Categories
Dedicated Server

Combining convolutional neural networks and self-attention for … – Nature.com

Figure 4

The overall architecture of MBSaNet.

MBSaNet is proposed to improve the performance of classification models on the task of automatic recognition of multilabel fundus diseases. The main idea of MBSaNet is based on the explicit combination of convolutional layers and SA layers, which enables the model to have both the generalization ability of CNN and the global feature modeling ability of Transformer18,43. Previous studies have demonstrated that the local prior of the convolutional layer makes it good for extracting local features from fundus images; however, we believe that long-term dependences and the global receptive field are also essential for fundus disease identification, because even an experienced ophthalmologist is unable to make an accurate diagnosis from a small part of a fundus image (e.g., using only a macula). Considering that the SA layer with global modeling ability can capture long-term dependencies, MBSaNet is implemented by adopting a building strategy similar to the CoAtNet18 architecture with vertically stacked convolutional blocks and self-attention modules. The overall framework of MBSaNet is shown in Figure4, and Table 7 shows the size of the input and output feature maps at each stage of the model. The framework comprises two parts. The first of which is a feature extractor with five stages: Stage0Stage4, where Stage0 is our proposed multiscale feature fusion stem (MFFS), Stage1Stage3 are all convolutional layers, and Stage 4 is an SA layer with relative position representations. The second part is a multilabel classifier that predicts the sample category based on the features extracted from the above structure. We use the MBConv block that includes residual connections and an SE block27 as basic building blocks in all convolutional stages due to the same reverse bottleneck design as the Feedforward Network (FFN) block of Transformers. Unlike the regular MBConv block, MBSaNet replaces the max-pooling layers in the shortcut branch with convolutional layers having stride 2 in the downsampling strategy. This is a custom neural network that needs to be implemented by training it from scratch.

The dataset obtained from the International Competition on Ocular Disease Intelligent Recognition sponsored by Peking University. This dataset contains real patient data collected from different hospitals and medical centers in China, which were jointly launched by the Nankai University School of Computer Science-Beijing Shanggong Medical Information Technology Co., Ltd. joint laboratory. The training set is a structured ophthalmology database that includes the ages of 3,500 patients, color fundus images of their left and right eyes, and diagnostic keywords from clinicians. The test set includes off-site test set and on-site test set, but as with the training set, the number of samples under each category is unbalanced. Therefore, we also constructed a balanced test set with 50 images per class by randomly sampling a total of 400 images from the training set. The specific details of the dataset can be found in Table8. Fundus images were recorded by various cameras, including Canon, Zeiss, and Kowa, with variable image resolutions. As illustrated in Figure5(a), these data categorize patients into eight categories: normal (N), DR (D), glaucoma (G), cataract (C), AMD (A), hypertension (H), Myopia (M), and other diseases/abnormalities (O). There are two points to note. First, a patient may contain one or more labels, as shown in Figure 5(b), that is, the task is a multidisease multilabel image classification task. Second, as shown in Figure5(c), the class labeled Other Diseases/Abnormalities (O) contains images related to more than 10 different diseases, and low quality images due to factors such as lens blemishes, and invisible optic discs, variability is largely expanded in. All the methods developed and experiments were carried out in accordance with the relevant guidelines and regulations associated to this publicly available dataset.

Accuracy is the proportion of correctly classified samples to the total samples, which is the most basic evaluation indicator in classification problems. Precision refers to the probability that the true label of a sample is positive among all samples predicted to be positive. Recall refers to the probability of being predicted by the model to be a positive sample among all the samples with positive labels, and given the specificity of the task, we use a micro-average of precision and recall for each category in our experiments. AUC is the area under the ROC curve, and the closer the value is to 1, the better the classification performance of the model. AUC is often used to measure model stability. The Kappa coefficient is another index calculated based on the confusion matrix, which is used to measure the classification accuracy of the model and can also be used for consistency testing, where p0 denotes the sum of the diagonal elements divided by the sum of the entire matrix elements, i.e., accuracy. pe denotes the sum of the products of the actual and predicted numbers corresponding to all categories, divided by the square of the total number of samples. F1(_)score, also known as BalancedScore, is the harmonic (weighted) average of precision and recall, and given the category imbalance in the dataset, we use micro-averaging to calculate metrics globally by counting the total true positives,false negatives and false positives. The closer the value is to 1, the better the classification performance of the model. Final(_)score is the average of F1(_)score, Kappa, and AUC.

$$begin{aligned} Accuracy= & {} frac{TP+TN}{TP+FP+TN+FN} end{aligned}$$

(1)

$$begin{aligned} Precision= & {} frac{TP}{TP+FP} end{aligned}$$

(2)

$$begin{aligned} Recall= & {} frac{TP}{TP+FN} end{aligned}$$

(3)

$$begin{aligned} F1_score= & {} frac{2Precision*Recall}{Precision+Recall} end{aligned}$$

(4)

$$begin{aligned} Kappa= & {} frac{p_0 - p_e}{1 - p_e} end{aligned}$$

(5)

$$begin{aligned} Final_score= & {} frac{F1_score + Kappa + AUC}{3} end{aligned}$$

(6)

The fundus image dataset contains some low-quality images, which are removed since it would not be helpful for training. In order to minimize the unnecessary interference to the feature extraction process due to the extra noise brought by the black area of the fundus images, the redundant black area is cropped. We use the OpenCV library to load the image as a pixel vector and use the edge position coordinates of the retinal region of the fundus image to remove the black edges. The fundus images are further resized to a 224224 image size after being cropped as shown in Figure 6. Data augmentation is the artificial generation of different versions of a real dataset to increase its data size; the images after data augmentation are shown in Figure7. Because it is necessary to expand the size of the dataset based on retaining the main features of the original image, we use operations such as random rotation by 90(^circ ), adjustment of contrast, and center cropping. Finally, the global histogram equalization operation is performed on the original and enhanced images, so that the contrast of the images is higher and the gray value distribution is more uniform.

Processing of original training image.

The predictive ability of a classifier is closely related to its ability to extract high-quality features. In the field of fundus multidisease identification, owing to the different characteristics of the lesions reflected in the fundus images of several common eye diseases, the lesion areas have the characteristics of different sizes and distributions. We propose a feature fusion module with convolution kernels of different sizes to extract multiscale primary features of images in the input stage of the network and fuse them in the channel dimension. Feature extractors with convolution kernel sizes of 3(times )3, 5(times )5, 7(times )7, and 9(times )9 are used, since the convolution stride is set to 2, we padding the input image before performing each convolution operation to ensure that the output feature maps are the same size. By employing convolution kernels with different receptive fields in the horizontal direction to broaden the stem structure, more locally or globally biased features are extracted from the original images. The batch normalization operation and ReLU activation are then performed separately and the resulting feature maps are concatenated. The experimental results show that by widening the stem structure in the horizontal direction, higher quality low-level image features can be obtained at the primary stage.

