Canada is joining the ranks of countries and states planning to ban sales of combustion engine cars. Engadget reports: Canada has outlined an Emissions Reduction Plan that will require all new passenger car sales to be zero-emissions models by 2035. The government will gradually ramp up pressure on automakers, requiring "at least" 20 percent zero-emissions sales by 2026 and 60 percent by 2030. Officials didn't say whether this applied to a make's product mix or simply the volume of cars sold. The strategy is more forgiving for the workplace -- the Canadian government wanted 35 percent of total medium- and heavy-duty vehicle sales to be zero-emissions by 2035, and 100 percent of a "subset" of those machines by 2040. The country is also offering $1.7 billion CAD (about $1.36 billion US) to extend incentives for buying electric cars and other zero-emissions vehicles. The current federal program offers up to a $5,000 CAD ($4,010 US) rebate for EVs, plug-in hybrids and hydrogen fuel cell cars that meet varying price, seat and battery requirements. Some provinces, such as British Columbia and Nova Scotia, offer their own incentives. The broader plan is meant to reduce emissions to 40 to 45 percent below 2005 levels by 2030, and reach net zero by 2050. This includes funds to support renewable energy projects, shrink oil industry emissions and develop "nature-based climate solutions."Read more of this story at Slashdot.
MojoKid writes: Today Intel finally launched its first major foray into discrete GPUs for gamers and creators. Dubbed Intel Arc A-Series and comprised of 5 different chips built on two different Arc Alchemist SoCs, the company announced its entry level Arc 3 Graphics is shipping in market now with laptop OEMs delivering new all-Intel products shortly. The two SoCs set the foundation across three performance tiers, including Arc 3, Arc 5, and Arc 7. For example, Arc A370M arrives today with 8 Xe cores, 8 ray tracing units, 4GB of GDDR6 memory linked to a 64-bit memory bus, and a 1,550MHz graphics clock. Graphics power is rated at 35-50W. However, Arc A770M, Intel's highest-end mobile GPU will come with 32 Xe cores, 32 ray tracing units, 16GB of GDDR 6 memory over a 256-bit interface and with a 1650MHz graphics clock. Doing the math, Arc A770M could be up to 4X more powerful than Arc 370M. In terms of performance, Intel showcased benchmarks from a laptop outfitted with a Core i7-12700H processor and Arc A370M GPU that can top the 60 FPS threshold at 1080p in many games where integrated graphics could come up far short. Examples included Doom Eternal (63 fps) at high quality settings, and Hitman 3 (62 fps), and Destiny 2 (66 fps) at medium settings. Intel is also showcasing new innovations for content creators as well, with its Deep Link, Hyper Encode and AV1 video compression support offering big gains in video upscaling, encoding and streaming. Finally, Intel Arc Control software will offer unique features like Smooth Sync that blends tearing artifacts when V-Synch is turned off, as well as Creator Studio with background blur, frame tracking and broadcast features for direct game streaming services support.Read more of this story at Slashdot.
Russia's omnipresent tech company, which created products ranging from the country's dominant search engine to its biggest ride-hail service, is facing a looming shortage of hardware as U.S. sanctions punish President Vladimir Putin for invading Ukraine. From a report: Yandex NV may run short of the semiconductors needed for the servers it uses to power its business within a year to 18 months because of import restrictions, two people with direct knowledge of the issue said, asking not to be identified in order to speak candidly. Sanctions on dual-use technology, which have both military and commercial uses, have hit its self-driving vehicle unit particularly hard, they said. Yandex has plunged into crisis since Putin began the war Feb. 24, caught between the Kremlin's increasingly harsh internet censorship and a backlash in its key foreign markets. The company's international partnerships are crumbling, two board members resigned, and its number two executive, Tigran Khudaverdyan, was forced to step down after being sanctioned by the European Union. The company's market value has slumped from a record $31 billion in November to $6.8 billion after the invasion began.Read more of this story at Slashdot.
Waymo, Alphabet's self-driving unit, has begun offering its San Francisco employees fully autonomous rides, the company said Wednesday. From a report: Waymo will begin its rider-only operations within its "initial San Francisco service territory," which spans from the Presidio to the farthest corner of Candlestick Point, and gradually ramp up from there. The news comes nearly a month after Waymo said it would soon begin charging Bay Area residents for robotaxi rides with a human operator on board after securing a permit from the California Public Utilities Commission (CPUC). It also follows the kick-off of Waymo's Trusted Tester program back in August, which involved San Franciscans signing up to hail one of Waymo's all-electric Jaguar I-Paces equipped with the Waymo Driver -- again, with a human operator onboard -- for free.Read more of this story at Slashdot.
happy monday writes: Dyson has announced its first wearable product that builds the firm's air purification expertise into a set of Bluetooth noise cancelling headphones aimed at city dwellers wanting to avoid polluted air. Quite unlike anything the company has made before, the Dyson Zone is sure to draw quizzical looks. It is a set of large, plush headphones with a plastic mask-type contraption that connects from ear-to-ear across the wearer's mouth and looks like something out of a sci-fi movie. It delivers purified air to the mouth and nose while simultaneously tackling noise pollution through its active noise cancelling technology. Chief engineer Jake Dyson said: "Air pollution is a global problem -- it affects us everywhere we go. In our homes, at school, at work and as we travel, whether on foot, on a bike or by public or private transport. The Dyson Zone purifies the air you breathe on the move. And unlike face masks, it delivers a plume of fresh air without touching your face." The eyebrow-raising design has a motor, compressor fan and air purifying dual-layer filter in each ear cup. The air is drawn through the filters cleaning it of 99% of particles as small as 0.1 microns, including pollen, bacteria and dust, as well as gas pollutants such as sulphur or nitrogen dioxide. The filtered air is then pushed along the inside of a visor, which sits just in front of the mouth and nose without making contact with the skin, creating a pocket of clean air for the wearer to breathe. The headphones have sensors that detect how fast the wearer is moving, automatically adjusting the airflow between three intensity levels to ensure they deliver up to 5 litres of clean air a second, the equivalent breathing rate of a jog.Read more of this story at Slashdot.
