Feed slashdot Slashdot

Favorite IconSlashdot

Link https://slashdot.org/
Feed https://rss.slashdot.org/Slashdot/slashdotMain
Copyright Copyright Slashdot Media. All Rights Reserved.
Updated 2025-04-22 03:33
NATO Countries Pledge $1 Billion To Strengthen Collection, Sharing of Space-Based Intel
An anonymous reader quotes a report from DefenseScoop: A group of NATO countries are set to begin implementing a new project aimed at improving the alliance's ability to quickly share intelligence gathered by space-based assets operated by both member nations and the commercial sector. Seventeen NATO members signed a memorandum of understanding for the Alliance Persistence Surveillance from Space (APSS) program as part of the annual NATO summit being held in Washington this week, the alliance announced Tuesday. Members will now move into a five-year implementation phase of the project, during which allies will contribute more than $1 billion "to leverage commercial and national space assets, and to expand advanced exploitation capacities," according to a press release. The United States is one of the nations signed onto the initiative, as well as Belgium, Canada, Denmark, Finland, France, Germany, Greece, Hungary, Italy, Luxembourg, the Netherlands, Norway, Poland, Romania, Sweden and Turkey, according to a NATO source. The transatlantic organization created APSS last year with the intent to establish a "virtual constellation" -- dubbed Aquila -- comprising both national and commercial space systems, sensors and data that can be used by NATO's command structure and other allies. The project is considered "the largest multinational investment in space-based capabilities" in the alliance's history, and is set to increase NATO's ability "to monitor activities on the ground and at sea with unprecedented accuracy and timeliness," a press release stated. Participating nations will be able to use their own space systems, provide tools for intelligence collection and analysis, or purchase space-based data gathered by commercial constellations. "Integrating and exploiting data from space effectively has been a growing challenge over time," a NATO press release stated. "By leveraging latest technologies from industry, APSS will help advance NATO's innovation agenda and offer a new platform to engage with the growing space industry." The APSS project is part of the larger implementation of NATO's overarching space policy adopted in 2019, which officially recognized space as a new operational domain. Since then, the alliance has worked to bolster its presence in space -- including the establishment of a NATO Space Centre in 2020 and approval of an official Space Branch within the Allied Command Transformation in June.Read more of this story at Slashdot.
Dune-Inspired Spacesuit Recycles Urine Into Clean Drinking Water
Researchers from Cornell University have developed a novel urine collection and filtration system for spacesuits, designed to improve hygiene and comfort for astronauts during long spacewalks. This new system, inspired by the 'stillsuits' from the Dune franchise, recycles urine into potable water using a vacuum-based external catheter and a forward-reverse osmosis unit. It's expected to be tested for use in upcoming NASA moon and Mars missions. Phys.Org reports: [Researchers] have now designed a urine collection device, including an undergarment made of multiple layers of flexible fabric. This connects to a collection cup (with a different shape and size for women and men) of molded silicone, to fit around the genitalia. The inner face of the collection cup is lined with polyester microfiber or a nylon-spandex blend, to draw urine away from the body and towards the inner cup's inner face, from where it is sucked by a vacuum pump. A RFID tag, linked to an absorbent hydrogel, reacts to moisture by activating the pump. Once collected, the urine is diverted to the urine filtration system, where it gets recycled with an efficiency of 87% through a two-step, integrated forward and reverse osmosis filtration system. This uses a concentration gradient to remove water from urine, plus a pump to separate water from salt. The purified water is then enriched in electrolytes and pumped into the in-suit drink bag, again available for consumption. Collecting and purifying 500ml of urine takes only five minutes. The system, which integrates control pumps, sensors, and a liquid-crystal display screen, is powered by a 20.5V battery with a capacity of 40 amp-hours. Its total size is 38 by 23 by 23 cm, with a weight of approximately eight kilograms: sufficiently compact and light to be carried on the back of a spacesuit. Now that the prototype is available, the new design can be tested under simulated conditions, and subsequently during real spacewalks. The design has been published in the journal Frontiers in Space Technology.Read more of this story at Slashdot.
Three Mile Island Considers Nuclear Restart
An anonymous reader quotes a report from Reuters: Constellation Energy is in talks with the Pennsylvania governor's office and state lawmakers to help fund a possible restart of part of its Three Mile Island power facility, the site of a nuclear meltdown in the 1970s, three sources familiar with the discussions said on Tuesday. The conversations, which two sources described as "beyond preliminary," signal that Constellation is advancing plans to revive part of the southern Pennsylvania nuclear generation site, which operated from 1974 to 2019. The nuclear unit Constellation is considering restarting is separate from the one that melted down. The sources said that a shut Michigan nuclear plant, which was recently awarded a $1.5 billion conditional loan to restart from the administration of U.S. President Joe Biden, could serve as a private-public sector blueprint for Three Mile Island. The sources asked not to be named due to the sensitivity of the discussions. "Though we have determined it would be technically feasible to restart the unit, we have not made any decision on a restart as there are many economic, commercial, operational and regulatory considerations remaining," Constellation spokesperson Dave Snyder said in an email. Snyder did not comment on the specifics of discussions about reopening the Pennsylvania site. Last month, Constellation told Reuters that it had cleared an engineering study of Three Mile Island, though it was unknown if the Baltimore, Maryland-based energy company would move forward with plans to reopen the site. Constellation also said that given the current premium placed on nuclear energy, acquiring other sites was generally off the table and the company would instead look to expand its existing fleet. The Three Mile Island unit that could be restarted is different to the site's unit 2, which experienced a partial meltdown in 1979 in the most famous commercial nuclear accident in U.S. history. The report notes that "no U.S. nuclear power plant has been reopened after shutting." A restart will not only be costly, but it will be challenged over safety and environmental concerns.Read more of this story at Slashdot.
OpenAI Working On New Reasoning Technology Under Code Name 'Strawberry'
OpenAI is close to a breakthrough with a new project called "Strawberry," which aims to enhance its AI models with advanced reasoning abilities. Reuters reports: Teams inside OpenAI are working on Strawberry, according to a copy of a recent internal OpenAI document seen by Reuters in May. Reuters could not ascertain the precise date of the document, which details a plan for how OpenAI intends to use Strawberry to perform research. The source described the plan to Reuters as a work in progress. The news agency could not establish how close Strawberry is to being publicly available. How Strawberry works is a tightly kept secret even within OpenAI, the person said. The document describes a project that uses Strawberry models with the aim of enabling the company's AI to not just generate answers to queries but to plan ahead enough to navigate the internet autonomously and reliably to perform what OpenAI terms "deep research," according to the source. This is something that has eluded AI models to date, according to interviews with more than a dozen AI researchers. Asked about Strawberry and the details reported in this story, an OpenAI company spokesperson said in a statement: "We want our AI models to see and understand the world more like we do. Continuous research into new AI capabilities is a common practice in the industry, with a shared belief that these systems will improve in reasoning over time." On Tuesday at an internal all-hands meeting, OpenAI showed a demo of a research project that it claimed had new human-like reasoning skills, according to Bloomberg, opens new tab. An OpenAI spokesperson confirmed the meeting but declined to give details of the contents. Reuters could not determine if the project demonstrated was Strawberry. OpenAI hopes the innovation will improve its AI models' reasoning capabilities dramatically, the person familiar with it said, adding that Strawberry involves a specialized way of processing an AI model after it has been pre-trained on very large datasets. Researchers Reuters interviewed say that reasoning is key to AI achieving human or super-human-level intelligence.Read more of this story at Slashdot.
