An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

IBM’s Watson Leading the Super Computer Charge on COVID-19

Most missed the Trump White House announcement that on March 11th, the leaders of several tech companies met with the Trump team to discuss ways that super computers can process and speed up solutions for eradicating COVID-19 with treatment discoveries. On tap for the meeting, Facebook, Alphabet, Amazon, Twitter, Apple and Microsoft. The White House Chief Technology Officer, Michael Kratsios also enlisted the help of NASA, IBM, Oak Ridge National Laboratory, US Department of Energy, Argonne National Lab, Sandia National Laboratory, Lawrence Livermore National Lab, Los Alamos National Laboratory, The National Science Foundation, Massachusetts Institute of Technology, Rensselaer Polytechnic Institute and several others.

The COVID-19 High Performance Computing Consortium will bring significant computing power, 16 systems with over 330 petaflops, 775,000 CPU cores, and 34,000 GPUs to help researchers understand COVID-19 potential treatments and cures. “These high-performance computing systems allow researchers to run very large numbers of calculations in epidemiology, bioinformatics, and molecular modeling,” Dario Gil, director of IBM Research said in the announcement. “These experiments would take years to complete if worked by hand, or months if handled on slower, traditional computing platforms.”

“Since the start of COVID-19 pandemic we have been working closely with governments in the US and worldwide to find all available options to put our technology and expertise to work to help organizations be resilient and adapt to the consequences of the pandemic, and to accelerate the process of discovery and enable the scientific and medical community to develop treatments and ultimately a cure,” Gil said.

Powerful supercomputer and training program, IBM’s Summit, previously enabled researchers at the Oak Ridge National Laboratory and the University of Tennessee to screen nearly 8,000 compounds to uncover, which are most likely to bind to the main “spike” of the coronavirus, making it unable to reproduce and infect other cells.

The organizations were able to recommend 77 promising small-molecule drug compounds that could be experimentally tested.  IBM will continue to work with different partners to evaluate proposals and provide access to supercomputing capacity to tackle to global pandemic.

“I am proud to be working with my IBM colleagues and the extended scientific community to help kick-start this effort. What began just two days ago with one conversation with the White House Office of Science and Technology Policy has solidified quickly into an unprecedented effort that can make a real difference,” Gil stressed.

***

The Oak Ridge National Laboratory in Tennessee (one member of the consortium) is using its supercomputers to look for compounds already on the market that might foil the virus.

Oak Ridge’s approach involves what’s called computational structure-based drug discovery. Basically, that means they use a computer to calculate how drugs might work against germs like viruses.

“We could get these calculations done in one day on the supercomputer, whereas a normal computer, it would take a month,” says Jeremy Smith, director of the Center for Molecular biophysics at Oak Ridge.

To run the calculations, you need to know the physical properties of the proteins a virus makes — what they’re made of and what their shape is.

One key viral protein of the coronavirus is called the spike protein. Information about what it looks like came out in mid-January, so Smith asked people in his lab if they wanted to start looking through databases of existing drugs that would block it.

***

Summit, IBM’s supercomputer equipped with the “brain of AI,” ran thousands of simulations to analyze which drug compounds might effectively stop the virus from infecting host cells.
The supercomputer identified 77 of them. It’s a promising step toward creating the most effective treatment.
Researchers at Oak Ridge National Laboratory published their findings in the journal ChemRxiv.

Summit was built to solve the world’s problems

Summit was commissioned by the US Department of Energy in 2014 for the purpose it’s serving now — solving the world’s problems.
It’s got the power of 200 petaflops, which means it has the computing speed of 200 quadrillion calculations per second, aka: It’s 1 million times more powerful than the fastest laptop.Summit, the world's most powerful supercomputer, modeled how different drug compounds might prevent the coronavirus from spreading to other cells.

