https://www.facebook.com/itzonepakistan
×

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2021
  • February 2021
  • December 2020
  • November 2020
  • April 2019

Categories

  • Business
  • DMS
  • Networking
  • Technology
  • Tips
  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

HOW TO SHOP

1 Login or create new account.
2 Review your order.
3 Payment & FREE shipment

If you still have problems, please let us know, by sending an email to support@website.com . Thank you!

SHOWROOM HOURS

Mon-Fri 9:00AM - 6:00AM
Sat - 9:00AM-5:00PM
Sundays by appointment only!
social sharing

SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!
IT Zone Pakistan
IT Zone Pakistan
QUESTIONS? CALL: 03144 166 777
  • LOGIN
  • SUPPORT

IT Zone Pakistan

IT Zone Pakistan

IT ZONE PAKISTAN – Secure Document Scanning, DMS Retrieval, Shredding Services & IT Recycling

T (31) 44 166 777
Email: sales@itzonepakistan.com

IT Zone Pakistan
II Chundriger Road Uni Plaza Karachi-Pakistan

Open in Google Maps
  • Home – IT Zone
  • About Us
  • Our Services
    • Office Paper Shredding Service – Free of Charge!
    • Document Scanning Services
    • Document Management Software
    • Office Computer Scrap Buying
  • Shop
  • BLOG & STORIES
    • EVENTS
  • Contact Us
  • MY CART
    No products in cart.
FREEQUOTE
  • Home
  • 2023
  • January
  • Page 17
August 4, 2025

Month: January 2023

From monolith to modular: How enterprise content management is evolving – Computerworld

Monday, 02 January 2023 by admin

Keith Shaw By Keith Shaw
Contributing Writer, Computerworld |
As digital technologies have transformed the way people create, move, and store their data over the decades, managing the multitude of physical documents and digital data produced by a company has remained an ongoing challenge for businesses. Technologies such as cloud-based apps and services, along with regulatory requirements around the storage and protection of customer data, have required companies to explore technology solutions for document and data management.
In earlier days, this meant investing in a document management system (DMS), which helped companies digitally store and manage paper-based and online documents. The rise of web-based technologies created content management systems (CMSes), which managed digitally created content, but also included formats such as audio, video, images, and HTML-based files.
Then enterprise content management (ECM) systems emerged, with ECM being a catch-all for a set of processes and tools that companies used to capture, store, protect, retrieve, and manage business information. Processes such as content lifecycle management, digital asset management, workflow management, information governance, and collaborative features joined the mix in managing documents, along with disaster recovery and advanced security features.
Although all these acronyms have remained in use to some extent, the lines between them have blurred over the years as vendors have added more capabilities. Today, managing content is less about the types of documents (physical versus digital, or format type) and more about whether the content is used in an internal- or external-facing fashion, said Holly Muscolino, group vice president for content strategies and future of work at IDC. The evolution of document management and content management systems has overlapped to the point where modern content systems can handle any document type, workflow, or process, she said.
That blurring and blending has continued, with traditional ECM applications and content-sharing and collaboration (CSC) applications converging in the cloud as more agile and scalable cloud content services. Hybrid work models spurred by the 2020 pandemic drove the need to scale access to content from anywhere. As a result, cloud content applications added artificial intelligence (AI), machine learning (ML), natural language processing (NLP), and analytics to help enterprises guide decision making and automate tasks across several business processes.
Indeed, Gartner has declared ECM dead and now calls the category content services platforms (CSPs). Rather than trying to store and manage all of a company’s information within a single platform, the CSP approach emphasizes using integrated apps and services to access, work with, and manage information wherever it resides.
 “CSPs provide a way for employees to retrieve and work with content in a modern, seamless way across devices and organizational boundaries,” the firm wrote in its 2021 report on the market. “As such, they are the core component of any organization’s digital workplace strategy.”
IDC, too, has noted the shift from single ECM platforms to a modular approach. “The content services term implies that instead of having a monolithic application that provided services that you may or may not need, and which never could satisfy every use case, they are modular — so your DevOps team or systems integrator can construct solutions that satisfy a number of use cases,” Muscolino said. “Because this can be integrated more easily, you’re not necessarily locked into specific technologies. That’s the vision. Some vendors have been able to execute on that better than others.”
Muscolino said newer vendors such as Box, as well as Alfresco and Nuxeo (both acquired by Hyland), were born in this area, with other traditional vendors in the space now looking to re-architect their offerings. In a 2019 vendor assessment on the worldwide SaaS and cloud-enabled content applications market, IDC also identified IBM, Microsoft, OpenText, Egnyte, Veeva, Citrix, Dropbox, and Oracle as major players in the market.
When looking at CSP systems, the Gartner report said, buyers “have many options that can enable them to truly implement an enterprise vision of content services,” thanks to advances in intelligence and cloud technologies. They are easier to procure, deploy, and implement than traditional ECM apps, with better designed UIs that allow users to “compose applications from the underlying microservices.”
However, Gartner cautioned that CSPs are rarely implemented as standalone solutions, as there is usually some existing content technology that a company is already using. “This may be seen as legacy by the organization, but it is always worth assessing the upgrade options of existing platforms,” Gartner said, since the costs of migrating and replatforming could be substantial.
The ability to integrate with existing enterprise applications such as ERP or CRM systems is also important. “The degree to which an application can be seamlessly integrated will have a big impact on adoption,” said Gartner in the report.
IDC’s Muscolino added that there are very few organizations that don’t have some sort of content management system in place already — even small companies are using free versions of Box, Dropbox, or Google to manage documents and files.
“What we’re seeing is a lot of modernization,” said Muscolino. “Most of the investment in these solutions is to modernize content management — they’re not necessarily greenfield installations.”
During its Ignite developer conference, Microsoft announced Microsoft Syntex, a unified content solution that brings together several services required to manage the content lifecycle within an organization. According to IDC, Syntex is an example of a new category of content solutions it refers to as a “Unified Content Model.”
“Cloud, artificial intelligence (AI), and new services-based architectures have made the legacy categories of capture, enterprise content management (ECM), content sharing and collaboration (CSC), digital asset management (DAM), and web content management (WCM) obsolete,” Muscolino wrote in a blog post announcing the new model. “These older labels refer to a set of use cases which are all supported by a common library of content services. These application categories made sense in the era of on-premises, standalone monolithic applications, but are cumbersome and inefficient in the context of the modern cloud and services architectures of the digital-first business.”
The new unified model proposed by IDC supports a common set of content-related services, such as version control, metadata generation and management, and secure access, as well as specialized services, such as image and video processing, governance, retention, and website translation, that can be utilized via low-code/no-code tools. This will allow companies to construct solutions for “any number of content-centric business use cases,” according to the firm.
The analyst firm said Microsoft Syntex is one of the first examples of this new technology category, and it expects to see other vendors follow suit with this approach.
Keith Shaw is a digital journalist and content creator with more than 20 years covering technology issues. He is currently host of Foundry’s “Today in Tech” show.
Copyright © 2022 IDG Communications, Inc.
Copyright © 2023 IDG Communications, Inc.

source

Read more
  • Published in Uncategorized
No Comments

Practice Innovations: No- or low-code approaches to legal case … – Thomson Reuters

Monday, 02 January 2023 by admin

Practice Innovations: No- or low-code approaches to legal case …  Thomson Reuters
source

Read more
  • Published in Uncategorized
No Comments

XBB COVID variant presents a unique threat: study – FierceHealthcare

Monday, 02 January 2023 by admin

XBB COVID variant presents a unique threat: study  FierceHealthcare
source

Read more
  • Published in Uncategorized
No Comments

Malware Analysis Market to Witness Surprising Growth of 5.54 … – GlobeNewswire

Sunday, 01 January 2023 by admin

September 12, 2022 11:00 ET | Source: Data Bridge Market Research Data Bridge Market Research
Pune, INDIA
LOS ANGELES, Sept. 12, 2022 (GLOBE NEWSWIRE) — Data Bridge Market research has a newly released expansive study titled “Global Malware Analysis Market” which guarantees you will remain better informed than your competition. This study provides a broader perspective of the marketplace with its comprehensive market insights and analysis which eases survival and success in the market. A complete overview of the industry has been presented via this Malware Analysis report which considers various aspects of product definition, market segmentation, and the existing retailer landscape. This market research report is produced by using integrated advancements and the latest technology to attain the most excellent results. It becomes easy to create sustainable and profitable business strategies by using helpful and actionable market insights covered in this Malware Analysis report. This market research report contains various parameters of this industry. These parameters range from industry outlook, currency, and pricing, value chain analysis, market overview, premium insights, and key insights to the company profile of the key market players.
Global Malware Analysis Market was valued at USD 5.54 billion in 2021 and is expected to reach USD 43.20 billion by 2029, registering a CAGR of 29.27% during the forecast period of 2022-2029. In addition to the market insights such as market value, growth rate, market segments, geographical coverage, market players, and market scenario, the market report curated by the Data Bridge Market Research team includes in-depth expert analysis, import/export analysis, pricing analysis, production consumption analysis, and pestle analysis.
Get a Sample PDF of Malware Analysis Market Research Report @ https://www.databridgemarketresearch.com/request-a-sample/?dbmr=global-malware-analysis-market
Market Overview: Malware Analysis
This Malware Analysis report provides details of new recent developments, trade regulations, import-export analysis, production analysis, value chain optimization, market share, the impact of domestic and localized market players, analyses opportunities in terms of emerging revenue pockets, changes in market regulations, strategic market growth analysis, market size, category market growths, application niches and dominance, product approvals, product launches, geographic expansions, technological innovations in the market. To gain more info on the malware analysis market contact Data Bridge Market Research for an Analyst Brief, our team will help you take an informed market decision to achieve market growth.
Opportunities
Growth and expansion of energy and utilities industry especially in the developing economies will present very many opportunities for the growth of the market. Additionally, the increasing trend of digitalization further offers numerous growth opportunities within the market. The increasing number of end users on a daily basis, both at large and small scale, and complete digitization of operations will also work in favor of the market.
A list of the leading companies operating in the Malware Analysis Market includes:
Key Benefits of the report:
Access Full Report@ https://www.databridgemarketresearch.com/checkout/buy/enterprise/global-malware-analysis-market
The analysis objectives of the report are:
Malware Analysis Market Drivers:
The increased acceptance of BYOD by businesses is causing the prevalence of mobile devices to grow quickly. Large amounts of data are saved on, transmitted to, and from mobile devices due to the diversity of applications, services, and functionalities accessible. Most of the information saved on mobile devices is private and includes passwords, credit card numbers, and usernames.
The adoption of government restrictions, an increase in the frequency of malware attacks, and the sophistication of attacks on various touchpoints are all expected to contribute to the malware analysis market’s growth throughout the forecast period. On the other hand, the increased demand for antivirus solutions to safeguard corporate applications and the prevalence of better infrastructure will create a number of chances for the growth of the malware analysis market throughout the estimated time.
Furthermore, the factors such as rising urbanization, industrialization and mounting awareness regarding the importance of malware analysis in the backward regions are some other important market drivers. Additionally, growing support by the government on the promotion of the technology and solutions and increasing per capita income are anticipated to drive the market’s growth rate.
Restraints/Challenges
Wireless communications and other systems require security, and it is anticipated that security concerns will grow more significant and pervasive across a wide range of devices. Price, power, performance, and consistency are a few of the numerous concerns while creating security solutions. A common security architecture continues to be difficult for most suppliers due to the diverse security requirements of device manufacturers. The process is even more complicated because the solution suppliers need content from security engineers and embedded system designers.
Dearth of expert knowledge and technical expertise and lack of awareness especially in the underdeveloped economies will create hurdles for the market in regards to the smooth growth in the market value. Additionally, dearth of technologically advanced infrastructure in the underdeveloped territories will further derail the market growth rate.
To Gain More Insights into the Market Analysis, Browse Summary of the Malware Analysis Market Report@ https://www.databridgemarketresearch.com/reports/global-malware-analysis-market
Global Malware Analysis Market Segmentations:
Component
Deployment Model
Organization Size
Industry Vertical:
Malware Analysis Market Regional Analysis/Insights
The countries covered in the Malware Analysis Market report are U.S., Canada and Mexico in North America, Brazil, Argentina and Rest of South America as part of South America, Germany, Italy, U.K., France, Spain, Netherlands, Belgium, Switzerland, Turkey, Russia, Rest of Europe in Europe, Japan, China, India, South Korea, Australia, Singapore, Malaysia, Thailand, Indonesia, Philippines, Rest of Asia-Pacific (APAC) in the Asia-Pacific (APAC), Saudi Arabia, U.A.E, South Africa, Egypt, Israel, Rest of Middle East and Africa (MEA) as a part of Middle East and Africa (MEA).
North America is flourishing its dominance in the global malware analysis market due to factors the ageing infrastructure, and growing number of research and development activities. Additionally, presence of major players in this region such as McAfee, LLC. (U.S.), AT&T Intellectual Property.  (U.S.), Juniper Networks, Inc. (U.S.), CrowdStrike (U.S.), Ziff Davis, Inc.  (U.S.), Lastline Inc. (U.S.) is also bolstering the growth of the market. 
The country section of the report also provides individual market impacting factors and changes in regulation in the market domestically that impacts the current and future trends of the market. Data points like down-stream and upstream value chain analysis, technical trends and porter’s five forces analysis, case studies are some of the pointers used to forecast the market scenario for individual countries. Also, the presence and availability of global brands and their challenges faced due to large or scarce competition from local and domestic brands, impact of domestic tariffs and trade routes are considered while providing forecast analysis of the country data.
Table of Content: Global Malware Analysis Market
Part 01: Executive Summary
Part 02: Scope of the Malware Analysis Market Report
Part 03: Global Malware Analysis Market Landscape
Part 04: Global Malware Analysis Market Sizing
Part 05: Global Malware Analysis Market Segmentation By Product
Part 06: Five Forces Analysis
Part 07: Customer Landscape
Part 08: Geographic Landscape
Part 09: Decision Framework
Part 10: Drivers and Challenges
Part 11: Market Trends
Part 12: Vendor Landscape
Part 13: Vendor Analysis
To Check the Complete Table Of Content Click Here @ https://www.databridgemarketresearch.com/toc/?dbmr=global-malware-analysis-market
Browse Related Reports:
About Data Bridge Market Research:
An absolute way to forecast what future holds is to comprehend the trend today!
Data Bridge Market Research set forth itself as an unconventional and neoteric Market research and consulting firm with unparalleled level of resilience and integrated approaches. We are determined to unearth the best market opportunities and foster efficient information for your business to thrive in the market. Data Bridge endeavours to provide appropriate solutions to the complex business challenges and initiates an effortless decision-making process. Data Bridge is an aftermath of sheer wisdom and experience which was formulated and framed in the year 2015 in Pune.
Data Bridge Market Research has over 500 analysts working in different industries. We have catered more than 40% of the fortune 500 companies globally and have a network of more than 5000+ clientele around the globe. Data Bridge adepts in creating satisfied clients who reckon upon our services and rely on our hard work with certitude. We are content with our glorious 99.9 % client satisfying rate.
Contact Us:-
Data Bridge Market Research
US: +1 888 387 2818
UK: +44 208 089 1725
Hong Kong: +852 8192 7475
Email:- corporatesales@databridgemarketresearch.com

