• Salesforce AI Releases Text2Data: A Training Framework for Low-Resource Data Generation
    www.marktechpost.com
    Generative AI faces a critical challenge in balancing autonomy and controllability. While autonomy has advanced significantly through powerful generative models, controllability has become a focal point for machine learning researchers. Text-based control has become particularly important as natural language offers an intuitive interface between humans and machines. This approach has enabled remarkable applications across image editing, audio synthesis, and video generation. Recent text-to-data generative models, particularly those employing diffusion techniques, have shown impressive results by utilizing semantic insights from extensive data-text pair datasets. However, significant barriers arise in low-resource situations where obtaining sufficient text-paired data becomes prohibitively expensive or complicated due to complex data structures. Critical domains like molecular data, motion capture, and time series often lack adequate text labels, which restricts supervised learning capabilities and impedes the deployment of advanced generative models. These limitations predictably result in poor generation quality, model overfitting, bias, and limited output diversityrevealing a substantial gap in optimizing text representations for better alignment in data-limited contexts.The low-resource scenario has prompted several mitigation approaches, each with inherent limitations. Data augmentation techniques often fail to accurately align synthetic data with original text descriptions and risk overfitting while increasing computational demands in diffusion models. Semi-supervised learning struggles with the inherent ambiguities in textual data, making correct interpretation challenging when processing unlabeled samples. Transfer learning, while promising for limited datasets, frequently suffers from catastrophic forgetting, where the model loses previously acquired knowledge as it adapts to new text descriptions. These methodological shortcomings highlight the need for more robust approaches specifically designed for text-to-data generation in low-resource environments.In this paper, researchers from Salesforce AI Research present Text2Data which introduces a diffusion-based framework that enhances text-to-data controllability in low-resource scenarios through a two-stage approach. First, it masters data distribution using unlabeled data via an unsupervised diffusion model, avoiding the semantic ambiguity common in semi-supervised methods. Second, it implements controllable fine-tuning on text-labeled data without expanding the training dataset. Instead, Text2Data employs a constraint optimization-based learning objective that prevents catastrophic forgetting by keeping model parameters close to their pre-fine-tuning state. This unique framework effectively utilizes both labeled and unlabeled data to maintain fine-grained data distribution while achieving superior controllability. Theoretical validation supports the optimization constraint selection and generalization bounds, with comprehensive experiments across three modalities demonstrating Text2Datas superior generation quality and controllability compared to baseline methods.Text2Data addresses controllable data generation by learning the conditional distribution p(x|c) where limited paired data creates optimization challenges. The framework operates in two distinct phases as illustrated in the figure below. Initially, it utilizes more abundant unlabeled data to learn the marginal distribution p(x), obtaining optimal parameters within set . This approach exploits the mathematical relationship between marginal and conditional distributions, where p(x) approximates the expected value of p(x|c) over the text distribution. Subsequently, Text2Data fine-tunes these parameters using the available labeled data-text pairs while implementing constraint optimization to keep the updated parameters within the intersection of and . This constraint ensures the model maintains knowledge of the overall data distribution while gaining text controllability, effectively preventing catastrophic forgetting that typically occurs during fine-tuning processes.Text2Data implements its two-phase approach by first using all available data with NULL tokens as conditions to learn the general data distribution. This allows the model to optimize p(x|), which effectively equals p(x) since the NULL token is independent of x. The second phase introduces a constraint optimization framework that fine-tunes the model on text-labeled data while preventing parameter drift from the previously learned distribution. Mathematically, this is expressed as minimizing the negative log-likelihood of conditional probability p(x|c) subject to the constraint that the marginal distribution performance remains close to the optimal value established during the first phase. This constraint-based approach directly addresses catastrophic forgetting by ensuring the model parameters remain within an optimal set where both general data representation and text-specific controllability can coexistessentially solving a lexicographic optimization problem that balances these competing objectives.It implements classifier-free diffusion guidance by transforming the theoretical objective into practical loss functions. The framework optimizes three key components: L1() for general data distribution learning, L1() for distribution preservation on labeled data, and L2() for text-conditioned generation. These are empirically estimated using available data samples. The lexicographic optimization process, detailed in