CNNs have been the dominant structure for many CV tasks. Traditionally, regular convolutional blocks, such as ResNet blocks5, are well-known in large-scale convolutional networks; meanwhile, depthwise convolutions44 can be expressed as Formula7 and are popular on mobile platforms due to their lower computation cost and smaller parameter size. Recent studies have shown that an improved inverse residual bottleneck block (MBConv)32,45 which is built on depthwise separable convolutions can achieve both high accuracy and efficiency7. Inspired by the CoAtNet18 framework, we consider the connection between the MBConv block and FFN module in the Transformer (both adopt the inverted bottleneck design: first expand the feature map to 4(times ) the size of the input channel, and after the depth separable convolutions operation, project the 4(times ) wide feature map back to the original channel size to satisfy the residual connection), and mainly adopt the improved MBConv block including the residual connection and SE27 block as the convolution building block. The convolution operation with a convolution kernel size of 2(times )2 and a stride of 2, implements the output feature map size on the shortcut branch to match the output size of the residual branch. The experimental results show that this slightly improves the performance. The convolutional building blocks we use are shown in Figure8, and the downsampling implementation can be expressed as Formula8.

$$begin{aligned} y_i = sum _{jin {mathcal {L}} (i)}^{} w_{i-j} odot x_j quad quad {(mathrm depthwisequad mathrm convolution)} end{aligned}$$

(7)

where (x_i,y_i in {R}^{D}) denote the input and output at position i, respectively, and ({mathcal {L}} (i) ) denotes a local neighborhood of i, e.g., a 3(times )3 grid centered at i in image processing.

$$begin{aligned} mathrm {xlongleftarrow Norm(Conv(x,stride=2))+Conv(DepthConv(Conv(Norm(x),stride=2)))} end{aligned}$$

(8)

In natural language processing and speech understanding, the Transformer design, which includes a crucial component of the SA module, has been widely used. SA extends the receptive field to all spatial places and computes weights based on the re-normalized pairwise similarity between the pair ((x_i,x_j)), as shown in Formula9, where ({mathcal {G}}) indicates the global spatial space. Stand-alone SA networks33 have shown that diverse CV tasks may be performed satisfactorily using SA modules alone, albeit with some practical limitations, in early research. After pretraining on the large-scale JFT dataset, ViT11 applied the vanilla Transformer to ImageNet classification and produced outstanding results. However, with insufficient training data, ViT still trails well behind SOTA CNNs. This is mainly because typical Transformer architectures lack the translation equivalence18 of CNNs, which increases the generalization on small datasets46. Therefore, we decided to adopt a method similar to CoAtNet; the global static convolution kernel is summed with the adaptive attention matrix before softmax normalization, which can be expressed as Formula10, where (i,j) denotes any position pair and (w_{i-j}) denotes the corresponding convolution weights, improve the generalization ability of the network based on the Transformer architecture by introducing the inductive bias of the CNNs.

$$begin{aligned} y_{i}= & {} sum _{j in {mathcal {G}}} underbrace{frac{exp left( x_{i}^{top } x_{j}right) }{sum _{k in {mathcal {G}}} exp left( x_{i}^{top } x_{k}right) }}_{A_{i, j}} x_{j} end{aligned}$$

(9)

$$begin{aligned} y_{i}^{text{ pre } }= & {} sum _{j in {mathcal {G}}} frac{exp left( x_{i}^{top } x_{j}+w_{i-j}right) }{sum _{k in {mathcal {G}}} exp left( x_{i}^{top } x_{k}+w_{i-k}right) } x_{j} end{aligned}$$

(10)

The receptive field size is one of the most critical differences between SA and convolutional modules. In general, a larger receptive field provides more contextual information, but this usually results in higher model capacity. The global receptive field has been a key motivation for employing SA mechanisms in vision. However, a larger receptive field requires more computation. For global attention, the complexity is quadratic w.r.t. spatial size. Therefore, in the process of designing the feature extraction backbone, considering the huge computational overhead brought by the Transformer structure and the small amount of training data for practical tasks, we use more convolution blocks, and only set up two layers of SA modules in Stage4 in the feature extraction stage. Experimental results show that this achieves a good balance between generalization performance and feature modeling ability.

Convolutional building blocks.

The fundus disease recognition task is a multilabel classification problem, so it is unsuitable for training models with traditional loss functions. We refer to the loss function used in work16,40, all classified images can be represented as (X = ){(x_1,x_2...x_i...x_N)} , where (x_i) is related to the ground truth label (y_i), and (i = 1...N), N represents the number of samples. We wish to find a classification function (F:Xlongrightarrow Y) that minimizes the loss function L, we use N sets of labeled training data ((x_i,y_i)), and apply a one-hot method to each (y_i) is encoded, (y_i = [y_i^1,y_i^2...y_i^8] ), each y contains 8 values, corresponding to the 8 categories in the dataset. We draw on the traditional multilabel classification method based on problem transformation, and transformed the multilabel classification problem into a two-class classification problem for each label. The final loss is the average of the loss values of the samples corresponding to each label. After studying weighted loss functions, such as sample balance and class balance, we decided to use weighted binary cross-entropy from Formula11 as the loss function, where W = (1,1.2,1.5,1.5,1.5,1.5,1.5,1.2) denotes the loss weight. The positive class is 1, and the negative class is 0. (p(y_i)) is the probability that sample i is predicted to be positive.

$$begin{aligned} L=-frac{1}{N} sum _{i=1}^{N} W left(y_{i} log left( pleft( y_{i}right) right) +left( 1-y_{i}right) log left( 1-pleft( y_{i}right) right) right) end{aligned}$$

(11)

After obtaining the loss function, we need to choose an appropriate optimization function to optimize the learning parameters. Different optimizers have different effects on parameter training, so we mainly consider the effects of SGD and Adam on model performance. We performed multiple comparison experiments under the same conditions. The results showed that Adam significantly outperformed SGD in terms of convergence and shortened training time, possibly because when we chose SGD as the optimizer, the gradients of the samples were updated at every epoch, which brings additional noise. Each iteration is not in the direction of the global optimum, so it can only converge to the local optimum, decreasing accuracy.

Read this article:

Combining convolutional neural networks and self-attention for ... - Nature.com

Categories
Dedicated Server

From a $10,000 Ring to a Pokmon Charizard Card: MrBeast Gifts Minecraft Players Whatever They Build on the Server – EssentiallySports

YouTube star MrBeast has been known to indulge the community in his challenge videos. Recently he invited 100 Minecraft players to build whatever they want and vouched that hell buy the thing they build. Interestingly, the money range of the build was from $10 to $50,000, which made the players brainstorm the things they would want. Plus, it should be better and more impressive than the others.

ADVERTISEMENT

Article continues below this ad

MrBeast has been seen involving many games in his videos like Fortnite, Minecraft, and Among Us. He has done many challenges on the gaming servers and is back with another one where players got a full gaming PC to diamond rings.

ADVERTISEMENT

Article continues below this ad

Starting off with the $10 section, many players left the server while some took their creativity to do justice to the range. However, a player builds a Feastables bar and straight out won the deal with MrBeast of getting what they build. Next up was the $50 section, in which there was a close competition between a hamster and a Mario build. But the hamster stole the deal at last by the scores of MrBeast and his crew.

Unfortunately, no build under the $100 range won as it failed to impress the scorers. Next up for the $500 build, they had builds like a plane ticket, a Meta Quest 2 VR headset, and $500 worth of ice cream. Ultimately, the plane ticket won, which facilitated its maker to visit his family.

For the $1000 build, close competition occurred between a Pac-Man arcade and a telescope. After the results from the scorers, the Pac-Man build copped the deal. The video became even more wholesome when the scorers got to choose between an engagement ring and a drum set under the $5000 range. MrBeast asked if the player will propose to his girlfriend if he gets him an engagement ring. After getting a yes from the player, the engagement ring build won. Moreover, with the courtesy of NordVPN, MrBeast agreed to buy a whole gaming PC for a player.

The $10,000 Jeep Renegade build made the player get it in real life, which was dedicated to his wife. After Karl asked how it feels to be married to a nerd, the wife was immensely happy with it. To utter surprise, another player won a wedding ring under the $10,000 build so that they could propose to their boyfriend.

ADVERTISEMENT

Article continues below this ad

Also, a Pokmon Charizard card build won above all in the $15,000 section. Meanwhile, a car build was awarded the crown for the $25,000 build range.

At last, the scorers went on to the $50,000 section. Perplexed by the builds of a car, a waffle maker, and even an empty slot, they got their winner. A players unique thought of building a throne of cash made him win the $50,000 section, leaving the scorers intrigued by it.

ADVERTISEMENT

Article continues below this ad

WATCH THIS STORY:A Swedish Entrepreneur Once Donated $1.2 Million Just to Meet MrBeast

With that, another MrBeast came to an end. Jimmy did mention that one who subscribes to his channel could get a chance to win a golden toilet and might get a feature in his video. What do you think will be his next video? Do let us know in the comments below.