source

Read more
  • Published in Uncategorized
No Comments

Document Management Market to Witness Growth Acceleration … – Digital Journal

Sunday, 01 January 2023 by admin

Hi, what are you looking for?
By
Published
Document Management

New Jersey, N.J., July 19, 2022 The Document Management Market research report provides all the information related to the industry. It gives the outlook of the market by giving authentic data to its client which helps to make essential decisions. It gives an overview of the market which includes its definition, applications and developments, and manufacturing technology. This Document Management market research report tracks all the recent developments and innovations in the market. It gives the data regarding the obstacles while establishing the business and guides to overcome the upcoming challenges and obstacles.
Document management is a system or process used to capture, track, and store electronic documents such as PDF files, word processing files, and digital images of paper content. Document management can save you time and money. The emergence of paperless offices and the need for increased efficiency is driving the growth of the market. Moreover, high scanning requirements to save space further fuel the growth.
Get the PDF Sample Copy (Including FULL TOC, Graphs, and Tables) of this report @:
https://www.a2zmarketresearch.com/sample-request/659738
Competitive landscape:
This Document Management research report throws light on the major market players thriving in the market; it tracks their business strategies, financial status, and upcoming products.
Some of the Top companies Influencing this Market include:eFileCabinet, Zoho Corporation, Microsoft, Google, Ascensio System SIA, Dropbox Business, Box, Adobe Systems, Evernote, M-Files, Office Gemini, Salesforce, Kofax, LSSP, Ademero, Konica Minolta, Lucion Technologies, Speedy Solutions, Blue Project Software, Templafy, SutiSoft, LogicalDOC, DocuXplorer Software, Laserfiche,
Market Scenario:
Firstly, this Document Management research report introduces the market by providing an overview which includes definition, applications, product launches, developments, challenges, and regions. The market is forecasted to reveal strong development by driven consumption in various markets. An analysis of the current market designs and other basic characteristics is provided in the Document Management report.
Regional Coverage:
The region-wise coverage of the market is mentioned in the report, mainly focusing on the regions:
Segmentation Analysis of the market
The market is segmented on the basis of the type, product, end users, raw materials, etc. the segmentation helps to deliver a precise explanation of the market
Market Segmentation: By Type
On-premise
Cloud-based
Market Segmentation: By Application
Government
Healthcare
BFSI
Others
For Any Query or Customization: https://a2zmarketresearch.com/ask-for-customization/659738
An assessment of the market attractiveness with regard to the competition that new players and products are likely to present to older ones has been provided in the publication. The research report also mentions the innovations, new developments, marketing strategies, branding techniques, and products of the key participants present in the global Document Management market. To present a clear vision of the market the competitive landscape has been thoroughly analyzed utilizing the value chain analysis. The opportunities and threats present in the future for the key market players have also been emphasized in the publication.
This report aims to provide:
Table of Contents
Global Document Management Market Research Report 2022 – 2029
Chapter 1 Document Management Market Overview
Chapter 2 Global Economic Impact on Industry
Chapter 3 Global Market Competition by Manufacturers
Chapter 4 Global Production, Revenue (Value) by Region
Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions
Chapter 6 Global Production, Revenue (Value), Price Trend by Type
Chapter 7 Global Market Analysis by Application
Chapter 8 Manufacturing Cost Analysis
Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers
Chapter 10 Marketing Strategy Analysis, Distributors/Traders
Chapter 11 Market Effect Factors Analysis
Chapter 12 Global Document Management Market Forecast
Buy Exclusive Report @: https://www.a2zmarketresearch.com/checkout
Contact Us:
Roger Smith
1887 WHITNEY MESA DR HENDERSON, NV 89014
[email protected]
+1 775 237 4157

Related Reports:
Biodegradable Bubble Wrap Market to Witness Growth Acceleration | Automated Packaging Systems, AP Packaging, Dana Poly
Utility Locator Market with Tremendous growth by 2029 Vivax-Metrotech, The Charles Machine Works, Radiodetection
Communications-based Train Control (CBTC) Market See Huge Growth for New Normal | Thales, Hitachi, Alstom
Intelligent Driving Solutions Market Scope and overview, To Develop with Increased Global Emphasis on Industrialization 2029 | Mobileye, Nvidia, Huawei
Pedestrians AEB System Market Report Covers Future Trends with Research 2022-2029 | ZF TRW, Continental AG, DENSO Corporation
Neuromuscular Stimulators Market to Witness Growth Acceleration | Medtronic, Boston Scientific, St. Jude Medical
Pancreatic Stone Protein Testing Market Is Booming Worldwide RayBiotech, Inc., Thermo Fisher Scientific
Cardiac Catheter Sensors Market to See Booming Growth GE Healthcare, Medtronic PLC, Honeywell International
Sperm Analysis System Market Growing Massively by QingHua TongFang, Hamilton Thorne Inc, Stormoff
Biodegradable Bubble Wrap Market to Witness Growth Acceleration | Automated Packaging Systems, AP Packaging, Dana Poly0
comtex tracking
COMTEX_410512915/2769/2022-07-19T08:22:27

The Vienna Philharmonic New Year concerts are a magical tradition, entertaining audiences and heralding the New Year. The 2023 event is no exception.
IT teams must act on intelligence from all the data that businesses collect and generate.
The art of the cocktail in Cuba really exploded 100 years ago under prohibition in the United States.
Viktoria Lukovenko was making a salad for a New Year’s Eve party when explosions overhead sent her running for cover in a Kyiv metro.
COPYRIGHT © 1998 – 2022 DIGITAL JOURNAL INC. Sitemaps: XML / News . Digital Journal is not responsible for the content of external sites. Read more about our external linking.

source

Read more
  • Published in Uncategorized
No Comments

iPadOS 16 takes the versatility of iPad even further – Apple

Sunday, 01 January 2023 by admin

Text of this article
June 6, 2022
PRESS RELEASE
iPadOS 16 takes the versatility of iPad even further with powerful new productivity and collaboration features
Introducing an entirely new multitasking experience with Stage Manager and full external display support, new ways to collaborate via Messages, big updates to Mail and Safari, iCloud Shared Photo Library, pro features including Reference Mode and Display Zoom, and more
CUPERTINO, CALIFORNIA Apple today previewed iPadOS 16, a major update that makes the iPad experience even more versatile. Taking advantage of the power of the M1 chip, Stage Manager brings a new way to multitask with multiple overlapping windows and full external display support. Collaboration is easier than ever with new ways to start working with others in apps across the system using Messages, and the new Freeform app provides a flexible canvas to brainstorm on together. New tools in Mail help users be more productive, Safari adds shared Tab Groups to browse the web with others, and the browsing experience gets even more secure with passkeys. The new Weather app takes full advantage of the stunning iPad display, and Live Text now interacts with text in video. New pro features — including Reference Mode and Display Zoom — make iPad an even more powerful mobile studio. Combined with the power of Apple silicon, iPadOS 16 makes it faster and easier to get more done on iPad.
“iPad is our most versatile device, and we’re excited to take what it can do even further with iPadOS 16,” said Craig Federighi, Apple’s senior vice president of Software Engineering. “With Stage Manager, which takes multitasking on iPad to a whole new level, plus new ways to share and collaborate via Messages, Safari, and the new Freeform app, and new pro features like Reference Mode and Display Zoom, users can get even more done on iPad.”
New Ways to Share and Connect in Messages
New features in Messages make it easy to start collaborating and manage shared content across Files, Keynote, Numbers, Pages, Notes, Reminders, and Safari, as well as third-party apps. When users send an invitation to collaborate via Messages, everyone on the thread is automatically added to the document, spreadsheet, or project. When someone makes a change to a shared file, everyone can see updates right at the top of the Messages thread. And when a user is working on a collaborative project, they can easily jump into the associated Messages conversation or just tap to start a FaceTime call with their collaborators.
iPadOS 16 makes everyday messaging even better. Users can now edit or recall recently sent messages, recover recently deleted messages, and mark conversations as unread so they can come back to them later.1 Additionally, users can now begin a SharePlay session via Messages, so they can choose a shared activity — like a movie, TV show, workout, or game — and enjoy it together in sync while chatting via Messages.
A Real-Time Collaboration Space Using Freeform
Freeform, a powerful new collaboration app with a flexible canvas, gives users the ability to see, share, and collaborate all in one place without worrying about layouts and page sizes, and with full support for Apple Pencil. Users can view others’ contributions as they add content or make edits, all while enjoying a real-time collaboration space. Coming to iPadOS 16 later this year, Freeform allows collaborators to start a session from FaceTime and see the updates from others right in the Messages thread.
Mail Introduces New Smart Tools
Being more productive is easier than ever with new tools introduced in Mail. Users are given a moment to cancel delivery of a message before it reaches a recipient’s inbox,2 schedule emails to be sent at the perfect moment, and move sent emails to the top of their inbox to quickly send a follow-up. Messages can also be resurfaced at any date and time with Remind Later, and users can get notified if they forget to include an important part of the message, like an attachment or recipient. Additionally, an all-new search experience delivers more complete and accurate results by correcting typos and using synonyms for the search terms, and allows users to see a richer view of contacts, shared content, and more.
Relive Memories with the New iCloud Shared Photo Library
iCloud Shared Photo Library is the easiest way to share photos seamlessly and automatically among up to six family members, so everyone can collaborate and enjoy the collection in Memories, Featured Photos, and the Photos widget. Users can share all their past photos, or use setup tools to contribute specific photos based on a start date or people in the photos. Photos can be added to the collection manually, or through Bluetooth proximity or sharing suggestions in For You. When anyone in the Shared Library adds, edits, or deletes photos, the library is updated for everyone.
New Collaboration and Security Features Come to Safari
Safari gets big updates, making it even more collaborative, customizable, and secure. Shared Tab Groups allow users to collaborate on a set of tabs with friends and see updates instantly while they work together, share tabs and bookmarks, and start a conversation right from Safari. Tab Groups get dedicated start pages that can be customized with a background image, bookmarks, and unique sections everyone can see and edit.
Browsing in Safari is even more secure with passkeys, an easier and safer sign-in method designed to replace passwords on the web and in apps. Passkeys are kept on iPad and are specific to the sites users create them for. And since passkeys are unique digital keys that stay on device and are never stored on a web server, hackers can’t leak them or trick users into sharing them. Users can sign in to websites or apps on Apple and non-Apple devices with their saved passkey by scanning the QR code with iPad, and using Face ID or Touch ID to authenticate.
The Weather App Comes to iPad
Designed to take full advantage of the stunning display, Weather comes to iPad with beautiful animations. With just a tap, users can see the most important weather information, or explore maps to check precipitation, air quality, and temperature. Users can also be notified when a severe weather alert is issued in their area, or check the air quality using a color-coded scale.
Live Text and Visual Look Up Get Powerful Updates
Using on-device intelligence, Live Text recognizes text in images across the system, and the feature now comes to video, making text completely interactive in paused video frames. With a single tap on a video, users can quickly translate languages or convert currencies. And Visual Look Up now allows users to lift the subject from an image or isolate a subject by removing the background with just a tap, and expands its recognition capabilities to birds, insects, statues, and more.
Pro Features Take Demanding Workflows Even Further
iPadOS 16 brings new powerful features that make iPad Pro an indispensable tool for creative professionals. Reference Mode enables the 12.9-inch iPad Pro with Liquid Retina XDR display to match the color requirements in workflows like review and approve, color grading, and compositing, where accurate colors and consistent image quality are critical.
Powered by the performance of the Apple-designed M1 chip, Display Zoom now allows users to increase the pixel density of the display so they can view more in their apps, which is especially useful when using Split View. With Virtual Memory Swap, iPad storage can be used to expand the available memory for all apps, and delivers up to 16 gigabytes of memory for the most demanding apps, helping to make multitasking absolutely seamless.
Powerful Multitasking with Stage Manager and Full External Display Support
Stage Manager is an entirely new multitasking experience that automatically organizes apps and windows, making it quick and easy to switch between tasks. For the first time on iPad, users can create overlapping windows of different sizes in a single view, drag and drop windows from the side, or open apps from the Dock to create groups of apps for faster, more flexible multitasking. The window of the app users are working on is displayed prominently in the center, and other open apps and windows are arranged on the left-hand side in order of recency.
Available on iPad Pro and iPad Air with the M1 chip, Stage Manager also unlocks full external display support with resolutions of up to 6K, so users can arrange the ideal workspace, and work with up to four apps on iPad and four apps on the external display.
Additional iPadOS 16 Features
Availability
The developer preview of iPadOS 16 is available to Apple Developer Program members at developer.apple.com starting today, and a public beta will be available to iPadOS users next month at beta.apple.com. New software features will be available this fall as a free software update for iPad (5th generation and later), iPad mini (5th generation and later), iPad Air (3rd generation and later), and all iPad Pro models. For more information, visit apple.com/ipados/ipados-preview. Features are subject to change. Some features may not be available in all regions or all languages.
About Apple
Apple revolutionized personal technology with the introduction of the Macintosh in 1984. Today, Apple leads the world in innovation with iPhone, iPad, Mac, Apple Watch, and Apple TV. Apple’s five software platforms — iOS, iPadOS, macOS, watchOS, and tvOS — provide seamless experiences across all Apple devices and empower people with breakthrough services including the App Store, Apple Music, Apple Pay, and iCloud. Apple’s more than 100,000 employees are dedicated to making the best products on earth, and to leaving the world better than we found it.
Press Contacts
Apple Media Helpline
media.help@apple.com
(408) 974-2042
Images in this article
Apple revolutionized personal technology with the introduction of the Macintosh in 1984. Today, Apple leads the world in innovation with iPhone, iPad, Mac, Apple Watch, and Apple TV. Apple’s five software platforms — iOS, iPadOS, macOS, watchOS, and tvOS — provide seamless experiences across all Apple devices and empower people with breakthrough services including the App Store, Apple Music, Apple Pay, and iCloud. Apple’s more than 100,000 employees are dedicated to making the best products on earth, and to leaving the world better than we found it.
Apple Media Helpline