Algorithm 1, balances these objectives by dynamically adjusting gradient updates with a parameter that enforces constraints while allowing effective learning. This approach uses a sophisticated update rule where is modified based on a weighted combination of gradients from both objectives. The constraint can be relaxed during training to improve convergence, recognizing that parameters need not be an exact subset of the original parameter space but should remain proximal to preserve distribution knowledge while gaining controllability.Text2Data provides theoretical underpinnings for its constraint optimization approach through generalization bounds that validate parameter selection. The framework establishes that random variables derived from the diffusion process are sub-Gaussian, enabling the formulation of rigorous confidence bounds. Theorem 0.2 delivers three critical guarantees: first, the empirical parameter set within the confidence bound fully encompasses the true optimal set; second, the empirical solution competes effectively with the theoretical optimum on the primary objective; and third, the empirical solution maintains reasonable adherence to the theoretical constraint. The practical implementation introduces a relaxation parameter that adjusts the strictness of the constraint while keeping it within the mathematically justified confidence interval. This relaxation acknowledges real-world conditions where obtaining numerous unlabeled samples is feasible, making the confidence bound reasonably tight even when handling models with millions of parameters. Experiments with motion generation involving 45,000 samples and 14 million parameters confirm the frameworks practical viability.Text2Data demonstrates superior controllability across multiple domains compared to baseline methods. In molecular generation, it achieves lower Mean Absolute Error (MAE) for all properties compared to EDM-finetune and EDM, particularly excelling with properties like LUMO and Cv. For motion generation, Text2Data surpasses MDM-finetune and MDM in R Precision and Multimodal Distance metrics. In time series generation, it consistently outperforms DiffTS-finetune and DiffTS across all evaluated properties. Beyond controllability, Text2Data maintains exceptional generation quality, showing improvements in molecular validity, stability, motion generation diversity, and distribution alignment in time series. These results validate Text2Datas effectiveness in mitigating catastrophic forgetting while preserving generation quality.Text2Data effectively addresses the challenges of text-to-data generation in low-resource scenarios across multiple modalities. By initially utilizing unlabeled data to grasp the overall data distribution and then implementing constraint optimization during fine-tuning on labeled data, the framework successfully balances controllability with distribution preservation. This approach prevents catastrophic forgetting while maintaining generation quality. Experimental results consistently demonstrate Text2Datas superiority over baseline methods in both controllability and generation quality. Though implemented with diffusion models, Text2Datas principles can be readily adapted to other generative architectures.Check outthe Paper and GitHub Page.All credit for this research goes to the researchers of this project. Also,feel free to follow us onTwitterand dont forget to join our80k+ ML SubReddit. Mohammad AsjadAsjad is an intern consultant at Marktechpost. He is persuing B.Tech in mechanical engineering at the Indian Institute of Technology, Kharagpur. Asjad is a Machine learning and deep learning enthusiast who is always researching the applications of machine learning in healthcare.Mohammad Asjadhttps://www.marktechpost.com/author/mohammad_asjad/Q-Filters: A Training-Free AI Method for Efficient KV Cache CompressionMohammad Asjadhttps://www.marktechpost.com/author/mohammad_asjad/Starter Guide For Running Large Language Models LLMsMohammad Asjadhttps://www.marktechpost.com/author/mohammad_asjad/Thinking Harder, Not Longer: Evaluating Reasoning Efficiency in Advanced Language ModelsMohammad Asjadhttps://www.marktechpost.com/author/mohammad_asjad/CoSyn: An AI Framework that Leverages the Coding Capabilities of Text-only Large Language Models (LLMs) to Automatically Create Synthetic Text-Rich Multimodal Data Parlant: Build Reliable AI Customer Facing Agents with LLMs (Promoted)
    0 Yorumlar ·0 hisse senetleri ·48 Views
  • Forza Horizon 5 on PS5 Requires a Microsoft Account, as Other Xbox Games on Sonys Consoles Do
    www.ign.com
    Forza Horizon 5 on PlayStation 5 requires a Microsoft account, the company has confirmed.Confirmation comes from a FAQ posted to the Forza support website: Yes, in addition to a PSN account youll need to link to a Microsoft account in order to play Forza Horizon 5 on PS5. This process begins the first time you start up the game on your console.This policy is in keeping with other Xbox games released on Sonys console, including Minecraft, Grounded, and Sea of Thieves.However, it has caused a degree of controversy among some. Does it play?, which works to ensure games and hardware remain accessible now and always, tweeted to say the news basically kills preservation for the PS5 version of Forza Horizon 5.That statement taps into a concern that Forza Horizon 5 may become unplayable even to those who bought it if at some point in the future Microsoft discontinues its account linking process without updating the game to be playable without a Microsoft account. Theres also concern that Forza Horizon 5 on PS5 will become unplayable if a player loses access to their linked Microsoft account