Categories
Dedicated Server

Could ‘Peer Community In’ be the revolution in scientific publishing … – Gavi, the Vaccine Alliance

In 2017, three researchers from the National Research Institute for Agriculture, Food and the Environment (INRAE), Denis Bourguet, Benoit Facon and Thomas Guillemaud, founded Peer Community In (PCI), a peer-review-based service for recommending preprints (referring to the version of an article that a scientist submits to a review committee). The service greenlights articles and makes them and their reviews, data, codes and scripts available on an open-access basis. Out of this concept, PCI paved the way for researchers to regain control of their review and publishing system in an effort to increase transparency in the knowledge production chain.

The idea for the project emerged in 2016 following an examination of several failings in the science publishing system. Two major problems are the lack of open access for most publications, and the exorbitant publishing and subscription fees placed on institutions.

Even in France, where the movement for open science has been gaining momentum, half of publications are still protected by access rights. This means that they are not freely accessible to citizens, journalists, or any scientists affiliated with institutions that cannot afford to pay scientific journal subscriptions. These restrictions on the free circulation of scientific information are a hindrance to the sharing of scientific knowledge and ideas at large.

Moreover, the global turnover for the academic publishing industry in science, technology and medicine is estimated at US$10 billion for every 3 million articles published. This is a hefty sum, especially given that profit margins enjoyed by major publishing houses have averaged at 35-40% in recent years. Mindful of these costs and margins, the PCI founders wanted scientists and institutions to take back control of their own publishing. And so, in 2017, the Peer Community In initiative was born.

PCI sets up communities of scientists who publicly review and approve pre-prints in their respective fields, while applying the same methods as those used for conventional scientific journals. Under this peer-review system, editors (known as recommenders) carry out one or more review rounds before deciding whether to reject or approve the preprint submitted to the PCI. Unlike virtually all traditional journals, if an article is approved, the editor must write a recommendation outlining its content and merits.

This recommendation is then published along with all other elements involved in the editorial process (including reviews, editorial decisions, authors responses, etc.) on the site of the PCI responsible for organising the preprint review. This level of transparency is what makes PCI unique within the current academic publishing system.

Lastly, the authors upload the finalised, approved and recommended version of the article free of charge and on an open access basis to the preprint server or open archive.

PCI is making traditional journal publication obsolete. Due to its de facto peer-reviewed status, the finalised, recommended version of the preprint is already suitable for citation. In France, PCI-recommended preprints are recognised by several leading institutions, review committees and recruitment panels at the National Centre for Scientific Research (CNRS). At the Europe-wide level, the reviewed preprints are recognised by the European Commission and funding agencies such as the Bill and Melinda Gates Foundation and the Wellcome Trust.

PCI is also unique in its ability to separate peer review from publishing, given that approved and recommended preprints can still be submitted by authors for publication in scientific journals. Many journals even advertise themselves as PCI-friendly, meaning that when they receive submissions of PCI-recommended preprints, they take into account the reviews already completed by PCI in order to speed up their editorial decision-making.

This initiative was originally intended exclusively for PCIs to review and recommend preprints, but authors were sometimes frustrated to only see their recommended preprint on dedicated servers (despite being reviewed and recommended, preprints are still poorly indexed and not always recognised as genuine articles) or having to submit it for publication in a journal at the risk of being subjected to another round of review. However, since the creation of Peer Community Journal, scientists now have access to direct, unrestricted publishing of articles recommended by disciplinary PCIs.

Peer Community Journal is a diamond journal, meaning one that publishes articles with no fees charged to authors or readers. All content can be read free of charge without a pay-wall or other access restrictions. Designed as a general journal, Peer Community Journal currently comprises 16 sections (corresponding to the PCIs in operation) and is able to publish any preprint recommended by a disciplinary PCI.

Currently there are 16 disciplinary PCIs (including PCI Evolutionary Biology, PCI Ecology, PCI Neuroscience and PCI Registered Reports) and several more are on the way. Together, they boast 1,900 editors, 130 members in the editorial committees and more than 4,000 scientists-users overall. PCI and Peer Community Journal are recognised by 130 institutions worldwide, half of which (including the University of Perpignan Via Domitia) support the initiative financially. The number of French academics who are familiar with and/or who use PCI varies greatly between scientific communities. The percentage is very high among communities with a dedicated PCI (e.g., the ecology or evolutionary biology communities, with PCI Ecology and PCI Evol Biol, wherein an estimated half of scientists are now familiar with the system), but remains low among those without one.

To date, more than 600 articles have been reviewed through the system. Biology maintains a significant lead, but more and more fields are popping up, including archaeology and movement sciences. There is still plenty of scope for growth, in terms of greater investment from those familiar with the system and the creation of new PCIs by scientists from fields not yet represented by the current communities.

Other open-science initiatives have been set up across the globe, but none have quite managed to emulate the PCI model. Mostly limited to offers of peer-reviewed preprints (often directly or indirectly requiring a fee), these initiatives, such as Review Commons and PreReview, do not involve an editorial decision-making process and are therefore unable to effect change within the current publishing system.

While the PCI model is undeniably growing and now garners more than 10,000 unique visitors per month across all PCI websites, the creation of Peer Community Journal shows that the traditional academic publishing system is still intact. And it will doubtless endure into the near future, even though the preprint approval offered will hopefully become a sustainable model due to its cost-effectiveness and transparency across the board.

In the meantime, PCI and Peer Community Journal present a viable alternative for publishing diamond open access articles that are completely free of charge for authors and readers. In these changing times of unbridled, unjustifiable inflation placed on subscription and publishing prices, numerous institutions and universities are backing the rise of these diamond journals. PCI and Peer Community Journal embrace this dynamic by empowering all willing scientific communities to become agents of their own review and publishing process.

When science and society nurture each other, we reap the benefits of their mutual dialogue. Research can draw from citizens own contributions, improve their lives and even inform public decision-making. This is what we aim to show in the articles published in our series Science and Society, A New Dialogue, which is supported by the French Ministry of Higher Education and Research.

Denis Bourguet, Inrae; Etienne Rouzies, Universit de Perpignan, and Thomas Guillemaud, Inrae

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Denis Bourguet is co-founder of Peer Community In and Peer Community Journal and president of the Peer Community In association.

Thomas Guillemaud is co-founder and works on the operation of Peer Community In and Peer Community Journal. Peer Community In has received over 100 funding from public bodies including the Ministry of Higher Education and Research, numerous universities and research organisations since 2016.

Etienne Rouzies does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

INRAE provides funding as a founding partner of The Conversation FR.

Universit de Perpignan provides funding as a member of The Conversation FR.

View post:

Could 'Peer Community In' be the revolution in scientific publishing ... - Gavi, the Vaccine Alliance

Categories
Dedicated Server

Soap Star Dies: Rita McLaughlin Walter, Carol on As the World Turns – Soaps.com

Rita Walter (ne McLaughlin) passed away on Christmas.