About one-third of U.S. subscribers to Netflix share their login credentials with others, according to new data from Leichtman Research Group. From the report: The research firm's online survey of 4,400 consumers confirms the company's own conclusions in recent years. While 64% of respondents said they pay for and use Netflix only in their own household, 33% indicate some form of sharing. (The remaining 3% are households whose Netflix comes packaged via other subscriptions.) Netflix has about 74 million subscribers in the U.S. and Canada and has penetrated nearly 70% of U.S. broadband homes. With subscription growth flattening in the region of late, Netflix has recently phased in rate increases in order to continue funding its $18 billion in annual programming spending. Earlier this month, Netflix announced a test of monthly fees for password-sharing in three territories outside of the U.S. The rise of password sharing between households, a blog post explained, is âoeimpacting our ability to invest in great new TV and films for our members.âRead more of this story at Slashdot.
A group of attorneys general have asked Snap and TikTok to work more closely with parental control apps and to apply more scrutiny to inappropriate content on their platforms, the latest salvo in a growing fight over child protection between governments and social media companies. From a report: Attorneys general from 43 states and territories said in a letter to executives at the two apps that they were worried the companies were "not taking appropriate steps to allow parents to protect their kids on your platforms." Specifically, the officials said that Snap, which makes the Snapchat app, and TikTok should work more closely with third-party parental control services. Some people have raised concerns that third-party parental controls surveil young people but do little to actually stop them from encountering harmful content. The attorneys general said in the letter, organized by the National Association of Attorneys General, that they were not endorsing a particular parental control product. They also called on the companies to tighten their own parental supervision tools and to do a better job of weeding out content that might be harmful to children. Concerns that popular social media platforms can expose children to posts that are sexualized, hurt their body image or are violent have escalated in recent years. State attorneys general are currently investigating whether Facebook, owned by Meta, and TikTok, part of the Chinese conglomerate ByteDance, have put young people in harm's way. President Biden also called for new online privacy rules for children in his State of the Union speech earlier this month.Read more of this story at Slashdot.
School surveillance companies are not doing enough to determine whether their products unfairly target minority groups, according to a report released by U.S. Senators Elizabeth Warren and Ed Markey. From a report: Democratic senators sent questions to four of the most prominent companies that make education software monitoring students' online activity. The resulting report about their findings said that parents and schools are not fully informed about the extent and risks associated with the tracking software made by GoGuardian, Gaggle.Net, Bark Technologies and Securly. The report also said that because the products could increase students' contact with law enforcement, the software "may be exacerbating the school-to-prison pipeline." Online education during the pandemic led to unprecedented levels of digital surveillance of children, as schools rushed to find ways to keep track of students, Bloomberg Businessweek reported in October. Private equity-backed GoGuardian, officially named Liminex, is one of the most popular makers of education surveillance tools. Its software helps teachers and administrators track what students are doing on school-issued devices, and sometimes personal devices when kids are logged into school accounts. The senators' report says none of the companies has assessed whether their algorithms are biased or track whether they over-target students of color or LGBTQ students. Each of the companies told the senators' offices that they do not study the effects of their products on specific populations due to privacy concerns.Read more of this story at Slashdot.
Several readers have shared this report: Employees with the firm, Targeted Victory, worked to undermine TikTok through a nationwide media and lobbying campaign portraying the fast-growing app, owned by the Beijing-based company ByteDance, as a danger to American children and society, according to internal emails shared with The Washington Post. Targeted Victory needs to "get the message out that while Meta is the current punching bag, TikTok is the real threat especially as a foreign owned app that is #1 in sharing data that young teens are using," a director for the firm wrote in a February email. Campaign operatives were also encouraged to use TikTok's prominence as a way to deflect from Meta's own privacy and antitrust concerns. "Bonus point if we can fit this into a broader message that the current bills/proposals aren't where [state attorneys general] or members of Congress should be focused," a Targeted Victory staffer wrote. The emails, which have not been previously reported, show the extent to which Meta and its partners will use opposition-research tactics on the Chinese-owned, multibillion-dollar rival that has become one of the most downloaded apps in the world, often outranking even Meta's popular Facebook and Instagram apps. In an internal report last year leaked by the whistleblower Frances Haugen, Facebook researchers said teens were spending "2-3X more time" on TikTok than Instagram, and that Facebook's popularity among young people had plummeted. In one email, a Targeted Victory director asked for ideas on local political reporters who could serve as a "back channel" for anti-TikTok messages, saying the firm "would definitely want it to be hands off." In other emails, Targeted Victory urged partners to push stories to local media tying TikTok to dangerous teen trends in an effort to show the app's purported harms. "Any local examples of bad TikTok trends/stories in your markets?" a Targeted Victory staffer asked.Read more of this story at Slashdot.
An anonymous reader quotes a report from NPR: A nearly decade-long scheme to steal millions of dollars of computers and iPads from Yale University's School of Medicine is officially over. Former Yale administrator Jamie Petrone, 42, pleaded guilty Monday in federal court in Hartford, Conn., to two counts of wire fraud and a tax offense for her role in the plot. Petrone's ploy started as far back as 2013 and continued well into 2021 while she worked at the university, according to the U.S. Attorney's Office for the District of Connecticut. Until recently, her role was the director of finance and administration for the Department of Emergency Medicine at Yale. As part of this job, Petrone had the authority to make and authorize certain purchases for the department -- as long as the amount was below $10,000. Starting in 2013, Petrone would order, or have a member of her staff order, computers and other electronics, which totaled to thousands of items over the years, from Yale vendors using the Yale School of Medicine's money. She would then arrange to ship the stolen hardware, whose costs amounted to millions of dollars, to a business in New York, in exchange for money once the electronics were resold. Investigators said Petrone would report on documents to the school that the equipment was for specific needs at the university, like medical studies that ultimately didn't exist. She would break up the fraudulent purchases into orders that were below $10,000 each so that she wouldn't need to get additional approval from school officials. Petrone would ship this equipment out herself to the third-party business that would resell the equipment. It would later pay Petrone by wiring funds into an account of Maziv Entertainment LLC, a company she created. Petrone used the money to live the high life, buy real estate and travel, federal prosecutors say. She bought luxury cars as well. At the time of her guilty pleas, she was in possession of two Mercedes-Benz vehicles, two Cadillac Escalades, a Dodge Charger and a Range Rover. [...] At the time of her guilty plea, she agreed to forfeit the luxury vehicles as well as three homes in Connecticut. A property she owns in Georgia may also be seized. Petrone has also agreed to forfeit more than $560,000 that was seized from the Maziv Entertainment LLC bank account. Federal prosecutors say the loss to Yale totals approximately $40,504,200.Read more of this story at Slashdot.
