASA’s space artifacts A giant new solar farm in Texas will harness the sun’s rays to … brew beer? Want to work in the stars? Here are six future space jobs you could hold Russia launches X-ray observatory capable of locating thousands of black holes Editors’ Recommendationslast_img read more

Read More

Extreme Es electric SUV will race in some of the toughest environments

first_img Formula E races aren’t just exciting, they’re driving EV tech into the future 2019 Audi E-Tron U.S. spec first drive review The technologies your car inherited from race cars Aston Martin will put its Valkyrie hybrid hypercar to the ultimate test The Crosstrek Desert Racer off-road buggy is like no Subaru you’ve ever seen Editors’ Recommendations Formula E has dropped hints about a racing series for electric SUVs, called Extreme E, to along with its current single-seater race series. At the 2019 Goodwood Festival of Speed, Formula E revealed the racer that all Extreme E teams will use. It’s called Odyssey 21 and will hit off-road race courses around the world in 2021.The Odyssey 21 doesn’t look like any electric SUV currently in production, but it does resemble off-roaders used in races like the Baja 1000 and Dakar Rally. It was built by Spark Racing Technologies, the same company that manufactures Formula E’s single seaters, with a battery pack from Williams Advanced Engineering, the current Formula E battery supplier. As with Formula E’s single-seat race cars, the idea was to standardize as many components as possible to keep costs down.The electric SUV racer boasts 550 horsepower, allowing it do zero to 62 mph in 4.5 seconds, according to Formula E. That’s about the same as a Jaguar I-Pace and certain versions of the Tesla Model X are quicker. But those road-legal models can’t match the Odyssey 21’s off-road performance. Formula E claims it can tackle gradients of up to 130%. The racer also boasts special Continental tires designed to handle extreme terrain.As with Formula E, Extreme E race teams won’t be allowed to change the basic chassis or battery pack, but they will be allowed to develop their own powertrains. Extreme E will also let teams modify some parts of the bodywork. Many automakers currently racing in Formula E have electric SUVs in production, or at least in development. Jaguar already has a race series for its I-Pace, operated in concert with Formula E. The opportunity to make the Odyssey 21 racer look like their production models could help convince those automakers to make the jump to Extreme E.The name Extreme E isn’t an exaggeration. The series is expected to feature off-road tracks in exotic locations like the Arctic and the Himalayas. A press release announcing the Odyssey 21 electric SUV stated that the goal of Extreme E is to “highlight the impact of climate change on some of the world’s most fragile ecosystems.” A pack of electric SUVs ripping around, not to mention legions of spectators, media, and team personnel, seems like it could be pretty disruptive to those ecosystems, though. Regardless, Extreme E gives Formula E a way to capitalize on the electric SUV trend, and maintain its status as the biggest name in electric racing.last_img read more

Read More

Japanese spacecraft Hayabusa 2 aborts marker drop mission

first_imgAn artist’s conception of JAXA Hayabusa 2’s Ryugu landing. JAXAJapan’s Hayabusa 2 spacecraft has been exploring the asteroid Ryugu since it arrived there at the start of the year. The dramatic science experiments performed so far include shooting a bullet at the asteroid to throw up matter to be collected, which left an impressive crater. But the latest mission has not been so successful.The aim of this month’s mission was to drop a reflective marker on the asteroid’s surface which would help the craft achieve a second touchdown. The second touchdown mission is being considered as a way to collect more materials, as a bonus to those materials already collected from the first go-round.The problem is that dropping the marker has proven difficult. The craft began its descent as scheduled on May 15, moving at a speed of 40 centimeters per second. Scientists back home at the Japanese Aerospace Exploration Agency (JAXA) were able to monitor the craft with a relatively short delay time of under 16 minutes, and the craft’s Optical Navigational Camera captured a series of images of the approaching asteroid.Some 12 hours later, the craft was slowing down as planned and reached an altitude of 4500m. And 11 hours after that, the altitude of the craft was just 300m, and the shadow of Hayabusa 2 was visible on the image of Ryugu.Then the troubles began, with an automated system aboard the craft halting the descent. “The spacecraft descent has been autonomously aborted at an altitude of about 50m,” JAXA announced in a tweet. “Hayabusa2 is currently rising to the home position. Telemetry from the spacecraft has been confirmed and the spacecraft is normal, but the target marker has not been dropped.”The scientists are still working on understanding what caused the abort, but in the meantime, the craft had to be moved back into its starting position. Fortunately, this process went well. JAXA announced that on May 17 at 11 a.m. JST, “the spacecraft has returned to the home position.” They signed off with a message of thanks for the support they received from the public during the operating.The issue now is that Ryugu is heating up fast. Within a few weeks, the asteroid will reach its closest orbital position to the Sun, causing high temperatures on its surface. The heat will make a second touchdown impossible.Whether the team will be able to make a second touchdown attempt remains to be seen. Editors’ Recommendations See the crater blasted into an asteroid by a Japanese spacecraft Hayabusa2 probe collects first-ever subsurface samples from an asteroid Research unearths clues about Tunguska event for International Asteroid Day The U.K.’s biggest (and only) asteroid mining company has designs on our skies NASA and partners will simulate a potentially deadly asteroid strike this weeklast_img read more