At its station in Oak Ridge National Laboratory in Tennessee, Summit has identified patterns in cellular systems that precede Alzheimer’s, analyzed genes that contribute to traits like opioid addiction and predicted extreme weather based on climate simulations.

How Summit fights coronavirus

Viruses infect host cells by injecting them with a “spike” of genetic material. Summit’s job is to find drug compounds that could bind to that spike and potentially stop the spread.
Oak Ridge researcher Micholas Smith created a model of the coronavirus spike based on research published in January. With Summit, he simulated how the atoms and particles in the viral protein would react to different compounds.
The supercomputer ran simulations of over 8,000 compounds that could bind to the spike protein of the virus, which could limit its ability to spread to host cells. Summit identified 77 of them and ranked them based on how likely they were to bind to the spike.

What’s next

The team will run the simulations on Summit again, using a more accurate model of the coronavirus’ spike that was published this month.Why these volunteers chose to participate in a coronavirus vaccine trial

Hat tip to the Trump White House

 

Govt Report on Prevention of Nationwide Cyber Catastrophe

A good first step for sure, however there needs to be a government-wide decision on cyber attacks being an act of war and how to respond.

***

The Cyberspace Solarium Commission’s proposes a strategy of layered cyber deterrence. Our report consists of over 80 recommendations to implement the strategy. These recommendations are organized into 6 pillars:
  1. Reform the U.S. Government’s Structure and Organization for Cyberspace.
  2. Strengthen Norms and Non-Military Tools.
  3. Promote National Resilience.
  4. Reshape the Cyber Ecosystem.
  5. Operationalize Cybersecurity Collaboration with the Private Sector.
  6. Preserve and Employ the Military Instrument of National Power.

Click here to download the full report.

A much-anticipated government report aimed at defending the nation against cyber threats in the years to come opens with a bleak preview of what could happen if critical systems were brought down.

“The water in the Potomac still has that red tint from where the treatment plants upstream were hacked, their automated systems tricked into flushing out the wrong mix of chemicals,” the Cyberspace Solarium Commission wrote in the opening lines of its report.

“By comparison, the water in the Lincoln Memorial Reflecting Pool has a purple glint to it. They’ve pumped out the floodwaters that covered Washington’s low-lying areas after the region’s reservoirs were hit in a cascade of sensor hacks,” it continues.

So begins the report two years in the making from a congressionally mandated commission made up of lawmakers and top Trump administration officials, pointing to the vulnerabilities involved with critical systems being hooked up to the internet.

The report, which includes more than 75 recommendations for how to prevent the cyber doomsday it spells out, and the commission that made it were both mandated by the 2019 National Defense Authorization Act (NDAA).

The commissioners, who include co-chairmen Sen. Angus King (I-Maine) and Rep. Mike Gallagher (R-Wis.), highlight a range of issues to address, but zero in on election security as “priority.”

“The American people still do not have the assurance that our election systems are secure from foreign manipulation,” King and Gallagher wrote in the report. “If we don’t get election security right, deterrence will fail and future generations will look back with longing and regret on the once powerful American Republic and wonder how we screwed the whole thing up.”

The focus on shoring up election security, and the agreed-upon recommendations for how to do this, sets the report apart from the approach to the subject on Capitol Hill, where it has been a major issue of contention between Republicans and Democrats since Russian interference in the 2016 presidential election.

Beyond election security, the commissioners call for overarching government reform to address cyber vulnerabilities. Chief among these is calling on the White House to issue an updated national strategy to address cyber threats and to establish a national cybersecurity director position to coordinate efforts.

In terms of congressional action, commissioners recommend that Congress create cybersecurity committees in both the House and Senate, establish a Bureau of Cybersecurity Statistics, and establish an assistant secretary position at the State Department to lead international efforts around cybersecurity.

“While cyberspace has transformed the American economy and society, the government has not kept up,” commissioners wrote in calling for reforms.