CISA Broke Into a US Federal Agency, No One Noticed For a Full 5 Months
A 2023 red team exercise by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) at an unnamed federal agency exposed critical security failings, including unpatched vulnerabilities, inadequate incident response, and weak credential management, leading to a full domain compromise. According to The Register's Connor Jones, the agency failed to detect or remediate malicious activity for five months. From the report: According to the agency's account of the exercise, the red team was able to gain initial access by exploiting an unpatched vulnerability (CVE-2022-21587 - 9.8) in the target agency's Oracle Solaris enclave, leading to what it said was a full compromise. It's worth noting that CVE-2022-21587, an unauthenticated remote code execution (RCE) bug carrying a near-maximum 9.8 CVSS rating, was added to CISA's known exploited vulnerability (KEV) catalog in February 2023. The initial intrusion by CISA's red team was made on January 25, 2023. "After gaining access, the team promptly informed the organization's trusted agents of the unpatched device, but the organization took over two weeks to apply the available patch," CISA's report reads. "Additionally, the organization did not perform a thorough investigation of the affected servers, which would have turned up IOCs and should have led to a full incident response. About two weeks after the team obtained access, exploit code was released publicly into a popular open source exploitation framework. CISA identified that the vulnerability was exploited by an unknown third party. CISA added this CVE to its Known Exploited Vulnerabilities Catalog on February 2, 2023." [...] After gaining access to the Solaris enclave, the red team discovered they couldn't pivot into the Windows part of the network because missing credentials blocked their path, despite enjoying months of access to sensitive web apps and databases. Undeterred, CISA managed to make its way into the Windows network after carrying out phishing attacks on unidentified members of the target agency, one of which was successful. It said real adversaries may have instead used prolonged password-praying attacks rather than phishing at this stage, given that several service accounts were identified as having weak passwords. After gaining that access, the red team injected a persistent RAT and later discovered unsecured admin credentials, which essentially meant it was game over for the agency being assessed. "None of the accessed servers had any noticeable additional protections or network access restrictions despite their sensitivity and critical functions in the network," CISA said. CISA described this as a "full domain compromise" that gave the attackers access to tier zero assets -- the most highly privileged systems. "The team found a password file left from a previous employee on an open, administrative IT share, which contained plaintext usernames and passwords for several privileged service accounts," the report reads. "With the harvested Lightweight Directory Access Protocol (LDAP) information, the team identified one of the accounts had system center operations manager (SCOM) administrator privileges and domain administrator privileges for the parent domain. "They identified another account that also had administrative permissions for most servers in the domain. The passwords for both accounts had not been updated in over eight years and were not enrolled in the organization's identity management (IDM)." From here, the red team realized the victim organization had trust relationships with multiple external FCEB organizations, which CISA's team then pivoted into using the access they already had. The team "kerberoasted" one partner organization. Kerberoasting is an attack on the Kerberos authentication protocol typically used in Windows networks to authenticate users and devices. However, it wasn't able to move laterally with the account due to low privileges, so it instead used those credentials to exploit a second trusted partner organization. Kerberoasting yielded a more privileged account at the second external org, the password for which was crackable. CISA said that due to network ownership, legal agreements, and/or vendor opacity, these kinds of cross-organizational attacks are rarely tested during assessments. However, SILENTSHIELD assessments are able to be carried out following new-ish powers afforded to CISA by the FY21 National Defense Authorization Act (NDAA), the same powers that also allow CISA's Federal Attack Surface Testing (FAST) pentesting program to operate. It's crucial that these avenues are able to be explored in such exercises because they're routes into systems adversaries will have no reservations about exploring in a real-world scenario. For the first five months of the assessment, the target FCEB agency failed to detect or remediate any of the SILENTSHIELD activity, raising concerns over its ability to spot genuine malicious activity. CISA said the findings demonstrated the need for agencies to apply defense-in-depth principles. The cybersecurity agency recommended network segmentation and a Secure-by-Design commitment.Read more of this story at Slashdot.
German Navy To Replace Aging 8-Inch Floppy Drives With an Emulated Solution
Mark Tyson reports via Tom's Hardware: The German Navy is searching for a new storage system to replace the aging 8-inch (20cm) floppy disks which are vital to the running of its Brandenburg class F123 frigates. According to an official tender document, the ideal answer to the German Navy's problems would be a drop-in floppy disk replacement based upon a storage emulation system, reports Golem.de. Germany's Brandenburg class F123 frigates were commissioned in the mid 1990s, so it is understandable that floppy disks were seen as a handy removable storage medium. These drives are part of the frigates' data acquisition system and, thus "central to controlling basic ship functions such as propulsion and power generation," according to the source report. The F123s are specialized in submarine hunting, and they are also being upgraded in terms of the weapon systems and weapon control systems. Swedish company Saab is the general contractor for the F123 modernizations. It won't be trivial to replace three decades old computer hardware seamlessly, while retaining the full functionality of the existing floppies. However, we note that other companies have wrestled similar problems in recent years. Moreover, there are plenty of emulator enthusiasts using technologies for floppy emulation solutions like Gotek drives which can emulate a variety of floppy drive standards and formats. There are other workable solutions already out there, but it all depends on who the German Navy chooses to deliver the project.Read more of this story at Slashdot.
Southwest Airlines Strikes Deal For Electric Air Taxi Network
Southwest Airlines has signed a deal with Archer Aviation to develop plans for an on-demand eVTOL (electric vertical takeoff and landing) service in California. The Verge reports: The service will operate using Archer's battery-powered, four-passenger, tilt-rotor Midnight aircraft, which are designed to take off and land vertically from a landing strip like a helicopter. As part of the deal, the aircraft will get access to 14 California airports where Southwest operates. [...] Archer claims that trips that normally take 60-90 minutes by car can be done in 10-20 minutes in the company's air taxis. Archer came out of stealth in spring 2020 after having poached key talent from Wisk and Airbus' Vahana project. (That fact spurred a lawsuit from Wisk for alleged trade secret theft, which was finally settled last year.) The company has a $1 billion order from United Airlines for its eVTOL aircraft and a deal to mass-produce its eVTOL craft with global automaker Stellantis. Archer recently received a Part 135 air carrier certification from the Federal Aviation Administration, which the company will need to operate an on-demand air taxi service. Archer has said it plans on launching before the end of 2025. [...] As part of the deal, Archer will work with Southwest and its partners on the development of an air taxi network across California. That includes the unions of Southwest employees, like the Southwest Airlines Pilots Association.Read more of this story at Slashdot.
American Hacker In Turkey Linked To Massive AT&T Breach
An anonymous reader quotes a report from 404 Media: John Binns, a U.S. citizen who has been incarcerated in Turkey, is linked to the massive data breach of metadata belonging to nearly all of AT&T's customers that the telecommunications giant announced on Friday, three sources independently told 404 Media. [...] As 404 Media reported in January, Binns has already been indicted for allegedly breaking into T-Mobile in 2021 and selling stolen data on more than 40 million people. Now, he is allegedly connected to the latest breach against AT&T, which the company said it detected in April. The AT&T data was lifted from a Snowflake instance, a data warehousing tool, AT&T told 404 Media. Snowflake has been at the center of a series of massive and high profile breaches, including Ticketmaster and Santander. In a blog post published in June which covered a threat actor targeting Snowflake instances, cybersecurity company Mandiant said the threat actor, which it dubs UNC5537, "comprises members based in North America, and collaborates with an additional member in Turkey." In its breach announcement, AT&T said authorities had already apprehended one of the people involved in the breach. Binns was recently arrested and detained in Turkey, The Desk reported in May. That report, which is the last public information about his whereabouts, says he was detained following an extradition request from the U.S. Before he was arrested, Binns told 404 Media in January that he had "reasons to not be concerned" about being extradited.Read more of this story at Slashdot.
Amazon's AI Chatbot Rufus Is Now Live For All US Customers
Amazon's AI chatbot Rufus is now live for all U.S. customers. Engadget's Lawrence Bonk reports: So what does it do? It's an Amazon chatbot so it helps with shopping. You can ask for lists of recommended products and ask what specific products do and stuff like that. I've tooled around with it a bit this morning and it seems fine, though a bit boring. I will say that I cross-referenced some of the recommended products with the web version and Rufus does not automatically list promoted items, at least for now. It spit out a seemingly random list of well-reviewed products on several occasions. That's fine by me, though I'm not about to buy something based on the word of a one-day old chatbot. You can also ask specific questions about products, but the answers seem to be pulled directly from the descriptions. As any regular Amazon customer knows, some of these descriptions are accurate and others aren't. The chatbot is tied to your personal account, so it can answer questions about upcoming deliveries and the like. Amazon says that the bot has been trained on its product catalog, along with customer reviews, community Q&As and public information found throughout the web. However, it hasn't disclosed what websites it pulled that public information from and to what end. It didn't even confirm that these were retail-adjacent websites. You can try Rufus by updating to the latest version of the Amazon Shopping app. It'll be available in the bottom navigation bar with a typical AI icon consisting of bubbles and sparkles/stars.Read more of this story at Slashdot.
Linus Torvalds Says RISC-V Will Make the Same Mistakes As ARM and x86
Jowi Morales reports via Tom's Hardware: There's a vast difference between hardware and software developers, which opens up pitfalls for those trying to coordinate the two teams. Arm and x86 researchers encountered it years ago -- and Linus Torvalds, the creator of Linux, fears RISC-V development may fall into the same chasm again. "Even when you do hardware design in a more open manner, hardware people are different enough from software people [that] there's a fairly big gulf between the Verilog and even the kernel, much less higher up the stack where you are working in what [is] so far away from the hardware that you really have no idea how the hardware works," he said (video here). "So, it's really hard to kind of work across this very wide gulf of things and I suspect the hardware designers, some of them have some overlap, but they will learn by doing mistakes -- all the same mistakes that have been done before." [...] "They'll have all the same issues we have on the Arm side and that x86 had before them," he says. "It will take a few generations for them to say, 'Oh, we didn't think about that,' because they have new people involved." But even if RISC-V development is still expected to make many mistakes, he also said it will be much easier to develop the hardware now. Linus says, "It took a few decades to really get to the point where Arm and x86 are competing on fairly equal ground because there was al this software that was fairly PC-centric and that has passed. That will make it easier for new architectures like RISC-V to then come in."Read more of this story at Slashdot.