Read More

Verizon phone locking is 2018s unwelcome return

first_imgIn a statement to CNET, Verizon says that it will begin locking phones as a means of preventing theft from its retail stores. Phones will remain locked for a period of time following purchase, but at the moment, Verizon hasn’t revealed how long that locked period will last. It also hasn’t said if there will be any other requirements – such as paying off your device entirely – before it’ll be unlocked. While Verizon phones are unlocked out of the box, other carriers require that you both pay off your phone and wait a certain amount of time before they’ll unlock your phone for use on another network. Verizon says that its unique unlocking policy makes its phones targets for thieves, but it didn’t elaborate further on that claim.Having your phone locked to your carrier for a certain amount of time may not be a problem for some people, but it will be for those who prefer to have the option to jump ship to another carrier at any time or those who travel internationally frequently. One way to get around high international fees from US carriers is to buy a pre-paid SIM card from the country you’re visiting and pay domestic rates for service during your trip. Assuming your phone is still SIM-locked to Verizon’s network when you take that trip, however, you won’t be able to do that.AdChoices广告This new policy also appears to fly in the face of rules laid down by the FCC more than a decade ago. In return for winning an auction for the spectrum that serves as the backbone of its 4G LTE network to this very day, the FCC required that Verizon stop the practice of SIM-locking phones to its network. Verizon, it would seem, thinks that it can get away with ignoring FCC rules, and the sad thing is that it’s probably right. The current FCC chairman, Ajit Pai, has already proven that he’s on the side of business with his much-derided campaign to repeal Title II regulations for net neutrality. Beyond that, however, Ajit Pai is part of the old guard over at Verizon, serving as Associate General Counsel for the company between 2001 and 2003. If there was ever a time that the FCC would roll over and let Verizon ignore rules it agreed to follow, it’s now.In the end, this argument that it needs to protect stock by SIM-locking devices feels like a Trojan horse that allows Verizon to skirt the rules, though that doesn’t necessarily mean the company isn’t worried about theft at all. Phone theft is certainly an issue, but we’re not sure that device locking is the most elegant way to deal with it, and it’s hard not see Verizon’s new policy as effectively hurting consumers just as it promises to help them. Verizon has started the week by making a big announcement, revealing today that it will begin locking phones later on this year. This is somewhat surprising because Verizon has historically offered its phones unlocked from the start, putting it in distinct contrast to the three other big carriers in the US. However, this may not be as big of a change as it seems at first blush, and on the surface, Verizon has at least a somewhat justifable reason for doing so.last_img read more