The commission also zeroed in on “imposing costs” to adversaries who attempt to attack the U.S. online. In order to do so, it recommended that the Department of Defense conduct vulnerability assessments of its weapons systems, including nuclear control systems, and that it make cybersecurity preparedness a necessity.

The Cybersecurity and Infrastructure Security Agency, the Department of Homeland Security’s cyber agency, would be empowered as the “lead agency” at the federal level.

The report’s recommendations were debated on and pinpointed by a group of high-ranking commissioners who also included FBI Director Christopher Wray, Deputy Secretary of Defense David Norquist, Transportation Security Administration Administrator David Pekoske, Sen. Ben Sasse (R-Neb.), and Rep. James Langevin (D-R.I.).

Langevin said in a statement on Wednesday that the report is intended to shore up the nation’s cyber “resiliency for years to come.”

“Our charge in drafting this report was to prevent a cyber event of significant national consequence, and we know that the short- and long-term recommendations we crafted will better position us to realize the promise of the Internet, while avoiding its perils,” Langevin said. “The sooner our recommendations are implemented, the better positioned the country will be to prevent and respond to incidents that can disrupt the American way of life.”

The report’s recommendations may soon have real-world consequences on Capitol Hill.

Rep. John Katko (R-N.Y.), the ranking member on the House Homeland Security Committee’s cyber panel, told The Hill this week that there “definitely will be some legislation” stemming from the report’s recommendations, and that hearings would likely be held.

Katko noted that he had talked with Senate Homeland Security Committee Chairman Ron Johnson (R-Wis.) about the Senate also taking action around the report.

“This report screams of the need for bipartisan action on this, and I hope that we can leave the politics out of it, and I hope we can attack these problems quickly and effectively,” Katko said.

Rep. Cedric Richmond (D-La.), the cyber subcommittee’s chairman, opened a hearing on Wednesday by praising the report’s recommendations and saying he looked forward to working to “codifying” the ideas alongside House Homeland Security Committee Chairman Bennie Thompson (D-Miss.).

Industry groups also reacted positively to the report’s recommendations. Tom Gann, the chief public policy officer of cybersecurity firm McAfee, told The Hill in a statement that he agreed with most of the report’s findings and hoped that they are “acted upon with speed.”

Protect Our Power, a nonprofit with the goal of protecting the electric grid, also praised the report.

“These are compelling recommendations, echoing issues we have highlighted for several years now, and action is long overdue,” Jim Cunningham, executive director of the group, said in a statement. “Without a reliable supply of electricity before, during and following a disabling cyberattack, none of our critical infrastructure can function.”

While there may be legislative action soon – and praise from industry groups – both Gallagher and King emphasized in the report that their main aim was for it to open the eyes of Americans to the dangers posed by cyberattacks on critical systems.

“The status quo is inviting attacks on America every second of every day,” the co-chairmen wrote. “We all want that to stop. So please do us, and your fellow Americans, a favor. Read this report and then demand that your government and the private sector act with speed and agility to secure our cyber future.”

FCC Charges Mobile Carriers with Selling Your Location Data

Source: The FCC has finished investigating carriers’ unauthorized disclosure and sale of subscribers’ real-time location data, Chairman Ajit Pai has shared with (PDF) lawmakers in the House of Representatives. In his letters, he told Energy and Commerce Committee Chairman Frank Pallone, Jr. and others that the agency has come to a conclusion after an extensive probe: one or more carriers “apparently violated federal law.” Pai has also promised the lawmakers that the agency is going to take action against the offending carriers to ensure that they comply with laws that protect consumers’ sensitive information.

Back in 2018, it came to light that carriers sell their customers’ real-time location data to aggregators, which then resold it to other companies or even gave it away. Last year, a Motherboard report also revealed that bail bond companies and bounty hunters have been buying people’s location data for years, allowing them to use that information to track their targets.

All four major US carriers promised to stop selling customer location data to aggregators after the information first came out. The companies made good on their word, though it took them a year to do so: They informed FCC Commissioner Jessica Rosenworcel that they had already halted sales to aggregators after she requested for an update in 2019.