schwit1 shares a report from EurekAlert: A nitrogen doped carbon-coated nickel anode can catalyze an essential reaction in hydrogen fuel cells at a fraction of the cost of the precious metals currently used, Cornell University researchers have found. The new discovery could accelerate the widespread use of hydrogen fuel cells, which hold great promise as efficient, clean energy sources for vehicles and other applications. It's one of a string of discoveries for the Hector D. Abruna lab in their ongoing search for active, inexpensive, durable catalysts for use in alkaline fuel cells. Recent experiments with nonprecious-metal HOR electrocatalysts needed to overcome two major challenges, the researchers wrote: low intrinsic activity from too strong a hydrogen binding energy, and poor durability due to rapid passivation from metal oxide formation. To overcome these challenges, the researchers designed a nickel-based electrocatalyst with a 2 nanometer shell made of nitrogen-doped carbon. Their hydrogen fuel cell has an anode (where hydrogen is oxidized) catalyst consisting of a solid nickel core surrounded by the carbon shell. When paired with a cobalt-manganese cathode (where oxygen is reduced), the resulting completely precious-metal-free hydrogen fuel cell outputs more than 200 milliwatts per square centimeter. The presence of nickel oxide species on the surface of the nickel electrode slows the hydrogen oxidation reaction dramatically, Abruna said. The nitrogen-doped carbon coating serves as a protection layer and enhances the HOR kinetics, making the reaction quicker and much more efficient. In addition, the presence of the graphene coating on the nickel electrode prevents the formation of nickel oxides -- resulting in electrodes with dramatically enhanced lifetimes. These electrodes are also much more tolerant to carbon monoxide, which rapidly poisons platinum. The study has been published in the journal Proceedings of the National Academy of Sciences.Read more of this story at Slashdot.
InfiniteZero shares a report from Space.com: Last Wednesday (March 23), NASA astronaut Raja Chari and the European Space Agency's Matthias Maurer spent nearly seven hours outside the International Space Station, performing a variety of maintenance work. Amazingly, astrophotographer Sebastian Voltmer managed to capture a snapshot of the spacewalk action from the ground -- and from Maurer's hometown of Sankt Wendel, Germany, no less. "I feel like I just made a once-in-a-lifetime image," Voltmer wrote at SpaceWeather.com, which featured the photo in its online gallery.Read more of this story at Slashdot.
Greenpeace and other environmental groups launched a new campaign today to push the Bitcoin network to slash its growing greenhouse gas emissions. The Verge reports: The goal of the campaign, dubbed "Change the code, not the climate," is to switch up the energy-hungry process of verifying transactions and mining new Bitcoins. [...] In order to validate transactions, Bitcoin miners rely on specialized hardware to solve complex puzzles. Their computers gobble up a lot of energy in the process, and the miners get new tokens in return. It's a process called "proof of work," in which the energy used is sort of the price paid to verify transactions. The process is deliberately energy-intensive as a safety measure. The baked-in inefficiency is meant to discourage bad actors from manipulating the data because it would cost a lot of energy to do so. The new campaign aims to move Bitcoin away from that energy-hungry proof of work process. The most popular alternative is called proof of stake. Cryptocurrencies that use proof of stake use vastly less energy because there are no puzzles to solve. Instead of essentially paying with electricity to participate in the process, you have to offer up some of your own tokens. This is supposed to prove that you have a "stake" in keeping the ledger accurate. If you mess anything up, you lose tokens as a penalty. While proof of stake might make solve a lot of Bitcoin's pollution problems, experts have been skeptical that miners would be willing to make the change. Miners invest a lot in their hardware and would be hard-pressed to abandon it. And some fans of proof of work maintain that it's the most secure way to maintain the ledger. "We know Bitcoin stakeholders are incentivized not to change," the campaign acknowledges on its website. "Changing Bitcoin would render a whole lot of expensive infrastructure worthless, meaning Bitcoin stakeholders will need to walk away from sunk costs -- or find other creative solutions." As the Guardian notes, the campaign is launching a huge digital advertising push via the Wall Street Journal, New York Times, Marketwatch, Politico, Facebook and others. "Organizers are also taking legal action against proposed mining sites and using their large memberships to push bitcoin's biggest investors and influencers to call for a code change." Additionally, the campaign is urging people to tweet at cryptocurrency influencers to support the campaign.Read more of this story at Slashdot.
"The Massachusetts Institute of Technology announced it will once again require applicants to take the SAT or ACT, reversing a Covid-era policy that made the standardized tests optional and rejecting the idea that the tests hurt diversity," reports CNN. An anonymous reader shares an excerpt from a blog post announcing the decision, writing: From the policy announcement, there's an excess of delicacy -- to the point where you might find it funny or terribly disturbing: "Our research can't explain why these tests are so predictive of academic preparedness for MIT, but we believe it is likely related to the centrality of mathematics -- and mathematics examinations -- in our education. All MIT students, regardless of intended major, must pass two semesters of calculus, plus two semesters of calculus-based physics [...]. The substance and pace of these courses are both very demanding, and they culminate in long, challenging final exams that students must pass to proceed with their education. In other words, there is no path through MIT that does not rest on a rigorous foundation in mathematics, and we need to be sure our students are ready for that as soon as they arrive." Did the entire admissions department threaten to quit? Or did the incoming class turn out to be morons? "Our research shows standardized tests help us better assess the academic preparedness of all applicants, and also help us identify socioeconomically disadvantaged students who lack access to advanced coursework or other enrichment opportunities that would otherwise demonstrate their readiness for MIT," Dean of Admissions Stu Schmill wrote in the policy announcement. "We believe a requirement is more equitable and transparent than a test-optional policy." A number of elite schools, including Harvard and University of California, announced plans to stop using the SAT and ACT college admissions exams. Last May, Colorado became the first state to ban "legacy" admissions and signed a bill that removes a requirement that public colleges consider SAT or ACAT scores for freshmen.Read more of this story at Slashdot.