Read More

Broadcom pulls Qualcomm offer after Trump shuts deal down

first_imgStory TimelineQualcomm smacks down Broadcom takeover bidBroadcom really, really wants to buy QualcommIntel could ruin Broadcom’s big Qualcomm takeover Broadcom has been pursuing Qualcomm for quite some time now. Its first offer was rejected by Qualcomm’s board, as the $70 per share Broadcom was offering wasn’t enough to tempt a sale. Broadcom shot back with another offer that was again rejected, but by nominating a fresh batch of people for Qualcomm’s board, Qualcomm shareholders would have essentially had the opportunity to vote in favor of the Broadcom buyout.Broadcom’s attempt at an unsolicited takeover ground to a halt earlier this week, when the Trump administration moved to block it from taking place. The President and his team cited national security concerns with Broadcom, a company from Singapore, taking over the US-based Qualcomm. Today, Broadcom announced that it will comply with the order by terminating its offer.The company’s statement on the matter was brief and mostly boiled down to thank-yous to the people who had supported Broadcom’s quest to acquire Qualcomm. Broadcom does say, however, that it will continue with the redomiciliation process it started to make this proposed buyout more attractive to US regulators. This means that Broadcom will still be moving its headquarters to the United States, making it more of presence domestically.AdChoices广告Even once that move is complete, there’s little hope talks of this merger will be reignited any time soon. The Trump administration’s order was a permanent one, and requires both companies to check in with the Committee on Foreign Investment in the United States on a weekly basis to demonstrate that they’re in compliance with the decision. Still, with Broadcom heading to the US, this probably won’t be the last time we hear about it attempting to take over another massive company, so stay tuned. It would appear that Broadcom’s ambitions of buying Qualcomm are well and truly dead. Broadcom formally withdrew its offer to acquire Qualcomm today, just a couple of days after the Trump administration permanently blocked the merger from taking place. Broadcom has also withdrawn the nominees it named for Qualcomm’s board of directors, which will be decided at Qualcomm’s 2018 annual stockholders meeting early next month.last_img read more

Read More

Google Assistant adds Google Pay voicecontrol on iOS and Android

first_imgInitially, the feature will only be available on smartphones, using the Google Assistant on Android and in the Assistant app for iOS devices. It’ll also be limited to the US, at least for now. You’ll also need to have the person you’re sending money to, or hoping to receive money from, in your contacts, so that you can refer to them by name. For instance, you’ll be able to say “Hey Google, send Tom $20 for the tickets” and the Assistant will automatically set up a payment. You’ll have the chance to check over the details – including, importantly, making sure the contact is the right person – in addition to adding a note to the transaction. You can also change the payment method from whatever default you have set up, assuming you have more than one saved in Google Pay. Receiving money works in much the same way. “Hey Google, request $5 from Paula for coffee,” for instance, will automatically fire off a payment request to the appropriate contact. Again, you’ll be able to add a note for more explanation if you choose. AdChoices广告The recipient will will get an email or text message about the payment or payment request or, if they’re already a Google Pay user, they’ll get a notification from the app on their device. If you haven’t set up Google Pay yourself, meanwhile, the Assistant will prompt that process the first time you ask to send money. “Funds are transferred almost instantaneously,” Google promises, “even if the recipient doesn’t have a Google Pay account.”Transactions are carried out free for contacts in the US, Google says, and in the coming months it plans to expand the service to the Assistant on smart speakers like the Google Home. It’s not the only improvement we’ve seen Google Pay make this past week. Recently, Google began the process of turning the mobile wallet into a transit pass portfolio too, beginning with the Las Vegas monorail. Eventually, the company says, it hopes to expand to public transit services all over the country, offering a way to digitally purchase tickets and passes, and swipe them at the gate, for an entirely paper-free travel process. Story TimelineGoogle Pay assimilates Android Pay, Google Wallet into a single platformGoogle Pay gives Android Pay a new walletGoogle Contacts can send money via Google Pay Send The Google Assistant is getting a new job as debt enforcer, with new integrations with Google Pay that allow you to simply ask to send and receive payments. The new functionality is aimed at further reducing the headache involved in settling IOUs in an increasingly cashless environment, not to mention encouraging more Google Pay users. last_img read more