See original here:

From a $10,000 Ring to a Pokmon Charizard Card: MrBeast Gifts Minecraft Players Whatever They Build on the Server - EssentiallySports

Categories
Dedicated Server

What is an SSL certificate, why is it important and how to get one? – Android Authority

Joe Hindy / Android Authority

Have you ever noticed the padlock symbol in your web browsers address bar? Most websites, including the one youre reading this article on, use SSL certificates to establish a secure connection. The padlock icon offers a visual indication that the website has a valid SSL certificate installed. It also signals that any information you enter on the website is fully encrypted in transit. In other words, nobody can eavesdrop on your connection and steal sensitive data like your password or credit card details.

But what exactly are SSL certificates, how do they work, and can anyone get one? Heres everything you need to know.

See also: What is encryption?

What is an SSL certificate and how does it work?

Calvin Wankhede / Android Authority

An SSL certificate is a digital certificate issued by a trusted authority used for HTTPS or secure connections on the internet. A properly signed certificate provides a few key pieces of information that help your computer identify the identity of a website. It typically includes the name of the certificate owner, a unique serial number, an expiration date, and the digital signature of the issuing Certificate Authority (CA).

When you visit a website, your browser will automatically initiate a handshake process that checks for a valid SSL certificate. This process involves exchanging the SSL certificate and cryptographic keys, both of which cannot be spoofed.

SSL certificates aren't just symbolic, they also help keep your passwords safe from prying eyes.

If the details shared by the web server correspond to a valid certificate issued by a trusted authority, your browser will display a padlock symbol in the address bar. It will then initiate a secure connection, ensuring that data sent back and forth is completely encrypted. In a nutshell, the server and web browser use the pieces of information they know about each other to generate a cryptographic key at each end. And since nobody else has access to these details, they wont have the key to decrypt your communications.

If your web browser claims that the website youre trying to access is insecure, chances are that its because of an invalid or expired SSL certificate. This can happen if the website owner forgets to renew their certificate, but if it happens on every single website, you should also check your system date and time. However, it could also mean that the website isnt trustworthy so double-check that youve entered the correct address. Without an encrypted connection, you shouldnt enter any sensitive information like passwords as your browser will send it in unencrypted plain-text.

Related: Can your ISP see your browsing history? Heres what you need to know

If youre a website owner, getting an SSL certificate should be your top priority. This is especially true if you collect personal information or even user input in general. SSL certificates help ensure that a hacker cant intercept any data sent back and forth, so theres also privacy at stake.

Most web browsers these days, including Google Chrome, warn users if they visit a non-HTTPS website, which will likely cause them to click away. Search engines like Google also rank websites with SSL enabled higher so youre incentivized to install a certificate.

If you dont run a web or mail server, however, you dont need an SSL certificate. As long as you have a modern, up-to-date web browser, its the websites responsibility to ensure a secure connection.

Related: The best encrypted private messenger apps

Calvin Wankhede / Android Authority

Users get this warning if a website doesn't have an SSL certificateinstalled.

If you do need an SSL certificate, dont worry getting one doesnt take too much effort. A certificate is essentially a file that lives on your web server, all you have to do is place it in the right location and ensure that your host provides it to visitors. While you can self-sign your own certificates, web browsers wont accept those as they lack the signature of a trusted authority.

You can self-sign your own digital certificate, but no web browser will accept it for secure connections.

The easiest way to get a valid SSL certificate is via your domain providers website. GoDaddy, for example, will provide a single-domain SSL certificate at a fee of $299.99 every three years. DigiCert, meanwhile, offers certificates starting at $268 per year. And if you want a certificate for cheaper, other providers like NameCheap will have you covered for as little as $11 a year.

You can also get a valid SSL certificate for free via Lets Encrypt, which works just fine for a personal website or even a small business. Lets Encrypt is a non-profit Certificate Authority (CA) that aims to make internet security and encryption more widely accessible. The only downside is that youll have to renew and reinstall your digital certificate every three months instead of every year or longer. That said, you can automate this process with a small bit of code running on your web server.

Why are digital certificates so expensive?

Calvin Wankhede / Android Authority

If youre wondering why the cost of a digital certificate varies so much, its because each one offers a different level of security and there are very few trusted authorities out there. Some CAs have humans manually review each domain before issuing a certificate. Naturally, this makes them inherently more trustworthy but also expensive. Premium SSL certificates may also display the name of the website owner in some web browsers (like Google Inc.), boosting the perceived legitimacy of the brand.

The price for a digital certificate can vary from $0 to hundreds of dollars, but for good reason.

For large businesses like banks where security matters above everything else, an SSL certificate is often a no-brainer. It also helps that many larger providers offer dedicated customer support and insurance in case something goes wrong.

Read more: What is a VPN, and why do you need one?

See original here:

What is an SSL certificate, why is it important and how to get one? - Android Authority

Categories
Dedicated Server

Startups And Companies Acquired By IBM Till 2022 – Inventiva

Startups and Companies Acquired by IBM

As a result of acquiring top-notch on-demand startups all over the world, International Business Machines is steadily gaining prominence. Having merged, acquired, and absorbed other reputable companies since IBMs incorporation, the American Technology MNC operates in 177 countries.

Further, IBM developed a reputation for providing quality services by acquiring startups around the globe. In 1911, when IBM merged with four large corporations, Charles Ranlett Flint founded IBM, a technology company based in New York.

Its initial objectives were to manufacture tools such as slicers, timers, punch cards, etc., for sale and lease. A few years later, Thomas J. Watson rejoined CTR and underlined customer service while expanding production scale and overseas operations, thus increasing sales. As a result of enabling people to receive technical services, IBM became a foreign operation by 1950.

A mass-produced computer with floating-point ARITHMETIC HARDWARE, IBM 701, became the industrys first practical AI in 1956. As a result of their acquisitions, IBM has prospered universally since 1912.

The company provides a variety of services, from mainframe computers to nanotechnology, including computer hardware, middleware, software, and hosting and consulting.

From IBMs incorporation until now, here is a list of the companies it has acquired.

7Summits

We are one of the Salesforce Platinum Consulting Partners that transmit transformative digital tests. NYSE: IBM acquired the company on January 11th, 2021, and they specialize in Salesforce ecosystem support.

Turbonomic

A fast-growing technology company, it is based in Los Angeles. They provide IT management applications. It protects the automation within context while fulfilling network, storage, and performance needs. Turbonomics acquisition by IBM will end on June 17, 2021.

Boxboat

DevOps, Continuous Delivery and Cloud Migration are all aspects of BoxBoat. In the cloud, they enable organizations to revise digital data using modern technologies. IBM announced the acquisition of Boxboat Technologies on July 29th, 2021.

TAOS

It is a company that manages IT services. In addition to migration and technical program management, they provide strategic IT planning, security assessments, cloud architecture, network and systems engineering, and security assessments. IBM announced the acquisition of Taos on January 14, 2021.

Bluetab

Business software and technical services are provided by the company. Spain, Mexico, and the UK are all possible locations for their departments. The Java EE, Microsoft. The technology that the company uses is NE and other open-source devices. IBM acquired Bluetab Solutions Group in 2021.

MyInvenio

A part of IMB is MyInvenio. As a result, unions can automate their business processes with AI-powered automation, simplifying the mining process and simplifying business processes. MyInvenio was acquired by IBM on April 15, 2021.

Instana

APM software is best created by Instana, a German-American company. Software used in microservice architectures and 3D visualization is managed with this application performance management software. San Francisco, Solingen, and Chicago are the bases of this company.

Spanugo

Cybersecurity Posture Assurance is offered by Spanugo for ENTERPRISE HYBRID clouds. As of June 2020, the company will cease operations. Janga R Aliminati, Doss Karan, and Doc Vaidhyanathan founded the company.

Nordcloud

As a cloud consulting services provider, Nordcloud gives a range of services. The company was established in 2011 in Helsinki, Finland. The company employs over 450 people and generates about $61 million in revenue. On 21, December 2020 IBM finally bought Nordcloud.