"Ukrainian special forces teamed up with IT professionals on ATV four-wheelers to target the infamous Kiev convoy," writes longtime Slashdot reader darkseid. "Every Help Desk Geek's Walter Mitty fantasy!" The Guardian reports: One week into its invasion of Ukraine, Russia massed a 40-mile mechanized column in order to mount an overwhelming attack on Kyiv from the north. But the convoy of armored vehicles and supply trucks ground to a halt within days, and the offensive failed, in significant part because of a series of night ambushes carried out by a team of 30 Ukrainian special forces and drone operators on quad bikes, according to a Ukrainian commander. The drone operators were drawn from an air reconnaissance unit, Aerorozvidka, which began eight years ago as a group of volunteer IT specialists and hobbyists designing their own machines and has evolved into an essential element in Ukraine's successful David-and-Goliath resistance. [...] The unit's commander, Lt Col Yaroslav Honchar, gave an account of the ambush near the town of Ivankiv that helped stop the vast, lumbering Russian offensive in its tracks. He said the Ukrainian fighters on quad bikes were able to approach the advancing Russian column at night by riding through the forest on either side of the road leading south towards Kyiv from the direction of Chernobyl. The Ukrainian soldiers were equipped with night vision goggles, sniper rifles, remotely detonated mines, drones equipped with thermal imaging cameras and others capable of dropping small 1.5kg bombs. "This one little unit in the night destroyed two or three vehicles at the head of this convoy, and after that it was stuck. They stayed there two more nights, and [destroyed] many vehicles," Honchar said. The Russians broke the column into smaller units to try to make headway towards the Ukrainian capital, but the same assault team was able to mount an attack on its supply depot, he claimed, crippling the Russians' capacity to advance. "The first echelon of the Russian force was stuck without heat, without oil, without bombs and without gas. And it all happened because of the work of 30 people," Honchar said. "The Aerorozvidka unit also claims to have helped defeat a Russian airborne attack on Hostomel airport, just north-west of Kyiv, in the first day of the war," adds the Guardian. Similar to the convoy ambush, they "[used] drones to locate, target and shell about 200 Russian paratroopers concealed at one end of the airfield."Read more of this story at Slashdot.
theodp shares a report from Chicago Sun-Times, written by Frank Main: When the school system [Chicago Public Schools] shifted to having students learn remotely in the spring of 2020 near the beginning of the pandemic, it lent students iPads, MacBooks and Windows computer devices so they could do school work and attend virtual classes from home. CPS then spent about $165 million to buy Chromebook desktop computers so that every student from kindergarten through senior year in high school who needed a computer could have one. Students borrowed 161,100 Chromebooks in September 2020. By June 2021, more than 210,000 of those devices had been given out. Of them, nearly 40,000 Chromebooks have been reported lost -- nearly a fifth of those that were lent. "Schools have made repeated efforts to recover the lost devices from families without success," according to a written statement from CPS officials in response to questions about the missing school property. Also missing are more than 9,600 iPads, 114 televisions, 1,680 printers and 1,127 audiovisual projectors, among many other items. Officials say CPS has bought new computer devices to replace the missing ones. Longtime Slashdot reader theodp notes that "there were 340,658 students enrolled in the Chicago Public Schools (CPS) at the start of the 2020-2021 school year."Read more of this story at Slashdot.
An anonymous reader quotes a report from ZDNet: The Log4Shell vulnerability is being actively exploited to deliver backdoors and cryptocurrency miners to vulnerable VMware Horizon servers. On Tuesday, Sophos cybersecurity researchers said the attacks were first detected in mid-January and are ongoing. Not only are backdoors and cryptocurrency miners being deployed, but in addition, scripts are used to gather and steal device information. Log4Shell is a critical vulnerability in Apache Log4J Java logging library. The unauthenticated remote code execution (RCE) vulnerability was made public in December 2021 and is tracked as CVE-2021-44228 with a CVSS score of 10.0. According to Sophos, the latest Log4Shell attacks target unpatched VMware Horizon servers with three different backdoors and four cryptocurrency miners. The attackers behind the campaign are leveraging the bug to obtain access to vulnerable servers. Once they have infiltrated the system, Atera agent or Splashtop Streamer, two legitimate remote monitoring software packages, may be installed, with their purpose twisted into becoming backdoor surveillance tools. The other backdoor detected by Sophos is Silver, an open source offensive security implant released for use by pen testers and red teams. Sophos says that four miners are linked to this wave of attacks: z0Miner, JavaX miner, Jin, and Mimu, which mine for Monero (XMR). Previously, Trend Micro found z0Miner operators were exploiting the Atlassian Confluence RCE (CVE-2021-26084) for cryptojacking attacks. A PowerShell URL connected to this both campaigns suggests there may also be a link, although that is uncertain. [...] In addition, the researchers uncovered evidence of reverse shell deployment designed to collect device and backup information.Read more of this story at Slashdot.
Apple Stores and Apple Authorized Service Providers will now be alerted if an iPhone has been reported as missing in the GSMA Device Registry when a customer brings in the device to be serviced, according to an internal memo obtained by MacRumors. From the report: If an Apple technician sees a message in their internal MobileGenius or GSX systems indicating that the device has been reported as missing, they are instructed to decline the repair, according to Apple's memo shared on Monday. The new policy should help to reduce the amount of stolen iPhones brought to Apple for repair. The GSMA Device Registry is a global database designed for customers to report their devices as missing in the event of loss or theft. The report notes that Apple Stores and Apple Authorized Service Providers "are already unable to service an iPhone if the customer cannot disable Find My iPhone."Read more of this story at Slashdot.
"I've been teaching college English for more than 30 years," writes Elisabeth Gruner, a professor of English at the University of Richmond. "Four years ago, I stopped putting grades on written work, and it has transformed my teaching and my students' learning. My only regret is that I didn't do it sooner." The practice she's adopted is called "ungrading," where students are given formative rather than summative feedback. "At the end of the semester they submit a portfolio of revised work, along with an essay reflecting on and evaluating their learning," writes Gruner. "Like most people who ungrade, I reserve the right to change the grade that students assign themselves in that evaluation. But I rarely do, and when I do, I raise grades almost as often as I lower them." Here's here reasoning (via The Conversation): I stopped putting grades on written work for three related reasons -- all of which other professors have also cited as concerns. First, I wanted my students to focus on the feedback I provided on their writing. I had a sense, since backed up by research, that when I put a grade on a piece of writing, students focused solely on that. Removing the grade forced students to pay attention to my comments. Second, I was concerned with equity. For almost 10 years I have been studying inclusive pedagogy, which focuses on ensuring that all students have the resources they need to learn. My studies confirmed my sense that sometimes what I was really grading was a student's background. Students with educational privilege came into my classroom already prepared to write A or B papers, while others often had not had the instruction that would enable them to do so. The 14 weeks they spent in my class could not make up for the years of educational privilege their peers had enjoyed. Third, and I admit this is selfish: I hate grading. I love teaching, though, and giving students feedback is teaching. I am happy to do it. Freed from the tyranny of determining a grade, I wrote meaningful comments, suggested improvements, asked questions and entered into a dialogue with my students that felt more productive -- that felt, in short, more like an extension of the classroom.Read more of this story at Slashdot.