SpaceX's Historic Falcon 9 Success Streak Is Over
An anonymous reader quotes a report from Reuters: SpaceX's workhorse Falcon 9 rocket was grounded by the U.S. Federal Aviation Administration (FAA) on Friday after one broke apart in space and doomed its payload of Starlink satellites, the first failure in more than seven years of a rocket relied upon by the global space industry. Roughly an hour after Falcon 9 lifted off from the Vandenberg Space Force Base in California on Thursday night, the rocket's second stage failed to reignite and deployed its 20 Starlink satellites on a shallow orbital path where they will soon reenter and burn up in Earth's atmosphere. The attempt to reignite the engine "resulted in an engine RUD for reasons currently unknown," SpaceX CEO Elon Musk wrote early on Friday on his social media platform X, using an industry acronym for Rapid Unscheduled Disassembly that usually means explosion.The Falcon 9 will be grounded until SpaceX investigates the cause of the failure, fixes the rocket and receives the agency's approval, the FAA said in a statement. That process could take several weeks or months, depending on the complexity of the failure and SpaceX's plan to fix it. Musk said SpaceX was updating the software of the Starlink satellites to force their on-board thrusters to fire harder than usual to avoid a fiery atmospheric re-entry. "Unlike a Star Trek episode, this will probably not work, but it's worth a shot," Musk said. The satellites' altitude is so shallow that Earth's gravity is pulling them 3 miles (5 km) closer toward the atmosphere with each orbit, SpaceX later said, confirming they would inevitably "re-enter Earth's atmosphere and fully demise." SpaceX said the second stage's failure occurred after engineers detected a leak of liquid oxygen, a propellant. The mishap occurred on Falcon 9's 354th mission. It was the first Falcon 9 failure since 2016, when a rocket exploded on a launch pad in Florida and destroyed its customer payload, an Israeli communications satellite. The failure "breaks a success streak of more than 300 straight missions," notes Reuters. "We knew this incredible run had to come to an end at some point," Tom Mueller, SpaceX's former vice president of propulsion who designed Falcon 9's engines. "... The team will fix the problem and start the cycle again."Read more of this story at Slashdot.
Samsung's New Watch and Earbuds Are Apple Copycats
Samsung unveiled new wearable devices at its Unpacked event earlier this week, drawing comparisons to Apple's offerings. The Galaxy Watch Ultra, set for release on July 24, bears striking similarities to Apple's Watch Ultra 2 launched last September. Both feature titanium cases, orange-accented buttons, and specialized bands. Samsung's version, priced at $650, undercuts Apple's $800 model. Business Insider adds: But the strategy has its downsides. If you spot someone wearing Galaxy Watch Ultra, there's a good chance you'd mistake it for Apple's model -- which doesn't help Samsung differentiate itself. In a statement to Business Insider, Samsung said that the design choices for its new smartwatch were "made to ensure comfort, usability, and durability in a variety of use cases." It didn't mention what went into naming the device. The similarities extend to Samsung's new earbuds. The Galaxy Buds 3 Pro and the Galaxy Buds 3 -- also announced at Unpacked -- got a revamp that steps away from previous designs to make Samsung's Bluetooth earbuds shaped more like Apple AirPods. The Galaxy Buds 2 Pro are stemless and come in light purple, but their successor only comes in silver or white. Similar to the AirPods Pro, Galaxy Buds 3 Pro owners will be able to control their earbuds with gestures.Read more of this story at Slashdot.
Rivers Becoming 'Reservoirs of Disease'
Scientists say "a reservoir of disease" is being created after discovering bacteria that naturally occur in rivers are becoming resistant to antibiotics due to the impact of sewage. From a report: Researchers at the University of Suffolk said bacterial strains found on the non-tidal section of the River Deben in Suffolk had acquired resistance by exchanging DNA with antibiotic resistant E. coli. Some bacteria have become resistant to the antibiotic carbapenem, which is used as the last line of defence in fighting infections already resistant to traditional antibiotics. Dr Nick Tucker, a microbiologist leading the research, described the discovery as "particularly worrying." "Organisms that are currently low risk are being mixed with pathogenic organisms from sewage," he said. "We're needlessly adding pathogenic and virulence genes to bacteria found in the environment, and that could be creating a reservoir of disease." The team has been working closely with citizen scientists from the Deben Climate Centre, who have been taking water samples for two years.They have also been working with scientists at the government's CEFAS laboratories, who have helped identify the new strains that are being screened for their resistance to six of the most commonly-used antibiotics. The River Deben rises in Debenham, Suffolk, before flowing through Woodbridge and down to the North Sea.Read more of this story at Slashdot.
India Antitrust Body Finds Apple Abused Dominant Position in Apps Market
India's antitrust watchdog has concluded that Apple abused its dominant position in the iOS app store market, according to a confidential report seen by Reuters, marking a significant development in the country's scrutiny of tech giants. The Competition Commission of India, which initiated an investigation into Apple in 2021, has determined that the company engaged in "abusive conduct and practices" by compelling developers to utilize its proprietary in-app purchase system, Reuters added. The report asserts that Apple wields "significant influence" over the distribution of digital products to consumers through its iOS platform and App Store, characterizing the tech giant as an "unavoidable trading partner" for app developers who have little choice but to comply with Apple's terms.Read more of this story at Slashdot.
When Scientific Citations Go Rogue
The Conversation: Reading and writing articles published in academic journals and presented at conferences is a central part of being a researcher. When researchers write a scholarly article, they must cite the work of peers to provide context, detail sources of inspiration and explain differences in approaches and results. A positive citation by other researchers is a key measure of visibility for a researcher's own work. But what happens when this citation system is manipulated? A recent Journal of the Association for Information Science and Technology article by our team of academic sleuths -- which includes information scientists, a computer scientist and a mathematician -- has revealed an insidious method to artificially inflate citation counts through metadata manipulations: sneaked references. People are becoming more aware of scientific publications and how they work, including their potential flaws. Just last year more than 10,000 scientific articles were retracted. The issues around citation gaming and the harm it causes the scientific community, including damaging its credibility, are well documented. Citations of scientific work abide by a standardized referencing system: Each reference explicitly mentions at least the title, authors' names, publication year, journal or conference name, and page numbers of the cited publication. These details are stored as metadata, not visible in the article's text directly, but assigned to a digital object identifier, or DOI -- a unique identifier for each scientific publication. References in a scientific publication allow authors to justify methodological choices or present the results of past studies, highlighting the iterative and collaborative nature of science. However, we found through a chance encounter that some unscrupulous actors have added extra references, invisible in the text but present in the articles' metadata, when they submitted the articles to scientific databases. The result? Citation counts for certain researchers or journals have skyrocketed, even though these references were not cited by the authors in their articles.Read more of this story at Slashdot.
Pluto's Not Coming Back, But Astronomers Want To Redefine Planets Again
A group of astronomers want to change the definition of a planet. Their new proposed definition wouldn't bring Pluto back into the planetary fold, but it could reclassify thousands of celestial bodies across the universe. From a report: The International Astronomical Union's (IAU) current definition of a planet, established in 2006, includes only celestial bodies that are nearly round, are gravitationally dominant and orbit our Sun. This Sun-centric definition excludes all of the bodies we've discovered outside our solar system, even if they may fit all other parameters. They are instead considered exoplanets. Those behind the new proposal critiqued the IAU's definition in an upcoming paper in the Planetary Science Journal, arguing it's vague, not quantitative and unnecessarily exclusionary. Their new proposal would instead classify planets based on their mass, considering a planet to be any celestial body that:1. orbits one or more stars, brown dwarfs or stellar remnants and,is more massive than 10AA kilograms (kg) and,is less massive than 13 Jupiter masses (2.5 X 10^28Akg).Read more of this story at Slashdot.