WDG

To make the most of your money, WDG works with your firm. This cloud-based application by IBM allows you to maximize the return on your investment through its clever and intuitive design and ease of use.

Expertus

Canada is the companys headquarters. Case Management, Fraud Detection, Data Management, Messaging Services, Payment, Payment Solutions, Processing, Regulation Compliance, Software Updates, Security Service, and Technical Maintenance are all services offered by the company. The Nordcloud acquisition was announced by IBM on 15 December 2020.

TruQua Enterprises

In addition to SAP Finance, TruQua Enterprises specializes in deployment strategies, blueprint designs, best practices, implementations, development libraries, development libraries, and solution research. Chicago, Illinois, is the headquarters of the company. It was founded in 2010.

Red Hat

The Red Hat Corporation provides businesses with open-source software. The companys headquarters are located in Raleigh, North Carolina. The company was founded in 1993 by Bob Young and Marc Ewing.

Oniqua Holdings Pty Ltd

In 1990, Oniqua was established in Denver, Colorado. The number of employees ranges from 50 to 200. It gives services such as Maintenance, Repairs, and Operations, as well as MRO Analytics, Asset Performance Management, Supply Chain Management, Maintenance, Repairs, and Asset Performance Management.

Armanta, Inc

In addition to developing drugs to treat drug-resistant bacteria, Armata Pharmaceuticals is a biotechnology company. In Marina del Rey, California, the company is headquartered.

Verizon Cloud services

Services and products are provided by Verizon Business, a division of Verizon Communications. It was founded in January 2006 by Verizon Business. As of 2019, Verizon Business Solutions has been renamed Verizon Business Solutions, dividing up into three groups.

Vivant Digital

Founded in 2008, Vivint Smart Home, Inc. is a publicly-traded company that gives smart home services in the USA and Canada. Todd Pedersen and Keith Nellesen founded APX Alarm Security Solutions Inc in 1999. In 2020, the company had revenue of 1,260.7 million dollars. The company employs approximately 11,000 people.

Cloudigo

Providing network infrastructure is what Cloudigo does. In 2016, Cloudigo launched as a new brand. International Business Machines Corporation owns Cloudigo. Among Cloudigos industries is IT services.

Agile 3 Solutions

CLIENTS of Agile 3 Solutions can renovate their businesses with the help of Agile 3 Solutions products. Founded in January 2009 by Raghu Varadan, the company has its headquarters in San Francisco, California, USA.

XCC

Together, IBM and XCC will improve the IBM Connections portfolio by providing tools to organizations, reducing content fragmentation, and improving communication and collaboration with organizations.

Iris Analytics

Using IBM Safer Payments, IRIS Analytics helps CLIENTS reduce risk, increase productivity, and increase profits. As of January 15, 2016, IBM acquired IRIS Analytics, which has its headquarters in Germany.

Resource Link

In Resource Link, you can access data used for application and server planning, installation, and management.

Aperto

Digital agency Aperto is a renowned name in the DACH region. IBM acquired the company in 2016. Berlin is the headquarters of the company, which was founded in 1995. CLIENTS both domestically and internationally work with them.

Truven Health Analytics

Watson Health, a subsidiary of IBM Corporation, acquired Truven on February 18, 2016. Pharma safety, health, and disease management are all ensured by Truven Health Analytics.

Optevia

In 2016, IBM acquired UK-based Optevia to address rising software demand for Microsoft Dynamics CRM in the public sector.

Blue Wolf Group LLC

Digital solutions are the specialty of Bluewolf Consulting. An approximately $200 million acquisition was made by IBM of Bluewolf, a cloud consulting firm. In May 2016, IBM acquired Bluewolf.

EZSource

Analyses and measurements with EZSource are reliable and automated. Visual dashboards in EZSource provide developers with an overview of what has changed in their programs. The company was developed in 2033.

Sanovi Technologies

We create and build applications at Sanovi Technologies Inc. The company provides enterprise application solutions, disaster recovery solutions, and private cloud infrastructure. It is headquartered in Bengaluru and was founded in 2002.

Resilient Systems

Enterprise software can be designed and maintained using Resilient Systems, Inc. Computer software is created by them, and they protect businesses from cyberattacks. The company was founded in 2010.

Ecx.io

Ecx.io helps CLIENTS grow their businesses by identifying digital opportunities. Around 25 years ago, the company was founded. In 2016, IBM acquired the company

Promontory Financial Group

CLIENTS receive financial services advice from Promontory Financial Group. IBM supervises the completion of the project. A Washington, D.C.-based company, the company was founded in 2001.

Ustream

Live video is broadcast by Ustream. It employs about 180 people at its headquarters in San Francisco. A year later, the company merged with IBM, launching in March 2007. In 2018, IBM Cloud Video was rebranded.

Blekko

A web search engine named Blekko promised to outperform Google Search in terms of search results. The institution was established on November 1, 2010.

Explorys

Healthcare organizations can easily consolidate, link, and combine data across corporate and clinical networks using Explorys Platform.

Compose, Inc

Developers use Compose, Inc.s managed platform to deploy, host, and scale databases. Compose serves customers in the U.S. In 2009, the company was founded.

Phytel

There is no doubt that Phytel has established itself as an industry leader in providing integrated population health management software. Dallas-based company specializing in population health. Phytel was acquired by IBM in May 2015.

Merge Healthcare Inc

Merge Healthcare Inc. provides electronic healthcare services to patients and physicians. Founded in 1987, the company is based in Chicago, Illinois. Cedara Software Ltd and Merge Healthcare Solutions Inc are subsidiaries of Merge Healthcare Solutions Inc.

Bluebox

As a hybrid cloud provider, Blue Box gives CLIENTS the security and ease of a private cloud. In 2015, IBM acquired this company.

Meteorix LLC

It provides financial services and human resource management. Boston-based company. About 200 people are employed by Meteorix, a company founded in 2011.

Gravitant, Inc

A consulting and IT services company, Gravitant cloudMatrix has approximately 200 employees. Austin, Texas, is the companys headquarters. Gravitant software was founded in 2004 and covers the entire IT value chain.

The weather Company- DIGITAL ASSETS

A weather forecasting and information technology company, The Weather Company owns and operates Weather.com and Weather Underground. Approximately $2 billion was spent by IBM on the DIGITAL ASSETS of The Weather Company.

AlchemyAPI

Machine learning was the focus of AlchemyAPIs software business. A variety of uses were made possible by its deep learning technology. The company was founded in 2005 and is located in Denver, Colorado.

StrongLoop Ltd

A top API Tier developed by StrongLoop, StrongLoop Suite is led by StrongLoop. With more than 30 Node.js developers in San Mateo, California, StrongLoop is a Node.js development company.

Silverpop Systems, Inc

Digital marketing is the specialty of Silverpop Systems, Inc. Email marketing ideas are generated automatically, campaigns are managed, executed, and campaign performance is analyzed. The company was founded in 1999 in Atlanta, Georgia.

Visit link:

Startups And Companies Acquired By IBM Till 2022 - Inventiva

Categories
Dedicated Server

Where to check the Overwatch 2 Server status – Sportskeeda

Overwatch 2 server down: Where to check the Overwatch 2 Server status

Server outages are common in multiplayer video games that are based on online servers. Overwatch 2 is a popular online hero-shooter game that features a dense player base. As a result, technical issues and server-based challenges commonly appear. Such hiccups can frustrate players, and calls for immediate attention.

Unfortunately, server-based issues in Overwatch 2 can be caused by many possible reasons. The usual cause can be attributed to developer-sided server maintenance sessions, which are usually announced ahead of schedule. However, the trigger could also be an unanticipated bug, a new update, or an error in the game's code.

Whatever the reason, players should stay informed about the server status to avoid running into mysterious errors and crashes in Overwatch 2.

Unlike some video game titles, Overwatch 2 doesn't feature a dedicated server status page that players can visit to gather updates. Instead, one needs to keep an eye on Blizzard's customer service handles on Twitter for an announcement.