Pallone said in a statement:

“Following our longstanding calls to take action, the FCC finally informed the Committee today that one or more wireless carriers apparently violated federal privacy protections by turning a blind eye to the widespread disclosure of consumers’ real-time location data. This is certainly a step in the right direction, but I’ll be watching to make sure the FCC doesn’t just let these lawbreakers off the hook with a slap on the wrist.”

Rosenworcel, who repeatedly brought the issue up over the past years, also said that it was a “shame that it took so long for the FCC to reach a conclusion that was so obvious.” Especially when “shady middlemen could sell your location within a few hundred meters based on your wireless phone data.”

We’ve reached out to AT&T, Verizon, T-Mobile, Sprint and CTIA, the trade group representing the wireless communications industry in the US, for a statement.

*** Google has been tracking Android users even when location ...  source: Google has been tracking Android users even when location services are disabled

House Commerce Committee Chairman Frank Pallone, Jr. (D-N.J.) said that Pai’s response to lawmakers “is a step in the right direction, but I’ll be watching to make sure the FCC doesn’t just let these lawbreakers off the hook with a slap on the wrist.”

Sen. Ron Wyden (D-Ore.) said that he is “eager to see whether the FCC will truly hold wireless companies accountable or let them off with a slap on the wrist.”

Source: An investigation by Motherboard in January 2019 found that “T-Mobile, Sprint, and AT&T are [still] selling access to their customers’ location data and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country.”

The carriers made further promises to stop selling the data and later confirmed to the FCC that they had phased out the data-selling programs.

Pai’s letter today did not say exactly which federal law the carriers broke, but Section 222 of the Communications Act says that carriers may not use or disclose location information “without the express prior authorization of the customer.” Carriers have also been accused of violating rules on the usage of 911 location data.

Justice Dept Brands Huawei as a Criminal Enterprise

Gotta hope that Europe takes note, especially Britain. Europe so far has approved Huawei as the vendor platform for 5G. Check your use of apps at the Google store and take a second look at your smart devices.

Image result for huawei source

FDD: The U.S. Department of Justice (DOJ) indicted Chinese telecommunications firm Huawei Technologies and its subsidiaries last week for alleged racketeering, theft of intellectual property, and conspiracy to commit bank fraud, among other charges. The indictment portrays Huawei not merely as a company that has broken the law, but as a fundamentally criminal enterprise.

The new charges target Huawei, four of Huawei’s subsidiaries (Huawei Device Co. Ltd., Huawei Device USA Inc., Futurewei Technologies Inc., and Skycom Tech Co. Ltd.), and Huawei’s chief financial officer, Meng Wanzhou, for violating the Racketeer Influenced and Corrupt Organizations (RICO) Act, which Congress passed in 1970 to combat organized crime.

According to the DOJ, the Huawei business model entailed “the deliberate and repeated misappropriation of intellectual property of companies headquartered or with offices in the United States.” DOJ also highlighted other violations, including Huawei’s role in sanctions evasion and fraudulent activities.

Last week’s indictment marks the first time DOJ charged a company with suspect connections to a foreign government as a criminal enterprise. Although Huawei asserts it is not state-owned, the company has indirect ties to the Chinese government and has yet to publically disclose who exactly owns and controls the company. Huawei’s majority shareholder is the company’s labor union, which keeps the details of its membership and governance structure out of the public eye. Last year, Jiang Xisheng, a top executive, explained during a press conference that the labor union’s ownership is simply a matter of legal convenience; this only further obfuscated who is really in charge. Additionally, Huawei’s founder, Ren Zhangfei, served in the Chinese military and is a member of the Chinese Communist Party.

While the indictment does not say that Beijing directed Huawei to operate as a criminal enterprise, China’s National Intelligence Law of 2017 requires Huawei and other private companies to provide the government with their data to “support, assist, and cooperate with state intelligence according to the law.” In short, the law empowers Beijing to exploit Huawei as an intelligence asset whenever it sees fit.