Android 15 Beta Has an Optional Desktop Mode
An anonymous reader shares a report: It's been tried before, more than once, but if it comes as a stock feature, maybe people will actually start to use the feature. Google's Pixel 9 range of fondleslabs is coming soon, and the company has already announced an event, Made by Google, for August 13th at 1000 Pacific Time (that's 1700 UTC, and 1800 for Brits.) The new devices are very likely to run Android 15 -- whose first developer preview appeared in February. Android Police reports that one of the less obvious features of the beta may continue to final release and could become more apparent: the desktop mode that can be activated in Android 14 QPR3 Beta 2.1. Having a desktop mode in Android isn't of itself a new thing. Samsung has offered its Dex feature since the Galaxy S8, and various vultures ventured Dex-wards in 2017 and again in 2018. The snag was that you needed a special dock to try it. Android 10 gained a hidden desktop mode in its developer features, but it wasn't easy to find. These days, though, the baseline is rather closer. Monitors with USB C connections are quite ordinary now, with ordinary prices to match, unlike, say, their prices five years ago. You can even get affordable portable ones.Read more of this story at Slashdot.
iPhone Upgrades - Not Android Switchers - Drive Apple Sales, Bernstein Says
In a new analysis, research firm Bernstein challenges the conventional wisdom surrounding Apple's iPhone sales fluctuations, arguing that perceived market share shifts between Apple and Android devices are largely illusory. The report, which Bernstein sent to its clients, contends that the majority of iPhone buyers are existing users upgrading their devices, rather than switchers from Android platforms. Bernstein posits that year-to-year changes in iPhone unit sales are predominantly driven by Apple's upgrade rates within its established user base. This dynamic creates the appearance of significant market share gains or losses, particularly in China, where consumers are highly sensitive to new features. The analyst notes that upgrade cycles in China tend to be more pronounced than in other markets, leading to exaggerated perceptions of market share volatility. He suggests that the company's struggles in the region are more likely attributed to poor upgrade rates within its existing customer base rather than a mass exodus to competitors like Huawei.Read more of this story at Slashdot.
NYC's Massive Link5G Towers Aren't Actually Providing 5G
An anonymous reader shares a report: The vast majority of the massive, metallic towers the city commissioned to help low-income neighborhoods access high-speed 5G internet still lack cell signal equipment -- more than two years after hundreds of the structures began sprouting across the five boroughs. Just two of the nearly 200 Link5G towers installed by tech firm CityBridge since 2022 have been fitted with 5G equipment, company officials said. Delayed installations and cooling enthusiasm around 5G technology have discouraged carriers like Verizon from using the towers to build out their networks, experts say. The firm only has an agreement with a single telecommunications carrier to deliver high-speed internet, stymieing its efforts to boost mobile connectivity citywide. The 32-foot-tall structures, which resemble giant tampon applicators emerging from the sidewalk, offer the same services as the LinkNYC electronic billboards that popped up around the city in 2016. Those were also installed by CityBridge. Both the original Link kiosks and the 5G towers provide free limited-range Wi-Fi, charging outlets and a tablet to connect users to city services. Data shared by the company shows that 16 million people have used the internet at kiosks since 2016, and the attached tablets are used to call for city services thousands of times each month. But unlike the LinkNYC kiosks, each new tower is topped with a 12-foot-tall cylindrical mesh chamber containing five empty shelves reserved for companies like Verizon and T-Mobile to store the equipment they use to transmit high-speed 5G internet service to paying customers.Read more of this story at Slashdot.
Indonesia Says It Has Begun Recovering Data After Major Ransomware Attack
Indonesia said it is beginning to recover data that had been encrypted in a major ransomware attack last month which affected more than 160 government agencies. From a report: The attackers identified as Brain Cipher asked for $8 million in ransom to unlock the data before later apologising and releasing the decryption key for free, according to Singapore-based cybersecurity firm StealthMole. The attack has disrupted multiple government services including immigration and operations at major airports. Indonesian officials have acknowledged that the bulk of the data had not been backed up. Chief Security Minister Hadi Tjahjanto said in a statement late on Thursday that data for 30 public services overseen by 12 ministries had been recovered using a "decryption strategy" without elaborating.Read more of this story at Slashdot.
AT&T Says Criminals Stole Phone Records of 'Nearly All' Customers in New Data Breach
U.S. phone giant AT&T confirmed Friday it will begin notifying millions of consumers about a fresh data breach that allowed cybercriminals to steal the phone records of "nearly all" of its customers. TechCrunch: In a statement, AT&T said that the stolen data contains phone numbers of both cellular and landline customers, as well as AT&T records of calls and text messages -- such as who contacted who by phone or text -- during a six-month period between May 1, 2022 and October 31, 2022. AT&T said some of the stolen data includes more recent records from January 2, 2023 for a smaller but unspecified number of customers. The stolen data also includes call records of customers with phone service from other cell carriers that rely on AT&T's network, the company said. [...] In all, the phone giant said it will notify around 110 million AT&T customers of the data breach, company spokesperson Andrea Huguely told TechCrunch.Read more of this story at Slashdot.
Data Breach Exposes Millions of mSpy Spyware Customers
An anonymous reader quotes a report from TechCrunch: A data breach at the phone surveillance operation mSpy has exposed millions of its customers who bought access to the phone spyware app over the past decade, as well as the Ukrainian company behind it. Unknown attackers stole millions of customer support tickets, including personal information, emails to support, and attachments, including personal documents, from mSpy in May 2024. While hacks of spyware purveyors are becoming increasingly common, they remain notable because of the highly sensitive personal information often included in the data, in this case about the customers who use the service. The hack encompassed customer service records dating back to 2014, which were stolen from the spyware maker's Zendesk-powered customer support system. mSpy is a phone surveillance app that promotes itself as a way to track children or monitor employees. Like most spyware, it is also widely used to monitor people without their consent. These kinds of apps are also known as "stalkerware" because people in romantic relationships often use them to surveil their partner without consent or permission. The mSpy app allows whoever planted the spyware, typically someone who previously had physical access to a victim's phone, to remotely view the phone's contents in real-time. As is common with phone spyware, mSpy's customer records include emails from people seeking help to surreptitiously track the phones of their partners, relatives, or children, according to TechCrunch's review of the data, which we independently obtained. Some of those emails and messages include requests for customer support from several senior-ranking U.S. military personnel, a serving U.S. federal appeals court judge, a U.S. government department's watchdog, and an Arkansas county sheriff's office seeking a free license to trial the app. Even after amassing several million customer service tickets, the leaked Zendesk data is thought to represent only the portion of mSpy's overall customer base who reached out for customer support. The number of mSpy customers is likely to be far higher. mSpy's owners, a Ukraine-based company called Brainstack, have yet to publicly disclose the breach. You can visit Have I Been Pwned to see if your email address was involved in a breach.Read more of this story at Slashdot.
Model Rocket Nails Vertical Landing After Three-Year Effort
Aryan Kapoor, a high schooler from JRD Propulsion, successfully developed a model rocket with SpaceX-style vertical landing capabilities. The three-year effort was made possible by a thrust-vector control and clever landing gear design. Hackaday reports: He started in 2021 with none of the basic skills needed to pull off something like this, but it seems like he quickly learned the ropes. His development program was comprehensive, with static test vehicles, a low-altitude hopper, and extensive testing of the key technology: thrust-vector control. His rocket uses two solid-propellant motors stacked on top of each other, one for ascent and one for descent and landing. They both live in a 3D printed gimbal mount with two servos that give the stack plus and minus seven degrees of thrust vectoring in two dimensions, which is controlled by a custom flight computer with a barometric altimeter and an inertial measurement unit. The landing gear is also clever, using rubber bands to absorb landing forces and syringes as dampers. You can watch the first successful test flight and landing on YouTube.Read more of this story at Slashdot.
China Building Two-Thirds of World's Wind and Solar Projects
An anonymous reader quotes a report from The Guardian: The amount of wind and solar power under construction in China is now nearly twice as much as the rest of the world combined, a report has found. Research published on Thursday by Global Energy Monitor (GEM), an NGO, found that China has 180 gigawatts (GW) of utility-scale solar power under construction and 15GW of wind power. That brings the total of wind and solar power under construction to 339GW, well ahead of the 40GW under construction in the US. The researchers only looked at solar farms with a capacity of 20MW or more, which feed directly into the grid. That means that the total volume of solar power in China could be much higher, as small scale solar farms account for about 40% of China's solar capacity. Between March 2023 and March 2024, China installed more solar than it had in the previous three years combined, and more than the rest of the world combined for 2023, the GEM analysts found. China is on track to reach 1,200GW of installed wind and solar capacity by the end of 2024, six years ahead of the government's target. "The unabated wave of construction guarantees that China will continue leading in wind and solar installation in the near future, far ahead of the rest of the world," the report said. Earlier analysis suggests that China will need to install between 1,600GW and 1,800GW of wind and solar energy by 2030 to meet its target of producing 25% of all energy from non-fossil sources. Between 2020 and 2023, only 30% of the growth in energy consumption was met by renewable sources, compared with the target of 50%.Read more of this story at Slashdot.