Blizzard has customer service pages on Twitter for every region. You can also report issues by tagging the specific handle for your area. Here are the handles you should take note of:

Alternatively, users can check out Overwatch 2-related public tweets for confirmation. One can also head over to the official Blizzard Support forums to check for similar complaints.

Apart from announcements on Twitter, the Battle.net launcher will also display a notification regarding the same.

There are no workarounds if the outage is caused by an officially acknowledged maintenance session or a bug. All one can do is wait until the maintenance period ends or the bug is addressed.

While most server outages affecting Overwatch 2 are caused internally, some issues could also be related to client-end hiccups. If you don't come across any reports or official acknowledgments regarding server maintenance, the issue is likely from the client's side and can be fixed with some basic workarounds.

Here are a few things you can try:

1) Restart your system

By this time, you have probably tried restarting the Battle.net client and the game. If not, try doing so. If that doesn't help, try a full system reboot.

2) Check your network

Check for an unstable network connection by performing a ping test. If you detect a problem, try fixing it. Try restarting your router and modem. Also, wireless connections are pretty unstable for gaming, and switching to a wired/ethernet connection may help.

You can try switching to a different DNS server and see if that helps the situation. If none of the basic internet-fixing workarounds help, contacting your ISP should be the next best option.

3) Attempt to Scan and Repair

Although a far-fetched idea, this could help trigger a missed patch update or fix corrupted game files. Click on the cog icon beside the Play button and the option should appear. Click on it to initiate the repair and try launching the game after the process is complete.

4) Contact Blizzard support

Make note of the error/issue you are facing and report it to Blizzard Support via Twitter or the forums.

More from Sportskeeda

Fetching more content...

Read more here:

Where to check the Overwatch 2 Server status - Sportskeeda

Categories
Dedicated Server

Best Phishing Training Options for You and Your Employees – Small Business Trends

One of the best defenses against phishing attacks is training. By teaching your employees how to recognize and report phishing attempts, you can help keep your company safe from hackers. But with so many training options available, how do you choose the right one for your business? Weve compiled a list of the best phishing training options to help you decide.

Phishing awareness training is a program that helps employees learn how to identify and avoid phishing emails. These emails are designed to lure employees into clicking on a phishing link or opening an infected file.

Phishing awareness training can help employees stay safe online by teaching them how to:

Phishing training for employees can also help them understand the risks of sharing personal information online.

People are often the weakest link in an organizations cybersecurity posture. Phishing attacks involve tricking employees into revealing sensitive information or clicking on malicious links, which is a common way for cybercriminals to gain access to company networks.

Thats why organizations need to offer phishing training for employees. Training can help employees learn how to identify phishing emails and protect themselves from becoming victims of these attacks.

In addition to training, there are other things that organizations can do to protect their networks from phishing attacks, such as implementing a strongcybersecurity policyand using anti-phishing tools.

But education is key, and companies must train their employees to avoid cyber risk and stay safe online.

Here are the top options for simulated phishing campaigns and security awareness training programs:

KnowBe4sKevin Mitnick Security Awareness Training (KMSAT) allows you to run tests regularly with real-life examples of malicious emails. You can start by testing how prone your employees are to phishing, then move on to train them.

KMSAT includes a mix of interactive modules, videos, and newsletters to train users. You also get insights into employee performance to assign additional training if needed.

Phishing simulations and training fromInfosec Institutehave over 1,000 templates to build simulated campaigns. And that library is updated regularly to simulate recent and ongoing attacks.

With Infosec, you can provide personalized anti-phishing training to your employees on auto-pilot. Once you configure the schedule, users start receiving the simulated emails and training videos automatically.

Phished delivers interactive cybersecurity education with the help of automated simulations. WithPhished Phishing Simulations, you can train employees to spot phishing emails and smishing (SMS phishing) attacks. The knowledge is imparted through a series of micro-learnings.

It sends AI-driven simulations and reports back with the results. The entire sequence is automated. So, you can set it up and forget.

PhishingBox simulator uses test phishing attacks to train employees. It provides a range of templates and landing pages for quick setup.

WithPhishingBox Phishing Simulator, you can ensure your employees are fully prepared for an attack. PhishingBox also has a Learning Management System (LMS) to monitor everyones progress.

Gophish is a phishing framework to help you test how phishing-prone your organization is. This free tool can design phishing email templates and schedule them. And then, you can track the results in near real-time.

Unlike other tools,Gophishdoesnt have a host of complex features. Its a minimal and intuitive program designed just for testing.

Infosequre has many premade scenarios with realistic phishing emails and text messages. You can use exercises ofInfosequre Phishing Simulationto track your employees capability and presence of mind. The platform sends custom exercises and feedback depending on how someone acts.

You can use your own dedicated server. So, no one outside your organization can access your information, phishing tests, and feedback.

Proofpoint Security Awareness Training is the key to cyber defense. You can use it to train your team to identify and report phishing messages. It helps make everyone better aware of the cyber threats looming in the air.

WithProofpoint Security Awareness Training, you can run phishing USB simulations based on real-world threats, get knowledge and culture assessments, and get a report that identifies your top clickers.

TerranovasPhishing Simulationleverage dynamic content in various formats to engage the users. It helps you identify the employees at the most risk and make them aware of it.

With its simulation, you can create mock phishing attacks to train your employees for D-day. You can empower them with all the skills to recognize and report phishing emails.

SafeTitan is an advanced platform for real-time training. It has several templates to automate your training campaign fully. Each user gets personalized training depending on their test responses.

The program uses short gamified tests to create an interactive and enjoyable environment for employee training. The content library ofSafeTitan Plus Phishing Protectionalso has an extensive amount of training resources.

Hook Securitys phishing training toolkit is a complete training resource for your most significant asset: the employees. It uses a series of bite-sized training modules to make learning easy.

WithHooks Phishing Testing, you can easily set up mock tests for phishing and spear phishing attacks.Employees get instant feedback and learn to make themselves better aware of the risks. And you get comprehensive reporting to drill down into specifics.

Phishing attack exercises are a type of mock cyber-attacks in which the attacker attempts to acquire login credentials by masquerading as a legitimate entity in emails or other communication channels. Phishing attack exercises or phishing tests are often used in training simulations for employees of organizations.

It depends on the organization. While a few smaller companies may only spend $500 or less per year, the average medium-sized company spends about $1,600 annually, and large organizations can spend up to $50,000 or more.

Several phishing awareness training options are available, ranging from online tutorials and self-paced courses to live classroom sessions led by expert instructors. Organizations should consider their specific needs and pick the phishing training program that suits their requirements.

Yes. Phishing training definitely works, but its crucial to ensure that the phishing awareness training is practical and provides employees with the knowledge they need to protect themselves from phishing attacks.

Image: Envato Elements

Link:

Best Phishing Training Options for You and Your Employees - Small Business Trends

Categories
Dedicated Server

9 Of Reddit’s Wildest Food Conversations – Daily Meal

Yes, you read that right: this is a popular subreddit about bread that has been stapled to trees. That's it. That's the sub. This thriving community of bread stapled to tree enthusiasts runs about 318,000 deep. According to Bon Appetit, it was started by two friends back in 2017 as a joke, but has taken off ever since. Users come to r/BreadStapledtoTrees to share images oftoasted white bread stapled to an ash tree, a marbled rye stapled to a palm tree, and even a sourdough starter stapled to a tree. There's something weirdly wholesome and calming about the thread. Redditors seem to understand and even celebrate the silliness of this tradition, while still respecting the strict rules.

Yes, there are rules. Lots of them, in fact. For starters, the founders of the thread spoke to tree conservationists who confirmed that staples won't hurt mature trees. But the group does have a strict no young trees, bonsai, or cactus policy (via Bon Appetit.) There is also a list of approved breads, which is quite extensive and ecompasses everything from Pop Tarts, taco shells, and more typical types of bread. So if you're inspired, why not grab some challah, matzah, or even some gingerbread menalong with a stapler and join in on the fun?