On December 26, David McLaughlin, the brother of former As the World Turns star Rita Walter, reported that she had died a day earlier, on the anniversary of her exit from the soap in 1981 following an 11-year run as Carol Deming Hughes Stallings Andropoulos Frazier.

My sweet, loving sister Rita was called to Jesus on His birthday,read his message. She was a well-known actress as well as dedicated server of the Lord Jesus.

May you rest in peace, sis. I love you forever, he added. Youve taken my heart with you.

Walter, who has three children with her reverend husband, got her big break in the 1960s when she landed the uncredited role of Patty Dukes double on The Patty Duke Show. Six years later, the budding soap star made her daytime debut as Wendy Phillips on The Secret Storm.

But it was the role of As the World Turns plucky Carol that really put Walter on the map. Introduced to the Oakdale scene as a college student working for much-married Lisa, the heroine tied the knot with her boss son, Tom, only to have second husband Jay Stallings cheat on her with her exs subsequent wife, Natalie!

Thats Walter on the right, third row down.

Credit: CBS/Courtesy of the Everett Collection

Later, Carol, who seemed to attract calamities like flames do moths, wound up adopting Natalies daughter with Jay, who was killed in a construction accident from which he couldve been saved by colleague Steve Andropoulos, who, needless to say, became her next husband. Following their split Carol wouldnt put her daughters neck on the line so that Steve could conduct shady business with James Stenbeck art imitated life when she married a reverend and left town.

Since retiring from showbiz, Walter, 71 when she passed away, had been working as an optician. On this somber occasion, pay your respects to the other soap alumni weve lost in 2022 via the below photo gallery.

See more here:

Soap Star Dies: Rita McLaughlin Walter, Carol on As the World Turns - Soaps.com

Categories
Dedicated Server

Combining convolutional neural networks and self-attention for … – Nature.com

Figure 4

The overall architecture of MBSaNet.

MBSaNet is proposed to improve the performance of classification models on the task of automatic recognition of multilabel fundus diseases. The main idea of MBSaNet is based on the explicit combination of convolutional layers and SA layers, which enables the model to have both the generalization ability of CNN and the global feature modeling ability of Transformer18,43. Previous studies have demonstrated that the local prior of the convolutional layer makes it good for extracting local features from fundus images; however, we believe that long-term dependences and the global receptive field are also essential for fundus disease identification, because even an experienced ophthalmologist is unable to make an accurate diagnosis from a small part of a fundus image (e.g., using only a macula). Considering that the SA layer with global modeling ability can capture long-term dependencies, MBSaNet is implemented by adopting a building strategy similar to the CoAtNet18 architecture with vertically stacked convolutional blocks and self-attention modules. The overall framework of MBSaNet is shown in Figure4, and Table 7 shows the size of the input and output feature maps at each stage of the model. The framework comprises two parts. The first of which is a feature extractor with five stages: Stage0Stage4, where Stage0 is our proposed multiscale feature fusion stem (MFFS), Stage1Stage3 are all convolutional layers, and Stage 4 is an SA layer with relative position representations. The second part is a multilabel classifier that predicts the sample category based on the features extracted from the above structure. We use the MBConv block that includes residual connections and an SE block27 as basic building blocks in all convolutional stages due to the same reverse bottleneck design as the Feedforward Network (FFN) block of Transformers. Unlike the regular MBConv block, MBSaNet replaces the max-pooling layers in the shortcut branch with convolutional layers having stride 2 in the downsampling strategy. This is a custom neural network that needs to be implemented by training it from scratch.

The dataset obtained from the International Competition on Ocular Disease Intelligent Recognition sponsored by Peking University. This dataset contains real patient data collected from different hospitals and medical centers in China, which were jointly launched by the Nankai University School of Computer Science-Beijing Shanggong Medical Information Technology Co., Ltd. joint laboratory. The training set is a structured ophthalmology database that includes the ages of 3,500 patients, color fundus images of their left and right eyes, and diagnostic keywords from clinicians. The test set includes off-site test set and on-site test set, but as with the training set, the number of samples under each category is unbalanced. Therefore, we also constructed a balanced test set with 50 images per class by randomly sampling a total of 400 images from the training set. The specific details of the dataset can be found in Table8. Fundus images were recorded by various cameras, including Canon, Zeiss, and Kowa, with variable image resolutions. As illustrated in Figure5(a), these data categorize patients into eight categories: normal (N), DR (D), glaucoma (G), cataract (C), AMD (A), hypertension (H), Myopia (M), and other diseases/abnormalities (O). There are two points to note. First, a patient may contain one or more labels, as shown in Figure 5(b), that is, the task is a multidisease multilabel image classification task. Second, as shown in Figure5(c), the class labeled Other Diseases/Abnormalities (O) contains images related to more than 10 different diseases, and low quality images due to factors such as lens blemishes, and invisible optic discs, variability is largely expanded in. All the methods developed and experiments were carried out in accordance with the relevant guidelines and regulations associated to this publicly available dataset.

Accuracy is the proportion of correctly classified samples to the total samples, which is the most basic evaluation indicator in classification problems. Precision refers to the probability that the true label of a sample is positive among all samples predicted to be positive. Recall refers to the probability of being predicted by the model to be a positive sample among all the samples with positive labels, and given the specificity of the task, we use a micro-average of precision and recall for each category in our experiments. AUC is the area under the ROC curve, and the closer the value is to 1, the better the classification performance of the model. AUC is often used to measure model stability. The Kappa coefficient is another index calculated based on the confusion matrix, which is used to measure the classification accuracy of the model and can also be used for consistency testing, where p0 denotes the sum of the diagonal elements divided by the sum of the entire matrix elements, i.e., accuracy. pe denotes the sum of the products of the actual and predicted numbers corresponding to all categories, divided by the square of the total number of samples. F1(_)score, also known as BalancedScore, is the harmonic (weighted) average of precision and recall, and given the category imbalance in the dataset, we use micro-averaging to calculate metrics globally by counting the total true positives,false negatives and false positives. The closer the value is to 1, the better the classification performance of the model. Final(_)score is the average of F1(_)score, Kappa, and AUC.

$$begin{aligned} Accuracy= & {} frac{TP+TN}{TP+FP+TN+FN} end{aligned}$$

(1)

$$begin{aligned} Precision= & {} frac{TP}{TP+FP} end{aligned}$$

(2)

$$begin{aligned} Recall= & {} frac{TP}{TP+FN} end{aligned}$$

(3)

$$begin{aligned} F1_score= & {} frac{2Precision*Recall}{Precision+Recall} end{aligned}$$

(4)

$$begin{aligned} Kappa= & {} frac{p_0 - p_e}{1 - p_e} end{aligned}$$

(5)

$$begin{aligned} Final_score= & {} frac{F1_score + Kappa + AUC}{3} end{aligned}$$

(6)

The fundus image dataset contains some low-quality images, which are removed since it would not be helpful for training. In order to minimize the unnecessary interference to the feature extraction process due to the extra noise brought by the black area of the fundus images, the redundant black area is cropped. We use the OpenCV library to load the image as a pixel vector and use the edge position coordinates of the retinal region of the fundus image to remove the black edges. The fundus images are further resized to a 224224 image size after being cropped as shown in Figure 6. Data augmentation is the artificial generation of different versions of a real dataset to increase its data size; the images after data augmentation are shown in Figure7. Because it is necessary to expand the size of the dataset based on retaining the main features of the original image, we use operations such as random rotation by 90(^circ ), adjustment of contrast, and center cropping. Finally, the global histogram equalization operation is performed on the original and enhanced images, so that the contrast of the images is higher and the gray value distribution is more uniform.