An anonymous reader quotes a report from Ars Technica: Some Internet traffic in and out of Twitter on Monday was briefly funneled through Russia after a major ISP in that country misconfigured the Internet's routing table, network monitoring services said. The mishap lasted for about 45 minutes before RTCOMM, a leading ISP in Russia, stopped advertising its network as the official way for other ISPs to connect to the widely used Twitter IP addresses. Even before RTCOMM dropped the announcement, safeguards prevented most large ISPs from abiding by the routing directive. A visualization of what the event looked like is illustrated on this page from BGPStream. Doug Madory, the director of Internet analysis at network analytics company Kentik, said that what little information is known about Monday's BGP event suggests that the event was the result of the Russian government attempting to block people inside the country from accessing Twitter. Likely by accident, one ISP made those changes apply to the Internet as a whole. "There are multiple ways to block traffic to Twitter," Madory explained in an email. "Russian telecoms are on their own to implement the government-directed blocks, and some elect to use BGP to drop traffic to certain IP ranges. Any network that accepted the hijacked route would send their traffic to this range of Twitter IP space into Russia -- where it likely was just dropped. It is also possible that they could do a man-in-the-middle and let the traffic continue on to its proper destination, but I don't think that is what happened in this case."Read more of this story at Slashdot.
Companies are offering interest-free advances to people with poor credit in exchange for detailed personal data. Wired: Tulloch [Editor's note: the anecdote character in the story] is one of a growing number of US workers turning their personal data over to private companies in exchange for paycheck advances, fueling an industry potentially worth up to $12 billion, by some estimates. In 2020, $9.5 billion in wages were accessed early, according to the research firm Aite-Novarica Group, up from $6.3 billion in 2019. These early payouts can be habit-forming; a 2021 report from the Financial Health Network found that more than 70 percent of pay advance users took out consecutive advances. What Tulloch didn't know was that when he signed up for the app, a company called Argyle was retrieving the data that would be used to decide how much money to give him. It builds the technology that allows companies like B9 to extract a wealth of data from payroll accounts -- up to 140 data points. These can include shifts worked, time off, earnings and promotions history, health care and retirement contributions, even reputational markers like on-time rate or a gig worker's star rating and deactivation history. For every worker that uses its product, Argyle charges customers like B9 a fee, plus an additional monthly charge for continuous monitoring. This makes for a valuable data trove; it's further upstream than banking data, providing a fuller picture of a worker's earnings, deductions, and behavior. Some estimate that payroll data could be worth $10 billion. Argyle pegs it at 10 times higher. Argyle is part of an emerging set of payroll data companies founded over the last four years to cash in on workers' personal information. They build secure connections between payroll providers like Paychex and businesses that want to access that data, like B9. Argyle acts like a courier, shuttling data from one account to another, the same way banking data is transmitted to apps like Venmo. Its competitors include Atomic, Pinwheel, Truv, and Plaid (which builds those bank integrations but recently began releasing payroll products). The data that workers provide can be used to underwrite financial products like loans, mortgages, insurance policies, and buy-now-pay-later apps; simplify direct deposit switching; or verify income and employment for apartment and job applications.Read more of this story at Slashdot.
The Federal Trade Commission sued Intuit in federal court on Monday, claiming it has deceived customers for years by marketing its TurboTax software as free and then charging most users when they file their income taxes. From a report: Around 56 million people filed their taxes with TurboTax in 2021, according to an Inuit shareholder presentation in January. Those individuals filed 54 million W-2 and 40 million 1099 tax forms, the company said. The FTC sued Intuit in U.S. District Court for the Northern District of California, asking for an immediate halt to its "bogus" advertising as taxpayers rush to meet the April 18 deadline to file their 2021 income taxes. The agency also issued a parallel administrative complaint on Monday. That proceeding will determine whether Intuit's conduct violated the FTC Act, the lawsuit said. Much of Intuit's advertising tells consumers they can file their income taxes for free online using TurboTax, but that's not true for most users, including independent contractors in the gig economy who get a 1099 tax form, the FTC said.Read more of this story at Slashdot.
The Chrome team: The Chrome team is delighted to announce the promotion of Chrome 100 to the stable channel for Windows, Mac and Linux. Chrome 100 is also promoted to our new extended stable channel for Windows and Mac. This will roll out over the coming days/weeks. Chrome 100.0.4896.60 contains a number of fixes and improvements -- a list of changes is available in the log.Read more of this story at Slashdot.
Existence of volcanoes makes idea that dwarf planet is inert ball of ice look increasingly improbable. From a report: Strung out in the icy reaches of our solar system, two peaks that tower over the surface of the dwarf planet Pluto have perplexed planetary scientists for years. Some speculated it could be an ice volcano, spewing out not lava but vast quantities of icy slush -- yet no cauldron-like caldera could be seen. Now a full analysis of images and topographical data suggests it is not one ice volcano but a merger of many -- some up to 7,000 metres tall and about 10-150km across. Their discovery has reignited another debate: what could be keeping Pluto warm enough to support volcanic activity? Sitting at the southern edge of a vast heart-shaped ice sheet, these unusual surface features were initially spotted when Nasa's New Horizons spacecraft flew past in July 2015, providing the first close-up images of the icy former planet and its moons. "We were instantly intrigued by this area because it was so different and striking-looking," said Dr Kelsi Singer, a New Horizons co-investigator and deputy project scientist at Southwest Research Institute in Boulder, Colorado. "There are these giant broad mounds, and then this hummocky-like, undulating texture superimposed on top; and even on top of that there's a smaller bouldery kind of texture." At the time, an ice volcano seemed like the least-weird explanation for these features -- there were no impact craters from asteroids or meteors nearby, suggesting these features had been erased by relatively recent geological events; and no evidence of plate tectonics -- a key contributor to mountain formation on Earth.Read more of this story at Slashdot.