Amazon Says It Now Runs On 100% Clean Power. Employees Say It's More Like 22%
Today, Amazon announced that it reached its 100% renewable energy goal seven years ahead of schedule. However, as Fast Company's Adele Peters reports, "a group of Amazon employees argues that the company's math is misleading." From the report: A report (PDF) from the group, Amazon Employees for Climate Justice, argues that only 22% of the company's data centers in the U.S. actually run on clean power. The employees looked at where each data center was located and the mix of power on the regional grids -- how much was coming from coal, gas, or oil versus solar or wind. Amazon, like many other companies, buys renewable energy credits (RECs) for a certain amount of clean power that's produced by a solar plant or wind farm. In theory, RECs are supposed to push new renewable energy to get built. In reality, that doesn't always happen. The employee research found that 68% of Amazon's RECs are unbundled, meaning that they didn't fund new renewable infrastructure, but gave credit for renewables that already existed or were already going to be built. As new data centers are built, they can mean that fossil-fuel-dependent grids end up building new fossil fuel power plants. "Dominion Energy, which is the utility in Virginia, is expanding because of demand, and Amazon is obviously one of their largest customers," says Eliza Pan, a representative from Amazon Employees for Climate Justice and a former Amazon employee. "Dominion's expansion is not renewable expansion. It's more fossil fuels." Amazon also doesn't buy credits that are specifically tied to the grids powering their data centers. The company might purchase RECs from Canada or Arizona, for example, to offset electricity used in Virginia. The credits also aren't tied to the time that the energy was used; data centers run all day and night, but most renewable energy is only available some of the time. The employee group argues that the company should follow the approach that Google takes. Google aims to use carbon-free energy, 24/7, on every grid where it operates.Read more of this story at Slashdot.
Arm Announces an Open-Source Graphics Upscaler For Mobile Phones
Arm is launching its Arm Accuracy Super Resolution (ASR) upscaler that "can make games look better, while lowering power consumption on your phone," according to The Verge. "It's also making the upscaling technology available to developers under an MIT open-source license." From the reprot: Arm based its technology on AMD's FidelityFX Super Resolution 2 (FSR 2), which uses temporal upscaling to make PC games look better and boost frame rates. Unlike spatial upscaling, which upscales an image based on a single frame, temporal upscaling involves using multiple frames to generate a higher-quality image. You can see just how Arm ASR stacks up to AMD's FSR 2 and Qualcomm's GSR tech in [this chart] created by Arm. Arm claims ASR produced 53 percent higher frame rates than rendering at native resolution on a device with an Arm Immortalis-G720 GPU and 2800 x 1260 display, beating AMD FSR 2. It also tested ASR on a device using MediaTek's Dimensity 9300 chip and found that rendering at 540p and upscaling with ASR used much less power than running a game at native 1080p resolution.Read more of this story at Slashdot.
Palestinians Say Microsoft Unfairly Closing Their Accounts
Ancient Slashdot reader Alain Williams writes: Palestinians living abroad have accused Microsoft of closing their email accounts without warning -- cutting them off from crucial online services. They say it has left them unable to access bank accounts and job offers -- and stopped them using Skype, which Microsoft owns, to contact relatives in war-torn Gaza. Microsoft says they violated its terms of service -- a claim they dispute. He also said being cut off from Skype was a huge blow for his family. The internet is frequently disrupted or switched off there because of the Israeli military campaign - and standard international calls are very expensive. [...] With a paid Skype subscription, it is possible to call mobiles in Gaza cheaply -- and while the internet is down -- so it has become a lifeline to many Palestinians. Some of the people the BBC spoke to said they suspected they were wrongly thought to have ties to Hamas, which Israel is fighting, and is designated a terrorist organization by many countries. Microsoft did not respond directly when asked if suspected ties to Hamas were the reason for the accounts being shut. But a spokesperson said it did not block calls or ban users based on calling region or destination. "Blocking in Skype can occur in response to suspected fraudulent activity," they said, without elaborating.Read more of this story at Slashdot.
iLounge and the Unofficial Apple Weblog Are Back As Unethical AI Content Farms
An anonymous reader quotes a report from Ars Technica, written by Samuel Axon: In one of the most egregiously unethical uses of AI we've seen, a web advertising company has re-created some defunct, classic tech blogs like The Unofficial Apple Weblog (TUAW) and iLounge by mimicking the bylines of the websites' former writers and publishing AI-generated content under their names. The Verge reported on the fiasco in detail, including speaking to Christina Warren, a former writer for TUAW who now works at GitHub. Warren took to the social media platform Threads yesterday to point out that someone had re-launched TUAW at its original domain and populated it with fake content allegedly written by her and other past TUAW staff. Some of the content simply reworded articles that originally appeared on TUAW, while other articles tied real writers' names to new, AI-generated articles about current events. TUAW was shut down in 2015, but its intellectual property and domain name continued to be owned by Yahoo. A Hong Kong-based web advertising firm named Web Orange Limited claims to have purchased the domain and brand name but not the content.The domain name still carries some value in terms of Google ranking, so Web Orange Limited seems to have relaunched the site and then used AI summarization tools to reword the original content and publish it under the original authors' names. (It did the same with another classic Apple blog, iLounge.) The site also includes author bios, which are generic and may have been generated, and they are accompanied by author photos that don't look anything like the real writers. The Verge found that some of these same photos have appeared in other places, like web display ads for iPhone cases and dating websites. They may have been AI-generated, though the company has also been caught reusing photos of real people without permission in other contexts. At first, some of Web Orange Limited's websites named Haider Ali Khan, an Australian currently residing in Dubai, as the owner of the company. Khan's own website identified him as "an independent cyber security analyst" and "long-time advocate for web security" who also runs a web hosting company, and who "started investing in several technology reporting websites" and "manages and runs several news blogs such as the well-known Apple tech-news blog iLounge." However, mentions of his name were removed from the websites today, and the details on his personal website have apparently been taken offline. Warren emailed the company, threatening legal action. After she did that, the byline was changed to what we can only assume is a made-up name -- "Mary Brown." The same goes for many of the other author names on Web Orange Limited's websites. The company likely tried to use the original authors' names as part of an SEO play; Google tracks the names of authors and gives them authority rankings on specific topics as another layer on top of a website's own authority. That way, Google can try to respond to user queries with results written by people who have built strong reputations in the users' areas of interest. It also helps Google surface authors who are experts on a topic but who write for multiple websites, which is common among freelance writers. The websites are still operational, even though the most arguably egregious breach of ethics -- the false use of real people's names -- has been addressed in many cases.Read more of this story at Slashdot.
Python GitHub Token Leak Shows Binary Files Can Burn Developers Too
snydeq shares a report from CSO Online, written by Lucian Constantin: A personal GitHub access token with administrative privileges to the official repositories for the Python programming language and the Python Package Index (PyPI) was exposed for over a year. The access token belonged to the Python Software Foundation's director of infrastructure and was accidentally included in a compiled binary file that was published as part of a container image on Docker Hub. [...] The incident shows that scrubbing access tokens from source code only, which some development tools do automatically, is not enough to prevent potential security breaches. Sensitive credentials can also be included in environment variables, configuration files and even binary artifacts as a result of automated build processes and developer mistakes. "Although we encounter many secrets that are leaked in the same manner, this case was exceptional because it is difficult to overestimate the potential consequences if it had fallen into the wrong hands -- one could supposedly inject malicious code into PyPI packages (imagine replacing all Python packages with malicious ones), and even to the Python language itself," researchers from security firm JFrog, who found and reported the token, wrote in a report.Read more of this story at Slashdot.
Apple Settles EU Case By Opening Its iPhone Payment System To Rivals
The European Commission has approved Apple's commitments to open its "tap to pay" iPhone payment system to rivals, avoiding a potentially hefty fine. The Guardian reports: Regulators had accused Apple in 2022 of abusing its dominant position by limiting access to its mobile payment technology. Apple responded by proposing in January to allow third-party mobile wallet and payment service providers access to the contactless payment function in its iOS operating system. After Apple tweaked its proposals following testing and feedback, the commission said those "final commitments" would address its competition concerns. "Today's commitments end our Apple Pay investigation," Margrethe Vestager, the commission's executive vice-president for competition policy, told a press briefing in Brussels. "The commitments bring important changes to how Apple operates in Europe to the benefit of competitors and customers." Apple said in a prepared statement that it is "providing developers in the European Economic Area with an option to enable NFC [near-field communication] contactless payments and contactless transactions" for uses like car keys, corporate badges, hotel keys and concert tickets. [...] Apple must open up its payment system in the EU's 27 countries plus Iceland, Norway and Liechtenstein by July 25. "As of this date, developers will be able to offer a mobile wallet on the iPhone with the same 'tap-and-go' experience that so far has been reserved for Apple Pay," Vestager said. The changes will remain in force for a decade and will be monitored by a trustee. Breaches of EU competition law can draw fines worth up to 10% of a company's annual global revenue, which in Apple's case could have amounted to tens of billions of euros.Read more of this story at Slashdot.