Processing of original training image.

The predictive ability of a classifier is closely related to its ability to extract high-quality features. In the field of fundus multidisease identification, owing to the different characteristics of the lesions reflected in the fundus images of several common eye diseases, the lesion areas have the characteristics of different sizes and distributions. We propose a feature fusion module with convolution kernels of different sizes to extract multiscale primary features of images in the input stage of the network and fuse them in the channel dimension. Feature extractors with convolution kernel sizes of 3(times )3, 5(times )5, 7(times )7, and 9(times )9 are used, since the convolution stride is set to 2, we padding the input image before performing each convolution operation to ensure that the output feature maps are the same size. By employing convolution kernels with different receptive fields in the horizontal direction to broaden the stem structure, more locally or globally biased features are extracted from the original images. The batch normalization operation and ReLU activation are then performed separately and the resulting feature maps are concatenated. The experimental results show that by widening the stem structure in the horizontal direction, higher quality low-level image features can be obtained at the primary stage.

CNNs have been the dominant structure for many CV tasks. Traditionally, regular convolutional blocks, such as ResNet blocks5, are well-known in large-scale convolutional networks; meanwhile, depthwise convolutions44 can be expressed as Formula7 and are popular on mobile platforms due to their lower computation cost and smaller parameter size. Recent studies have shown that an improved inverse residual bottleneck block (MBConv)32,45 which is built on depthwise separable convolutions can achieve both high accuracy and efficiency7. Inspired by the CoAtNet18 framework, we consider the connection between the MBConv block and FFN module in the Transformer (both adopt the inverted bottleneck design: first expand the feature map to 4(times ) the size of the input channel, and after the depth separable convolutions operation, project the 4(times ) wide feature map back to the original channel size to satisfy the residual connection), and mainly adopt the improved MBConv block including the residual connection and SE27 block as the convolution building block. The convolution operation with a convolution kernel size of 2(times )2 and a stride of 2, implements the output feature map size on the shortcut branch to match the output size of the residual branch. The experimental results show that this slightly improves the performance. The convolutional building blocks we use are shown in Figure8, and the downsampling implementation can be expressed as Formula8.

$$begin{aligned} y_i = sum _{jin {mathcal {L}} (i)}^{} w_{i-j} odot x_j quad quad {(mathrm depthwisequad mathrm convolution)} end{aligned}$$

(7)

where (x_i,y_i in {R}^{D}) denote the input and output at position i, respectively, and ({mathcal {L}} (i) ) denotes a local neighborhood of i, e.g., a 3(times )3 grid centered at i in image processing.

$$begin{aligned} mathrm {xlongleftarrow Norm(Conv(x,stride=2))+Conv(DepthConv(Conv(Norm(x),stride=2)))} end{aligned}$$

(8)

In natural language processing and speech understanding, the Transformer design, which includes a crucial component of the SA module, has been widely used. SA extends the receptive field to all spatial places and computes weights based on the re-normalized pairwise similarity between the pair ((x_i,x_j)), as shown in Formula9, where ({mathcal {G}}) indicates the global spatial space. Stand-alone SA networks33 have shown that diverse CV tasks may be performed satisfactorily using SA modules alone, albeit with some practical limitations, in early research. After pretraining on the large-scale JFT dataset, ViT11 applied the vanilla Transformer to ImageNet classification and produced outstanding results. However, with insufficient training data, ViT still trails well behind SOTA CNNs. This is mainly because typical Transformer architectures lack the translation equivalence18 of CNNs, which increases the generalization on small datasets46. Therefore, we decided to adopt a method similar to CoAtNet; the global static convolution kernel is summed with the adaptive attention matrix before softmax normalization, which can be expressed as Formula10, where (i,j) denotes any position pair and (w_{i-j}) denotes the corresponding convolution weights, improve the generalization ability of the network based on the Transformer architecture by introducing the inductive bias of the CNNs.

$$begin{aligned} y_{i}= & {} sum _{j in {mathcal {G}}} underbrace{frac{exp left( x_{i}^{top } x_{j}right) }{sum _{k in {mathcal {G}}} exp left( x_{i}^{top } x_{k}right) }}_{A_{i, j}} x_{j} end{aligned}$$

(9)

$$begin{aligned} y_{i}^{text{ pre } }= & {} sum _{j in {mathcal {G}}} frac{exp left( x_{i}^{top } x_{j}+w_{i-j}right) }{sum _{k in {mathcal {G}}} exp left( x_{i}^{top } x_{k}+w_{i-k}right) } x_{j} end{aligned}$$

(10)

The receptive field size is one of the most critical differences between SA and convolutional modules. In general, a larger receptive field provides more contextual information, but this usually results in higher model capacity. The global receptive field has been a key motivation for employing SA mechanisms in vision. However, a larger receptive field requires more computation. For global attention, the complexity is quadratic w.r.t. spatial size. Therefore, in the process of designing the feature extraction backbone, considering the huge computational overhead brought by the Transformer structure and the small amount of training data for practical tasks, we use more convolution blocks, and only set up two layers of SA modules in Stage4 in the feature extraction stage. Experimental results show that this achieves a good balance between generalization performance and feature modeling ability.

Convolutional building blocks.

The fundus disease recognition task is a multilabel classification problem, so it is unsuitable for training models with traditional loss functions. We refer to the loss function used in work16,40, all classified images can be represented as (X = ){(x_1,x_2...x_i...x_N)} , where (x_i) is related to the ground truth label (y_i), and (i = 1...N), N represents the number of samples. We wish to find a classification function (F:Xlongrightarrow Y) that minimizes the loss function L, we use N sets of labeled training data ((x_i,y_i)), and apply a one-hot method to each (y_i) is encoded, (y_i = [y_i^1,y_i^2...y_i^8] ), each y contains 8 values, corresponding to the 8 categories in the dataset. We draw on the traditional multilabel classification method based on problem transformation, and transformed the multilabel classification problem into a two-class classification problem for each label. The final loss is the average of the loss values of the samples corresponding to each label. After studying weighted loss functions, such as sample balance and class balance, we decided to use weighted binary cross-entropy from Formula11 as the loss function, where W = (1,1.2,1.5,1.5,1.5,1.5,1.5,1.2) denotes the loss weight. The positive class is 1, and the negative class is 0. (p(y_i)) is the probability that sample i is predicted to be positive.

$$begin{aligned} L=-frac{1}{N} sum _{i=1}^{N} W left(y_{i} log left( pleft( y_{i}right) right) +left( 1-y_{i}right) log left( 1-pleft( y_{i}right) right) right) end{aligned}$$

(11)

After obtaining the loss function, we need to choose an appropriate optimization function to optimize the learning parameters. Different optimizers have different effects on parameter training, so we mainly consider the effects of SGD and Adam on model performance. We performed multiple comparison experiments under the same conditions. The results showed that Adam significantly outperformed SGD in terms of convergence and shortened training time, possibly because when we chose SGD as the optimizer, the gradients of the samples were updated at every epoch, which brings additional noise. Each iteration is not in the direction of the global optimum, so it can only converge to the local optimum, decreasing accuracy.