In other high-profile cases, the Chinese government has stolen sensitive U.S. data to achieve a strategic advantage. U.S. officials have even deemed China’s espionage and intelligence activities as a “long-term existential threat to the security of our nation.” In 2012, the head of the U.S. National Security Agency estimated that China’s economic espionage cost U.S. companies $250 billion in annual losses. Additionally, the targeting of strategic industries has allowed Beijing to enhance its own military capabilities at America’s expense.

The exploitation of Huawei could clearly enhance Beijing’s intelligence collecting capabilities. Just last week, the U.S. government reported that for over ten years Huawei secretly maintained “back doors” on its mobile networks that allowed the company – and potentially the Chinese government – to have direct access to their users’ most sensitive data.

The indictment of Huawei as a criminal enterprise shows that the Trump administration was mistaken when it placated Beijing by softening previous penalties for Huawei’s misconduct. If the court finds Huawei guilty under RICO, the administration should ensure the full application of all penalties necessary to end its criminal pursuits.

 

Facebook Still Deleting Accounts Tied to Iran and Russia

Social media giant Facebook on Wednesday removed two unconnected networks of accounts, pages, and groups “engaging in foreign or government interference,” one originating in Russia and the other one in Iran, both of which have alleged ties to intelligence services.

Calling the behavior “coordinated” and “inauthentic,” Facebook’s head of security policy, Nathaniel Gleicher, said both operations were acting on “behalf of a government or foreign actor.”

The Russian network primarily targeted Ukraine and its neighboring countries, while the Iranian operation focused mainly on the United States.

The people behind the groups and accounts “coordinated with one another and used fake accounts to misrepresent themselves, and that was the basis for our action,” the social-media company said.

In total, 78 accounts, 11 pages, 29 groups, and four Instagram accounts originating in Russia were removed.

Facebook’s investigation “found links to Russian and military intelligence services” within the Russian network.

The people behind the network would pose as citizen journalists and tried to contact policymakers, journalists, and other public figures in the region.

They would post content in Russian, English, and Ukrainian “about local and political news including public figures in Ukraine, Russian military engagement in Syria, alleged SBU (Ukrainian Security Service) leaks related to ethnic tensions in Crimea and the downing of the Malaysian airliner in Ukraine in 2014.”

Similarly, six Facebook and five Instagram accounts were removed originating in Iran that engaged in “coordinated inauthentic behavior.”

Some tried contacting public figures and they shared posts on such topics as the U.S. elections, Christianity, U.S.-Iran relations, U.S. immigration policy, and criticism of U.S. policies in the Middle East.

About 60 people had followed one or more of the Iran-based Instagram accounts, the media company said.

*** What there is more….

Add in Vietnam and Myanmar.

Per Facebook in part:

Each of them created networks of accounts to mislead others about who they were and what they were doing. We have shared information about our findings with industry partners.

We’re constantly working to detect and stop this type of activity because we don’t want our services to be used to manipulate people. We’re taking down these Pages, Groups and accounts based on their behavior, not the content they posted. In each of these cases, the people behind this activity coordinated with one another and used fake accounts to misrepresent themselves, and that was the basis for our action.

We are making progress rooting out this abuse, but as we’ve said before, it’s an ongoing challenge. We’re committed to continually improving to stay ahead. That means building better technology, hiring more people and working closer with law enforcement, security experts and other companies.The individuals behind this activity posed as locals and used fake accounts — some of which had already been detected and disabled by our automated systems — to manage Groups and Pages, post and comment on various content. Some of these accounts represented themselves as citizen journalists and tried to contact policymakers, journalists and other public figures in the region.

Screenshot of content posted by some of these Pages Screenshot of content posted by some of these Pages  Read more here for more fake news sampling noted by Facebook.