media.help@apple.com
(408) 974-2042
The latest news and updates, direct from Apple.
Read more

source

Read more
  • Published in Uncategorized
No Comments

Best Document Management Systems for 2023 – The Motley Fool

Sunday, 01 January 2023 by admin

If you’re on a Galaxy Fold, consider unfolding your phone or viewing it in full screen to best optimize your experience.
Credit Cards
Banks
Brokers
Crypto
Mortgages
Insurances
Loans
Small Business
Knowledge
Taking content and document management from the physical world to the digital is a necessity. This may sound like an enormous undertaking, but document management systems make this transfer much more efficient. Choose the right solution, and your organization can make the digital leap quickly and easily.
Cluttered file cabinets are so yesterday. To keep your organization secure and operating efficiently, you must migrate data and digitalize your documents. The right document management system makes all the difference for easy and intuitive document storing, sharing, and editing.
But like a Cinderella slipper, there is no one-size-fits-all system. You can choose from many excellent document management solutions, each fulfilling different specialties. What will work best for you depends on your business needs, budget, and the features you want. Keep those in mind as your browse our top picks below!
DocSend is known for its ease of use and integration capabilities. There’s no confusing back end architecture, as DocSend syncs easily into your existing framework. It syncs with other common platforms such as Microsoft Office or Google, so you can use DocSend to share files internally and store data directly from your desktop.
It keeps information secure with customizable permissions. For example, you can require email verification or set visibility access to expire after a certain amount of time.
DocSend has a small learning curve. Plans start at $10/month per user, placing DocSend in a mid-range price point compared to other systems.

Customized share permissions protects your data. Image source: Author
Bloomerang is a donor management system with extensive options for record-keeping and an array of supporting features that can help nonprofits who don’t want to build a stack of different tools. This platform is great for tracking all the important information you need to know about donors, volunteers, and other supporters.
Besides creating in-depth constituent records, Bloomerang empowers you with reporting features that help you make sense of the data. You can choose from tons of report templates or use their step-by-step process to build your own report. Because Bloomerang is cloud-based, you can always pull the most up-to-date entries or specify specific date ranges.
When it comes to donor communications and engagement, you can create and manage both email and direct mail letters. Bloomerang comes with a variety of letter and email templates to cover all the most common nonprofit needs. Their Twitter Listening Hub is a clever bonus feature, allowing you to dip your toes into social media monitoring.
For startups or small nonprofits, Bloomerang’s website integration features can empower you to collect important details (and donations). You can create forms in Bloomerang and embed them on your own website. Then all the information collected goes right into your database. More mature organizations, however, might need greater flexibility or more advanced functionalities from their donation pages.
With many pricing tiers (all of which include unlimited users), Bloomerang software can work with any budget. But the many tiers, based on number of records and file storage, could be a hassle for rapidly growing organizations. Bloomerang’s free tier and special small shop pricing might be just what a budding nonprofit founder needs.
Box excels at the basics: uploading and sharing documents and editing files online. It sets up basic workflows, much like task managers available in organization apps, so you can track document edits, progress, views, etc.
You can create multiple logins for internal use or share files with external guests. You can extend editing permissions to select guests.
Speaking of sharing, Box makes it easy. Click the dots beside a document’s name to access tools to download a document or create a direct link for sharing.
Each link can have customized access, ranging from basic viewing to editing abilities.

Box options make sharing simple. Image source: Author
If you want free document management software, Box offers a $0 plan for solo users. From there, the first paid option is still affordable, starting at $5/month per user, for 3-10 users.
M-Files follows a unique, straightforward principle and classifies information by the “what” of its content rather than the “where” of its folder storage, resulting in more intuitive document storage and searching. You are likely to find the document you want much more quickly.
It also uses autosave to ensure that content is not lost as you are updating and editing, and background updates keep everything current.
M-Files centralized storage offers a dynamic view of your entire organization. Content is automatically organized by type and associations, so you can search for what you need with a high-level view into storage.

Find what you’re looking for when you can search by content by type without rummaging through folders. Image source: Author
eFileCabinet keys on efficiency, with a streamlined system, focused around a central solution. It is a one-stop-shop for digital document management, providing easy document archiving, data migrations, and ongoing maintenance.
eFileCabinet is an excellent choice for small and medium businesses because of its easy setup and straightforward interface.
eFileCabinet uses an open API (application programming interface), which means you can connect with your current office system, alleviating a lot of integration headaches.
Just drag and drop files from your desktop into the app, and they are automatically uploaded to eFileCabinet’s library.

Save time and desktop space by uploading simply with Sidekick. Image source: Author
You can also audit a file’s history with an open admin view, or create custom links for doc tracking to keep tabs on who has accessed which files and when.
Ademero Content Central is a highly customizable platform with many useful features and an easy-to-use interface. Besides handling storing and file sharing basics, Ademero Content Central is known for its zonal recognition capabilities.
It uses optical character recognition (OCR) to scan and populate predetermined areas of documents, saving you a lot of time.
It also developed QCards. QCards are like document cover pages produced internally in Ademero Content Central with barcodes. They are used to quickly identify the document type being created (or uploaded), and the crucial fields a user has added.

QCards store information in barcodes to manage data more efficiently. Image source: Author
If your system needs to do more than simply store and send out documents, Ademero Content Central has premade templates you can use.
Its centralized storage system searches for documents, both stored (master copies) and edited (revised as a team or by individuals). Pricing starts at $35/month per user.
Microsoft SharePoint file management software integrates seamlessly with your Microsoft software. You can customize its look and incorporate your company’s branding.
SharePoint works well for co-authors, allowing many people to work in a document at once, and you can extend guest access.
Most external links are “view only” shares, but some plans let you offer other abilities to people outside your organization.

Set up customizable guest accesses and permissions from the settings dashboard. Image source: Author
Pricing is reasonable, starting at just $5/month per user and going up to $20/month per user. The base option gives you an ample 1 TB of storage, so you shouldn’t run out of space.

Each software option must meet a few basic criteria to be considered a top choice.
Sensitive information and confidential documents are par for the course with data storage, so every option must be secure. Each software option should be encrypted and have other security options such as assigned permissions, password-protected links, two-factor authentication, etc.
Collaboration is one of main reasons for using document management software. Since files are shared among teams and companies, they must have editing abilities to match.
A document management system is unsuitable if it can’t be integrated with your existing software. A good system fits into the day-to-day of your workforce and makes your life easier, not harder.
Going digital comes with plenty of benefits that staying offline simply can’t provide.
History reporting shows you who accessed files, when they opened them, and what was changed. Looking at revision history protects original data while logs provide user accountability.
With paper files, you risk something being misplaced, stolen, mishandled. Digital files have encrypted security and are much easier to access by those with the right credentials while being hidden from other users.
Whether it is a proposal, a contract, or a flyer, if multiple people need to touch a file at some point, it’s going to be faster via digital workflows than any other method. With all necessary authors having access in one place, tasks can be completed efficiently.
Rose Wheeler is a seasoned writer and content manager with more than 15 years of experience. She specializes in content related to digital marketing, small business, personal finance, and CMS. Her work has appeared on sites such as Selz, The Cheat Sheet, and Swaay. When she’s not working with her awesome clients, Rose enjoys cooking, playing games and curling up with a good book.
We’re firm believers in the Golden Rule, which is why editorial opinions are ours alone and have not been previously reviewed, approved, or endorsed by included advertisers. The Ascent does not cover all offers on the market. Editorial content from The Ascent is separate from The Motley Fool editorial content and is created by a different analyst team. The Motley Fool has a Disclosure Policy. The Author and/or The Motley Fool may have an interest in companies mentioned.
The Ascent is a Motley Fool service that rates and reviews essential products for your everyday money matters.
Copyright © 2018 – 2022 The Ascent. All rights reserved.

source

Read more
  • Published in Uncategorized
No Comments

Formpipe is using Microsoft Dynamics to transform document … – Technology Record

Sunday, 01 January 2023 by admin

Documents are the bread and butter of business. In an increasingly digital world, it is easy for companies to get lost in the huge volumes of invoices, PDFs or other types of documents.
To help businesses address this challenge, document management expert Formpipe has created DM for Dynamics, a specialised new interface that connects a user’s Formpipe Autoform DM digital repository with Microsoft Dynamics 365.
Autoform DM is an electronic document management system which provides users with secure storage, configurability and easy access to all their documents. “With DM, you can store any file type, including data, documents, video files and audio files,” says Ben Saxton, head of customer success at Formpipe. “Everything is safe and secure. It’s stored following International Organization for Standardization (ISO) best practices and the object’s metadata is stored alongside it. It’s also very easy for employees to view or access the content if they need to do so.”
According to Saxton, the new interface will pull the DM product into Dynamics, bringing it closer to the core platforms already familiar to Dynamics customers. He cites the example of a finance operative that relies heavily on Dynamics in its day-to-day operations. “Users will now be able to easily store, search for and retrieve documents generated by both Dynamics and all other systems within their standard finance and operations (F&O) interface, without switching systems or screens,” he says. “This saves them time and removes the hassle of using multiple platforms.
“It is all about usability. We will provide those using the Dynamics platform – whether they be in customer experience or F&O – with a complete 360-degree view of that one particular query without having to change displays or adapt to a new system.”
The new solution will also provide customers with multiple other benefits, including an overview of all data in one place, a reduction of the technical debt often associated with ungoverned repositories, and the ability for administrators to control governance requirements around document management.
“Essentially, DM for Dynamics will offer users three key things,” says Saxton. “These are: ease of access to all files and documents, lifetime configurability with the tools needed to continually construct new uses for the product, and secure storage providing users with peace of mind.”
In addition to these capabilities, Saxton highlights the ability to build new applications that provide document search and retrieval based on a business’s metadata. “That’s absolutely paramount and that’s what we focus on,” he says.
Another key feature allows users to quickly and easily import documents from their local machine into a controlled repository. “This will automatically sort that document to a particular content type and then wrap all of the functions that we require around that content type,” Saxton explains.
With compliance an important factor in document management, DM for Dynamics adheres to ISO 27001 retention policies, which informs what happens at the end of a retention period and how that content is treated.
The concept behind the new interface was driven by market requirements and builds on the success of Formpipe’s Lasernet output within the Dynamics market. According to Saxton, the project has been significantly requested by partners and end users, and, as such, has been in the works for some time.
“We've been in the Dynamics market right since the days of AX2009,” he says. “So, we’ve been talking about this for a long time, but we’ve really accelerated our efforts over the last couple of years to pull our products closer to those core platforms, whether that be core banking, enterprise resource planning or customer relationship management. As document management specialists, we knew that we needed to bring that functionality into Dynamics to make it easier for the end user. That’s why we’re so excited about what we’ve been able to produce.” 
This article was originally published in the Autumn 2022 issue of Technology Record. To get future issues delivered directly to your inbox, sign up for a free subscription.
Number of views (1163)/Comments (–)

source

Read more
  • Published in Uncategorized
No Comments

Applications for artificial intelligence in Department of Defense cyber … – Microsoft

Sunday, 01 January 2023 by admin

May 3, 2022 | Microsoft Corporate Blogs
Editor’s note: On May 3 Eric Horvitz, Chief Scientific Officer, testified before the U.S. Senate Armed Services Committee Subcommittee on Cybersecurity for a hearing on the use of AI in Department of Defense cyber missions. Read Eric Horvitz’s written testimony below and watch the hearing here.
 