Read this article:

Combining convolutional neural networks and self-attention for ... - Nature.com

Categories
Dedicated Server

What is an SSL certificate, why is it important and how to get one? – Android Authority

Joe Hindy / Android Authority

Have you ever noticed the padlock symbol in your web browsers address bar? Most websites, including the one youre reading this article on, use SSL certificates to establish a secure connection. The padlock icon offers a visual indication that the website has a valid SSL certificate installed. It also signals that any information you enter on the website is fully encrypted in transit. In other words, nobody can eavesdrop on your connection and steal sensitive data like your password or credit card details.

But what exactly are SSL certificates, how do they work, and can anyone get one? Heres everything you need to know.

See also: What is encryption?

What is an SSL certificate and how does it work?

Calvin Wankhede / Android Authority

An SSL certificate is a digital certificate issued by a trusted authority used for HTTPS or secure connections on the internet. A properly signed certificate provides a few key pieces of information that help your computer identify the identity of a website. It typically includes the name of the certificate owner, a unique serial number, an expiration date, and the digital signature of the issuing Certificate Authority (CA).

When you visit a website, your browser will automatically initiate a handshake process that checks for a valid SSL certificate. This process involves exchanging the SSL certificate and cryptographic keys, both of which cannot be spoofed.

SSL certificates aren't just symbolic, they also help keep your passwords safe from prying eyes.

If the details shared by the web server correspond to a valid certificate issued by a trusted authority, your browser will display a padlock symbol in the address bar. It will then initiate a secure connection, ensuring that data sent back and forth is completely encrypted. In a nutshell, the server and web browser use the pieces of information they know about each other to generate a cryptographic key at each end. And since nobody else has access to these details, they wont have the key to decrypt your communications.

If your web browser claims that the website youre trying to access is insecure, chances are that its because of an invalid or expired SSL certificate. This can happen if the website owner forgets to renew their certificate, but if it happens on every single website, you should also check your system date and time. However, it could also mean that the website isnt trustworthy so double-check that youve entered the correct address. Without an encrypted connection, you shouldnt enter any sensitive information like passwords as your browser will send it in unencrypted plain-text.

Related: Can your ISP see your browsing history? Heres what you need to know

If youre a website owner, getting an SSL certificate should be your top priority. This is especially true if you collect personal information or even user input in general. SSL certificates help ensure that a hacker cant intercept any data sent back and forth, so theres also privacy at stake.

Most web browsers these days, including Google Chrome, warn users if they visit a non-HTTPS website, which will likely cause them to click away. Search engines like Google also rank websites with SSL enabled higher so youre incentivized to install a certificate.

If you dont run a web or mail server, however, you dont need an SSL certificate. As long as you have a modern, up-to-date web browser, its the websites responsibility to ensure a secure connection.

Related: The best encrypted private messenger apps

Calvin Wankhede / Android Authority

Users get this warning if a website doesn't have an SSL certificateinstalled.

If you do need an SSL certificate, dont worry getting one doesnt take too much effort. A certificate is essentially a file that lives on your web server, all you have to do is place it in the right location and ensure that your host provides it to visitors. While you can self-sign your own certificates, web browsers wont accept those as they lack the signature of a trusted authority.

You can self-sign your own digital certificate, but no web browser will accept it for secure connections.

The easiest way to get a valid SSL certificate is via your domain providers website. GoDaddy, for example, will provide a single-domain SSL certificate at a fee of $299.99 every three years. DigiCert, meanwhile, offers certificates starting at $268 per year. And if you want a certificate for cheaper, other providers like NameCheap will have you covered for as little as $11 a year.

You can also get a valid SSL certificate for free via Lets Encrypt, which works just fine for a personal website or even a small business. Lets Encrypt is a non-profit Certificate Authority (CA) that aims to make internet security and encryption more widely accessible. The only downside is that youll have to renew and reinstall your digital certificate every three months instead of every year or longer. That said, you can automate this process with a small bit of code running on your web server.

Why are digital certificates so expensive?

Calvin Wankhede / Android Authority

If youre wondering why the cost of a digital certificate varies so much, its because each one offers a different level of security and there are very few trusted authorities out there. Some CAs have humans manually review each domain before issuing a certificate. Naturally, this makes them inherently more trustworthy but also expensive. Premium SSL certificates may also display the name of the website owner in some web browsers (like Google Inc.), boosting the perceived legitimacy of the brand.

The price for a digital certificate can vary from $0 to hundreds of dollars, but for good reason.

For large businesses like banks where security matters above everything else, an SSL certificate is often a no-brainer. It also helps that many larger providers offer dedicated customer support and insurance in case something goes wrong.

Read more: What is a VPN, and why do you need one?

See original here:

What is an SSL certificate, why is it important and how to get one? - Android Authority

Categories
Dedicated Server

From a $10,000 Ring to a Pokmon Charizard Card: MrBeast Gifts Minecraft Players Whatever They Build on the Server – EssentiallySports

YouTube star MrBeast has been known to indulge the community in his challenge videos. Recently he invited 100 Minecraft players to build whatever they want and vouched that hell buy the thing they build. Interestingly, the money range of the build was from $10 to $50,000, which made the players brainstorm the things they would want. Plus, it should be better and more impressive than the others.

ADVERTISEMENT

Article continues below this ad

MrBeast has been seen involving many games in his videos like Fortnite, Minecraft, and Among Us. He has done many challenges on the gaming servers and is back with another one where players got a full gaming PC to diamond rings.

ADVERTISEMENT

Article continues below this ad

Starting off with the $10 section, many players left the server while some took their creativity to do justice to the range. However, a player builds a Feastables bar and straight out won the deal with MrBeast of getting what they build. Next up was the $50 section, in which there was a close competition between a hamster and a Mario build. But the hamster stole the deal at last by the scores of MrBeast and his crew.

Unfortunately, no build under the $100 range won as it failed to impress the scorers. Next up for the $500 build, they had builds like a plane ticket, a Meta Quest 2 VR headset, and $500 worth of ice cream. Ultimately, the plane ticket won, which facilitated its maker to visit his family.