Taiwan's TSMC Crosses $1 Trillion Market Cap Amid AI Frenzy
An anonymous reader quotes a report from Reuters: Taiwan's TSMC scaled a record high on Thursday after posting strong second-quarter revenue on booming demand for AI applications, cementing its position as Asia's most valuable company. TSMC also topped a trillion dollar market value this week. The AI frenzy has sparked a rally in chipmaker stocks across the globe. Taiwan Semiconductor Manufacturing Co (TSMC), the world's largest contract chipmaker, whose customers include AI poster child Nvidia, has especially benefited from the soaring demand for AI-capable chips. Foreign investors have poured $4.8 billion so far this year into Taiwan's stock market, which is dominated by TSMC. Asian funds, however, according to HSBC, still remain underweight on Taiwan, suggesting there could be room for further inflow. Shares of TSMC, whose customers also include Apple, have jumped nearly 80% this year, widely outperforming the benchmark Taiwan SE Weighted Index, which is up 35%. On Thursday, TSMC's Taipei-listed shares rose more than 2% to a record T$1,080, taking the company's market value to T$28 trillion ($861 billion) and making it Asia's most valuable publicly listed company.Read more of this story at Slashdot.
UK Digital Industry Job Growth Falls To Lowest in Decade
Job growth in the UK's digital industry hit its lowest in a decade, prompting the incoming Labour government to pledge to revive the sector as it seeks to stimulate growth. From a report: The number of jobs in the sector grew by just 0.3% last year -- the lowest since a decline of 0.1% in 2013, according to Office for National Statistics data released on Thursday. Wider employment across the whole UK economy grew more than twice as fast, the data showed. The figures may stoke concerns of a stagnation in the UK tech sector, as employment and earnings stalled in the sector. Digital sector employees -- including programmers and tech consultants -- saw their hourly pay rise by just over 1% between 2022 and 2023, equating to a pay fall in real terms, the data showed. Nevertheless, the UK's new Secretary of State for Science, Innovation and Technology, Peter Kyle, promised to revitalize the sector.Read more of this story at Slashdot.
Renewables Growth Rate Insufficient To Reach 2030 Target, Says IRENA
The world risks missing a goal to triple renewable energy capacity by 2030 as the current growth rate is inadequate, a report by the International Renewable Energy Agency (IRENA) showed on Thursday. From a report: A U.N. climate change conference in Dubai last year set a goal of tripling renewable energy capacity worldwide by 2030 to more than 11 terawatts (TW). Countries have to submit new or updated climate target commitments every five years after 2020 so next year they have to include revised ambitions for 2030. About 473 gigawatts (GW) of capacity was added last year, representing a 14% increase from the year before and the largest annual growth since 2000, IRENA said in a report. To meet the target, the world will have to add renewables capacity at a minimum 16.4% rate annually to 2030. However, if last year's 14% increase rate continues, the 11 TW target will be 1.5 TW short. Further reading: World Will Miss Target of Tripling Renewable Electricity Generation By 2030, IEA Says.Read more of this story at Slashdot.
Microsoft's Xbox 360 Stores Will Close Up Shop on July 29
Speaking of Xbox, the Xbox 360 Store and Marketplace are coming to a close later this month. From a report: Microsoft announced this last year and put an official end date of July 29, according to its official FAQ page. In case you didn't notice, the end of July is fast approaching. All of the games, DLC and any gaming tidbits for Microsoft's second generation console won't be available to purchase or download on the Xbox 360 console. Your games and movie purchases are still safe, however, if you've got any throwback titles on your Xbox One or Series X/S console. You can also still watch your purchased movies and shows on Windows 10 and 11 devices.Read more of this story at Slashdot.
Apple's Vision Pro Won't Cross 500,000 Sales This Year, IDC Says
Apple's biggest new product in years is not expected to shake off its slow sales start until the release of a cheaper model next year. From a report: The $3,500 Vision Pro mixed-reality headset has yet to sell 100,000 units in a quarter since its launch in the US in February, and it faces a 75% drop in domestic sales in the current quarter, according to market tracker IDC. The gadget's international launch at the end of June will offset weakness in the US. A more affordable edition -- which IDC estimates would cost roughly half as much -- should rekindle interest in 2025, but sales may not rise meaningfully over the coming year, IDC said. "The Vision Pro's success, regardless of its price, will ultimately depend on the available content," said Francisco Jeronimo, vice president at IDC. "As Apple expands the product to international markets, it's crucial that local content is also made available."Read more of this story at Slashdot.
DVD Rental Kiosks Business Redbox is Shutting Down
DVD kiosk-rental business Redbox is all set to close the shutter. LowPass: The judge overseeing the bankruptcy case of Redbox's corporate parent Chicken Soup for the Soul Entertainment granted the debtors request to convert it from a Chapter 11 bankruptcy to a Chapter 7 bankruptcy, effectively paving the way for shutting down the company and liquidating its assets. Chicken Soup for the Soul Entertainment's CEO Bart Schwartz, who had only joined the company two weeks ago, stepped down this morning for unrelated reasons, according to the attorney representing the debtors in the case. Companies use Chapter 11 bankruptcy cases to reorganize, allowing them to continue to operate while they rid themselves of debt, while a Chapter 7 bankruptcy generally results in a trustee selling off company assets to pay creditors, and winding down the company. "There is no means to continue to pay employees, pay any bills, otherwise finance this case. It is hopelessly insolvent," United States bankruptcy judge Thomas Horan determined during a hearing Wednesday, adding: "Given the fact that there may also be at least the possibility of misappropriation of funds that were held in trust for employees, there is more than ample reason why this case should be converted. So I am going to grant the motion." The firm operates a network of 24,000 DVD rental kiosks.Read more of this story at Slashdot.
Night Owls' Cognitive Function 'Superior' To Early Risers, Study Suggests
The idea that night owls who don't go to bed until the early hours struggle to get anything done during the day may have to be revised. From a report: It turns out that staying up late could be good for our brain power as research suggests that people who identify as night owls could be sharper than those who go to bed early. Researchers led by academics at Imperial College London studied data from the UK Biobank study on more than 26,000 people who had completed intelligence, reasoning, reaction time and memory tests. They then examined how participants' sleep duration, quality, and chronotype (which determines what time of day we feel most alert and productive) affected brain performance. They found that those who stay up late and those classed as "intermediate" had "superior cognitive function," while morning larks had the lowest scores. Going to bed late is strongly associated with creative types.Read more of this story at Slashdot.
Indie Video Game Devs Are Struggling To Survive
The video game industry is grappling with a severe financial downturn that's hitting independent developers particularly hard, as exemplified by Necrosoft Games' recent brush with bankruptcy while developing their upcoming title "Demonschool." Brandon Sheffield, the studio's director, managed to secure a temporary contract to keep the company afloat, but he acknowledges the precarious nature of their situation, telling Reuters, "It was the only way to survive, because nobody was funding anything. It's also better than what's happening to a lot of people, where they just have to fold," he told Wired. This struggle is emblematic of a broader trend in the industry, with experts cited by Wired in a story warning that 2024 could see numerous small studio closures as traditional funding avenues dry up and larger companies tighten their belts. The ripple effects of this contraction extend beyond immediate job losses, with industry veterans like Victoria Tran from Innersloth expressing concern that the challenging climate could deter new talent and stifle the creativity that often emerges from smaller, more experimental game projects.Read more of this story at Slashdot.
Google Exploring Options Against Microsoft's Licensing Practices, Google Cloud Head Says
Alphabet unit Google's cloud subsidiary will look into other options in its fight against Microsoft's licensing practices, the head of Google Cloud head said on Wednesday. From a report: The comments by Amit Zavery came after Microsoft reached a deal with trade body CISPE to resolve the latter's antitrust complaint about its cloud licensing practices. "Many regulatory bodies have opened inquiries into Microsoft's licensing practices, and we are hopeful there will be remedies to protect the cloud market from Microsoft's anti-competitive behavior," he said. "We are exploring our options to continue to fight against Microsofta(TM)s anti-competitive licensing in order to promote choice, innovation, and the growth of the digital economy in Europe."Read more of this story at Slashdot.