Chairman Manchin, Ranking Member Rounds, and Members of the Subcommittee, thank you for the opportunity to share insights about the impact of artificial intelligence (AI) on cybersecurity. I applaud the Subcommittee for its foresight and leadership in holding a hearing on this critically important topic. Microsoft is committed to working collaboratively with you to help ensure new advances in AI and cybersecurity benefit our country and society more broadly.
My perspective is grounded in my experiences working across industry, academia, scientific agencies, and government. As Microsoft’s Chief Scientific Officer, I provide leadership and perspectives on scientific advances and trends at the frontiers of our understandings, and on issues and opportunities rising at the intersection of technology, people, and society. I have been pursuing and managing research on principles and applications of AI technologies for several decades, starting with my doctoral work at Stanford University. I served as a Commissioner on the National Security Commission on AI (NSCAI), was president of the Association for the Advancement of Artificial Intelligence (AAAI), chaired the Section on Computing, Information, and Communication of the American Association for the Advancement of Science (AAAS). I am a member of the National Academy of Engineering (NAE) and the American Academy of Arts and Sciences. I currently serve on the President’s Council of Advisors on Science and Technology (PCAST) and on the Computer Science and Telecommunications Board (CSTB) of the National Academies of Sciences.
I will cover in my testimony four key areas of attention at the intersection of AI and cybersecurity that warrant deeper understanding and thoughtful action:
Before covering these topics, I will provide brief updates on the cybersecurity landscape and on recent progress in AI. I’ll conclude my testimony with reflections about directions.
1. Cybersecurity’s changing landscape
Attacks on computing systems and infrastructure continue to grow in complexity, speed, frequency, and scale. We have seen new attack techniques and the exploitation of new attack surfaces aimed at disrupting critical infrastructure and accessing confidential data.[1] In 2021 alone, the Microsoft 365 Defender suite, supported by AI techniques, blocked more than 9.6 billion malware threats, 35.7 billion phishing and malicious emails, and 25.6 billion attempts to hijack customer accounts targeting both enterprise and consumer devices.[2],[3] Multiple independent reports have characterized the nature and status of different forms of cyberattack.[4] As detailed in Microsoft’s recent Digital Defense Report,[5] cyber criminals and nation-state actors continue to adapt their techniques to exploit new vulnerabilities and counter cyber defenses.
To help mitigate these concerning trends, the U.S. government has taken significant steps forward to secure our cyber ecosystem. Congress enacted several recommendations that came out of the Cyberspace Solarium Commission, such as creating the Office of the National Cyber Director and enacting cyber incident reporting legislation. Almost a year ago, the Administration issued Executive Order (E.O.) 14028, Improving the Nation’s Cybersecurity, which directs agencies to develop and implement a variety of initiatives to raise the bar on cybersecurity across areas, such as supply chain security, and requiring agencies to adopt a zero-trust model. Microsoft has worked diligently to meet deadlines specified in the E.O. on cybersecurity and we support these efforts to encourage a cohesive response to evolving cyber threats.
We expect to face continuing efforts by creative and tireless state and non-state actors who will attempt to attack computing systems with the latest available technologies. We need to continue to work proactively and reactively to address threats and to note changes in systems, technologies, and patterns of usage. On the latter, cybersecurity challenges have been exacerbated by the increasing fluidity between online work and personal activities as daily routines have become more intertwined.[6] The large-scale shift to a paradigm of hybrid work coming with the COVID-19 pandemic has moved workers further away from traditional, controlled environments. Cybersecurity solutions must enable people to work productively and securely across various devices from a variety of non-traditional locations.
2. Advancements in Artificial Intelligence
Artificial intelligence is an area of computer science focused on developing principles and mechanisms to solve tasks that are typically associated with human cognition, such as perception, reasoning, language, and learning. Numerous milestones have been achieved in AI theory and applications over the 67 years since the phrase “artificial intelligence” was first used in a funding proposal that laid out a surprisingly modern vision for the field.[7]
Particularly stunning progress has been made over the last decade, spanning advances in machine vision (e.g., object recognition), natural language understanding, speech recognition, automated diagnosis, reasoning, robotics, and machine learning—procedures for learning from data. Many impressive gains across subdisciplines of AI are attributed to a machine learning methodology named deep neural networks (DNNs). DNNs have delivered unprecedented accuracy when fueled by large amounts of data and computational resources.
Breakthroughs in accuracy include performances that exceed human baselines for a number of specific benchmarks, including sets of skills across vision and language subtasks. While AI scientists remain mystified by the powers of human intellect, the rate of progress has surprised even seasoned experts.
Jumps in core AI capabilities have led to impressive demonstrations and real-world applications, including systems designed to advise decision makers, generate textual and visual content, and to provide new forms of automation, such as the control of autonomous and semi-autonomous vehicles.
AI technologies can be harnessed to inject new efficiencies and efficacies into existing workflows and processes. The methods also can be used to introduce fundamentally new approaches to standing challenges.  When deployed in a responsible and insightful manner, AI technologies can enhance the quality of the lives of our citizenry and add to the vibrancy of our nation and world.  For example, AI technologies show great promise in enhancing healthcare via providing physicians with assistance on diagnostic challenges, guidance on optimizing therapies, and inferences about the structure and interaction of proteins that lead to new medications.
AI advances have important implications for the Department of Defense, our intelligence community, and our national security more broadly. Like any technology, the rising capabilities of AI are available to friends and foes alike. Thus, in addition to harnessing AI for making valuable contributions to people and society, we must continue to work to understand and address the possibilities that the technologies can be used by malevolent actors and adversaries to disrupt, interfere, and destroy. AI has important implications for cybersecurity as the technologies can provide both new powers for defending against cyberattacks and new capabilities to adversaries.
3. Advancing Cybersecurity with AI
The value of harnessing AI in cybersecurity applications is becoming increasingly clear. Amongst many capabilities, AI technologies can provide automated interpretation of signals generated during attacks, effective threat incident prioritization, and adaptive responses to address the speed and scale of adversarial actions. The methods show great promise for swiftly analyzing and correlating patterns across billions of data points to track down a wide variety of cyber threats of the order of seconds. Additionally, AI can continually learn and adapt to new attack patterns—drawing insights from past observations to detect similar attacks that occur in the future.
3.1 Assisting and Complementing Workforce
 The power of automation and large-scale detection, prioritization, and response made possible by AI technologies can not only relieve the burden on cybersecurity professionals but also help with the growing workforce gap. On the challenges to current cyber workforce: the U.S. Bureau of Labor Statistics estimates cybersecurity job opportunities will grow 33% from 2020 to 2030—more than six times the national average.[8] However, the number of people entering the field is not keeping pace. There is a global shortage of 2.72 million cybersecurity professionals, according to the 2021 (ISC)2 Cybersecurity Workforce Study released in October 2021.[9]
 Organizations that prioritize cybersecurity run security operations teams 24/7. Still, there are often far more alerts to analyze than there are analysts to triage them, resulting in missed alerts that evolve into breaches. Trend Micro released a survey in May 2021 of security operations center decision makers that showed that 51% feel their team is overwhelmed with the overall volume of alerts, 55% are not confident in their ability to efficiently prioritize and respond to alerts, and that 27% of their time is spent dealing with false positives.[10]
AI technologies enable defenders to effectively scale their protection capabilities, orchestrate and automate time-consuming, repetitive, and complicated response actions. These methods can enable cybersecurity teams to handle large volumes of classical threats in more relevant time frames with less human intervention and better results. Such support with scaling on the essentials can free cybersecurity professionals to focus and prioritize on those attacks that require specialized expertise, critical thinking, and creative problem solving. However, additional attention should also be given to general cybersecurity training, security awareness, secure development lifecycle practices, and simulated training modules, including using AI to run intelligent and personalized simulations.
3.2 AI at Multiple Stages of Security
Today, AI methods are being harnessed across all stages of security including prevention, detection, investigation and remediation, discovery and classification, threat intelligence, and security training and simulations. I will discuss each of these applications in turn.
Prevention. Prevention encompasses efforts to reduce the vulnerability of software to attack, including user identities and data, computing system endpoints, and cloud applications. AI methods are currently used in commercially available technologies to detect and block both known and previously unknown threats before they can cause harm. In 2021, AV-Test Institute observed over 125 million new malware threats.[11] The ability of machine learning techniques to generalize from past patterns to catch new malware variants is key to being able to protect users at scale.
As an example, last year Microsoft 365 Defender successfully blocked a file that would later be confirmed as a variant of the GoldMax malware. Defender had never seen the new variant of GoldMax. The malware was caught and blocked leveraging the power of an AI pattern recognizer working together with a technology known as “fuzzy hashing”—a means for taking a fingerprint of malware.[12] It is important to note that GoldMax is malware that persists on networks, feigning to be a “scheduled task” by impersonating the activities of systems management software. Such hiding out as a scheduled task is part of the tools, tactics, and procedures of NOBELIUM, the Russian state actor behind the attacks against SolarWinds in December 2020 and which the U.S. government and others have identified as being part of Russia’s foreign intelligence service known as the SVR.
In other work, we have found that AI methods can improve our ability to detect sophisticated phishing attacks. Phishing attacks center on social engineering, where an attacker creates a fake webpage or sends a fraudulent message designed to trick a person into revealing sensitive data to the attacker or to deploy malicious software on the victim’s device, such as ransomware. To help protect people from harmful URLs, AI pattern recognizers have been deployed in browsers and other applications as part of their security services. AI methods can improve detection while lowering false positive rates, which can frustrate end users.[13]
Detection. Detection involves identifying and alerting suspicious behaviors as they happen. The goal is to quickly respond to attacks, including identifying the scale and scope of an attack, closing the attacker’s entry, and remediating footholds that the attacker may have established. The key challenge with detecting suspicious activity is to find the right balance between providing enough coverage via seeking high rates of accurate security alerts versus false alarms. AI methods are being leveraged in detection to (1) triage attention to alerts about potential attacks, (2) identify multiple attempts at breaches over time that are part of larger and lengthier attack campaigns, (3) detecting fingerprints of the activities of malware as it operates within a computer or on a network, (4) identifying the flow of malware through an organization,[14] and (5) guiding automated approaches to mitigation when a response needs to be fast to stop an attack from propagating. For example, an automated system can shut down network connectivity and contain a device if a sequence of alerts is detected that is known to be associated with ransomware activity like the way a bank might decline a credit card transaction that appears fraudulent.
There are several technologies available today to help detect attacks. I will use Microsoft 365 Defender capabilities as an example. A set of neural network models are used to detect a potential attack underway by fusing multiple signals about activities within a computing system, including processes being started and stopped, files being changed and renamed, and suspicious network communication.[15], [16] In addition, probabilistic algorithms are used to detect high likelihoods of “lateral movement” on a network.[17] Lateral movement refers to malware, such as ransomware, moving from machine to machine as it infects an organization. The goal is to detect signals of concerning patterns of spread and to shut down the infection by isolating potentially infected machines and alerting security experts to investigate. As numerous legitimate operations can appear like lateral movement of malware, simplistic approaches can have high false-positive rates. AI systems can help to raise the rate of capture and block these spreading infections, while reducing false positives.[18]
As a recent example, in March 2022, Microsoft leveraged its AI models to identify an attack attributed to a Russian actor that Microsoft tracks as Iridium, also referred to as Sandworm.  The US government has attributed Iridium activity to a group allegedly based at GRU Unit 74455 of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation. The actor deployed wiper malware at a Ukrainian shipping company based in Lviv. Wiper malware erases data and programs on the computers that it infects. The first documented encounter of this malware was on a system running Microsoft Defender with Cloud Protection enabled. The ensemble of machine learning models in Defender, combined with signals across client and cloud, allowed Microsoft to block this malware at first sight.
Investigation and remediation. Investigation and remediation are methods used following a breach to provide customers with a holistic understanding of the security incident, including the extent of the breach, which devices and data were impacted, how the attack propagated through the customer environment, and to seek attribution for the threat.[19] Gathering and doing synthesis from telemetry sources is tedious. Efforts to date include multiple tools to collect telemetry from within and across organizations. The use of AI for investigation and remediation is a promising and open area of research.[20],[21]
Threat intelligence. Threat intelligence enables security researchers to stay on top of the current threat landscape by tracking active malicious actors, at times deliberately engaging with them and studying their behavior. Today, Microsoft actively tracks 40+ active nation-state actors and 140+ threat groups across 20 countries.[22],[23] AI methods help to identify and tag entities from multiple feeds and intelligence sharing across agencies. AI models show promise with their ability to learn and make inferences about high-level relationships and interactions by identifying similarities across different campaigns for enhancing threat attribution.[24],[25]