Russia's biggest internet company has embedded code into apps found on mobile devices that allows information about millions of users to be sent to servers located in its home country. From a report: The revelation relates to software created by Yandex that permits developers to create apps for devices running Apple's iOS and Google's Android, systems that run the vast majority of the world's smartphones. Yandex collects user data harvested from mobiles, before sending the information to servers in Russia. Researchers have raised concerns the same "metadata" may then be accessed by the Kremlin and used to track people through their mobiles. Researcher Zach Edwards first made the discovery regarding Yandex's code as part of an app auditing campaign for Me2B Alliance, a non-profit. Four independent experts ran tests for the Financial Times to verify his work. Yandex has acknowledged its software collects "device, network and IP address" information that is stored "both in Finland and in Russia," but it called this data "non-personalised and very limited." It added: "Although theoretically possible, in practice it is extremely hard to identify users based solely on such information collected. Yandex definitely cannot do this." The revelations come at a critical time for Yandex, often referred to as "Russia's Google," which has long attempted to chart an independent path without falling foul of Russian president Vladimir Putin's desire for greater control of the internet. The company said it followed "a very strict" internal process when dealing with governments: "Any requests that fail to comply with all relevant procedural and legal requirements are turned down."Read more of this story at Slashdot.
A cryptocurrency affiliated with the popular free-to-play blockchain game Axie Infinity has been hacked in one of the largest crypto heists in history. From a report: The Ronin network is a blockchain launched in February 2021 to make interacting with the Ethereum-based Axie Infinity a little less costly. Whereas doing anything at all on Ethereum costs fees, Ronin allows 100 free transactions per day, per user. Axie Infinity is popular in the Philippines, for example, where users work playing the game in exchange for tokens, often on behalf of individuals or firms that may employ dozens or hundreds of so-called "scholars." In a blog post published on Tuesday, Ronin revealed it had fallen victim to a security breach that has drained half a billion dollars in crypto. Hackers were able to exploit the Ronin bridge and make off with 173,600 ETH (worth about $591,242,019) and $25.5 million worth of the stablecoin USDC in two separate transactions by taking over the blockchain's validator nodes. Validator nodes verify and approve transactions in Ronin's Proof-of-Authority (PoA) model, which differs from the decentralized mining and approval process employed by Bitcoin. Ronin has nine validator nodes, five of which were needed to approve any particular deposit or withdrawal. According to the blog, the hackers "used hacked private keys in order to forge fake withdrawals." The attackers found a backdoor in the gas-free RPC node run by Sky Mavis -- the company that owns Axie Infinity -- allowing them to gain control over a validator node linked to the Axie DAO after it helped Sky Mavis distribute free transactions in November 2021 during an overload of users, according to the Ronin blog post. With Axie DAO's validator node and the four controlled by Sky Mavis, the attackers were able to approve the two transactions.Read more of this story at Slashdot.
Microsoft is finally making it easier to change your default browser in Windows 11. A new update (KB5011563) has started rolling out this week that allows Windows 11 users to change the default browser with a single click. After testing the changes in December, this new one-click method is rolling out to all Windows 11 users. From a report: Originally, Windows 11 shipped without a simple button to switch default browsers that was always available in Windows 10. Instead, Microsoft forced Windows 11 users to change individual file extensions or protocol handlers for HTTP, HTTPS, .HTML, and .HTM, or you had to tick a checkbox that only appeared when you clicked a link from outside a browser. Microsoft defended its decision to make switching defaults harder, but rival browser makers like Mozilla, Brave, and even Google's head of Chrome criticized Microsoft's approach.Read more of this story at Slashdot.
UnknowingFool writes: Google has proposed a change on how Linux kernel handles shutdowns specifically when NVMe drives are used. The issue that Google is finding is that the current NVMe drivers use synchronous APIs when shutting down and it can take 4.5 seconds for each NVMe drive. For a system with 16 NVMe drives that could take more than a minute longer. While this is a problem that only large enterprise systems face currently, more enterprises are replacing their mechanical disk RAID servers with SSD ones. [...] The proposed patches from Google allow for an optional asynchronous shutdown interface at the bus level. The new interface maintains backwards compatibility with the synchronous implementation. As part of the patches, all PCI Express based devices are moved to use the async interface, implements the changes at the PCIe level, and then the changes to the NVMe driver to exploit the async shutdown interface.Read more of this story at Slashdot.
Krebs on Security reports: In the United States, when federal, state or local law enforcement agencies wish to obtain information about who owns an account at a social media firm, or what Internet addresses a specific cell phone account has used in the past, they must submit an official court-ordered warrant or subpoena. Virtually all major technology companies serving large numbers of users online have departments that routinely review and process such requests, which are typically granted as long as the proper documents are provided and the request appears to come from an email address connected to an actual police department domain name. But in certain circumstances -- such as a case involving imminent harm or death -- an investigating authority may make what's known as an Emergency Data Request (EDR), which largely bypasses any official review and does not require the requestor to supply any court-approved documents. It is now clear that some hackers have figured out there is no quick and easy way for a company that receives one of these EDRs to know whether it is legitimate. Using their illicit access to police email systems, the hackers will send a fake EDR along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately. In this scenario, the receiving company finds itself caught between two unsavory outcomes: Failing to immediately comply with an EDR -- and potentially having someone's blood on their hands -- or possibly leaking a customer record to the wrong person. "We have a legal process to compel production of documents, and we have a streamlined legal process for police to get information from ISPs and other providers," said Mark Rasch, a former prosecutor with the U.S. Department of Justice. "And then we have this emergency process, almost like you see on [the television series] Law & Order, where they say they need certain information immediately," Rasch continued. "Providers have a streamlined process where they publish the fax or contact information for police to get emergency access to data. But there's no real mechanism defined by most Internet service providers or tech companies to test the validity of a search warrant or subpoena. And so as long as it looks right, they'll comply." To make matters more complicated, there are tens of thousands of police jurisdictions around the world -- including roughly 18,000 in the United States alone -- and all it takes for hackers to succeed is illicit access to a single police email account.Read more of this story at Slashdot.
Alphabet's Google was fined 2 million euros ($2.2 million) by the Paris Commercial Court over abusive practices toward developers on its app store. From a report: The U.S. tech giant will also have to change seven clauses from its contracts dating back to years 2015 and 2016, that included a 30% commission on revenues generated by developers on the Google Play Store, according to a text of Monday's ruling. Google, as well as Apple, were taken to court in 2018 by the French Ministry of Finance, for imposing a "significant imbalance in the rights and obligations" concerning app developers, including the right for Google to unilaterally modify or terminate the contracts.Read more of this story at Slashdot.