for whatever reason. Adding to this concern is the fact Microsoft will release Forza Horizon 5 on PS5 digitally, and has no plans for a physical disc version.Sony came under fire for forcing PC players of Arrowheads Helldivers 2 to link a PSN account in order to play, but that decision was reversed after a backlash online. In January, Sony announced gamers would no longer require players to link a PSN account to enjoy some of its PC games, but offered bonuses to those who did.The reaction to the Forza Horizon 5 Microsoft account news among the PS5 community has been mixed, with most players left wondering if the game has cross-progression given the forced Microsoft account link.Unfortunately, according to the FAQ, Forza Horizon 5 for PS5 does not carry over save files from Xbox or PC. Microsoft pointed out that this is also the same behavior between the Xbox and Steam versions of the game, where game files are separate and not synchronized.You can publish UGC on one platform and download it to play on another, however you won't be able to edit it unless you're playing on the save profile it was originally created on. Some online statistics, such as your leaderboard scores, are synchronized if you log into the game using the same Microsoft account, the company added.Forza Horizon 5 is the latest Xbox game to launch on a rival console as part of Microsofts big multiplatform push. Expect plenty more where that came from in the months ahead.Wesley is the UK News Editor for IGN. Find him on Twitter at @wyp100. You can reach Wesley at wesley_yinpoole@ign.com or confidentially at wyp100@proton.me.
    0 Yorumlar ·0 hisse senetleri ·48 Views
  • Exclusive First Look at Happy Face: A Real Life Serial Killer Story from a New Perspective
    www.denofgeek.com
    They say everyone has a story worth telling, but Melissa G. Moore really has a story worth telling.Moore is the daughter of Keith Hunter Jesperson, a real-life serial killer known as The Happy Face Killer who murdered at least eight women during the early 90s. She has shared details of her unique upbringing on talk shows, books, podcasts, and more. Now her life is getting the scripted television treatment on Paramount+ with the Jennifer Cacicio-created, Michael Showalter-directed series Happy Face.Ive told my story in all these mediums, but the one thing thats been missing is what its really like to experience what I experienced, Moore says. Its one thing to say this is what happened to me, its another thing to give them the emotional elements.Happy Face indeed spares few details about what its like to be the child of a killer. Primarily set after Jesperson has been discovered, convicted, and imprisoned, the eight-episode series stars Annaleigh Ashford as Moore as she endures ongoing harassment from her father and works to ensure that the Happy Face Killers victims receive justice.Ive been really lucky throughout my career to have played a few real-life people, and that was really helpful jumping into this incredible story, Ashford says. The best part of getting to play this character is that the real Melissa has such a beautiful and authentic heart. Thats a real giftto play someone who really cares about others before she cares about herself.Dennis Quaid steps into the role of Keith Jesperson, dubbed the Happy Face Killer due to his penchant for scribbling smiley faces in correspondence with authorities. Jesperson is currently 69 years old and continues to torment his daughter from behind bars in Oregon State Penitentiary with unwanted letters.[Happy Face] shows what its like to have these letters still coming into my mailbox, him watching my Instagram, strangers reaching out to me, just the emotions of what thats like, and the emotions of what my children go through, having a grandfather whos a serial killer, Moore says.Moore credits Ashford and Quaids performances with helping her better understand her own dynamic with her father.They got the emotional entanglement, how toxic it was, says Moore. There was always going to be a part of me that wishes that this wasnt true, that I really did have a dad. Dennis knows that my desire is to have a father and how my real father plays on that as manipulation.One of the things that Dennis did so beautifully was he was able to play both people. He was able to play the man before the crime and the man after the crime, Ashford adds. It was a thrill to act with him. I feel like we had a really natural parental chemistry.In unpacking Moores trauma, Happy Face walks a familiar true crime tightrope by examining the dark psyche of a killer while still respecting the humanity of his victims.Join our mailing listGet the best of Den of Geek delivered right to your inbox!I want to tell my story, but when I tell my story, Im also giving attention to my serial killer father, Moore says of the dilemma. But Im also giving attention to the victims of my father and the victims family members. I have to respect them. What youll see in this series is sometimes, victims family members want autonomy; they want privacy. Sometimes, my wishes are in conflict with their desires. There are very complex and delicate conversations that I have privately with survivors.Family ties loom large in Happy Facenot only in the twisted entanglement between a killer father and an innocent daughter but also in the far more healing relationship among Moore, her husband Ben (James Wolk), and their children, Hazel (Khiyla Aynne) and Max (Benjamin Mackey).Its about family, Ashford says. When things are darkest, there always has to be light. I think thats something special about this show.The first two episodes of Happy Face premiere Thursday, March 20 on Paramount+.