For the $1000 build, close competition occurred between a Pac-Man arcade and a telescope. After the results from the scorers, the Pac-Man build copped the deal. The video became even more wholesome when the scorers got to choose between an engagement ring and a drum set under the $5000 range. MrBeast asked if the player will propose to his girlfriend if he gets him an engagement ring. After getting a yes from the player, the engagement ring build won. Moreover, with the courtesy of NordVPN, MrBeast agreed to buy a whole gaming PC for a player.

The $10,000 Jeep Renegade build made the player get it in real life, which was dedicated to his wife. After Karl asked how it feels to be married to a nerd, the wife was immensely happy with it. To utter surprise, another player won a wedding ring under the $10,000 build so that they could propose to their boyfriend.

ADVERTISEMENT

Article continues below this ad

Also, a Pokmon Charizard card build won above all in the $15,000 section. Meanwhile, a car build was awarded the crown for the $25,000 build range.

At last, the scorers went on to the $50,000 section. Perplexed by the builds of a car, a waffle maker, and even an empty slot, they got their winner. A players unique thought of building a throne of cash made him win the $50,000 section, leaving the scorers intrigued by it.

ADVERTISEMENT

Article continues below this ad

WATCH THIS STORY:A Swedish Entrepreneur Once Donated $1.2 Million Just to Meet MrBeast

With that, another MrBeast came to an end. Jimmy did mention that one who subscribes to his channel could get a chance to win a golden toilet and might get a feature in his video. What do you think will be his next video? Do let us know in the comments below.

See original here:

From a $10,000 Ring to a Pokmon Charizard Card: MrBeast Gifts Minecraft Players Whatever They Build on the Server - EssentiallySports

Categories
Dedicated Server

Startups And Companies Acquired By IBM Till 2022 – Inventiva

Startups and Companies Acquired by IBM

As a result of acquiring top-notch on-demand startups all over the world, International Business Machines is steadily gaining prominence. Having merged, acquired, and absorbed other reputable companies since IBMs incorporation, the American Technology MNC operates in 177 countries.

Further, IBM developed a reputation for providing quality services by acquiring startups around the globe. In 1911, when IBM merged with four large corporations, Charles Ranlett Flint founded IBM, a technology company based in New York.

Its initial objectives were to manufacture tools such as slicers, timers, punch cards, etc., for sale and lease. A few years later, Thomas J. Watson rejoined CTR and underlined customer service while expanding production scale and overseas operations, thus increasing sales. As a result of enabling people to receive technical services, IBM became a foreign operation by 1950.

A mass-produced computer with floating-point ARITHMETIC HARDWARE, IBM 701, became the industrys first practical AI in 1956. As a result of their acquisitions, IBM has prospered universally since 1912.

The company provides a variety of services, from mainframe computers to nanotechnology, including computer hardware, middleware, software, and hosting and consulting.

From IBMs incorporation until now, here is a list of the companies it has acquired.

7Summits

We are one of the Salesforce Platinum Consulting Partners that transmit transformative digital tests. NYSE: IBM acquired the company on January 11th, 2021, and they specialize in Salesforce ecosystem support.

Turbonomic

A fast-growing technology company, it is based in Los Angeles. They provide IT management applications. It protects the automation within context while fulfilling network, storage, and performance needs. Turbonomics acquisition by IBM will end on June 17, 2021.

Boxboat

DevOps, Continuous Delivery and Cloud Migration are all aspects of BoxBoat. In the cloud, they enable organizations to revise digital data using modern technologies. IBM announced the acquisition of Boxboat Technologies on July 29th, 2021.

TAOS

It is a company that manages IT services. In addition to migration and technical program management, they provide strategic IT planning, security assessments, cloud architecture, network and systems engineering, and security assessments. IBM announced the acquisition of Taos on January 14, 2021.

Bluetab

Business software and technical services are provided by the company. Spain, Mexico, and the UK are all possible locations for their departments. The Java EE, Microsoft. The technology that the company uses is NE and other open-source devices. IBM acquired Bluetab Solutions Group in 2021.

MyInvenio

A part of IMB is MyInvenio. As a result, unions can automate their business processes with AI-powered automation, simplifying the mining process and simplifying business processes. MyInvenio was acquired by IBM on April 15, 2021.

Instana

APM software is best created by Instana, a German-American company. Software used in microservice architectures and 3D visualization is managed with this application performance management software. San Francisco, Solingen, and Chicago are the bases of this company.

Spanugo

Cybersecurity Posture Assurance is offered by Spanugo for ENTERPRISE HYBRID clouds. As of June 2020, the company will cease operations. Janga R Aliminati, Doss Karan, and Doc Vaidhyanathan founded the company.

Nordcloud

As a cloud consulting services provider, Nordcloud gives a range of services. The company was established in 2011 in Helsinki, Finland. The company employs over 450 people and generates about $61 million in revenue. On 21, December 2020 IBM finally bought Nordcloud.

WDG

To make the most of your money, WDG works with your firm. This cloud-based application by IBM allows you to maximize the return on your investment through its clever and intuitive design and ease of use.

Expertus

Canada is the companys headquarters. Case Management, Fraud Detection, Data Management, Messaging Services, Payment, Payment Solutions, Processing, Regulation Compliance, Software Updates, Security Service, and Technical Maintenance are all services offered by the company. The Nordcloud acquisition was announced by IBM on 15 December 2020.

TruQua Enterprises

In addition to SAP Finance, TruQua Enterprises specializes in deployment strategies, blueprint designs, best practices, implementations, development libraries, development libraries, and solution research. Chicago, Illinois, is the headquarters of the company. It was founded in 2010.

Red Hat

The Red Hat Corporation provides businesses with open-source software. The companys headquarters are located in Raleigh, North Carolina. The company was founded in 1993 by Bob Young and Marc Ewing.

Oniqua Holdings Pty Ltd

In 1990, Oniqua was established in Denver, Colorado. The number of employees ranges from 50 to 200. It gives services such as Maintenance, Repairs, and Operations, as well as MRO Analytics, Asset Performance Management, Supply Chain Management, Maintenance, Repairs, and Asset Performance Management.

Armanta, Inc

In addition to developing drugs to treat drug-resistant bacteria, Armata Pharmaceuticals is a biotechnology company. In Marina del Rey, California, the company is headquartered.

Verizon Cloud services

Services and products are provided by Verizon Business, a division of Verizon Communications. It was founded in January 2006 by Verizon Business. As of 2019, Verizon Business Solutions has been renamed Verizon Business Solutions, dividing up into three groups.

Vivant Digital

Founded in 2008, Vivint Smart Home, Inc. is a publicly-traded company that gives smart home services in the USA and Canada. Todd Pedersen and Keith Nellesen founded APX Alarm Security Solutions Inc in 1999. In 2020, the company had revenue of 1,260.7 million dollars. The company employs approximately 11,000 people.

Cloudigo

Providing network infrastructure is what Cloudigo does. In 2016, Cloudigo launched as a new brand. International Business Machines Corporation owns Cloudigo. Among Cloudigos industries is IT services.

Agile 3 Solutions

CLIENTS of Agile 3 Solutions can renovate their businesses with the help of Agile 3 Solutions products. Founded in January 2009 by Raghu Varadan, the company has its headquarters in San Francisco, California, USA.