Sony is set to launch a new video game subscription service this summer, seeking to drive sales of its PlayStation consoles and compete with a similar offering from Microsoft. CNBC: The company said Tuesday it will bundle its existing PlayStation Plus and PlayStation Now services into one single subscription service called PlayStation Plus. The new PlayStation Plus will be available in June and comes in three tiers: 1. The basic package, PS Plus Essential, replaces the original PS Plus, which offers players two free games each month and access to online multiplayer. It costs $10 a month or $60 for an annual subscription.2. A step above Essential is PS Plus Extra, which comes with all the same perks as Essential but includes a selection of 400 downloadable PlayStation 4 and PlayStation 5 titles. It's priced at $15 monthly or $100 a year.3. The most expensive package is PS Plus Premium. This one includes 340 more games than Extra, and lets players stream a selection of PS, PS2, PSP, PS3, PS4 and PS5 games over the internet. PS Plus Premium costs $18 a month or $120 each year.Read more of this story at Slashdot.
Almost $10 billion over the next decade will be pumped into helping Australia compete in cyber warfare with adversaries such as Russia and China in a major funding boost that will nearly double the size of the nation's leading cyber security agency. From a report: In its centrepiece defence budget announcement, the government will make the largest single investment in the 75-year history of the Australian Signals Directorate, the country's powerful and highly secretive electronic intelligence agency. The government said the funding increase -- dramatically named Project REDSPICE (Resilience, Effects, Defence, Space, Intelligence, Cyber, and Enablers) -- will significantly expand the ASD's offensive cyber capabilities, as well as the agency's ability to prevent hacking and other digital attacks. The government intends to put national security at the centre of the upcoming election campaign, contrasting its latest announcements with reductions to defence spending during the Rudd-Gillard era. In his budget night speech Treasurer Josh Frydenberg described the $9.9 billion in spending over 10 years as the country's "biggest ever investment in Australia's cyber preparedness." It comes on top of the government's previously announced expansion in Australian Defence Force personnel and the purchase of new Chinook helicopters, Abrams tanks and combat engineering vehicles.Read more of this story at Slashdot.
An anonymous reader quotes a report from Ars Technica: For years, players have complained that ballooning game download sizes are clogging up hard drives and Internet bandwidth. In a recent interview with streamer TeeP, Call of Duty: Warzone Live Operations Lead Josh Bridge admitted that the game's massive file size is also impacting the team's ability to release new maps.Asked about the possibility of adding the original Verdansk map to cycle alongside the game's current Caldera map, Bridge said, "We want that. We all want that," before addressing the "technical problem" that makes it difficult: "The install and re-install sizes are fucking insane, right? If we pulled out Caldera and say we're gonna drop in Verdansk, this could be essentially re-downloading, like, the size of Warzone," he said. "And every time we've done that, we lose players," Bridge continued. "Because you're kind of like, 'I don't want to re-download that,' [so you] uninstall. I think you can't fit anything else but Warzone on a base PS4." Bridge is exaggerating, but only a little. Activision says you need a whopping 175GB of hard drive space on PC for a Warzone install. On Xbox, the base download is listed at nearly 92GB, similar to the size on PlayStation systems. Adding Modern Warfare onto the Warzone package increases the total size to about 250GB on PC and 150GB on consoles. About a year ago, Activision announced that the "larger than usual" Warzone "Season 2 Reloaded" patch would reduce the game's "overall footprint" on hard drives by 10-15GB (and 30-35GB when combined with Modern Warfare, depending on the platform). The "data optimization and streamlining" in that update would also ensure that "future patch sizes for Modern Warfare and Warzone [would] be smaller" than the 57GB update being offered at that point. The results over the ensuing year have been mixed. A February Season 2 patch required only about 11GB of file downloads, for instance, while a December 7 update that introduced new maps required a 41-45 GB download on consoles. [...] In any case, Bridge was remarkably frank about Warzone's file size issues and said that "looking to the future, we're putting a lot more effort into how we sort that out on a technical level so that we can have that [map] rotation. We've been really looking at it, so we'll have more to talk about that, but that is ultimately a goal to ensure that there's a freshness and a variety of experiences."Read more of this story at Slashdot.
Corin Faife writes via The Verge: On March 24th, EU governing bodies announced that they had reached a deal on the most sweeping legislation to target Big Tech in Europe, known as the Digital Markets Act (DMA). Seen as an ambitious law with far-reaching implications, the most eye-catching measure in the bill would require that every large tech company -- defined as having a market capitalization of more than 75 billion euros or a user base of more than 45 million people in the EU -- create products that are interoperable with smaller platforms. For messaging apps, that would mean letting end-to-end encrypted services like WhatsApp mingle with less secure protocols like SMS -- which security experts worry will undermine hard-won gains in the field of message encryption. The main focus of the DMA is a class of large tech companies termed "gatekeepers," defined by the size of their audience or revenue and, by extension, the structural power they are able to wield against smaller competitors. Through the new regulations, the government is hoping to "break open" some of the services provided by such companies to allow smaller businesses to compete. That could mean letting users install third-party apps outside of the App Store, letting outside sellers rank higher in Amazon searches, or requiring messaging apps to send texts across multiple protocols. But this could pose a real problem for services promising end-to-end encryption: the consensus among cryptographers is that it will be difficult, if not impossible, to maintain encryption between apps, with potentially enormous implications for users. Signal is small enough that it wouldn't be affected by the DMA provisions, but WhatsApp -- which uses the Signal protocol and is owned by Meta -- certainly would be. The result could be that some, if not all, of WhatsApp's end-to-end messaging encryption is weakened or removed, robbing a billion users of the protections of private messaging. Given the need for precise implementation of cryptographic standards, experts say that there's no simple fix that can reconcile security and interoperability for encrypted messaging services. Effectively, there would be no way to fuse together different forms of encryption across apps with different design features, said Steven Bellovin, an acclaimed internet security researcher and professor of computer science at Columbia University.Read more of this story at Slashdot.