    0 Yorumlar ·0 hisse senetleri ·37 Views
  • This Trend Will Change the Way You Think About Outdoor Furniture
    www.countryliving.com
    When it comes to interior design, it's all about the art of the mix. Layering in piecesof different materials, from different erasmakes for a much more interesting and personal point of view than a buy-it-all-in-one-weekend trip to the big box store. (This acquired-over-time approach is also a hallmark of the slow decorating movement, which is a design tactic that has been garnering more interest as of late.)Annie Schlecter for Country LivingA wicker sofa paired with an antique coffee table helps helps warm up a Texas porchHowever, when it comes to our outdoor living spaces, the matching set mindset still tends to reign supreme. Even though we theoretically know better, we're quick to snatch up coordinating furniture in the name of convenience. Martin SolystVintage chairs paired with a wooden table make for a more casual, kick-up-your-feet mixDavid Tsay for Country LivingWicker dining chairs with curved backs help soften the rectangular silhouette of a teak table.Roger DaviesThis California cottage continues the cozy onto the porch thanks to antique furniture and a plate collection on the wall Recently, though, we're seeing more and more designers and homeowners applying the mix-and-maybe-don't-match approach to outdoor settings, and our only thought is: Why haven't we been doing this all along? This is not a case against buying new, but rather a simple encouragement to apply the same thinking you'd bring to interior rooms to outdoor spacesthink more materials, softer silhouettes, and a few peppered-in antiques.Brian WoodcockOn an Alabama porch, weathered antiques reinforce the farmhouse feel. Dana Gallagher for Country LivingA Texas porch by designer Meredith Ellis features a mix of wood and wickerThis mix of materials aligns with a larger indoor and outdoor trend of "high texture decorating," says Daniel McCurry, co-founder of Father Nature Landscapes in Birmingham, Alabama, who adds that that texture was a hot topic at recent high-profile garden shows. "With the significant adoptions of technology in the early 2000s came a minimalist trend, but people are now getting their confidence back to place thoughtful pieces and differing textures, which helps make a space feel warm."Clare Horne, the owner of Nashville-based garden design studio The Grass Girl, is seeing a similar movement away from sterile. "My clients are increasingly moving away from modern, minimalist aesthetics and are instead embracing traditional furniture designs." If your outdoor living space is covered, you obviously have more flexibility here, but even the most exposed-to-the-elements of spaces can still utilize a mix of outdoor-friendly materials as opposed to all teak, all the time. You can still opt for a big box store table, but maybe skip the corresponding seating (if sold separately) in favor of something else entirelypreferably made of a different material or with a softer shape. Or perhaps you opt for a wicker sofa, but round out the seating area with wooden or metal chairs. We also love a good garden stool.Buff Strickland for Country LivingAn antique iron sofa, wooden coffee table, and rattan chairs help this outdoor space feel more like an extension of the collected interiorAs mentioned, antiques will also also go a long way toward helping an outdoor space feel more soulful and thoughtfully designed. While not everything can stand up to the elements, it's worth hitting up local estate sales for more weather-tolerant antique wares (wrought-iron pieces, metal gliders).David A. LandAt a Michigan vacation home, an antique robins egg blue table pairs beautifully with newer woven chairs.The ultimate goal is to infuse your outdoor spaces with as much soul, sentiment, and personality as your interiors. Just as nostalgia gardening prioritizes plantings tied to memory and meaning, this mix-it-up approach to outdoor design ensures your spaces will be a better reflection of you.Outdoor Furniture to Mix and MatchGreen Scalloped Side Table$599 at businessandpleasureco.comCredit: Business and Pleasure Co.VWPEYY Green Woven Outdoor Chairs (Set of Two)Credit: AmazonSERENA & LILY Trestle Outdoor Coffee Table$1,498 at Serena and LilyCredit: Serena and LilyBlue Garden StoolNow 25% Off$279 $209 at ballarddesigns.comCredit: Ballard DesignsOutdoor Settee$1,349 at RejuvenationCredit: RejuvenationCarved Outdoor Dining Table$1,899 at greenrow.comCredit: GreenrowWovendale Rocking Chair$459 at polywood.comCredit: PolywoodDovecove Tiered Round Drink Table$139 at WayfairCredit: WayfairOutdoor Bistro Dining Chair$149 at Pottery BarnCredit: Pottery BarnRonde Teak Outdoor BenchNow 96% Off$799 $33 at RejuvenationCredit: RejuvenationBowie Metal Outdoor Bench$1,699 at Pottery BarnCredit: Outdoor BenchHighland Dunes Woven Armchair$250 at WayfairCredit: WayfairRachel Hardage BarrettRachel Hardage Barrett is the Editor-in-Chief of Country Living. She can't pass up a vintage seascape, drives an '89 Woody Wagoneer (that is, when it'll start), and hopes to buy you a lemonade at a future Country Living Fair.