Recommendations: Advance development and application of AI methods to defend against cyberattacks
4. AI-powered cyberattacks
While AI is improving our ability to detect cybersecurity threats, organizations and consumers will face new challenges as cybersecurity attacks increase in sophistication. To date, adversaries have commonly employed software tools in a manual manner to reach their objectives. They have been successful in exfiltrating sensitive data about American citizens, interfering with elections, and distributing propaganda on social media without the sophisticated use of AI technologies. [26],[27],[28] While there is scarce information to date on the active use of AI in cyberattacks, it is widely accepted that AI technologies can be used to scale cyberattacks via various forms of probing and automation. Multiple research and gaming efforts within cybersecurity communities have demonstrated the power using AI methods to attack computing systems. This area of work is referred to as offensive AI.[29],[30]
4.1 Approaches to offensive AI
Offensive AI methods will likely be taken up as tools of the trade for powering and scaling cyberattacks.  We must prepare ourselves for adversaries who will exploit AI methods to increase the coverage of attacks, the speed of attacks, and the likelihood of successful outcomes. We expect that uses of AI in cyberattacks will start with sophisticated actors but will rapidly expand to the broader ecosystem via increasing levels of cooperation and commercialization of their tools.[31]
Basic automation. Just as defenders use AI to automate their processes, so too can adversaries introduce efficiencies and efficacies for their own benefit. Automating attacks using basic pre-programmed logic is not new in cybersecurity. Many malware and ransomware variants over the last five years have used relatively simple sets of logical rules to recognize and adapt to operating environments. For example, it appears that attacking software has checked time zones to adapt to local working hours and customized behavior in a variety of ways to avoid detection or take tailored actions to adapt to the target computing environment.[32],[33] On another front, automated bots have begun to proliferate on social media platforms.[34] These are all rudimentary forms of AI that encode and harness an attacker’s expert knowledge. However, substantial improvements in AI technology make plausible malicious software that is much more adaptive, stealthy, and intrusive.[35]
Authentication-based attacks. AI methods can be employed in authentication-based attacks, where, for example, recently developed AI methods can be used to generate synthetic voiceprints to gain access through an authentication system. Compelling demonstrations of voice impersonations to fool an authentication system were presented during the Capture the Flag (CTF) cybersecurity competition at the 2018 DEF CON meeting.[36]
AI-powered social engineering. Human perception and psychology are weak links in cyber-defense. AI can be used to exploit this persistent vulnerability. We have seen the rise of uses of AI for social engineering, aiming the power of machine learning at influencing the actions of people to perform tasks that are not in their interest. As an example, AI methods can be used to generate ultra-personalized phishing attacks capable of fooling even the most security conscious users. A striking 2018 study demonstrated how AI methods could be used to significantly raise the probability that end users would click on malevolent links in social media posts. The AI system learned from publicly available data including online profiles, connections, content of posts, and online activity of targeted individuals. Machine-learning was used to optimize the timing and content of messages with a goal of maximizing clickthrough rates—with significant results.[37] A 2021 study demonstrated that the language of emails could be crafted automatically with large-scale neural language models and that the AI-generated messages were more successful than the human-written messages by a significant margin.[38] In a related direction, Microsoft has tracked groups that use AI to craft convincing but fake social media profiles as lures.
4.2 AI-powered cyberattacks on the frontier
The need to prepare for more sophisticated offensive AI was highlighted in presentations at a National Academies of Sciences workshop on offensive AI that I co-organized in 2019. The workshop, sponsored by the Office of the Director of National Intelligence, led to a report available from the Academies.[39] The report includes discussion of the applications of AI methods across the cyber kill-chain, including the use of AI methods in social engineering, discovery of vulnerabilities, exploiting development and targeting, and malware adaptation, as well as in methods and tools that can be used to target vulnerabilities in Al-enabled systems, such as autonomous systems and controls used in civilian and military applications.
The cybersecurity research community has demonstrated the power of AI and other sophisticated computational methods in cyberattacks. Adversaries can harness AI to efficiently guess passwords, to attack industrial control systems without raising suspicions, and to create malware that evades detection or prevents inspection[40],[41],[42],[43],[44],[45] AI-enabled bots can also automate network attacks and make it difficult to extinguish the attacker’s command and control channels.[46] In another direction, a competitor demonstrated at a DARPA Cyber Grand Challenge exercise in 2016 [47] how machine learning could be used to learn how to generate “chaff” traffic, decoy patterns of online activity that resemble the distribution of events seen in real attacks for distraction and cover-up of actual attack strategies.[48]
It is safe to assume that AI will improve the success, impact, and scope of the full breadth of threats present today. AI will also introduce new challenges, including special cyber vulnerabilities introduced with general uses of AI components and applications, which create new apertures for adversaries to exploit.
Recommendations: Prepare for malicious uses of AI to perform cyberattacks
5. Special vulnerabilities of AI systems
The power and growing reliance on AI generates a perfect storm for a new type of cyber-vulnerability: attacks targeted directly at AI systems and components. With attention focused on developing and integrating AI capabilities into applications and workflows, the security of AI systems themselves is often overlooked. However, adversaries see the rise of new AI attack surfaces growing in diversity and ubiquity and will no doubt be pursuing vulnerabilities. Attacks on AI systems can come in the form of traditional vulnerabilities, via basic manipulations and probes, and via a new, troubling category: adversarial AI.
5.1 Attacks on AI Supply Chains
AI systems can be attacked via targeting traditional security weaknesses and software flaws, including attacks on the supply chain of AI systems, where malevolent actors gain access and manipulate insecure AI code and data. As an example, in 2021, a popular software platform used to build neural networks was found to have 201 traditional security vulnerabilities, such as memory corruption and code execution.[50] Researchers have demonstrated how adversaries could use existing cyberattack toolkits to attack core infrastructure of the software running AI systems.[51] Multiple components of AI systems in the supply chain of AI systems can be modified or corrupted via traditional cyberattacks. As an example, data sets used to train AI systems are rarely under version control in the same way that source code is. Researchers from NYU found that most AI frameworks downloaded from a popular algorithm repository do not check the integrity of AI models, in contrast to the standards of practice with traditional software, where cryptographic verification of executables/libraries has been standard practice for well over a decade.[52]
5.2 Adversarial AI
Adversarial AI or adversarial machine learning methods harness more sophisticated AI techniques to attack AI systems. Several classes of adversarial AI have been identified, including adversarial examples, the use of basic policies or more sophisticated machine learning methods to fool AI systems with inputs that cause the systems to fail to function properly. A second type of attack is called data poisoning, where data used to train AI systems are “poisoned” with streams of data that inject erroneous or biased training data into data sets, changing the behavior or degrading the performance of AI systems.[53] A third type of attack, called model stealing, seeks to learn details about the underlying AI model used in an AI system.[54] A fourth category of attack, called model inversion, seeks to reconstruct the underlying private data that is used to train the target system.[55]
With adversarial examples, basic manipulations or more sophisticated application of AI methods are used to generate inputs that are custom-tailored to cause failures in targeted AI systems. Goals of these attacks include disruptive failures of automated message classifiers, perceptions of machine vision systems, and recognitions of the words in utterances by speech recognition systems.
As an example of basic manipulations of inputs, a group, alleged to be within the Chinese government, attempted to amplify propaganda on Uyghurs by bypassing Twitter’s anti-spam algorithm via appending random characters at the end of tweets.[56] The approach was viewed as an attempt to mislead the algorithm into thinking each tweet was unique and legitimate. In another example, researchers from Skylight appended benign code from a gaming database to Wannacry ransomware to cause the machine-learning-based antivirus filter to classify the modified ransomware as benign.[57] In related work on the fragility of AI systems, researchers showed that simply rotating a scan of a skin lesion confuses a computer recognition system to classify the image as malignant.[58]
In uses of AI to generate adversarial examples, researchers have demonstrated stunning examples of failures. In one approach, adversarial methods are used to inject patterns of pixels into images to change what an AI system sees. While the changes with AI inferences are dramatic, the changes to the original images are not detectable by humans. Sample demonstrations include the modification of a photo of a panda leading an AI system to misclassify the panda as a gibbon and changes to a stop sign to misclassify it as a yield sign.[59],[60] Similar demonstrations have been done in the realm of speech recognition, with the injection of hidden acoustical patterns in speech that changes what a listening system hears.[61] Attacks leading to such misclassifications and malfunctions can be extremely costly, particularly in high-stakes domains like defense, transportation, healthcare, and industrial processes.
Challenges of adversarial AI and a set of recommendations are called out in the final report of the National Security Commission on AI (NSCAI).[62] I chaired the lines of effort on directions with developing and fielding trustworthy, responsible, and ethical AI applications, leading to chapters 7 and 8 of the report and the appendix on NSCAI’s recommendations on key considerations for fielding AI systems that align with democratic values, civil liberties, and human rights.[63],[64],[65] Chapter 7 of the report covers rising concerns with adversarial AI, including the assessment that, “The threat is not hypothetical: adversarial attacks are happening and already impacting commercial ML systems.” In support of this statement, over the last five years, the Microsoft cybersecurity team has seen an uptick in adversarial AI attacks.[66] I believe the trend will continue.
5.3 Efforts to Mitigate Adversarial AI
Pursuit of resistant systems. Computer science R&D has been underway on methods for making AI systems more resistant to adversarial machine learning attacks. One area of work centers on raising the level of robustness of systems to attacks with adversarial inputs as described above.[67],[68] Approaches include special training procedures to include adversarial examples, validation of inputs to identify specific properties that can reveal signs of an attack and making changes to the overall approach to building models, and modifying the objective functions used in optimization procedures used to create the models so that more robust models are created. While the latter techniques and research directions behind them are promising, the challenges of adversarial examples persist, per the large space of inputs to machine learning procedures. Thus, it is important to continue to invest in R&D on adversarial AI, to perform ongoing studies with red-teaming exercises, and to remain vigilant.
5.4 Tracking, Awareness, and Resources
Front-line awareness. Despite the opportunities that adversarial AI methods will provide to state and non-state actors for manipulating and disrupting critical AI systems and rising evidence of real-world attacks with adversarial AI, the idea of protecting AI systems from these attacks has been largely an afterthought. There is an urgency to be aware and to be ready to respond to adversarial AI threats, especially those used in critical areas such as defense. A Microsoft survey of 28 organizations in 2020 showed, despite the rise in attacks on AI systems, companies are still unaware of these kinds of intentional failures to AI systems and are massively underinvested in tools and processes to secure AI systems. Ryan Fedasiuk, a noted researcher at Georgetown’s Center for Security of Emerging Technology specializing in China’s AI operations, notes that Chinese military officers have explicitly called out that the U.S. defenses are susceptible to data poisoning, and even so far as calling data integrity as “the Achilles’ heel” of the U.S. joint all-domain command and control strategy.[69]
Resources and Engagement. Microsoft, along with MITRE and 16 other organizations created the Adversarial ML Threat Matrix to catalog threats to AI systems.[70] The content includes documentation of case studies where attacks have been made on commercial AI systems. For engineers and policymakers, Microsoft, in collaboration with Berkman Klein Center at Harvard University, released a taxonomy of machine learning failure modes.[71] For security professionals, Microsoft has open-sourced Counterfit, its own tool for assessing the posture of AI systems.[72] For the broader community of cybersecurity practitioners interested in AI and security, Microsoft hosts the annual Machine Learning Evasion Competition as a venue to exercise their muscle in attacking and securing AI systems.[73] Within the Federal government, the DoD has listed safety and security of AI systems in its core AI principles.[74] And there is encouraging activity by NIST on an AI Risk Assessment Framework to address multiple dimensions of AI systems, including robustness and security.[75]
Recommendations: Raise awareness and address vulnerabilities of AI systems
6. AI in Malign Information Operations
Advances in machine learning and graphics have boosted the abilities of state and non-state actors to fabricate and distribute high-fidelity audiovisual content, referred to as synthetic media and deepfakes. AI technologies for generating deepfakes can now fabricate content that is indistinguishable from real-world people, scenes, and events, threatening national security. Advances that could only be found with the walls of computer science laboratories or in demonstrations that surprised attendees at academic AI conferences several years ago are now widely available in tools that create audio and audiovisual content that can be used to drive disinformation campaigns.
6.1 Challenges of Synthetic Media
Advances in the capabilities of generative AI methods to synthesize a variety of signals, including high-fidelity audiovisual imagery, have significance for cybersecurity. When personalized, the use of AI to generate deepfakes can raise the effectiveness of social-engineering operations (discussed above) in persuading end-users to provide adversaries with access to systems and information.