See the original post here:

9 Of Reddit's Wildest Food Conversations - Daily Meal

Categories
Dedicated Server

Quiet Quitting, Re-Recruiting: New Tech Terms That Arose in 2022 – Tech.co

From Mark Zuckerbergs mad metaverse musings to mass layoffs and Musk-induced mayhem at Twitter, 2022 has been a tumultuous twelve months for the technology industry.

Along the way, a whole host of new phrases and words, virtually unused and unheard of in January, have slowly crept into our conversations. Looking ahead to 2023, it's likely you'll see these terms used even more frequently, as we continued to adapt to the modern and often novel post-pandemic world of work.

Here are all the important tech terms you need to brush up on before 2022 ends and the new year begins.

The term Quiet quitting garnered significant media attention after being discussed extensively by employees on social media throughout the year, particularly in younger millennial and Gen Z circles.

The term refers to doing the absolute bare minimum your job requires you to do, and nothing beyond that. Its precisely the opposite of going above and beyond at work, which is perceived by Quiet Quitters to negatively impact a healthy work-life balance.

Re-recruiting isn't necessarily a brand-new term and probably arose before the year began but it was honed in on by Microsoft in their September 2022 Work Trend Index, for which 20,000 workers from across the globe were surveyed.

One key takeaway from the survey was that staff need to be re-recruited to their roles in order to ensure theyre continuing to develop and grow within their company.

This effectively means giving employees ample opportunity to expand their skill sets and learn more about both their own roles and roles that exist above them. The hope is that providing employees with this will help minimize job-hopping, which has made it difficult for companies to retain staff all year.

A Decentralized VPN sometimes called a dVPN refers to any VPN that does not have centralized control over the individual servers that make up its server network.

As popular VPN company Surfshark puts it, instead of a single VPN provider supplying and maintaining the servers, dVPN's servers are hosted by independent users. They could be using dedicated server machines or just installing dVPN software on their home computers.

There are some definite advantages to Decentralized VPNs, but perhaps the biggest one is that your privacy is secured by the very nature of the network infrastructure, rather than a private company (i.e. a VPN provider) giving you their word however trustworthy that they wont log your data.

Coined by project management software provider Wrike, the Dark Matter of work lives in synchronous applications and unstructured work, such as instant message threads and video calls, as well as the gaps between systems and applications that arent integrated.

Workplace dark matter consists of all the little tasks you have to complete in your workday that take very long to complete in isolation, but slowly add up and eat into your time. As alluded to above, the project management provider suggests thinks the explosion of workplace applications is to blame for an exponential increase in workplace dark matter.

Conversely to Quiet Quitting, Quiet Firing is enforced by managers. Instead of just firing an employee outright, during a Quiet Fire, a boss will slowly remove one of their staff members duties until their position becomes obsolete or unneeded.

Bosses engaging in the practice may reassign these tasks to other employees, change the employee's job description, demote them, or simply block them from pursuing opportunities that will expand their horizons within the company.

If an employee is quietly fired in this way, it makes it significantly harder for them to launch legal action against the company than if they were fired outright.

Workfluencers are essentially influencers that create content about their jobs. those who are interested in learning more about their field and what their day-to-day work life is like.

They often make money from brand partnerships like standard influencers and seek engagement from followers in much the same way, but focus their content entirely around the 9-5.

Workfluencers have been aided significantly by changes to business and career apps like LinkedIn, which have continuously borrowed features from mainstream social media sites over the past few years to make their platforms more accessible and usable.

Now, over 13 million LinkedIn users have their profiles set to creator mode, which will, in theory, more people will see their posts. Workfluencers are here to stay, whether we like it or not, and there'll probably be plenty more who try their hand at it in 2023.

MFA Fatigue is a novel hacking technique that was used to great effect by thereat actors throughout 2022, and is thought to have been the catalyst behind successful breaches of Uber, Microsoft, and CISCO's networks.

In MFA Fatigue attacks, perpetrators will run a script that attempts to log into a targets account that has multi-factor authentication turned on using stolen credentials. The victim will then receive a seemingly unending stream of authentication requests as the script runs.

The hackers are hoping that the victim is so irked by the constant string of notifications that they finally approve one of the requests out of frustration. After that, they'll have access to the account and can wreak whatever havoc they please.

Overemployment is a modern term for someone working multiple jobs which has become increasingly common since the post-pandemic economic downturn were all experiencing began.

According to the Bureau of Labor Statistics, 4.9% of the 164 million-strong US workforce held two or more jobs in September 2022, which amounts to almost 8 million people.

As the name would suggest, boomerang employees are staff members that are employed at companies theyve previously left, typically on good terms (hence the return). One analysis of LinkedIn members job histories shows boomerang employees accounted for 4.3% of US hireslast year.

Some companies are now encouraging this practice, setting up alumni networks and other ways to stay connected with former employees once they leave in order to coax them into the office and back onto the payroll at a later date.

However, some research suggests that employees returning to more senior positions after leaving previously can have a negative impact on staff morale, particularly for those who are still in the same roles they were in when their returning co-workers first departed.

Ransomware-as-a-Service a play on the more widely-known term Software-as-a-Service is a term given to any ransomware that is made commercially available as a subscription service, enabling affiliates to use the already-developed tools to execute their own attacks.

The rise of Ransomware-as-a-Service has materialized alongside many ransomware gangs moving from double extortion tactics both encrypting and exfiltrating a victim companys data and threatening to publish it to triple extortion tactics.

In a triple extortion attack, a companys data will first be encrypted (coupled with the threat of deletion) and exfiltrated (coupled with the threat of publication), all while the threat actor also orchestrates a third stage, such as a DDoS attack or threatening the companys clients.

Productivity paranoia refers to a disparity between how productive CEOs, bosses, and managers think their staff members are, and how productive staff members actually believe themselves to be.

The disparity is stark, too. According to a Microsoft Work Index study released this year, although 87% of employees believe themselves to be productive at work, only 12% of leaders believe their employees are making the most of their time.

Productivity paranoia has likely been exacerbated by the rise of hybrid, flexible and remote approaches to working, which many bosses feel has given them less visibility over their teams.

Email Bankruptcy occurs when a person deletes or ignores emails that are older than a certain date, or in more extreme cases, abandons their inbox altogether due to the volume of emails theyre receiving.

Granted, this term has been around a lot longer than just this year but considering the rise of project management software apps with built-in collaboration tools as well as business communication platforms like Slack, you might hear it a whole lot more in 2023. Around 30% of US adults have already declared email bankruptcy, with inboxes becoming increasingly clogged with spam, junk, and marketing emails.

While as equally interesting as it has been exhausting, 2022 has left many people working in and around the tech sector with more questions than answers.

Will the mass layoffs weve experienced this year continue? What cyber threats will be used to target businesses? Will Twitter survive until the end of the year with Musk at the helm, or will Googles scarily sentient AI have taken over the world before we can find out?

Whatever happens in 2023, well be keeping you up to date with daily news updates on the platforms, services, and businesses that matter to you.

If youre yet to declare email bankruptcy and would like to get all of Tech.cos news straight to your email inbox, sign up for our newsletter today:[/vc_column_text]

Follow this link:

Quiet Quitting, Re-Recruiting: New Tech Terms That Arose in 2022 - Tech.co

Categories
Dedicated Server

How Mastodon is scaling amid the Twitter exodus – TechCrunch

Twitter is in crisis these days. Under new owner Elon Musk, the service has lost more than half its staff through layoffs and quitting, made erratic moves in its product and platform strategies and is facing up to reports about its financial state.

That disruption, in true tech industry style, has led to the emergence of a plethora of alternatives, some still in germination and some fully formed and waiting for their moment in the spotlight.

Among them, one of the leaders that has emerged is Mastodon a network created on the ActivityPub protocol that runs servers itself and allows others to join and/or establish their own servers to engage with and see each others content.

Eugen Rochko, Mastodons creator and currently sole full-time employee said in an interview with TechCrunch that the service has ratcheted up numbers very fast, and it now has 2.5 million monthly active users across no less than 8,600 different servers. Mastodon operates a couple of these directly, and the biggest of them, mastodon.social, has 881,000 registered users, 210,000 of them active.