XCC

Together, IBM and XCC will improve the IBM Connections portfolio by providing tools to organizations, reducing content fragmentation, and improving communication and collaboration with organizations.

Iris Analytics

Using IBM Safer Payments, IRIS Analytics helps CLIENTS reduce risk, increase productivity, and increase profits. As of January 15, 2016, IBM acquired IRIS Analytics, which has its headquarters in Germany.

Resource Link

In Resource Link, you can access data used for application and server planning, installation, and management.

Aperto

Digital agency Aperto is a renowned name in the DACH region. IBM acquired the company in 2016. Berlin is the headquarters of the company, which was founded in 1995. CLIENTS both domestically and internationally work with them.

Truven Health Analytics

Watson Health, a subsidiary of IBM Corporation, acquired Truven on February 18, 2016. Pharma safety, health, and disease management are all ensured by Truven Health Analytics.

Optevia

In 2016, IBM acquired UK-based Optevia to address rising software demand for Microsoft Dynamics CRM in the public sector.

Blue Wolf Group LLC

Digital solutions are the specialty of Bluewolf Consulting. An approximately $200 million acquisition was made by IBM of Bluewolf, a cloud consulting firm. In May 2016, IBM acquired Bluewolf.

EZSource

Analyses and measurements with EZSource are reliable and automated. Visual dashboards in EZSource provide developers with an overview of what has changed in their programs. The company was developed in 2033.

Sanovi Technologies

We create and build applications at Sanovi Technologies Inc. The company provides enterprise application solutions, disaster recovery solutions, and private cloud infrastructure. It is headquartered in Bengaluru and was founded in 2002.

Resilient Systems

Enterprise software can be designed and maintained using Resilient Systems, Inc. Computer software is created by them, and they protect businesses from cyberattacks. The company was founded in 2010.

Ecx.io

Ecx.io helps CLIENTS grow their businesses by identifying digital opportunities. Around 25 years ago, the company was founded. In 2016, IBM acquired the company

Promontory Financial Group

CLIENTS receive financial services advice from Promontory Financial Group. IBM supervises the completion of the project. A Washington, D.C.-based company, the company was founded in 2001.

Ustream

Live video is broadcast by Ustream. It employs about 180 people at its headquarters in San Francisco. A year later, the company merged with IBM, launching in March 2007. In 2018, IBM Cloud Video was rebranded.

Blekko

A web search engine named Blekko promised to outperform Google Search in terms of search results. The institution was established on November 1, 2010.

Explorys

Healthcare organizations can easily consolidate, link, and combine data across corporate and clinical networks using Explorys Platform.

Compose, Inc

Developers use Compose, Inc.s managed platform to deploy, host, and scale databases. Compose serves customers in the U.S. In 2009, the company was founded.

Phytel

There is no doubt that Phytel has established itself as an industry leader in providing integrated population health management software. Dallas-based company specializing in population health. Phytel was acquired by IBM in May 2015.

Merge Healthcare Inc

Merge Healthcare Inc. provides electronic healthcare services to patients and physicians. Founded in 1987, the company is based in Chicago, Illinois. Cedara Software Ltd and Merge Healthcare Solutions Inc are subsidiaries of Merge Healthcare Solutions Inc.

Bluebox

As a hybrid cloud provider, Blue Box gives CLIENTS the security and ease of a private cloud. In 2015, IBM acquired this company.

Meteorix LLC

It provides financial services and human resource management. Boston-based company. About 200 people are employed by Meteorix, a company founded in 2011.

Gravitant, Inc

A consulting and IT services company, Gravitant cloudMatrix has approximately 200 employees. Austin, Texas, is the companys headquarters. Gravitant software was founded in 2004 and covers the entire IT value chain.

The weather Company- DIGITAL ASSETS

A weather forecasting and information technology company, The Weather Company owns and operates Weather.com and Weather Underground. Approximately $2 billion was spent by IBM on the DIGITAL ASSETS of The Weather Company.

AlchemyAPI

Machine learning was the focus of AlchemyAPIs software business. A variety of uses were made possible by its deep learning technology. The company was founded in 2005 and is located in Denver, Colorado.

StrongLoop Ltd

A top API Tier developed by StrongLoop, StrongLoop Suite is led by StrongLoop. With more than 30 Node.js developers in San Mateo, California, StrongLoop is a Node.js development company.

Silverpop Systems, Inc

Digital marketing is the specialty of Silverpop Systems, Inc. Email marketing ideas are generated automatically, campaigns are managed, executed, and campaign performance is analyzed. The company was founded in 1999 in Atlanta, Georgia.

Visit link:

Startups And Companies Acquired By IBM Till 2022 - Inventiva

Categories
Dedicated Server

Where to check the Overwatch 2 Server status – Sportskeeda

Overwatch 2 server down: Where to check the Overwatch 2 Server status

Server outages are common in multiplayer video games that are based on online servers. Overwatch 2 is a popular online hero-shooter game that features a dense player base. As a result, technical issues and server-based challenges commonly appear. Such hiccups can frustrate players, and calls for immediate attention.

Unfortunately, server-based issues in Overwatch 2 can be caused by many possible reasons. The usual cause can be attributed to developer-sided server maintenance sessions, which are usually announced ahead of schedule. However, the trigger could also be an unanticipated bug, a new update, or an error in the game's code.

Whatever the reason, players should stay informed about the server status to avoid running into mysterious errors and crashes in Overwatch 2.

Unlike some video game titles, Overwatch 2 doesn't feature a dedicated server status page that players can visit to gather updates. Instead, one needs to keep an eye on Blizzard's customer service handles on Twitter for an announcement.

Blizzard has customer service pages on Twitter for every region. You can also report issues by tagging the specific handle for your area. Here are the handles you should take note of:

Alternatively, users can check out Overwatch 2-related public tweets for confirmation. One can also head over to the official Blizzard Support forums to check for similar complaints.

Apart from announcements on Twitter, the Battle.net launcher will also display a notification regarding the same.

There are no workarounds if the outage is caused by an officially acknowledged maintenance session or a bug. All one can do is wait until the maintenance period ends or the bug is addressed.

While most server outages affecting Overwatch 2 are caused internally, some issues could also be related to client-end hiccups. If you don't come across any reports or official acknowledgments regarding server maintenance, the issue is likely from the client's side and can be fixed with some basic workarounds.

Here are a few things you can try:

1) Restart your system

By this time, you have probably tried restarting the Battle.net client and the game. If not, try doing so. If that doesn't help, try a full system reboot.

2) Check your network

Check for an unstable network connection by performing a ping test. If you detect a problem, try fixing it. Try restarting your router and modem. Also, wireless connections are pretty unstable for gaming, and switching to a wired/ethernet connection may help.

You can try switching to a different DNS server and see if that helps the situation. If none of the basic internet-fixing workarounds help, contacting your ISP should be the next best option.