    0 Yorumlar ·0 hisse senetleri ·35 Views
  • Apple teases new Crocker Park store in Westlake, Ohio
    9to5mac.com
    Apples website is teasing a new Crocker Park retail store in Westlake, Ohio, with a three-sentence addition to the stores listing.Get ready. Great things are in store. A brand-new AppleStore is coming soon The store is certainly due a refresh, given the now dated-looking aluminum facade and walls, in contrast to the use of natural materials like wood and stone in more recent stores.While the company hasnt revealed any specifics, the wording does seem to point to a new store in the shopping village, and AppleInsider points to further evidence for this.According to the shopping villages owners, the existing home furnishings retailer Arhaus currently on the same Crocker Park Boulevard as Apple is to both relocate and expand its space in the center. Consequently, given the small size of the current Apple Store, plus the apparent popularity of the shopping village and the option to relocate, its likely that Apple will be moving to larger or more prominent premises within Crocker Park.For shopping malls in particular, weve seen Apple adopt a new design language which creates a curved, seamless transition between the exterior and interior.We first saw this used in India.Apple Saket welcomes customers through a uniquely designed curved storefront with white oak tables displaying Apples products and accessories, as well as a feature wall manufactured in India.Weve since seen the same approach employed in two Chinese Apple Stores, one in Shenzhen, the second in Hefei.There seems a decent chance that a similar approach will be taken at Crocker Park.Theres no word yet on when the new store will open.All photos: AppleAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Yorumlar ·0 hisse senetleri ·40 Views
  • 18.8-inch foldable iPad or MacBook prototype has in-display Face ID, says leaker
    9to5mac.com
    Multiple sources have reported Apple working on an 18.8-inch foldable iPad or MacBook, and a leaker today reports that theres a prototype of the device with Face ID embedded beneath the display.While more than one supply-chain source has pointed to signs of an 18.8-inch folding display, differing views have been expressed about whether the intended use is for an iPad Pro or MacBook Display analyst Ross Young was first to suggest Apples interest in a 20.x-inch display, which he described as being for a MacBook.We are now showing Apple in our roadmap for foldable notebooks. We hear there is interest at the largest size yet, around 20.x. This size could create a new category for Apple and would result in a true dual use product, a notebook with a full-size keyboard when folded and for use as a monitor when not folded and used with an external keyboard.Apple analyst Ming-Chi Kuo found evidence of a large folding display in the supply chain, at the time saying it was 20.3 inches diagonally. He too said it was for a MacBook.Kuo later said that Apple was instead considering a somewhat smaller 18.8-inch display, and this new size was later backed by Young, who said the exact size was 18.76 inches, which Apple would round to 18.8 inches.Fast-forward a few months, and Jeff Pu added a third voice, though by this time it was unclear whether the intended use was in an iPad or MacBook.Prototype unit has embedded Face IDLeaker Digital chat station who posted accurate leaks about the telephoto lens coming to the iPhone 16 Pro (after previously being exclusive to the iPhone 15 Pro Max) and the larger sensor in this years main camera now says that there is a prototype of this folding display with Face ID tech embedded beneath it.Guoguo also has a Foldable iPad Pro, an engineering machine with a 18.8-inch screen, using a metal superstructured lens, mainly integrating Face ID Rx and Tx for under-screen 3D face recognition.Apple does have multiple patents for this tech, and was recently reported to have solved the biggest problem.By this point, theres plenty of evidence that Apple is experimenting with some kind of foldable 18.8-inch display the question is: Is it for an iPad Pro or a MacBook?An all-display device would instinctively point us to an iPad, and this still seems the most likely bet at this point. While Apple does have patents relating to an all-screen MacBook with soft keyboard, the company would need to solve three separate problems to make this workable:Making a non-physical keyboard comfortable to useSimulating the feel of a physical keyboardMaking it compatible with touch-typingThe company has ideas for solving all three problems, dating all the way back to 2018, but implementing them still seems a stretch even within the uncertain launch timings for the mystery device.There are also those who believe Apple is working on a single hybrid device which can run both macOS and iPadOS. While Im sure prototypes of such a device exist, the company has consistently said that it sees them as different products intended for different usage.Id expect in-display Face ID to launch in an iPhone ahead of an iPad, but the timings are currently vague enough for this to remain possible.Add 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Yorumlar ·0 hisse senetleri ·42 Views