Across the US, Heat Keeps Breaking Records
The western United States is experiencing an unprecedented heat wave, with multiple states breaking temperature records in recent weeks. Palm Springs, California has been particularly affected, shattering its all-time high temperature record when it reached 124F (51.1C) last Friday. The National Weather Service reported that Palm Springs hit 122F (50C) on July 8, the highest temperature ever recorded for that date. This extreme heat is not isolated to Palm Springs, as Arizona, Oregon, and Nevada have also seen record-breaking temperatures. Climate scientists attribute this intensifying heat to human-caused climate change. The heat wave comes as global temperatures continue to rise. According to the European Union's Copernicus Climate Change Service, the world has been at or above the 1.5 degree Celsius threshold for 12 straight months as of June, a key marker in climate change discussions.Read more of this story at Slashdot.
AI Investment Soars but Profitable Use Remains Elusive for Many Firms, Goldman Sachs Says
Despite soaring investment in AI hardware, most companies are struggling to turn the technology into profitable ventures, Goldman Sachs' latest AI adoption tracker reveals. Equity markets project a $330 billion boost to annual revenues for AI enablers by 2025, up from $250 billion forecast just last quarter, yet only 5% of US firms currently use AI in their production processes. The disconnect between sky-high investment and tepid adoption underscores the significant hurdles businesses face in implementing AI effectively. Industry surveys by Goldman indicate that while many small businesses are experimenting with the technology, most have yet to define clear use cases or establish comprehensive employee training programs. Data compatibility and privacy concerns remain substantial roadblocks, with many firms reporting their existing tech platforms are ill-equipped to support AI applications. The lack of in-house expertise and resources further compounds these challenges, leaving many companies unable to bridge the gap between AI's theoretical potential and practical implementation. Even among those organizations actively deploying AI, only 35% have a clearly defined vision for creating business value from the technology. This strategic uncertainty is particularly acute in consumer and retail sectors, where just 30% of executives believe they have adequately prioritized generative AI. The barriers to profitable AI use are not limited to technical and strategic issues. Legal and compliance risks loom large, with 64% of businesses expressing concerns about cybersecurity risks and roughly half worried about misinformation and reputational damage stemming from AI use. Despite these challenges, investment continues to pour into AI hardware, particularly in semiconductor and cloud computing sectors. Markets anticipate a 50% revenue growth for semiconductor companies by the end of 2025. However, this enthusiasm has yet to translate into widespread job displacement, with AI-related layoffs remaining muted and unemployment rates for AI-exposed jobs tracking closely with broader labor market trends.Read more of this story at Slashdot.
Silicon Valley Wins Few Government Contracts
The federal government has spent $22 billion in recent years on technology from the top 100 national-security startups, a paltry portion of overall contract spending and less than half of what venture capitalists have invested in those same companies. WSJ: The gap underscores the discrepancy between the surge of venture capital funding for defense technology and the U.S. government's spending on substantial contracts to startups. The new numbers come from a report released Thursday by Silicon Valley Defense Group, a nonprofit that started a decade ago with the aim of bringing more startup innovation to the Defense Department. According to the report, the top 100 venture capital-backed national security startups have raised a combined $53 billion in private funding since their inception, $11 billion of which has come in the past 12 months. Those same startups have collectively earned $22 billion in revenue from federal awards, $6 billion of which came from the Defense Department. The organization ranked the startups based on head count growth, total capital raised and other factors.ATraditional defense contractors receive hundreds of billions in awards every year.Read more of this story at Slashdot.
Apple Warns iPhone Users in 98 Countries of Spyware Attacks
Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks. It's the second such alert campaign from the company this year, following a similar notification sent to users in 92 nations in April. TechCrunch: In its communication to affected users, Apple stressed the sensitive nature of its threat identification methods, cautioning that divulging additional details could potentially aid attackers in evading future detection. Apple has also made a notable shift in its language since last year, opting to describe these incidents as "mercenary spyware attacks" instead of the previously used term "state-sponsored" attacks.Read more of this story at Slashdot.
Germany To Remove Huawei From Mobile Networks
An anonymous reader quotes a report from Reuters: The German government and mobile phone carriers have agreed in principle on steps to phase components by Chinese technology companies out of the nation's 5G wireless network over the next five years, two people familiar with the matter told Reuters on Wednesday. Newspaper Sueddeutsche Zeitung as well as broadcasters NDR and WDR earlier jointly reported the news, saying the agreement gives network operators Deutsche Telekom, Vodafone, and Telefonica Deutschland more time to replace critical parts. Under the preliminary agreement driven by security considerations, operators will initially rid the country's core network of 5G data centers of technology made by companies such as Huawei and ZTE in 2026, said the sources, adding that a final pact has yet to be signed. In a second phase, the role of Chinese makers' parts for antennas, transmission lines and towers should be all but eliminated by 2029, they added. "The government is acting on the basis of the national security strategy and China strategy to reduce possible security risks and dependencies," said a spokesperson for Germany's interior ministry.Read more of this story at Slashdot.
Lithium Ion Batteries a Growing Source of PFAS Pollution, Study Finds
"Nature recently published an open-access article (not paywalled) that studies the lifecycle of lithium-ion batteries once they are manufactured," writes Slashdot reader NoWayNoShapeNoForm. "The study is a 'cradle-to-grave' look at these batteries and certain chemicals that they contain. The University researchers that authored the study found that the electrolytes and polymers inside lithium-ion batteries contain a class of PFAS known as bis-FASI chemicals. PFAS chemicals are internationally recognized pollutants, yet they are found in consumer and industrial processes, such as non-stick coatings, surfactants, and film-forming foams. PFAS chemicals have been found in windmill coatings, semiconductors, solar collectors, and photovoltaic cells." Phys.org reports: Texas Tech University's Jennifer Guelfo was part of a research team that found the use of a novel sub-class of per- and polyfluoroalkyl (PFAS) in lithium ion batteries is a growing source of pollution in air and water. Testing by the research team further found these PFAS, called bis-perfluoroalkyl sulfonimides (bis-FASIs), demonstrate environmental persistence and ecotoxicity comparable to older notorious compounds like perfluorooctanoic acid (PFOA). The researchers sampled air, water, snow, soil and sediment near manufacturing plants in Minnesota, Kentucky, Belgium and France. The bis-FASI concentrations in these samples were commonly at very high levels. Data also suggested air emissions of bis-FASIs may facilitate long-range transport, meaning areas far from manufacturing sites may be affected as well. Analysis of several municipal landfills in the southeastern U.S. indicated these compounds can also enter the environment through disposal of products, including lithium ion batteries. Toxicity testing demonstrated concentrations of bis-FASIs similar to those found at the sampling sites can change behavior and fundamental energy metabolic processes of aquatic organisms. Bis-FASI toxicity has not yet been studied in humans, though other, more well-studied PFAS are linked to cancer, infertility and other serious health harms. Treatability testing showed bis-FASIs did not break down during oxidation, which has also been observed for other PFAS. However, data showed concentrations of bis-FASIs in water could be reduced using granular activated carbon and ion exchange, methods already used to remove PFAS from drinking water. "Our results reveal a dilemma associated with manufacturing, disposal, and recycling of clean energy infrastructure," said Guelfo, an associate professor of environmental engineering in the Edward E. Whitacre Jr. College of Engineering. "Slashing carbon dioxide emissions with innovations like electric cars is critical, but it shouldn't come with the side effect of increasing PFAS pollution. We need to facilitate technologies, manufacturing controls and recycling solutions that can fight the climate crisis without releasing highly recalcitrant pollutants."Read more of this story at Slashdot.