3) Attempt to Scan and Repair

Although a far-fetched idea, this could help trigger a missed patch update or fix corrupted game files. Click on the cog icon beside the Play button and the option should appear. Click on it to initiate the repair and try launching the game after the process is complete.

4) Contact Blizzard support

Make note of the error/issue you are facing and report it to Blizzard Support via Twitter or the forums.

More from Sportskeeda

Fetching more content...

Read more here:

Where to check the Overwatch 2 Server status - Sportskeeda

Categories
Dedicated Server

Best Phishing Training Options for You and Your Employees – Small Business Trends

One of the best defenses against phishing attacks is training. By teaching your employees how to recognize and report phishing attempts, you can help keep your company safe from hackers. But with so many training options available, how do you choose the right one for your business? Weve compiled a list of the best phishing training options to help you decide.

Phishing awareness training is a program that helps employees learn how to identify and avoid phishing emails. These emails are designed to lure employees into clicking on a phishing link or opening an infected file.

Phishing awareness training can help employees stay safe online by teaching them how to:

Phishing training for employees can also help them understand the risks of sharing personal information online.

People are often the weakest link in an organizations cybersecurity posture. Phishing attacks involve tricking employees into revealing sensitive information or clicking on malicious links, which is a common way for cybercriminals to gain access to company networks.

Thats why organizations need to offer phishing training for employees. Training can help employees learn how to identify phishing emails and protect themselves from becoming victims of these attacks.

In addition to training, there are other things that organizations can do to protect their networks from phishing attacks, such as implementing a strongcybersecurity policyand using anti-phishing tools.

But education is key, and companies must train their employees to avoid cyber risk and stay safe online.

Here are the top options for simulated phishing campaigns and security awareness training programs:

KnowBe4sKevin Mitnick Security Awareness Training (KMSAT) allows you to run tests regularly with real-life examples of malicious emails. You can start by testing how prone your employees are to phishing, then move on to train them.

KMSAT includes a mix of interactive modules, videos, and newsletters to train users. You also get insights into employee performance to assign additional training if needed.

Phishing simulations and training fromInfosec Institutehave over 1,000 templates to build simulated campaigns. And that library is updated regularly to simulate recent and ongoing attacks.

With Infosec, you can provide personalized anti-phishing training to your employees on auto-pilot. Once you configure the schedule, users start receiving the simulated emails and training videos automatically.

Phished delivers interactive cybersecurity education with the help of automated simulations. WithPhished Phishing Simulations, you can train employees to spot phishing emails and smishing (SMS phishing) attacks. The knowledge is imparted through a series of micro-learnings.

It sends AI-driven simulations and reports back with the results. The entire sequence is automated. So, you can set it up and forget.

PhishingBox simulator uses test phishing attacks to train employees. It provides a range of templates and landing pages for quick setup.

WithPhishingBox Phishing Simulator, you can ensure your employees are fully prepared for an attack. PhishingBox also has a Learning Management System (LMS) to monitor everyones progress.

Gophish is a phishing framework to help you test how phishing-prone your organization is. This free tool can design phishing email templates and schedule them. And then, you can track the results in near real-time.

Unlike other tools,Gophishdoesnt have a host of complex features. Its a minimal and intuitive program designed just for testing.

Infosequre has many premade scenarios with realistic phishing emails and text messages. You can use exercises ofInfosequre Phishing Simulationto track your employees capability and presence of mind. The platform sends custom exercises and feedback depending on how someone acts.

You can use your own dedicated server. So, no one outside your organization can access your information, phishing tests, and feedback.

Proofpoint Security Awareness Training is the key to cyber defense. You can use it to train your team to identify and report phishing messages. It helps make everyone better aware of the cyber threats looming in the air.

WithProofpoint Security Awareness Training, you can run phishing USB simulations based on real-world threats, get knowledge and culture assessments, and get a report that identifies your top clickers.

TerranovasPhishing Simulationleverage dynamic content in various formats to engage the users. It helps you identify the employees at the most risk and make them aware of it.

With its simulation, you can create mock phishing attacks to train your employees for D-day. You can empower them with all the skills to recognize and report phishing emails.

SafeTitan is an advanced platform for real-time training. It has several templates to automate your training campaign fully. Each user gets personalized training depending on their test responses.

The program uses short gamified tests to create an interactive and enjoyable environment for employee training. The content library ofSafeTitan Plus Phishing Protectionalso has an extensive amount of training resources.

Hook Securitys phishing training toolkit is a complete training resource for your most significant asset: the employees. It uses a series of bite-sized training modules to make learning easy.

WithHooks Phishing Testing, you can easily set up mock tests for phishing and spear phishing attacks.Employees get instant feedback and learn to make themselves better aware of the risks. And you get comprehensive reporting to drill down into specifics.

Phishing attack exercises are a type of mock cyber-attacks in which the attacker attempts to acquire login credentials by masquerading as a legitimate entity in emails or other communication channels. Phishing attack exercises or phishing tests are often used in training simulations for employees of organizations.

It depends on the organization. While a few smaller companies may only spend $500 or less per year, the average medium-sized company spends about $1,600 annually, and large organizations can spend up to $50,000 or more.

Several phishing awareness training options are available, ranging from online tutorials and self-paced courses to live classroom sessions led by expert instructors. Organizations should consider their specific needs and pick the phishing training program that suits their requirements.

Yes. Phishing training definitely works, but its crucial to ensure that the phishing awareness training is practical and provides employees with the knowledge they need to protect themselves from phishing attacks.

Image: Envato Elements

Link:

Best Phishing Training Options for You and Your Employees - Small Business Trends

Categories
Dedicated Server

9 Of Reddit’s Wildest Food Conversations – Daily Meal

Yes, you read that right: this is a popular subreddit about bread that has been stapled to trees. That's it. That's the sub. This thriving community of bread stapled to tree enthusiasts runs about 318,000 deep. According to Bon Appetit, it was started by two friends back in 2017 as a joke, but has taken off ever since. Users come to r/BreadStapledtoTrees to share images oftoasted white bread stapled to an ash tree, a marbled rye stapled to a palm tree, and even a sourdough starter stapled to a tree. There's something weirdly wholesome and calming about the thread. Redditors seem to understand and even celebrate the silliness of this tradition, while still respecting the strict rules.

Yes, there are rules. Lots of them, in fact. For starters, the founders of the thread spoke to tree conservationists who confirmed that staples won't hurt mature trees. But the group does have a strict no young trees, bonsai, or cactus policy (via Bon Appetit.) There is also a list of approved breads, which is quite extensive and ecompasses everything from Pop Tarts, taco shells, and more typical types of bread. So if you're inspired, why not grab some challah, matzah, or even some gingerbread menalong with a stapler and join in on the fun?

See the original post here:

9 Of Reddit's Wildest Food Conversations - Daily Meal

Categories
Dedicated Server

Quiet Quitting, Re-Recruiting: New Tech Terms That Arose in 2022 – Tech.co

From Mark Zuckerbergs mad metaverse musings to mass layoffs and Musk-induced mayhem at Twitter, 2022 has been a tumultuous twelve months for the technology industry.