On a larger scale, the generative power of AI methods and synthetic media have important implications for defense and national security. The methods can be used by adversaries to generate believable statements from world leaders and commanders, to fabricate persuasive false-flag operations, and to generate fake news events. A recent demonstration includes the multiple examples of manipulated and more sophisticated deepfakes that have come to the fore over the course of the Russian attack on Ukraine. This includes a video of President Volodymyr Zelenskyy appearing to call for surrender.[76]
The proliferation of synthetic media has had another concerning effect: malevolent actors have labeled real events as “fake,” taking advantage of new forms of deniability coming with the loss of credibility in the deepfake era. Video and photo evidence, such as imagery of atrocities, are being called fake. Known as the “liar’s dividend”, the proliferation of synthetic media emboldens people to claim real media as “fake,” and creates plausible deniability for their actions.[77]
We can expect synthetic media and its deployment to continue grow in sophistication over time, including the persuasive interleaving of deepfakes with unfolding events in the world and real-time synthesis of deepfakes. Real-time generations could be employed to create compelling, interactive imposters (e.g., appearing in teleconferences and guided by a human controller) that appear to have natural head pose, facial expressions, and utterances. Looking further out, we may have to face the challenge of synthetic fabrications of people that can engage autonomously in persuasive real-time conversations over audio and visual channels.
6.2 Direction: Digital Content Provenance
A promising approach to countering the threat of synthetic media can be found in a recent advance, named digital content provenance technology. Digital content provenance leverages cryptography and database technologies to certify the source and history of edits (the provenance) of any digital media. This can provide “glass-to-glass” certification of content, from the photons hitting the light-sensitive surfaces of cameras to the light emitted from the pixels of displays, for secure workloads. We pursued an early vision and technical methods for enabling end-to-end tamper-proof certification of media provenance in a cross-team effort at Microsoft.[78],[79] The aspirational project was motivated by our assessment that, in the long-term, neither humans nor AI methods would be able to reliably distinguish fact from AI-generated fictions—and that we must prepare with urgency for the expected trajectory of increasingly realistic and persuasive deepfakes.
After taking the vision to reality with technical details and the implementation of prototype technologies for certifying the provenance of audiovisual content, we worked to build and contribute to cross-industry partnerships, including Project Origin, the Content Authenticity Initiative (CAI), and the Coalition for Content Provenance and Authenticity (C2PA), a multistakeholder coalition of industry and civil society organizations. [80],[81],[82],[83] In January 2022, C2PA released a specification of a standard that enables the interoperability of digital content provenance systems.[84],[85] Commercial production tools are now becoming available in accordance with the C2PA standard that enable authors and broadcasters to assure viewers about the originating source and history of edits to photo and audiovisual media.
The final report of the NSCAI recommends that digital content provenance technologies should be pursued to mitigate the rising challenge of synthetic media. In Congress, the bipartisan Deepfake Task Force Act (S. 2559) proposes the establishment of the National Deepfake and Digital Provenance Task Force.[86] Microsoft and its media provenance collaborators encourage Congress to move forward with standing-up a task force to help identify and address the challenges of synthetic media and we would welcome the opportunity to provide assistance and input into the work.
 Recommendations: Defend against malign information operations
Summary
I have covered in my testimony status, trends, examples, and directions ahead with rising opportunities and challenges at the intersection of AI and cybersecurity. AI technologies will continue to be critically important for enhancing cybersecurity in military and civilian applications. AI methods are already qualitatively changing the game in cyber defense. Technical advances in AI have helped in numerous ways, spanning our core abilities to prevent, detect, and respond to attacks—including attacks that have never been seen before. AI innovations are amplifying and extending the capabilities of security teams across the country.
On the other side, state and non-state actors are beginning to leverage AI in numerous ways. They will draw new powers from fast-paced advances in AI and will continue to add new tools to their armamentarium. We need to double down with our attention and investments on threats and opportunities at the convergence of AI and cybersecurity. Significant investments in workforce training, monitoring, engineering, and core R&D will be needed to understand, develop, and operationalize defenses for the breadth of risks we can expect with AI-powered cyberattacks. The threats include new kinds of attacks, including those aimed squarely at AI systems. The DoD, federal and state agencies, and the nation need to stay vigilant and stay ahead of malevolent adversaries. This will take more investment and commitment to fundamental research and engineering on AI and cybersecurity, and in building and nurturing our cybersecurity workforce so our teams can be more effective today—and well-prepared for the future.
Thank you for the opportunity to testify. I look forward to answering your questions.
[1] https://www.microsoft.com/security/blog/2021/12/15/the-final-report-on-nobeliums-unprecedented-nation-state-attack/
[2] https://news.microsoft.com/wp-content/uploads/prod/sites/626/2022/02/Cyber-Signals-E-1-218.pdf, page 3
[3] https://www.microsoft.com/en-us/research/group/m365-defender-research/
[4] 2018-Webroot-Threat-Report_US-ONLINE.pdf
[5] Microsoft Digital Defense Report, October 2021
[6] https://www.microsoft.com/security/blog/2021/05/12/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do/
[7] J. McCarthy, J., M.L. Minsky, N.  Rochester, N., C.E. Shannon, C.E. A Proposal for the Dartmouth Summer Project on Artificial Intelligence, Dartmouth University, May 1955. http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html
[8] https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
[9] https://www.isc2.org/News-and-Events/Press-Room/Posts/2021/10/26/ISC2-Cybersecurity-Workforce-Study-Sheds-New-Light-on-Global-Talent-Demand
[10] https://newsroom.trendmicro.com/2021-05-25-70-Of-SOC-Teams-Emotionally-Overwhelmed-By-Security-Alert-Volume
[11] https://www.av-test.org/en/statistics/malware/
[12] https://www.microsoft.com/security/blog/2021/07/27/combing-through-the-fuzz-using-fuzzy-hashing-and-deep-learning-to-counter-malware-detection-evasion-techniques
[13] https://www.microsoft.com/en-us/research/publication/urltran-improving-phishing-url-detection-using-transformers/
[14] https://dl.acm.org/doi/10.1145/3471621.3471858
[15] https://www.microsoft.com/security/blog/2020/07/23/seeing-the-big-picture-deep-learning-based-fusion-of-behavior-signals-for-threat-detection/
[16] https://www.microsoft.com/security/blog/2020/08/27/stopping-active-directory-attacks-and-other-post-exploitation-behavior-with-amsi-and-machine-learning/
[17] https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/
[18] https://www.microsoft.com/security/blog/2020/06/10/the-science-behind-microsoft-threat-protection-attack-modeling-for-finding-and-stopping-evasive-ransomware/
[19] https://www.microsoft.com/security/blog/2021/12/02/structured-threat-hunting-one-way-microsoft-threat-experts-prioritizes-customer-defense/
[20] https://www.microsoft.com/security/blog/2020/07/09/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents/
[21] https://www.microsoft.com/security/blog/2020/07/29/inside-microsoft-threat-protection-solving-cross-domain-security-incidents-through-the-power-of-correlation-analytics/
[22] https://www.microsoft.com/security/blog/2022/02/03/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends/
[23] https://www.microsoft.com/security/blog/2021/05/12/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do/
[24] https://www.microsoft.com/security/blog/2021/04/01/automating-threat-actor-tracking-understanding-attacker-behavior-for-intelligence-and-contextual-alerting/
[25] https://dl.acm.org/doi/pdf/10.1145/3448016.3452745
[26] Cybersecurity Incidents (opm.gov)
[27] Russian Interference in 2016 U.S. Elections – FBI
[28] Characterizing networks of propaganda on twitter: a case study
[29] https://arxiv.org/pdf/2106.15764.pdf
[30] B. Buchanan, J. Bansemer, D. Cary, et al., Automating Cyber Attacks: Hype and Reality, Center for Security and Emerging Technology, November 2020.  https://cset.georgetown.edu/wp-content/uploads/CSET-Automating-Cyber-Attacks.pdf
[31] How cyberattacks are changing according to new Microsoft Digital Defense Report
[32] Intelligence, FireEye Threat. “HAMMERTOSS: Stealthy tactics define a Russian cyber threat group.” FireEye, Milpitas, CA (2015).
[33] Virtualization/Sandbox Evasion, Technique T1497 – Enterprise | MITRE ATT&CK®
[34] https://www.jmir.org/2021/5/e26933/
[35] See for example, see documentation of Deep Exploit, tools and demonstration showing the use of reinforcement learning to drive cyberattacks: https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit
[36] https://www.defcon.org/
[37] J. Seymour and P. Tully, Generative Models for Spear Phishing Posts on Social Media, 31st Conference on Neural Information Processing Systems, Long Beach, CA, USA, 2017. https://arxiv.org/abs/1802.05196
[38] https://www.wired.com/story/ai-phishing-emails/amp
[39] Implications of Artificial Intelligence for Cybersecurity: A Workshop, National Academy of Sciences, 2019. https://www.nationalacademies.org/our-work/implications-of-artificial-intelligence-for-cybersecurity-a-workshop
[40] Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit – NDSS Symposium (ndss-symposium.org)
[41] B. Hitaj, P. Gasti, G. Ateniese, F. Perez-Cruz, PassGAN: A Deep Learning Approach for Password Guessing, NeurIPS 2018 Workshop on Security in Machine Learning (SecML’18), December 2018. https://github.com/secml2018/secml2018.github.io/raw/master/PASSGAN_SECML2018.pdf
[42] S. Datta, DeepObfusCode: Source Code Obfuscation through Sequence-to-Sequence Networks In: Arai, K. (eds) Intelligent Computing. Lecture Notes in Networks and Systems, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-80126-7_45, July 2021.
[43] J. Li, L. Zhou, H. Li, L. Yan and H. Zhu, “Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks,” 2019 IEEE Conference on Communications and Network Security (CNS), 2019, pp. 268-276, doi: 10.1109/CNS.2019.8802772.  https://ieeexplore.ieee.org/abstract/document/8802772
[44] C. Novo, R. Morla, Flow-Based Detection and Proxy-Based Evasion of Encrypted Malware C2 Traffic, Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security 2020, https://doi.org/10.1145/3411508.3421379.
[45] D. Han et al., “Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors,” in IEEE Journal on Selected Areas in Communications, vol. 39, no. 8, pp. 2632-2647, Aug. 2021, https://ieeexplore.ieee.org/abstract/document/9448103
[46] A botnet-based command and control approach relying on swarm intelligence – ScienceDirect
[47] https://www.darpa.mil/program/cyber-grand-challenge
[48] R. Rivest, Chaffing and Winnowing: Confidentiality Without Encryption,” CryptoBytes, 4(1):12-17, https://pdfs.semanticscholar.org/aaf3/7e0afa43f5b6168074dae 2bc0e695a9d1d1b.pdf
[49] https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf. page 279.
[50] https://www.cvedetails.com/product/53738/Google-Tensorflow.html
[51] Xiao, Qixue, et al. “Security risks in deep learning implementations.” 2018 IEEE Security and privacy workshops (SPW). IEEE, 2018.
[52] Gu, Tianyu, Brendan Dolan-Gavitt, and Siddharth Garg. “Badnets: Identifying vulnerabilities in the machine learning model supply chain.” arXiv preprint arXiv:1708.06733 (2017).
[53] Jagielski, Matthew, et al. “Manipulating machine learning: Poisoning attacks and countermeasures for regression learning.” 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 2018.
[54] Yu, Honggang, et al. “CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.” NDSS. 2020.
[55] Ziqi Yang, Ee-Chien Chang, Zhenkai Liang, Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment, 2019
[56] https://www.nytimes.com/interactive/2021/06/22/technology/xinjiang-uyghurs-china-propaganda.html
[57] https://skylightcyber.com/2019/07/18/cylance-i-kill-you/
[58] Finlayson, Samuel G., et al. “Adversarial attacks on medical machine learning.” Science 363.6433 (2019): 1287-1289.
[59] I.J. Goodfellow, J. Shlens, C. Szegedy, Explaining and Harnessing Adversarial Examples, ICLR 2015. https://arxiv.org/pdf/1412.6572.pdf
[60]N. Papernot, P. McDaniel, I. Goodfellow, et al., Practical Black-Box Attacks against Machine Learning, ASIA CCS ’17, April 2017. https://dl.acm.org/doi/pdf/10.1145/3052973.3053009
[61] M. Alzantot, B. Balaji, M. Srivastava, Did you hear that? Adversarial Examples Against Automatic Speech Recognition, Conference on Neural Information Processing Systems, December 2017. https://arxiv.org/pdf/1801.00554.pdf
[62] https://www.nscai.gov/
[63] “Upholding Democratic Values: Privacy, Civil Liberties, and Civil Rights in Uses of AI for National Security,” Chapter 8, Report of the National Security Commission on AI, March 2021. https://reports.nscai.gov/final-report/chapter-8/
[64] “Establishing Justified Confidence in AI Systems,” Chapter 8, Report of the National Security Commission on AI, March 2021. https://reports.nscai.gov/final-report/chapter-7/
[65] E. Horvitz J. Young, R.G. Elluru, C. Howell, Key Considerations for the Responsible Development and Fielding of Artificial Intelligence, National Security Commission on AI, April 2021. https://arxiv.org/ftp/arxiv/papers/2108/2108.12289.pdf
[66]Kumar, Ram Shankar Siva, et al. Adversarial machine learning-industry perspectives. 2020 IEEE Security and Privacy Workshops (SPW). IEEE, 2020.
[67] https://cacm.acm.org/magazines/2018/7/229030-making-machine-learning-robust-against-adversarial-inputs/fulltext
[68] A. Madry, A. Makelov, L. Schmidt, et al. Towards deep learning models resistant to adversarial attacks, ICLR 2018. https://arxiv.org/pdf/1706.06083.pdf
[69] https://breakingdefense.com/2021/11/china-invests-in-artificial-intelligence-to-counter-us-joint-warfighting-concept-records/
[70] https://atlas.mitre.org/
[71] https://docs.microsoft.com/en-us/security/engineering/failure-modes-in-machine-learning
[72] https://github.com/Azure/counterfit/
[73] https://mlsec.io/
[74] https://www.defense.gov/News/Releases/Release/Article/2091996/dod-adopts-ethical-principles-for-artificial-intelligence/
[75] https://www.nist.gov/itl/ai-risk-management-framework
[76] See: https://www.youtube.com/watch?v=X17yrEV5sl4
[77] The Liar’s Dividend: The Impact of Deepfakes and Fake News on Politician Support and Trust in Media | GVU Center (gatech.edu)
[78] P. England, H.S. Malvar, E. Horvitz, et al. AMP: Authentication of Media via Provenance, ACM Multimedia Systems 2021. https://dl.acm.org/doi/abs/10.1145/3458305.3459599
[79]E. Horvitz, A promising step forward on disinformation, Microsoft on the Issues, February 2021. https://blogs.microsoft.com/on-the-issues/2021/02/22/deepfakes-disinformation-c2pa-origin-cai/
[80] Project Origin, https://www.originproject.info/about
[81] J. Aythora, et al. Multi-stakeholder Media Provenance Management to Counter Synthetic Media Risks in News Publishing, International Broadcasting Convention 2020 (IBC 2020), Amsterdam, NL 2020 https://www.ibc.org/download?ac=14528
[82] Content Authenticity Initiative, https://contentauthenticity.org/
[83] Coalition for Content Provenance and Authenticity (C2PA), https://c2pa.org/
[84]C2PA Releases Specification of World’s First Industry Standard for Content Provenance, Coalition for Content Provenance and Authenticity, January 26, 2022,  https://c2pa.org/post/release_1_pr/
[85] https://erichorvitz.com/A_Milestone_Reached_Content_Provenance.htm
[86] Deepfake Task Force Act, S. 2559, 117th Congress, https://www.congress.gov/bill/117th-congress/senate-bill/2559/text
Tags: artificial intelligence, cyberattacks, department of defence, US government
Have the latest posts sent right to your inbox. Enter your email below.
By providing your email address, you will receive email updates from the Microsoft on the Issues blog.