  • Why The Modern Google Workspace Needs Unified Security
    thehackernews.com
    Mar 10, 2025The Hacker NewsData Protection / SaaS SecurityThe Need For Unified SecurityGoogle Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals are constantly evolving, finding ways to exploit misconfigurations, steal sensitive data, and hijack user accounts. Many organizations try to secure their environment by piecing together different security tools, hoping that multiple layers of protection will keep them safe. But in reality, this patchwork approach often creates blind spots, making it hardernot easierto defend against threats. To truly secure Google Workspace, businesses need a unified security strategy that offers complete protection without unnecessary complexity.The problem with most security solutions is that they only solve part of the puzzle. Point solutions, like tools that block malware or phishing attacks, might work well for a specific type of threat but fail to recognize suspicious user behavior, unauthorized data access, or configuration weaknesses. They operate in silos, addressing individual risks without considering the bigger picture. This means attackers can still slip through the cracks, exploiting gaps between different tools that don't communicate with each other.Some companies turn to broader security platforms, like Data Protection and SaaS Security Posture Management (SSPM) solutions, to cover more ground. While these tools provide high-level oversight and governance across multiple SaaS applications, they often lack the deep specialization needed for Google Workspace. Generic security controls can't always catch Workspace-specific threats, like insider misuse, improper file-sharing settings, or privilege escalation tactics that take advantage of Google's native features.Google Workspace does offer built-in security protections, but managing them effectively can be overwhelming. Many of these controls require constant configuration, monitoring, and fine-tuning to work at their best. Without dedicated security experts, organizations may struggle to set them up correctly, leaving potential gaps that cybercriminals can exploit. Simply put, the tools are therebut without the right expertise, they may not be enough.This fragmented security approach creates a perfect storm for attackers, who thrive on blind spots and misconfigurations. That's why organizations need a unified security solution designed specifically for Google Workspaceone that combines deep visibility, proactive threat detection, and seamless management. A truly effective security solution should not only detect and respond to threats in real-time but also provide proactive defense mechanisms to stop attacks before they happen.Most importantly, security shouldn't be a burden. A strong, unified security approach should be easy to manage, even for teams without dedicated security resources. By consolidating visibility, threat detection, compliance management, and incident response into a single, integrated solution, organizations can cut through the complexity and focus on what matterskeeping their data, users, and businesses safe.Cyber threats aren't slowing down, and attackers are becoming more sophisticated every day. A disjointed security strategy is no longer enough. To fully protect Google Workspace, businesses need an intelligent, comprehensive, and easy-to-manage approachone that keeps them ahead of threats without slowing the business operations down.A New Approach to Workspace SecuritySecuring Google Workspace requires a fundamentally different approach than securing traditional SaaS environments. Most security solutions available today focus on isolated threats: we have point solutions for blocking phishing emails, detecting misconfigurations, or monitoring for data leaks. But this piecemeal strategy leaves critical gaps: without context into the broader Workspace operation, point solutions will miss critical details and, as a result, be unable to detect certain threats. A unified approach is needed. One that delivers visibility and contextual awareness across the entire platform, deep integration into Workspace itself, and meaningful automation to enable remediation at machine speed. That's the only way to provide security that is comprehensive, scalable, and manageable.Years of experience securing Google Workspace have convinced us that an effective tool needs to be built on four key pillars:Comprehensive protection across the security lifecycle: We have decades of proof that perimeter security and inbound email security is simply not sufficient. There are too many ways for attackers to get in. Continuous protection