Along the way, a whole host of new phrases and words, virtually unused and unheard of in January, have slowly crept into our conversations. Looking ahead to 2023, it's likely you'll see these terms used even more frequently, as we continued to adapt to the modern and often novel post-pandemic world of work.

Here are all the important tech terms you need to brush up on before 2022 ends and the new year begins.

The term Quiet quitting garnered significant media attention after being discussed extensively by employees on social media throughout the year, particularly in younger millennial and Gen Z circles.

The term refers to doing the absolute bare minimum your job requires you to do, and nothing beyond that. Its precisely the opposite of going above and beyond at work, which is perceived by Quiet Quitters to negatively impact a healthy work-life balance.

Re-recruiting isn't necessarily a brand-new term and probably arose before the year began but it was honed in on by Microsoft in their September 2022 Work Trend Index, for which 20,000 workers from across the globe were surveyed.

One key takeaway from the survey was that staff need to be re-recruited to their roles in order to ensure theyre continuing to develop and grow within their company.

This effectively means giving employees ample opportunity to expand their skill sets and learn more about both their own roles and roles that exist above them. The hope is that providing employees with this will help minimize job-hopping, which has made it difficult for companies to retain staff all year.

A Decentralized VPN sometimes called a dVPN refers to any VPN that does not have centralized control over the individual servers that make up its server network.

As popular VPN company Surfshark puts it, instead of a single VPN provider supplying and maintaining the servers, dVPN's servers are hosted by independent users. They could be using dedicated server machines or just installing dVPN software on their home computers.

There are some definite advantages to Decentralized VPNs, but perhaps the biggest one is that your privacy is secured by the very nature of the network infrastructure, rather than a private company (i.e. a VPN provider) giving you their word however trustworthy that they wont log your data.

Coined by project management software provider Wrike, the Dark Matter of work lives in synchronous applications and unstructured work, such as instant message threads and video calls, as well as the gaps between systems and applications that arent integrated.

Workplace dark matter consists of all the little tasks you have to complete in your workday that take very long to complete in isolation, but slowly add up and eat into your time. As alluded to above, the project management provider suggests thinks the explosion of workplace applications is to blame for an exponential increase in workplace dark matter.

Conversely to Quiet Quitting, Quiet Firing is enforced by managers. Instead of just firing an employee outright, during a Quiet Fire, a boss will slowly remove one of their staff members duties until their position becomes obsolete or unneeded.

Bosses engaging in the practice may reassign these tasks to other employees, change the employee's job description, demote them, or simply block them from pursuing opportunities that will expand their horizons within the company.

If an employee is quietly fired in this way, it makes it significantly harder for them to launch legal action against the company than if they were fired outright.

Workfluencers are essentially influencers that create content about their jobs. those who are interested in learning more about their field and what their day-to-day work life is like.

They often make money from brand partnerships like standard influencers and seek engagement from followers in much the same way, but focus their content entirely around the 9-5.

Workfluencers have been aided significantly by changes to business and career apps like LinkedIn, which have continuously borrowed features from mainstream social media sites over the past few years to make their platforms more accessible and usable.

Now, over 13 million LinkedIn users have their profiles set to creator mode, which will, in theory, more people will see their posts. Workfluencers are here to stay, whether we like it or not, and there'll probably be plenty more who try their hand at it in 2023.

MFA Fatigue is a novel hacking technique that was used to great effect by thereat actors throughout 2022, and is thought to have been the catalyst behind successful breaches of Uber, Microsoft, and CISCO's networks.

In MFA Fatigue attacks, perpetrators will run a script that attempts to log into a targets account that has multi-factor authentication turned on using stolen credentials. The victim will then receive a seemingly unending stream of authentication requests as the script runs.

The hackers are hoping that the victim is so irked by the constant string of notifications that they finally approve one of the requests out of frustration. After that, they'll have access to the account and can wreak whatever havoc they please.

Overemployment is a modern term for someone working multiple jobs which has become increasingly common since the post-pandemic economic downturn were all experiencing began.

According to the Bureau of Labor Statistics, 4.9% of the 164 million-strong US workforce held two or more jobs in September 2022, which amounts to almost 8 million people.

As the name would suggest, boomerang employees are staff members that are employed at companies theyve previously left, typically on good terms (hence the return). One analysis of LinkedIn members job histories shows boomerang employees accounted for 4.3% of US hireslast year.

Some companies are now encouraging this practice, setting up alumni networks and other ways to stay connected with former employees once they leave in order to coax them into the office and back onto the payroll at a later date.

However, some research suggests that employees returning to more senior positions after leaving previously can have a negative impact on staff morale, particularly for those who are still in the same roles they were in when their returning co-workers first departed.

Ransomware-as-a-Service a play on the more widely-known term Software-as-a-Service is a term given to any ransomware that is made commercially available as a subscription service, enabling affiliates to use the already-developed tools to execute their own attacks.

The rise of Ransomware-as-a-Service has materialized alongside many ransomware gangs moving from double extortion tactics both encrypting and exfiltrating a victim companys data and threatening to publish it to triple extortion tactics.

In a triple extortion attack, a companys data will first be encrypted (coupled with the threat of deletion) and exfiltrated (coupled with the threat of publication), all while the threat actor also orchestrates a third stage, such as a DDoS attack or threatening the companys clients.

Productivity paranoia refers to a disparity between how productive CEOs, bosses, and managers think their staff members are, and how productive staff members actually believe themselves to be.

The disparity is stark, too. According to a Microsoft Work Index study released this year, although 87% of employees believe themselves to be productive at work, only 12% of leaders believe their employees are making the most of their time.

Productivity paranoia has likely been exacerbated by the rise of hybrid, flexible and remote approaches to working, which many bosses feel has given them less visibility over their teams.

Email Bankruptcy occurs when a person deletes or ignores emails that are older than a certain date, or in more extreme cases, abandons their inbox altogether due to the volume of emails theyre receiving.

Granted, this term has been around a lot longer than just this year but considering the rise of project management software apps with built-in collaboration tools as well as business communication platforms like Slack, you might hear it a whole lot more in 2023. Around 30% of US adults have already declared email bankruptcy, with inboxes becoming increasingly clogged with spam, junk, and marketing emails.

While as equally interesting as it has been exhausting, 2022 has left many people working in and around the tech sector with more questions than answers.

Will the mass layoffs weve experienced this year continue? What cyber threats will be used to target businesses? Will Twitter survive until the end of the year with Musk at the helm, or will Googles scarily sentient AI have taken over the world before we can find out?

Whatever happens in 2023, well be keeping you up to date with daily news updates on the platforms, services, and businesses that matter to you.

If youre yet to declare email bankruptcy and would like to get all of Tech.cos news straight to your email inbox, sign up for our newsletter today:[/vc_column_text]

Follow this link:

Quiet Quitting, Re-Recruiting: New Tech Terms That Arose in 2022 - Tech.co