Read More

MoviePass acquires Moviefone to amass more subscribers

first_imgMoviefone was launched in 1989, enabling anyone to call a number to get information about movie showtimes and more. The service grew to massive popularity, being the source of an entire episode of Seinfeld, for example. AOL had acquired the service back in 1999 for a relatively huge $388 million, putting its current $1 million acquisition value into perspective. Moviefone shut down its iconic 777-FILM information line in 2014 due to very low demand.The company didn’t fold, however, setting its focus on mobile apps instead. Presently, Moviefone has around 6 million users per month; combine that with the name likeness and relatively inexpensive price tag, and it’s easy to see why MoviePass made a move for the business. If you’ve guessed that MoviePass acquired Moviefone to target the latter company’s users as potential new subscribers, you’re right.In a statement, MoviePass CEO Mitch Lowe explained the reasoning behind the new deal:This natural alignment between MoviePass and Moviefone will help us grow our subscriber base significantly and expand our marketing and advertising platform for our studio and brand partners. Moviefone has been a go-to resource for entertainment enthusiasts for years, and we’re excited to bolster its presence and bring this iconic platform into the entertainment ecosystem of the future.MoviePass recently attempted to lure new subscribers with a temporary price cut, which reduced the current $9.95/month subscription rate to under seven dollars, the catch being that you had to pay for a year’s subscription up front. The company’s long term plans include roping vendors into the ecosystem that is in-theater movie viewing, something that may involve tracking users.SOURCE: BusinessWire Subscription-based company MoviePass is acquiring Moviefone from Oath, it has been revealed. The deal was struck between MoviePass’s majority owner Helios and Matheson Analytics and Verizon subsidiary Oath. Moviefone, once a highly popular movie information service worth hundreds of millions, was purchased for a mere $1 million cash with a couple million common shares tossed in, according to a document filed with the SEC. last_img read more

Read More

Pixel 3 Lite looks better than the original

first_imgWe’re now privy to a so-called Google Pixel 3 Lite thanks to a series of photos shared this week by a leakster in Russia. If this device is, indeed, what it’s reported to be, it’s more than a little bit welcome in my pocket. This is because not ONLY does it have a rectangular display, and a back-facing camera that almost certainly has Pixel 3 powers, it also has a standard headphone jack on top. The Google Pixel 3 Lite we’re seeing here has a bigger bezel than its Pixel 3 predecessor, which I couldn’t care less about. It’s all one color on its back – though that MIGHT be a bit of a break up near the top allowing it to look a bit like Pixel 2. There’s a fingerprint sensor on the back, right where it should be, and an LED flash, too.The “C” you see on the back of this device is the same as we’ve seen in the past on test devices meant for Googlers. AKA it’s likely the real deal. Given the location of this leak, it’s not a stretch to guess at its source – the same place from whens the Google Pixel 3 was leaked in full earlier this year. UPDATE: Confirmed – this is literally the same source, albeit still unnamed.AdChoices广告According to last week’s teardown of the APK for the newest ARCore update, this device’s codename is Bonito. There could also be another device – maybe bigger than the XL – with codename Sargo. That’d be weird, but not impossible. This device looks like a cross between a Google Pixel 2 XL and a Pixel 3. It would NOT surprise me to find parts that were used in the Google Pixel 2 XL used again here in this “Bonito” 3 Lite. This device is said to have a 5.56-inch IPS LCD with 2220 × 1080 pixels across its face. The source for this device says it runs a Qualcomm Snapdragon 670 SoC with 4GB RAM and 32GB internal storage. The battery inside is said to be a piddly 2915 mAh. The source for this leak (anonymous to the Russian blog linked above) suggests that the camera array is THE SAME as the other Pixel 3 devices. Whether we’ll see this device revealed and/or released before the end of the year is not yet known. Given our proximity to the holidays, chances are we’ll have to wait a bit. center_img Story TimelineGoogle Pixel 3 Review: Picture greatnessOnePlus 6T Review : Clawing its way to the topGoogle Black Friday 2018 revealed: Pixel 3, Pixelbook, Nest, ChromecastThis Pixel 3 BOGO 50-percent off deal is already underwaylast_img read more