across the entire lifecycle is critical: detect threats early, contain active incidents, respond quickly, and secure sensitive content even when credentials are compromised.Security that respects how people work: The cure can't be more painful than the problem it's solving. To effectively protect Workspace, a solution needs to fit seamlessly into the workflows of both the end users and how they work as well as the security team responsible for protecting the platform.Ability to scale without adding headcount: Budgets are tight and the cybersecurity talent gap remains. An effective solution provides effective automation that allows security teams to act much larger than they are while providing the capabilities and tools that allow small security teams to mature their operations faster than they'd otherwise be able.Dedicated Security for Workspace: Google Workspace isn't just another app: it's critical infrastructure. The Google infrastructure is overall very safe, but operationalizing its capabilities for modern business isn't straightforwardan effective Workspace security needs to simplify and strengthen Workspace's native capabilities without needing dedicated Workspace expertise on staff.The Future of Google Workspace SecurityGoogle Workspace security doesn't have to be a complicated patchwork of tools and manual oversight. The key to effective protection is a unified approachone that eliminates blind spots, connects security signals across your entire environment, and automates remediation to keep threats at bay without slowing down business operations.Material Security is built specifically for Google Workspace, providing deep visibility into every layer of your environmentemail, file sharing, user behavior, and security configurationsso you can detect and stop threats before they cause damage. By combining automated remediation, contextual threat detection, and seamless integration with Google's native security controls, Material ensures that your Workspace remains secure without adding unnecessary complexity to your security operations.Cyber threats are evolving, but your security strategy doesn't have to fall behind. See how Material Security can help you take a smarter, more effective approach to protecting Google Workspace. Learn more at material.security.Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Yorumlar ·0 hisse senetleri ·39 Views
  • What Will Be Quantum Computings Role in the Cloud?
    www.informationweek.com
    TechTarget and Informa Techs Digital Business Combine.TechTarget and InformaTechTarget and Informa Techs Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.What Will Be Quantum Computings Role in the Cloud?What Will Be Quantum Computings Role in the Cloud?As stakeholders in the cloud try their hands at developing quantum compute chips and related resources, is there a symbiotic evolution of tech in the making?Joao-Pierre S. Ruth, Senior EditorMarch 10, 2025Quantum computing may be a work in progress before it fully delivers on promises, but that is not stopping players in cloud computing from taking a hand in fleshing this space out.Microsoft's Majorana 1, Googles Willow, and AWS with Ocelet are examples of quantum chips from major players in cloud. Such an intersection of development can speak to mutual innovation, but also questions tied to both camps of technology.A lot of attention that surrounds quantum computing ties to the potential upheaval of cybersecurity. How much of that, if any, includes security in the cloud? Can quantum computing make the cloud more secure or less? Could the cloud lead to a democratization of access to quantum computing? Does industry want widespread access to quantum compute power?This episode of DOS Wont Hunt brought together James Kaplan, partner with McKinsey; Rich Salz, principal architect at Akamai; Matthew Keesan, vice president and general manager of quantum computing and platform with IonQ; and Daniella Pontes, quantum ambassador.They discussed those questions as well as should enterprises make an effort to be quantum-ready, AI-ready, as well as cloud-ready -- or does this become a point of confusion for CIOs?Listen to the full episode here.Related:Read more about:Quantum ComputingAbout the AuthorJoao-Pierre S. RuthSenior EditorJoao-Pierre S. Ruth covers tech policy, including ethics, privacy, legislation, and risk; fintech; code strategy; and cloud & edge computing for InformationWeek. He has been a journalist for more than 25 years, reporting on business and technology first in New Jersey, then covering the New York tech startup community, and later as a freelancer for such outlets as TheStreet, Investopedia, and Street Fight.See more from Joao-Pierre S. RuthWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    0 Yorumlar ·0 hisse senetleri ·41 Views
  • Rayner sets out plans to cut list of statutory consultees and reduce role in planning decisions
    www.bdonline.co.uk