Researchers Discover a New Form of Scientific Fraud: Uncovering 'Sneaked References'
A recent study has exposed a method of artificially inflating citation counts through "sneaked references," which are extra citations included in metadata but not in the actual text of articles. This manipulation, uncovered in journals by Technoscience Academy, distorts citation metrics that are critical for research funding and academic promotions. The Conversation reports: The investigation began when Guillaume Cabanac, a professor at the University of Toulouse, wrote a post on PubPeer, a website dedicated to post-publication peer review, in which scientists discuss and analyze publications. In the post, he detailed how he had noticed an inconsistency: a Hindawi journal article that he suspected was fraudulent because it contained awkward phrases had far more citations than downloads, which is very unusual. The post caught the attention of several sleuths who are now the authors of the JASIST article. We used a scientific search engine to look for articles citing the initial article. Google Scholar found none, but Crossref and Dimensions did find references. The difference? Google Scholar is likely to mostly rely on the article's main text to extract the references appearing in the bibliography section, whereas Crossref and Dimensions use metadata provided by publishers. To understand the extent of the manipulation, we examined three scientific journals that were published by the Technoscience Academy, the publisher responsible for the articles that contained questionable citations. [...] In the journals published by Technoscience Academy, at least 9% of recorded references were "sneaked references." These additional references were only in the metadata, distorting citation counts and giving certain authors an unfair advantage. Some legitimate references were also lost, meaning they were not present in the metadata. In addition, when analyzing the sneaked references, we found that they highly benefited some researchers. For example, a single researcher who was associated with Technoscience Academy benefited from more than 3,000 additional illegitimate citations. Some journals from the same publisher benefited from a couple hundred additional sneaked citations. We wanted our results to be externally validated, so we posted our study as a preprint, informed both Crossref and Dimensions of our findings and gave them a link to the preprinted investigation. Dimensions acknowledged the illegitimate citations and confirmed that their database reflects Crossref's data. Crossref also confirmed the extra references in Retraction Watch and highlighted that this was the first time that it had been notified of such a problem in its database. The publisher, based on Crossref's investigation, has taken action to fix the problem. To combat this practice of "sneaked references," the authors suggest several measures: rigorous verification of metadata by publishers and agencies like Crossref, independent audits to ensure data reliability, and increased transparency in managing references and citations.Read more of this story at Slashdot.
Whataburger App Becomes Unlikely Power Outage Map After Houston Hurricane
An anonymous reader quotes a report from TechCrunch: Fast-food chain Whataburger's app has gone viral in the wake of Hurricane Beryl, which left around 1.8 million utility customers in Houston, Texas without power. Hundreds of thousands of those people may remain without power for days as Houston anticipates a heat wave, with temperatures climbing into the mid-90s. Amid frustrations with the local utility company CenterPoint Energy, which doesn't offer an app, some Houstonians got creative with their attempts to track the power outages. They turned to the Whataburger app instead. Whataburger is a San Antonio-based fast-food chain with 127 stores in the Houston area, according to Newsweek. On the Whataburger app, users can see a map of Whataburger locations, with an orange logo indicating a store is open, and a grey logo meaning it's closed. Since CenterPoint Energy doesn't have an online map of outages, an X user with the screen name BBQBryan found that the map of which Whataburger stores are open could be a useful tool for seeing where there's power. This viral moment seems to have boosted Whataburger's download numbers. In the iOS App Store, Whataburger is currently ranked 16th in the food and drink category. Just three weeks ago, it was ranked 40th. "The Whataburger app works as a power outage tracker, handy since the electric company doesn't show a map," BBQBryan wrote in a post that now has over 22,000 likes and 6.9 million impressions. "Well there's a use for our app we didn't think of!" the Whataburger X account replied. "We hope you and everyone else are okay!"Read more of this story at Slashdot.
Inside the Health Crisis of a Texas Bitcoin Town
Longtime Slashdot reader ArchieBunker shares a report from TIME Magazine: On an evening in December 2023, 43-year-old small business owner Sarah Rosenkranz collapsed in her home in Granbury, Texas and was rushed to the emergency room. Her heart pounded 200 beats per minute; her blood pressure spiked into hypertensive crisis; her skull throbbed. "It felt like my head was in a pressure vise being crushed," she says. "That pain was worse than childbirth." Rosenkranz's migraine lasted for five days. Doctors gave her several rounds of IV medication and painkiller shots, but nothing seemed to knock down the pain, she says. This was odd, especially because local doctors were similarly vexed when Indigo, Rosenkranz's 5-year-old daughter, was taken to urgent care earlier that year, screaming that she felt a "red beam behind her eardrums." It didn't occur to Sarah that these symptoms could be linked. But in January 2024, she walked into a town hall in Granbury and found a room full of people worn thin from strange, debilitating illnesses. A mother said her 8-year-old daughter was losing her hearing and fluids were leaking from her ears. Several women said they experienced fainting spells, including while driving on the highway. Others said they were wracked by debilitating vertigo and nausea, waking up in the middle of the night mid-vomit. None of them knew what, exactly, was causing these symptoms. But they all shared a singular grievance: a dull aural hum had crept into their lives, which growled or roared depending on the time of day, rattling their windows and rendering them unable to sleep. The hum, local law enforcement had learned, was emanating from a Bitcoin mining facility that had recently moved into the area -- and was exceeding legal noise ordinances on a daily basis. Over the course of several months in 2024, TIME spoke to more than 40 people in the Granbury area who reported a medical ailment that they believe is connected to the arrival of the Bitcoin mine: hypertension, heart palpitations, chest pain, vertigo, tinnitus, migraines, panic attacks. At least 10 people went to urgent care or the emergency room with these symptoms. The development of large-scale Bitcoin mines and data centers is quite new, and most of them are housed in extremely remote places. There have been no major medical studies on the impacts of living near one. But there is an increasing body of scientific studies linking prolonged exposure to noise pollution with cardiovascular damage. And one local doctor -- ears, nose, and throat specialist Salim Bhaloo -- says he sees patients with symptoms potentially stemming from the Bitcoin mine's noise on an almost weekly basis. "I'm sure it increases their cortisol and sugar levels, so you're getting headaches, vertigo, and it snowballs from there," Bhaloo says. "This thing is definitely causing a tremendous amount of stress. Everyone is just miserable about it." "By the end of 2024, we intend to have replaced the majority of air-cooled containers with immersion cooling, with no expansion required," said a representative for Marathon Digital Holdings, the company that owns the mine. "Initial sound readings on immersion containers indicate favorable results in sound reduction and compliance with all relevant state noise ordinances." They did not answer questions about the health impacts their mining site was causing. "We're living in a nightmare," said Rosenkranz. She clocked the hum at 72 decibels in Indigo's bedroom in the dead of night. "Indigo's room directly faces the mine, which sits about a mile and a half away," notes TIME. She had to be pulled from her school after she developed so many ear infections from the sound. The report also said a resident's dog "started going bald and developed debilitating anxiety shortly after the Bitcoin mine began operating four blocks away." TIME added: "Directly next door, Tom Weeks' dog Jack Rabbit Slim started shaking and hyperventilating uncontrollably for hours on end; a vet placed him on the seizure medication Gabapentin. Rosenkranz's chickens stopped laying eggs for months. And Jerry and Patricia Campbell's centuries-old oak tree, which had served as the family's hub and protector for generations of backyard family reunions and even a wedding, died suddenly three months ago."Read more of this story at Slashdot.
Tokyo Residents Seek To Block Building of Massive Data Centre
A group of residents in Tokyo said on Wednesday they were aiming to block construction of a massive logistics and data centre planned by Singaporean developer GLP, in a worrying sign for businesses looking to Japan to meet growing demand. From a report: The petition by more than 220 residents of Akishima city in western Tokyo follows a successful bid in December in Nagareyama city to quash a similar data-centre plan. The Akishima residents were concerned the centre would threaten wildlife, cause pollution and a spike in electricity usage, and drain its water supply which comes solely from groundwater. They filed a petition to audit the urban planning procedure that approved GLP's 3.63-million-megawatt data centre, which GLP estimated would likely emit about 1.8 million tons of carbon dioxide a year. "One company will be responsible for ruining Akishima. That's what this development is," Yuji Ohtake, a representative of the residents' group, told a press conference. Global tech firms such as Microsoft, Amazon and Oracle also have plans to build data centres in Japan. The residents estimated that 3,000 of 4,800 trees on the site would have to be cut down, threatening the area's Eurasian goshawk birds and badgers.Read more of this story at Slashdot.
China Outspends the US on Fusion in the Race for Energy's Holy Grail
A high-tech race is under way between the U.S. and China as both countries chase an elusive energy source: fusion. From a report: China is outspending the U.S., completing a massive fusion technology campus and launching a national fusion consortium that includes some of its largest industrial companies. Crews in China work in three shifts, essentially around the clock, to complete fusion projects. And the Asian superpower has 10 times as many Ph.D.s in fusion science and engineering as the U.S. The result is an increasing worry among American officials and scientists that an early U.S. lead is slipping away. JP Allain, who heads the Energy Department's Office of Fusion Energy Sciences, said China is spending around $1.5 billion a year on fusion, nearly twice the U.S. government's fusion budget. What's more, China appears to be following a program similar to the road map that hundreds of U.S. fusion scientists and engineers first published in 2020 in hopes of making commercial fusion energy. Scientists familiar with China's fusion facilities said that if the country continues its current pace of spending and development, it will surpass the U.S. and Europe's magnetic fusion capabilities in three or four years.Read more of this story at Slashdot.
...101102103104105106107108109110...