Read More

DJI Osmo Pocket puts smartphone cameras on notice

first_imgWith that gimbal, the Osmo Pocket already has a leg up on smartphone cameras, which usually rely on optical or digital image stabilization (unless, of you course, you use a gimbal made for smartphones, which DJI also releases under the Osmo brand). The company says that the Osmo Pocket is the “smallest 3-axis stabilized handheld camera” it’s ever produced, and even though that’s a very specific list of qualifiers, we believe it, as the camera seems particularly tiny.According to DJI’s spec sheet, the camera on the Osmo Pocket uses a 1/2.3″ CMOS sensor and an F2.0 lens that has a field of view of 80-degrees. It’s capable of capturing 12MP photos or recording 100Mbps video in 4K60, so it seems pretty capable for how small it is. In the video below, DJI covers the Osmo Pocket’s various shooting modes, which include 3×3 panoramas, face tracking, subject tracking (dubbed Activetrack), Motionlapse, and Nightshot. One interesting thing about the Osmo Pocket is its universal port, which can be used to connect different accessories. Some of the accessories DJI has announced thus far include a waterproof case, smartphone adapters for iPhones and USB-C Android phones, a 3.5mm jack for connecting a mic, a charging case, and yes, even a selfie stick. Finally, the camera comes with a 875mAh battery that lasts for as long as 140 minutes, according to DJI.All in all, it sounds like a solid portable camera if you’re looking for something more beyond the camera on your smartphone. The Osmo Pocket is available today from DJI’s website for $349 and ships out about two weeks after purchase. Story TimelineDJI Osmo Mobile hands-on: A stabilized bargain for the camera you always carryDJI at CES 2017: Osmo Mobile Silver, Zenmuse M1, Phantom 4 CNYDJI Osmo Mobile 2 hands-on: Less Expensive, More Versatilecenter_img We’re used to seeing nothing but drones out of DJI, but every once and a while, it’s been known to shake things up a bit. Today it’s doing just that by announcing the Osmo Pocket, a new mini camera that seems perfectly poised to take on smartphone cameras. As DJI fans can probably already tell by the name alone, the main feature here is stabilization, as the Osmo Pocket comes equipped with a 3-axis gimbal.last_img read more

Read More

Subaru Viziv7 Concept promises 7passenger fullsize SUV at 2016 LA Auto Show

first_imgIn the current automotive climate, to not have a three-row SUV sitting in your showroom is the equivalent of leaving millions of dollars in lost sales on the table. Subaru, a brand well known for its sport-utility vehicles and crossovers, hasn’t offered anything with more than five passenger seating since the quiet death of the competent, but unremarkable Tribeca several years ago. That all changed at this week’s 2016 LA Auto Show with the unveiling of the Subaru Viviz-7 Concept. The Viziv-7 Concept is the largest vehicle to wear a Subaru badge, by a fair margin. Chunky and bold, the full-size SUV features an enormous frontal area that brings to mind the recent Mazda CX-9 if it had hit the human growth hormone just a little too hard while bulking up for the summer beach season. This muscular impression continues all the way back to the Viziv-7’s thick flanks, which again bring to mind cues cribbed from the current crop of big people movers on the market.It’s certainly no sin to walk a path that’s already been tread, from a design perspective, and large SUVs don’t typically offer much opportunity to get busy with the stylus and clay. Subaru has also been burned in the past by adopting cues that were a little too forward-thinking with models like the Tribeca, so a more conservative approach is understandable. The important thing for Subaru loyalists is that seven-passenger practicality is on the way from the automaker, and while we don’t have any details regarding the Viziv-7’s drivetrain, the company has several turbocharged four-cylinder options to choose from as well as a reliable flat-six that would fit perfectly in the SUV’s engine bay. All-wheel drive will, of course, be standard with whatever production vehicle arises from the Viziv-7. Look for the new sport-utility in 2018, which is our guess for a delivery date.AdChoices广告Story TimelineSubaru concept hints at Tribeca replacement with plug-in diesel hybridSubaru Viziv Future concept aims at the active bicyclistslast_img read more

Read More

Audi and Huawei tie up for L4 autonomous driving advancement

first_imgHuawei has announced that it has tied up with Audi to help usher in innovation in level 4 autonomous driving. The vehicle that the tech will go into first will be the new Audi Q7. Audi and Huawei will work together to evaluate a joint development with highly automated driving functions. The duo will also work together on a future vehicle-2-infrastructure communications system. Huawei notes that Audi is one of the tech leaders in autonomous driving and it is looking forward to the partnership.Huawei’s Mobile Data Center is integrated into the Audi Q7 for use in urban autonomous driving environments. The new partnership is an extension of the memorandum of understanding that the two firms signed in July of this year. This marks an expansion of the partnership into an overall strategy for both companies.Audi is betting big on future technology these days. It rolled out its first fully electric SUV called the e-tron recently. We were able to spend some time with this EV and took it for a spin.If you had hoped to reserve one of the e-tron First Edition cars, they are all gone, and you are out of luck. That is assuming one of the folks who reserved don’t back out, which is likely to happen. There is no indication of when autonomous Audi cars using Huawei tech might turn up for purchase.SOURCE: Huaweilast_img read more

Read More