    Proposals come ahead of publication of planning and infrastructure billThe government is proposing to overhaul the statutory consultee system in a bid to speed up the planning system.Under the new plans, organisations such as Sport England, Theatres Trust and The Gardens Trust will be removed from the list of statutory consultees.Source: MHCLG / FlickrAngela Rayner hosts a roundtable on the planning and infrastructure bill, flanked (on her right) by housing minister Matthew PennycookAccording to the government, the list of statutory consultees - official stakeholders legally required to provide advice on planning decisions - has grown haphazardly over time and now includes more than 25 organisations.It said that while consultees play an important role in the planning system, problems have been reported by councils, including consultees failing to engage proactively, submitting automatic holding objections which are later withdrawn, and re-opening issues that have been dealt with in local plans.The governments proposals will see the scope of these consultees narrowed to focus on heritage, safety and environmental protection.We need to reform the system to ensure it is sensible and balanced, and does not create unintended delays putting a hold on peoples lives and harming our efforts to build the homes people desperately need, said Angela Rayner, secretary of state in the Ministry of Housing, Communities and Local Government (MHCLG).New developments must still meet our high expectations to create the homes, facilities and infrastructure that communities need.According to MHCLG, disagreements from consultees forcedmore than 300 applications over the last three years to be escalated for consideration by the secretary of state.As well as shaking up the statutory consultee list, the department also wants planners to make better use of standing guidance instead of case-by-case responses and to clarify that authorities should only be consulting relevant bodies when necessary.It also plans to introduce a new performance framework, in which the chief executives of key statutory consultees report on their performance directly to Treasury and MHCLG Ministers.This Spring, it will consult on the impacts of its planned reforms to the consultee system.The announcement today comes ahead of the introduction of the governments Planning and Infrastructure Bill this week.According to reports in The Times, the bill could include measures to strip council planning committees of powers to decide all but the largest building schemes.Earlier this year, the government published a policy paper invitingviews on models for a national scheme of delegation, which would standardise the operation of planning committees, as well as the creation of smaller targeted planning committees specifically for strategic development and mandatory training for committee members.
    0 Yorumlar ·0 hisse senetleri ·41 Views
  • Allies & Morrisons plans for Cambridge manufacturing complex get go ahead
    www.bdonline.co.uk
    The scheme will support Cambridge's booming life sciences sectorThe two main buildings in the scheme's first phase, included in the application's detailed componentDrawing of the site, with the scheme's outline component on the right1/4show captionPlans for an Allies & Morrison-designed manufacturing complex in Cambridge have been approved by the local council.The 2.5ha Mercers Row scheme will consist of a cluster of mid-tech buildings supporting the supply chain of the citys growing life sciences industry.The hybrid application, designed for Cambridge city council and property developer Wrenbridge, envisages two main manufacturing buildings with sawtooth roofs and a pocket park in its detailed element.An outline element of the application would add a further 5,700sq m of commercial floorspace within a range of buildings as part of a second phase of construction.Councillors voted seven in favour for the applicationand none against, with one abstention, at a planning committee meeting last week.Drawing of the site, with the schemes outline component on the rightPlanning officers had recommended the scheme for approval ahead of the meeting, arguing it would have a positive visual impact and would result in high-quality, well-designed buildings and landscaping to replace an existing run-down area.Officers said the scheme would support growing demand for mid-tech floorspace in the city, which has seen a string of large life science apporvals in recent years including Allies & Morrisons 11,000sq m workspace at Cambridge Science Park.> Also read:Ministers pledge to double the size of the Oxford-Cambridge economy in boost for life sciences sectorOther major life sciences schemes in the city include Hawkins Browns 100m Coldhams Lane masterplan and a 139,000sq ft builidng at Merlin Place by HOK.The project team for Mercers Row includes Stantec on planning, heritage and landscape architecture, Sweco as acoustics consultant, KAM as cost consultant and Burrows Graham as structural and civil engineer. CMP Architects is executive architect.
    0 Yorumlar ·0 hisse senetleri ·41 Views