Rochko has closed Mastodons servers for new signups. Its a move he described as a victimless decision, because there are so many other places to register an account and still interact with the wider Mastodon universe. Nonetheless, the move has created a curious scarcity/demand situation: People and organizations have contacted Rochko asking for access to getting accounts on his servers anyway.

The main reason that the registration is closed right now is just that it is a big burden to the DevOps, to scale up, beyond the number of users [we have now], he said. I dont want to say, oh, the software is not good enough to scale or whatever. Thats not really the reason, its just a question of not having a dedicated DevOps employee right now. I cant run all of these organizational things and the rest. Its just easier to close registrations and ensure that the people who are already on there have a good quality of service, instead of allowing more people to sign up, and then it slows down. And then I have to stay up, sleepless nights fixing things.

The decentralized nature, and the fact that theres plenty of other servers to choose from to sign up on means that its kind of a victimless decision to make.

Now Rochko is eyeing up the next steps for his operation.

Mastodon as it currently exists is set up as a not-for-profit organization, financed for the most part by a Patreon account that Rochko set up that currently brings in $31,000 each month a figure that he says has risen dramatically over the past month from $7,000.

Mastodon is going to remain not-for-profit, Rochko said, but its looking at what he describes as a split model, like Mozillas, where the nonprofit will continue working on the core product, which will remain open source, nonprofit and so on, and we might start a for-profit side business for software as a service, first to provide hosting for Mastodons for those who desire that.

The aim, he said, is a sustainable and fair business we would do just the hosting and the server would be completely under your control. And obviously, we would allow you to take take your data and move it to your own hosting provider in the future, or migrate from another hosting provider, and so on.

Unlike the approach taken by WordPress, there are no plans to incorporate ads as part of the hosted service, he said. Its a position that seems to come out of his own sentiments about them, but he doesnt dismiss them altogether.

You have to consider that the fediverse nature of the network, he said. Anyone could develop another platform, using the same ActivityPub protocol [that Mastodon does], but with completely different software around it, with different expectations and different features. And if they wanted to build ads into it, they could, in theory.

The question is only as a user, would you go to a service that has ads, and to make those ads effective, the service keeps track of your interests and location? Or would you just go to another one that doesnt have that? We, Mastodon, are not interested in the ad business and implementing ads into our code. But as I said, its free and open source, so anyone could modify it. Theyd do it at their own risk, with different business models.

As for those operators of Mastodon servers, he said, he leaves it open to them, but ironically favors something not unlike what Musk has floated for Twitter itself.

I think that I see a method in the sort of framework for building interoperable social media networks; you could think of an individual server as a separate social network, like Tumblr, or Instagram, he said. With interoperability built in straightaway, I think that it makes sense that they would be able to explore different business models, or maybe build out different features. I think that probably the fairest model that could appear in the ecosystem would be the paid accounts model. This is something in the past App.net tried to do but, I feel, did not succeed. It wasnt clear if that was because of the paid account part, or because they didnt really build out a good flagship product.

He revealed that he also has been talking with investors, although for the most part it seems that a lot of those who want to give him money dont really understand what hes trying to do, with one recurring theme being the idea of further commercializing the platform.

Over the years, Ive definitely received a lot of unprompted cold contacts from various VCs. Ive previously ignored them, but now we have Felix [Hlatky], who works as basically a CFO, but he doesnt have the title officially, yet. Now I forward those to him and then he tries talking with them, or sometimes I tune into the calls, he said. Weve tried talking to some VCs about this hosting business thing in the past couple of weeks. I have to say, though, theyre interested in somehow getting into the main product and theyre not so much interested in a sustainable hosting business. So, VCs are not going to help here. Were not letting them into the main product in any way. So yeah, were probably going to have to go with an angel investor, or just crowdfunding the hosting business separately or just, I dont know, maybe personal funds would be enough. Thats not entirely clear.

Mastodon has been notable for how its been picking up attention in the wake of Twitters drama so much so that it triggered a new Musk-era rule forbidding links to competing social networks, suspending Mastodons Twitter presence in the process.

Its also interesting because of how its approaching the social space.

Mastodon is based on an open source, federated concept, where different servers use the same protocol to speak to each other and share content; server operators oversee the activity of the users registered and hosted on their respective servers.

It might sound a little confusing to the uninitiated, but there are tools out there to help import your Twitter world over to Mastodon and retain much of the same experience.

To follow the metaphor, the servers become like a herd of animals, Mastodons even, distinct but generally moving in the same direction. To move away from the metaphor, though, Mastodons ethos is far from extinct: As weve detailed, open source is something that a number of other social media platforms, Twitter among them, are also contemplating quite seriously.

Mastodon in particular seems to have really struck a chord. The platforms mobile apps are seeing about 4,000 downloads per day on average, but at one recent peak saw downloads of 149,000 on Android and 235,000 on iOS.

This spike took place, Rochko said, over the days when Twitter announced a huge swathe of job cuts that wiped out entire departments at the company, including those managing communications with the media but also those working on moderation, security and curation, as well as a number of technical teams.

Indeed, that inverse variation Twitters fall equals Mastodons rise is one that is playing out very well for the latter right now.

The question is whether it will last. To be sure, Twitters ups and downs as a platform have been a hallmark of the company almost from its start, so much so that many have wondered if its better thought of as a utility, not a business.

Regardless, Twitter has stayed and grown. And although this latest bout has, for many, felt like the last straw, only time will tell if everything settles down and users eventually accept whatever becomes the new status quo, or if meaningful change in social platforms really is coming.

In any case, sometimes evolutions in tech seem to happen overnight, but sometimes they take years. (Read more about how Rochko spent those years over on TC+.)

For Mastodon, the financial aspect is one that continues to hover over it, regardless.

For one, its played a part in how the company has grown. Rochko may be the sole full-time employee, but there are five others working freelance as moderators on Mastodons own servers, in addition to Felix Hlatky on the financial front, named on Mastodons about page. One focus has been to figure out how to bring on more people in a stable way.

The $31,000 per month he makes through Patreon is not really enough, nor stable enough, to finance a staff, Rochko said, but he has been thinking about a secondary level of business to generate a more stable income for the business, operating a second service where it provides services to host Mastodon servers for others.

Im the only full-time employee, and the rest five people are contractors at the moment, he said. Im looking to expand the full-time team and have been working on some job listings. Its kind of a slow process. I wish I could do it a lot faster. But its a new frontier for a company that has been a one-person venture for six years. It has been fine so far, but now we need more people.

Read the original:

How Mastodon is scaling amid the Twitter exodus - TechCrunch

Categories
Dedicated Server

Gm, Frens! The Art Worlds Discord Membership Exploded Amid the NFT Bubble. Can It Survive the Crypto Winter? – artnet News

Its social media for Web3. An NFT grifters saleroom. Chat rooms for gaming-adjacent crypto natives. Whatever the social media app Discord is, if youre into digital art, you are on it. And if youre trying to reach those who are into digital art, thats the place to go. From fashion brands like Gucci or Adidas, to art galleries like Pace, starting a Discord channel is a key part of integrating into the decentralized ethos of web3.

At least that was true when the NFT bubble began to inflate in 2021.

As NFTs grew in popularity, there was an equal rise in conversation about these so-called non-fungible tokens that live on the blockchain. Much of this chatter was happening behind the scenes on Discord, a more multifaceted platform than Twitter or Instagram, both of which are more commonly used in the traditional art world.

Discord, which doubled in membership in the pandemic, allows a group of users to build their own community server, which can be public (anyone can join) or private (invite-only). Each server hosts its own unique spread of chaotic, always-on channels on different topics, like whos going to Art Basel or the odd artist shilling their NFTs. Often, theres a meme channel (these days, filled with self-deprecating GIFs of crypto-apocalyptic losses). In the morning (depending where you are), users greet each other daily. Gm (meaning good morning) is the universal Web3 greeting on Discord, where time zones are an irrelevant nuisance and friendly brevity is of the essence.