Follow us:

source

Read more
  • Published in Uncategorized
No Comments

Tech and system related upgrades to China's dispute resolution … – Law.asia

Sunday, 01 January 2023 by admin

When the going gets tough, inspirational thinking comes to the fore. Small wonder that the past couple of years have spawned an exciting amount of tech-related reform in China’s courts and arbitration institutions. Kevin Cheng reports
In October, the US government enacted sweeping restrictions over the export of technology, software and equipment used for producing advanced computing chips and supercomputers to China’s semiconductor and hardware industry, which has seen a streak of encouraging growth over the years but still relies considerably on imported know-how.
This is perceived as a drastic escalation from the ongoing trade war between the world’s two largest economies, which began in 2018, as well as a hefty roadblock to the global trade network, already plagued by geopolitical and macroeconomic impediments that seem to be popping up faster than they can be resolved.
Upon hearing the news, China-based entrepreneurs, overseas investors and legal professionals jotted down this unfortunate development onto their list of concerns, and promptly set out to schedule a top-down risk assessment of all existing and planned operations.
On that list, the new entry closely follows the recurring pandemic and potential lockdowns, the war in Ukraine and the Western world’s sanctions against Russia, deteriorating geopolitical stability, interest rate hikes and the looming recession, and shortages across the global supply chain.
Tested during these trying times is not only the business acumen of corporate executives determined to sail beyond the national border, but also the expertise of their law practising convoys and the wisdom of China’s evolving judicial system, dedicated to help maintain trade vitality when disputes are constantly one factor – beyond either party’s reach – away.
“These adverse macroeconomic factors, along with a growing phenomenon of generalising ‘national security’, manifested as wanton decoupling and other acts of reverse globalisation, are making it difficult for the world economy to recuperate and grow,” says David Jia, a Shenzhen-based senior partner at Long An Law Firm.
Referring to the “chip 4 alliance” advocated by the US to form a global semiconductor supply and co-ordination network comprising Japan, South Korea and Taiwan, Jia adds: “It not only concerns the interests of Chinese and American companies, but also how the chip industry chain will reform and develop on a global scale, which obviously will lead to more cross-border disputes.”
Jia is not alone in his observation that a volatile and unpredictable international business environment begets a growing number of cross-border disputes and challenges long-held precedents in international trade.
David Jia, Long An Law FirmDavid Jia, Long An Law Firm
According to Zhang Lixia, a founding partner of Huamao & Guigu Law Firm, more companies looking to consult or engage their services are claiming that due to the pandemic or the Sino-US trade breakdown, their contracts can no longer move ahead, or have met major obstacles, leaving lawsuits or arbitration their only recourse.
Likewise, Chen Xiaoshan, head of international arbitration at the Shanghai office of DLA Piper, sees an uptick in the frequency of cross-border disputes. “In the past year, due to covid-19, we have handled a large number of international trade disputes relating to the cross-border sale and purchase of personal protective equipment (PPE) and force majeure clause,” he says. “In the meantime, disputes directly or indirectly relating to the Russia-Ukraine war, especially those arising out of international trade and transportation, have also significantly increased.”
The trend is also reflected in the published statistics of leading arbitration venues, as with the 2021 work report of the China International Economic and Trade Arbitration Commission (CIETAC). According to the report, CIETAC handled a record high of 4,071 cases in 2021, a year-on-year increase of 12.6%, of which 636 were foreign-related (including those related to Hong Kong, Macau and Taiwan), representing a significant increase.
According to Cao Lijun, a partner at Zhong Lun Law Firm in Beijing, we have yet to see the peak of international disputes related to the Ukraine-Russia war or the pandemic. “Considering the hysteretic nature of disputes, the numbers are likely to continue climbing for some time,” he predicts.
Chris Zhang, the senior partner of Jincheng Tongda & Neal based in the firm’s Shanghai office, looks at macroeconomic factors from a dialectical perspective. “On one hand, as foreign trade is riddled with uncertainties during the pandemic, China’s seen a decline in its total amount of cross-border business activities,” she says, but on the other hand, also as a result of the pandemic, what foreign trade there is has become more likely to produce disputes.
“Due to the war in Ukraine, and the numerous Western sanctions against Russia’s major exporters and their executives, Chinese businesses must sometimes breach their contracts with original partners to avoid being sanctioned by the EU and US,” says Zhang. “This adds to the likelihood of cross-border disputes.”
Even more damaging, the stagnation of the global supply chain has not only increased the volume of international disputes but also added to their complexity and difficulty.
Cao Lijun, Zhong Lun Law FirmCao Lijun, Zhong Lun Law Firm
During Shanghai’s two-month lockdown earlier in the year, Shanghai Port suffered from labour shortages, overpacked warehouses and logistics chain paralysis, which halted the circulation of domestic and international goods in their tracks, leading to a series of discords.
Zhang says that while the Civil Code and other laws and judicial interpretations have made force majeure a viable defence for pandemic-induced defaults, these cross-border contracts may not be governed by Chinese law.
“In addition, exports of masks, medical gloves, antigen testing and other anti-pandemic supplies were restricted, as they were required to be first distributed to covid-affected regions in China,” she observes. “Consequently, domestic vendors faced lawsuits and arbitrations from overseas buyers, and had to deal with a compromised reputation.”
Zhang Guanglei, a partner at the Beijing head office of Jingtian & Gongcheng, believes that macro headwinds have made contract performance a challenge, and whether that is enough to trigger force majeure, or constitute a “change of situation”, may become the focal point of cross-border disputes. “Furthermore, these adverse factors have made it difficult to obtain evidence in cross-border proceedings,” he adds.
Ray Liu, a global partner at Dorsey and head of its Beijing office, believes the surge in disputes reflects, to a degree, China’s rapid development in both traditional and new-tech sectors, contributing to their stronger presence on the international stage that has now fallen victim to macroeconomic uncertainty.
“Covid-19 cut down the opportunities for courts, clients and other parties to meet face to face, which makes it hard to regulate the procedure and for parties to negotiate in the same room,” says Liu. “With uncertainties seeping into the global economy, many enterprises have seen a sharp decline in their revenue, leading to a series of contractual, labour and financing-related disputes.”
Chris Zhang, of Jincheng Tongda & Neal, holds incompatibility between foreign and Chinese laws as one of the chief catalysts for cross-border strife, citing Cadence Design Systems v Syntronic (2022) as one such case.
The California Northern District Court ordered the defendant to send 24 computers from China to the US for inspection, to which the defensive lawyer argued that, as these computers contained the protected personal information of the employees, according to article 39 of the Personal Information Protection Law (PIPL), they can only be moved out of China with employees’ individual consent.
However, the judge deemed that the exception under the clause – permission to transfer personal information “where necessary to fulfil statutory duties and responsibilities or statutory obligations” – should apply to foreign legal obligations, and persisted with his decision.
Cross-border transfer of data and personal information has in recent years quickly ascended to the highest tier of corporate legal concerns. The Cyberspace Administration of China promulgated the Measures for Security Assessment for Outbound Data Transfer in July 2022, and is currently seeking public comment on the amendment to China’s five-year-old Cybersecurity Law. The rise of the compliance threshold is matched by the challenge in transferring evidence to overseas courts.
“With the strict discovery rules in the US, Chinese companies may be required to collect and provide relevant evidence as a party to the case, or a third party, and failure to follow such rules may incur adverse consequences” says Ray Liu at Dorsey. “On the other hand, with China building up its own data security governance and privacy protection systems, transfer of data overseas is subject to an unprecedented level of requirements and restrictions.”
Similarly, Cao at Zhong Lun cautions that compliance matters related to cross-border transfer of data may significantly affect document disclosure in international arbitration. “Lawyers in international arbitration must take data compliance into prudent consideration when disclosing documents,” he says.
While it seems more likely than ever that engaging in foreign-related dealings will end in unpleasant lawsuits, legal risks can usually be avoided, or at least abated, with shrewd safety mechanisms and meticulous planning.
“Most mature enterprises in China have gained sufficient understanding of the risks in overseas investments and how to address them,” notes Xiao Jin, a Beijing-based partner at King & Wood Mallesons. “But in view of the complicated international situation, outbound assets further face multiple levels of regulatory and political risks, for which enterprises must remain vigilant.
“Bilateral investment treaties [BITs] may be the last valid defence for protecting investors’ overseas interests,” says Xiao. “Outbound investors should make good use of these treaties to ward off regulatory and political pitfalls.”
Xiao Jin, King & Wood MallesonsXiao Jin, King & Wood Mallesons
Regarding BITs as a protective shield for outbound investors, as well as an important basis for relief, Cao adds: “If China has not entered into a BIT with the investment home country, or the BIT is insufficient, companies may consider setting up a special purpose vehicle [SPV] in a third country with whom China has a valid BIT, which in turn would grant investment protection.”
Zou Wen, who recently joined the Shenzhen office of Fangda Partners as a partner, advises outbound enterprises to not only engage a local law firm that provides high-quality legal services, but also to choose an experienced Chinese law firm as a long-term ally and consultant. “This is a tried and true practice among foreign enterprises,” says Zou. “When multiple overseas lawsuits are happening across many jurisdictions, foreign enterprises often engage a single legal adviser to oversee litigations across the globe, and help select local law firms. This helps the companies manage litigation costs and better co-ordinate with services provided by overseas lawyers.”
Chen Xiaoshan, of DLA Piper, cautions against potential political pitfalls. “Given the cross-border nature of these disputes, we would recommend that, instead of looking at the whole case solely from the PRC law perspective, clients should have an in-depth understanding about how one legal issue works under different rules in different jurisdictions,” he says. “In the meantime, given the sensitivity, some disputes are no longer relating to pure legal issues only.”
Chen says that Chinese companies should pay more attention to internal document management. “It is my experience that when it comes to the stage of discovery in foreign legal proceedings, Chinese companies always face a lot of difficulties due to a lack of internal policies on the management and retention of internal documents, which may lead the courts and arbitral tribunals to draw an adverse inference.”
Chen Xiaoshan, DLA PiperChen Xiaoshan, DLA Piper
Mishandling of documents appears to be a widespread but understated pain point among Chinese companies, one liable to cause disproportionate legal hardships down the line.
“When handling disputes related to funds, investments, insurance and construction, I have encountered many enterprises that had trouble producing evidence, simply because they improperly managed internal personnel transfer, evidence preservation and filing,” says Zhang Lixia, of Huamao & Guigu. “It is my belief that standardisation of file management in terms of contracts, transaction logs and performance records is vital for companies to address potential disputes.”
Fortune favours the prepared. For Chinese enterprises operating at an international level, or planning to do so, it is vital that they remain up to date about legal, political and economic situations, as well as business practices, most pertinent to the other side of the negotiation table.
David Jia, of Long An, urges Chinese companies to closely follow global developments, especially legal and policy updates, as well as trends in jurisdictions relevant to the industry in which they operate. “Diligently develop compliance of the company, and remember to put ‘compliance interests’ above general commercial interests,” he advises.
In times of uncertainties, Ray Liu at Dorsey cautions outbound enterprises in China to take great care with risk prevention, explicitly distinguish contractual parties’ rights, obligations and sharing of risks, and to the greatest extent possible avoid disputes arising from unclear contractual stipulations, or different understandings of contract terms. “In times of dispute, it is vital to comprehend the rules of the game, and to make full use of pre-action negotiation and mediation, so as to save unnecessary costs,” he says.
“Lastly, outbound enterprises should be more proactive in resorting to legal means to protect their rights and interests when they are violated,” he concludes.
Chris Zhang, Jincheng Tongda & NealChris Zhang, Jincheng Tongda & Neal
On a positive note, Xiao Jin, of King & Wood Mallesons, observes that with restrictive foreign investment policies sprouting up around the world, Chinese companies have visibly raised their awareness of rights protection, and quickly learned to defend their overseas legal rights.
“With the global situation being ever unpredictable and trade protectionism on the rise, more disputes are going beyond simple commercial disagreements between companies, but have instead become hybrid conflicts mixed with the actions of local governments,” says Xiao, stressing the importance to accurately judge the nature of a cross-border dispute and identify legal remedies beyond litigation and arbitration, while cautioning that such remedies may be mutually exclusive.
With the world changing at an almost dazzling pace, laws and rule books are under increasingly intense scrutiny for their continuing suitability. In China, court and arbitration practices are becoming more internationally aligned, industry-specific and tech savvy.
Amendments to the Civil Procedure Law (CPL), which came into effect on 1 January 2022, reflect these directions. They have broadened the application of the sole-judge panel to include ordinary and second-instance hearings, improving judicial efficiency, and have optimised the standards of small claim procedure.
“With the amendment, cases involving small claims are more specific, their applicable standards more reasonable, and the procedures further expedited,” says Chris Zhang, of Jincheng Tongda & Neal. “Besides further reducing litigation costs, these measures promote the separation of complex and simple cases, which represents another step towards the true democratisation of the justice system.”
Furthermore, for the first time in China, the amended CPL officially recognised online proceedings as equally valid as the offline version. It also allowed for electronic delivery of judicial documents, and shortened the term for service of process by public announcement from 60 to 30 days.
Zhang Lixia points out that content related to judicial reviews in foreign-related business dealings and arbitration, in the Minutes of the Symposium on the Trial of Foreign-related Commercial Cases by Courts Nationwide issued by the Supreme People’s Court (SPC) in January 2022, have a great impact on commercial arbitration, while demonstrating a comprehensive support to develop arbitration as a means of dispute resolution. “The minutes represent a swift attitude change toward ‘arbitration before litigation’ clauses,” she says.
“Courts used to make independent decisions on whether contracts containing such a clause should go through arbitration or litigation, but now the SPC treats the ‘arbitration before litigation’ arrangements as valid arbitration agreements, as in only the agreement on litigation is deemed invalid, without affecting the validity of arbitration agreement.”
Judicial bodies and adjudicators have innovated by opening other fronts to make dispute resolution overall more pragmatic and cost-efficient. Ray Liu, of Dorsey, is especially impressed with the SPC’s “one stop” diversified resolution platform for international commercial disputes.
“The platform allows for information sharing and connection between the litigation, mediation and arbitration mechanisms of the China International Commercial Court,” he says. “Since its inception, it has included numerous prominent international commercial arbitration and mediation institutions, and this year it connected with the Hong Kong International Arbitration Centre [HKIAC] for the first time.
“As a distinctive mechanism that organically connects litigation, mediation and arbitration with one another, it provides effective judicial support throughout international commercial disputes for Chinese and foreign parties alike, demonstrating the labours of China’s ‘smart court’ development and its competitive edge in international dispute resolution.”
Smart court, as mentioned by Liu, refers to the modernisation of China’s court system and capacity with big data, cloud computing, artificial intelligence and other cutting-edge technologies. “By allowing online filing of cases and online court hearings, smart courts offer a lot of convenience to both lawyers and their clients,” says Zhang Guanglei.
Similarly, China’s burgeoning sector of arbitration is trail blazing on the digital front. Zhang Guanglei, of Jingtian & Gongcheng, cites the 2022 edition of arbitration rules of Shanghai Arbitration Commission (SHAC), enacted on 1 July, and the arbitration rules of the Shenzhen Court of International Arbitration (SCIA), amended in February 2022, as prime examples.
Zhang Lixia, Huamao & Guigu Law FirmZhang Lixia, Huamao & Guigu Law Firm
The SHAC rules provide that “unless the parties agreed to the contrary, arbitral tribunals may elect to conduct hearings on online video or video-conferencing platforms according to the needs of the case,” while the SCIA rules provide that the arbitral institution or tribunal may require parties to submit documents, and arrange the case filing, service, hearing and cross-examination through the online arbitration service platform, unless they agreed to the contrary.
Besides developments towards “smart arbitration”, SHIAC’s new arbitration rules made other strides to match the international pace, including requiring the disclosure of third-party funding (TPF) and including international investment disputes into the jurisdiction of arbitration.
Forming a clear pattern, the new arbitration rules of the Beijing Arbitration Commission (BAC), effective from 1 February 2022, recognised the validity of online hearings and electronic services. It further revamped rules on the composition of an arbitral tribunal by allowing two arbitrators to jointly elect a presiding arbitrator, in the event that the parties failed to do so first.
“Diversification of how presiding arbitrators are produced has positive effects on the arbitral tribunal’s independence and credibility of the institution,” says Zhang Lixia.
Chen Xiaoshan, of DLA Piper, reserves particular praise for the HKIAC’s Case Digest system launched at the end of 2021. “This database includes anonymised and summarised procedural decisions made by the HKIAC under various procedural rules,” he says. “It offers parties and their representatives insight into the procedural decision-making of the HKIAC’s proceeding committee and the appointments committee. It also helps parties and their representatives better understand the relevant HKIAC rules.”
Starting from 1 June 2022, CIETAC enacted its Special Relief Arrangements on Arbitration Fees Responding to the Covid-19 Pandemic, which set out scenarios where arbitration fees may be reduced or returned if the parties are affected by the pandemic. “By alleviating the cost concerns of parties, especially for SMEs, it is undoubtedly a welcome policy for those seeking legal relief to defend their lawful rights,” says Cao.
Furthermore, the China Marine Law Association (CMLA) and China Maritime Arbitration Commission (CMAC) jointly published the CMLA Ad Hoc Arbitration Rules and CMAC Rules as Appointing Authority in Arbitration on 18 March 2022.
Ad hoc arbitration, conducted without recourse to institutional arbitration rules and without the oversight of an arbitral institution, is often seen as a less costly, more flexible option. Previously, it had been elusive in China’s relevant legislations, although overseas ad hoc arbitral awards may be recognised and enforced, according to the SPC’s interpretations to the CPL.
“These are the first ad hoc arbitration rules formulated and promulgated in China, as an important step to match with international practice,” says Zhang Lixia. “The debut of domestic ad hoc arbitration rules is a bold, innovative move that will set valuable precedents to the amendments of the Arbitration Law.” The addition of “ad hoc arbitral tribunal” in last year’s draft of the amended Arbitration Law was perceived as the first sign of importing the practice at long last.
Between the amended CPL affirming the validity of online litigation, and its top arbitration venues revising their rules to facilitate online hearings, it is safe to conclude that online dispute resolution (ODR) continues to thrive in China. But where does it go from here?
Zhang Guanglei, Jingtian & GongchengZhang Guanglei, Jingtian & Gongcheng
Since the outbreak of covid-19, online alternatives to in-person events, formerly considered to be relatively niche, quickly entered mainstream and in many cases became pillars that supported their forms of activity through the toughest times.
However, some would argue that the toughest times are behind us. Offline events have made a resounding comeback in 2022, especially in countries and regions where gathering and travel restrictions have been eased. According to a recent Bloomberg analysis, many billionaires who found their fortunes exponentially increase due to covid-induced market restructurings have now watched the same numbers plummet by as much as 80% as the needs for their products recede.
These include the chairman and CEO of Zoom, operator of the popular video-conferencing software; the co-founder of Carvana, an e-commerce platform for used cars; and the founder of Coupang, often referred to as the “Amazon of South Korea”.
These trends seem to indicate that, while the value and popularity of virtual events cannot be denied, they may have been somewhat expanded by the extraordinary circumstances of the past few years. But is that the case for ODR?
“Personally, I believe the need for ODR will decline after the pandemic, but not necessarily to the pre-covid level,” says Cao, who proposes to base the form of hearings on the specific type of dispute. “For certain complicated disputes, especially tech-related ones, offline hearings allow arbitration attorneys to better state the case, and for the tribunal to better sort out the convoluted facts,” he says.
By comparison, disputes involving relatively small amounts or less complex circumstances benefit little from physical proceedings,” he adds. “Parties may opt for online or hybrid hearing in order to conserve both costs and time.”
Zhang Guanglei agrees that the demand for ODR will remain above pre-covid levels even with the pandemic coming under control and offline events mounting a robust return. “While online hearings still risk being incompatible with highly specialised or technical cases, it can still subsist as a viable option with technological improvements, or the adoption of an ‘online plus offline’ mode,” he says.
“Just in the first half of 2022, we have conducted a number of hybrid arbitration hearings, where arbitrators or attorneys sometimes patch in via online access, which to a large degree prevented delays caused by incompatible time arrangements between all participants.”
Ray Liu points out that the innate advantages of ODR will endure even with the resumption of physical hearings. “To lawyers, ODR is expedient, efficient and fast, free from spacial constraints; while for clients, especially SMEs, ODR saves costs in transportation and printing, while also consuming less time.”
On the other hand, he does not believe that ODR is on a path to completely overtake the more traditional format. “ODR makes it difficult to verify party identities, give testimonies and present evidence, and is especially limited when the cases are complex or the parties suffer from bad internet connection,” he points out.
Ray Liu, DorseyRay Liu, Dorsey
“I believe that ODR is at its most useful and efficient in small claim cases such as cross-border e-commerce disputes or domain name infringements, while traditional offline procedures are more suitable to complicated cases involving a lot of witnesses and physical evidence.”
Apart from practicality, ODR’s post-covid rise to prominence may have irrevocably altered the general habit of legal professionals. To Ji Xuefeng, the director of Tianjin office of Anli Partners, ODR exceeded her expectations in terms of efficiency and ease of use. “I believe that in the future, even when the pandemic is a distant memory and life has resumed a normal pace, ODR will still enjoy a significant presence,” she says, “especially as it makes long-distance proceedings so much more efficient by taking traffic time out of the equation.”
Zhou Zhiming, a Shanghai-based partner at Guantao Law Firm, acknowledges that social perception of ODR has changed, and that the pandemic helped its spread and development by allowing its strengths and value to shine. He says that in prior surveys he conducted in his capacity as the director of the civil and commercial litigation committee of the Shanghai Bar Association, many lawyers reported that due to technical constraints and inconsistent ODR capacity at each court and arbitration venue, the ODR experience overall fell short of its offline counterpart.
Nevertheless, Zhou is optimistic about the long-term applicability and accessibility of ODR. “To parties or lawyers participating in online lawsuits or arbitrations, my advice is to explore the option of submitting in-trial comments to the court or tribunal beforehand,” he says. “During the trial, it is important to keep expressions concise and accurate. In addition, pre-hearing preparations should cover not only the case itself, but also the internet connection, equipment and environment, and make any necessary adjustments.”
In many ways, China’s explorations of technology-based judicial proceeding have gone beyond the use of video-conferencing and the digitisation of evidence. In 2017, the first internet court in the world was inaugurated in Hangzhou. Beijing and Guangzhou soon followed suit.
“Internet courts, incorporated with technologies related to identity authentication, electronic data input, online evidence presentation and electronic delivery, are fully online unless parties applied to conduct certain procedures offline,” says Chris Zhang.
As internet courts are designed to handle internet and technology-related cases such as disputes over online service contracts, domain names, blockchain, cryptocurrency and non-fungible tokens (NFTs), they form a unique ecosystem to use technologies to resolve tech-related disputes, giving rise to a series of valuable legal precedents.
“The Hangzhou Internet Court gave online judgments to China’s first unfair competition case involving big data products, the first case to confirm the legal review method of blockchain electronic certificates, the first Bitcoin ‘mining machine’ dispute, and the first NFT infringement,” says Ray Liu. “Evidently, internet courts are innovative not only in its procedures, but also in terms of the types and nature of the disputes.”
In July 2020, the Hangzhou Internet Court officially launched its cross-border trade tribunal, being the first in China to specialise in cross-border digital trade disputes. The first case it heard, a lawsuit filed by a Singaporean user against Tmall, China’s biggest B2C e-commerce platform, was broadcast live across dozens of media and watched by 8 million viewers.
“I believe that AI, blockchain and such technologies will profoundly transform ODR and internet courts, and fundamentally affect the procedural, or even substantive, rules of court proceedings, including how services are delivered and how evidence is presented,” says Liu.
!function(e,i,n,s){var t=”InfogramEmbeds”,d=e.getElementsByTagName(“script”)[0];if(window[t]&&window[t].initialized)window[t].process&&window[t].process();else if(!e.getElementById(n)){var o=e.createElement(“script”);o.async=1,o.id=n,o.src=”https://e.infogram.com/js/dist/embed-loader-min.js”,d.parentNode.insertBefore(o,d)}}(document,0,”infogram-async”);
China Business Law Journal reveals the law firms that have excelled in the past year
We asked some of our elite A-list lawyers to provide us with keywords that others might use to rise to the top of their game
After months of intensive market surveys and research, China Business Law Journal’s editorial team unveils our In-house Counsel Award winners
Top arbitration institutions examine the evolution of the sector in China
General counsel hold the keys to unlocking sound investment opportunities in troubled times
Join our mailing list for legal news and alerts