Zach Lieberman, A globe, a world, (2022.) Courtesy of the artist and Unit London.

Its like 24/7 communication, its very fast, said Joe Kennedy, founder of Mayfair art gallery Unit London, who made Discord part of his strategy in May 2021 to build a community outside of the traditional collecting spheres. Now, the gallery uses its server to announce artist collaborations, and issue statements on artist royalties. Theres a good network effect, he said. Weve met lots of new collectors we wouldnt have access to otherwise. With its busy, unfamiliar interface, Discord appeals more to those that work in tech, he noted. Theyre in their 40s, and tend to be a bit more open-minded, he said. These collectors might not even use Instagram, he noted, and would be more comfortable on Reddit or Twitter.

This year, the gallery has been focused on small, curated sales via their marketplace Unit London Web3; for Kennedy, Discord is most successful in working with large editions, which the gallery has in the pipeline next year. Thats the perfect format for Discord, he said. Its a much more beneficial platform if theres lots of people who are invested in a project by collecting.

Caroline Busta, who co-founded the art-adjacent media project New Models well before cryptos 2021 explosion, noted that the need for a Discord channel was initiated by their community in 2019, who werent satisfied with simply commenting on New Models content. A lot of people were already into Discord and they held our hand, she said. We were like why not? Then, in spring 2021 the crypto boom happened, and people suddenly entered the Discord channel, often looking for trading tips.

But now that the NFT bubble has burst, and the crypto winter shows signs of a permafrost, stakeholders on the Discord servers are wondering if the app is worth fighting for.

Screenshot of the website New Models.

The old art world and the new digital art world are, in part, engineered on exclusivity. One advantage Discord has for the burgeoning crypto-sphere (and the crypto-loving art world) is that it can provide a similarly gated space. With technology integrated into the app, some channels on certain servers are only open to those who own specific NFTsthink of it like a blockchain-enabled VIP card for Art Basel. The Discord server for Friends with Benefits, a cheekily-named crypto-enabled community of artists, developers, and cultural thinkers, is only accessible to those who hold a certain number of crypto tokens in their wallet. Discord, meanwhile, (the company declined to comment for this story) has, at times, signaled further crypto integrations, like in a recent tweet by their founder Jason Citron (he walked back the comment two days later).

While its functionalities are not vastly different from an app like the workplace messaging program Slack, the pace and insider knowledge required to participate in Discord conversations can be overwhelming. The bricks-and-mortar art world has been, on the whole, slow to adopt it. Maybe that is because its roots stem to the gaming worldas such, it has retained idiosyncratic elements like badges and special roles that can be awarded to members, as well as a young demographic. Though the gaming-friendly design may alienate non-gamers, it is also a natural home for projects focused on web3, a version of the internet that is decentralized, blockchain-built, and token-based.

In the early days of Web3 and crypto, there was this correlation with folks who were really into gaming, said Malcolm Levy, an artist who runs a digital arts festival platform called RefractionDAO, which also runs a Discord server. For those building culture and tools for digital art and NFTs, he said, Discord became the default app for both collaboration and socializing.

Tara Donovan, QWERTY, (2022). Pace Verso

As voice-chatting apps became more popular during the lockdowns of the early pandemic, Discord became newly attractive. I think Clubhouse led to Discord, said Justin Aversano, a photographer who works with NFTs and runs the Discord server Quantum, a server with over 14,000 members that announces drops from his curated NFT platform. Clubhouse, that fleetingly buzzing app in the art world, was where someone suggested he set up a Discord server for his collectors so that he could keep them updated on his work while they chatted to one another.

More traditional industry players followed the wave of creatives like Aversano there.

When Knig Galerie set up its digital marketplace Misa.art, now rebranded as Expanded Art, they ran a Discord server alongside it. (Despite the rebrand, Misa.arts official Discord server is still online as of December 14; a representative of Expanded Art declined to comment, though online posts suggest the Discord will remain, under the new branding. There is a new community manager in place, and the channel promises to bring the discord back to life.)

Screenshot of Unit Londons Web3 platform.

Pace Verso, the web3 arm of the blue-chip gallery Pace, launched its Discord in March this year, intending to connect directly with the segment of the NFT community outside Paces orbit, according to Amelia Redgrift, Paces chief marketing and communications officer.

It quickly became clear that establishing a Discord server needed to be one of our first steps in growing an audience for Pace Verso, she said. The platform is used for sales announcements and programming, but also, increasingly, for conversation, she noted, adding that one of the most notable differences from other platforms is its informal nature of Discord and the potential for two way engagement. The Pace spokesperson said that the Discord had been uniquely successfulindeed, they are creating a new communications role at Pace Verso that will, in large part, be dedicated to managing and strategizing the platform.

Random International and Danil Krivoruchko, Life in Our Minds, (2022). Pace Verso

But is Pace moving in the opposite direction from the rest of the market? As another crypto winterwhich saw a major downturn in the value of tokens, a devaluation of NFTs, as well as the folding of major web3 corporation FTXdraws in, Discord devotees have noticed a slide in the participation levels.

In September 2021, there were multiple gms every day on Unit Gallerys Discord server, for instancenow, they pop up once or twice a week. A lot of people have just stopped using [Discord], probably to do stuff in the real world, said the photographer, Aversano. All the mania of 2021 has ceased. These days, his works are mostly sold to NFT funds or DAOs, he said, so his Discord isnt as important as a sales conversion pipeline. There really is no conversation when the art ends up in the final place for it to be, he said.

Levy, from RefractionDAO, said that he felt artists in particular were becoming burned out on the platform. Meanwhile, theres no sign of traditional collectors joining the conversation: If you profile a traditional art collector whos buying paintings and sculptures, for them, its seen as tiring and exhausting, said Kennedy.

Discords fate has not been helped by its susceptibility to hackers. Pace Verso has a section of its Discord server dedicated to scam warnings, and joining most NFT-related Discord servers results in an influx of spam messages promising get-rich-quick schemes. Indeed, in three separate incidents between April and June this year, hackers have successfully used phishing links on Discord to steal hundreds of thousands of dollars worth of NFTs from Bored Apes Yacht Club (BAYC) owners this year. After the third, BAYC co-founder Gordon Goner wrote in a tweet: Discord isnt working for web3 communities. We need a better platform that puts security first.

Bored Ape Yacht Club collection in OpenSea displayed on a phone screen. (Photo by Jakub Porzycki/NurPhoto via Getty Images)

In an email to Artnet News, BAYC co-founder Greg Solano (also known as Garga) said: Scams are an unfortunate part of the crypto world right now, and relying on a platform we dont control can be a little nerve-wracking. BAYC have now created a bespoke security verification system for posting announcements on their own website.

Levy said they have begun hosting Town Hall meetings on Twitter instead. Friends with Benefits have developed an app (soft-launched in Miami in early December during Art Basel Miami Beach) that will play the role of Discord for their members. Even the CryptoPunks Discord channel, which is where Justin Aversano was convinced of the platforms community utility, has now fractured. That conversation is now happening on a Telegram group started by members of the community, he said.

While crypto was riding high, there was a financial incentive to learn about some of the cumbersome user interface required to use Discords token-gated mechanisms, said Busta, from New Models. At this point. I dont see that happening, she said.

Though some have proposed Discord as a replacement for an imploding Twitter, she noted that the platform encouraged siloed communities that dont communicate with one another: it doesnt provide a public, open space. I think that web3 may hold the answer to this public square question, but Discord alone cant yet solve that, she said.

What is certain is that this community of tech-literate art aficionados will keep looking for new ways to connect. This industry is not just volatile in that the coins change, but also in how communities formits really rapid, said Aversano. It literally changes on a week-to-week basis. Watch this space.

Follow this link:

Gm, Frens! The Art Worlds Discord Membership Exploded Amid the NFT Bubble. Can It Survive the Crypto Winter? - artnet News