source

Read more
  • Published in Uncategorized
No Comments
  • 14
  • 15
  • 16
  • 17
  • 18

Recent Posts

  • 5 Best AI Document Management Solutions (August 2025) – Unite.AI

    source...
  • Epson Workforce ES-300W Portable Wireless Duplex Document Scanner Review – PCMag

    source...
  • 11 Best Document Scanner Apps for iPhone, iPad in 2025 – howtoisolve.com

    source...
  • The Best Scanners We've Tested (August 2025) – PCMag

    source...
  • 11 Best Document Scanner Apps for iPhone, iPad in 2025 – HowToiSolve

    source...

Recent Comments

    Featured Posts

    • 5 Best AI Document Management Solutions (August 2025) – Unite.AI

      0 comments
    • Epson Workforce ES-300W Portable Wireless Duplex Document Scanner Review – PCMag

      0 comments
    • 11 Best Document Scanner Apps for iPhone, iPad in 2025 – howtoisolve.com

      0 comments
    • The Best Scanners We've Tested (August 2025) – PCMag

      0 comments
    • 11 Best Document Scanner Apps for iPhone, iPad in 2025 – HowToiSolve

      0 comments

    Archives

    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2021
    • February 2021
    • December 2020
    • November 2020
    • April 2019

    Categories

    • Business
    • DMS
    • Networking
    • Technology
    • Tips
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    GET A FREE QUOTE

    Please fill this for and we'll get back to you as soon as possible!

    FACEBOOK

    2,175
    LIKES

    TWITTER

    1,050
    Followers

    PINTEREST

    101
    follower

    FOOTER MENU

    • Terms and Conditions
    • F.A.Q.
    • Our Services
    • BLOG & STORIES

    NEWSLETTER SIGNUP

    By subscribing to our mailing list you will always be update with the latest news from us.

    We never spam!

    GET IN TOUCH

    II Chundriger Road Uni Plaza Karachi-Pakistan
    Email: Info@Itzonepakistan.com
    Phone:
    Direct+92-314-4166-777
    Sales+92-313-8854-133

    Social Platform

    • Tweet
    • Pin It

    RSS ARY NEWS

    • WATCH: Moment Chris Woakes walks out to bat with arm in a sling August 4, 2025
    • GET SOCIAL
    IT Zone Pakistan

    Copyright @2024-25. All rights reserved | Design & Develop IT Zone Pakistan.

    TOP