SpaceX has ended production of new Crew Dragon astronaut capsules, a company executive told Reuters, as Elon Musk's space transportation company heaps resources on its next-generation spaceship program. From the report: Capping the fleet at four Crew Dragons adds more urgency to the development of the astronaut capsule's eventual successor, Starship, SpaceX's moon and Mars rocket. Starship's debut launch has been delayed for months by engine development hurdles and regulatory reviews. It also poses new challenges as the company learns how to maintain a fleet and quickly fix unexpected problems without holding up a busy schedule of astronaut missions. "We are finishing our final (capsule), but we still are manufacturing components, because we'll be refurbishing," SpaceX President Gwynne Shotwell told Reuters, confirming the plan to end Crew Dragon manufacturing. She added that SpaceX would retain the capability to build more capsules if a need arises in the future, but contended that "fleet management is key." Musk's business model is underpinned by reusable spacecraft, so it was inevitable the company would cease production at some point. But the timing was not known, nor was his strategy of using the existing fleet for its full backlog of missions. "Crew Dragon has flown five crews of government and private astronauts to space since 2020, when it flew its first pair of NASA astronauts and became the U.S. space agency's primary ride for getting humans to and from the International Space Station," notes Reuters.Read more of this story at Slashdot.
An anonymous reader quotes a report from The Independent: Energy bills for people living near onshore wind farms could be slashed under new reforms, according to a cabinet minister. Education secretary Nadhim Zahawi also suggested he supports more onshore wind farms but only if they are backed by the local community. Boris Johnson has committed to publishing a British energy security strategy although when asked about onshore wind farms, the Prime Minister stressed there is a "massive opportunity" for the UK with offshore wind. Mr Zahawi told Sky's Sophy Ridge On Sunday program: "I would say that if we are going to make sure that we carry the will of local people, whether it's onshore wind or nuclear, we have to learn from how it's done well in other countries. "The way you do that is to make sure the local community has a real say. "But also we've seen great examples of other people where if they build a nuclear power station, within a certain radius of that power station they get free power. So it's right to look at innovation to make sure we wean ourselves off hydrocarbons, we have to do that, we have to do that well, part of that is making sure we look after the will of the local people." Mr Zahawi insisted there "isn't a row" around the Cabinet table about onshore wind.Read more of this story at Slashdot.
The Lapsus$ hackers used compromised credentials to break into the network of customer service giant Sitel in January, days before subsequently accessing the internal systems of authentication giant Okta, according to documents seen by TechCrunch that provide new details of the cyber intrusion that have not yet been reported. The report adds: [...] The documents provide the most detailed account to date of the Sitel compromise, which allowed the hackers to later gain access to Okta's network. [...] The documents, obtained by independent security researcher Bill Demirkapi and shared with TechCrunch, include a Sitel customer communication sent on January 25 -- more than a week after hackers first compromised its network -- and a detailed timeline of the Sitel intrusion compiled by incident response firm Mandiant dated March 17 that was shared with Okta. According to the documents, Sitel said it discovered the security incident in its VPN gateways on a legacy network belonging to Sykes, a customer service company working for Okta that Sitel acquired in 2021. The timeline details how the attackers used remote access services and publicly accessible hacking tools to compromise and navigate through Sitel's network, gaining deeper visibility to the network over the five days that Lapsus$ had access. Sitel said that its Azure cloud infrastructure was also compromised by hackers. According to the timeline, the hackers accessed a spreadsheet on Sitel's internal network early on January 21 called "DomAdmins-LastPass.xlsx." The filename suggests that the spreadsheet contained passwords for domain administrator accounts that were exported from a Sitel employee's LastPass password manager.Read more of this story at Slashdot.
juul_advocate shares a report from iTWire: Apple's output of the iPhone SE will drop by a fifth in the coming quarter, indicating that the Russia-Ukraine conflict and fears of inflation have affected demand for the device, a report claims. The Nikkei Asia website reported that the company had been telling a number of suppliers that production orders for the next three months would be lower by about two or three million units. Orders for AirPods earphones were also down, by about 10 million units for the whole year, the website said, citing four unnamed individuals as sources. Apple announced the third-generation iPhone SE earlier this month at its "Peek Performance" event. It features the A15 Bionic chip, improved battery life, 5G connectivity, and a new camera system, among other things, for a starting price of $429.Read more of this story at Slashdot.
An anonymous reader quotes a report from The Verge: Collecting satellite data for research is a group effort thanks to this app developed for Android users. Camaliot is a campaign funded by the European Space Agency, and its first project focuses on making smartphone owners around the world part of a project that can help improve weather forecasts by using your phone's GPS receiver. The Camaliot app works on devices running Android version 7.0 or later that support satellite navigation. Researchers think that they can use satellite signals to get more information about the atmosphere. For example, the amount of water vapor in the atmosphere can affect how a satellite signal travels through the air to something like a phone. The app gathers information to track signal strength, the distance between the satellite and the phone being used, and the satellite's carrier phase, according to Camaliot's FAQs. With enough data collected from around the world, researchers can theoretically combine that with existing weather readings to measure long-term water vapor trends. They hope to use that data to inform weather forecasting models with machine learning. They can also track changes in Earth's ionosphere -- the part of the atmosphere near space. Creating better ionospheric forecasts could be relevant in tracking space weather and could eventually make Global Navigation Satellite Systems (GNSS) more accurate by accounting for events like geomagnetic storms. Camaliot could eventually expand to include more attempts at collecting data on a massive scale using sensors present in "Internet of Things" connected home devices. According to The Verge, these are the steps to take to begin using the Camaliot app on your Android phone: 1. Select "start logging" and place your phone in an area with a clear sky view to begin logging the data 2. Once you have measured to your liking, select "stop logging" 3. Then, upload your session to the server and repeat the process over time to collect more data. You can also delete your locally-stored log files at this step. "In addition to being able to view your own measurements against others accumulated over time, you can also see a leaderboard showing logging sessions done by other participants," adds The Verge. "Eventually, the information collected for the study will be available in a separate portal."Read more of this story at Slashdot.
"A reputed expert in the quantum computing field puts it in black and white: as of today, quantum computing is a paper tiger, and nobody knows when (if ever) it will become commercially practical," writes Slashdot reader OneHundredAndTen. "In the meantime, the hype continues." In an opinion piece for MIT Technology Review, Sankar Das Sarma, a "pro-quantum-computing" physicist that's "published more than 100 technical papers on the subject," says he's disturbed by some of the quantum computing hype he sees today, "particularly when it comes to claims about how it will be commercialized." Here's an excerpt from his article: Established applications for quantum computers do exist. The best known is Peter Shor's 1994 theoretical demonstration that a quantum computer can solve the hard problem of finding the prime factors of large numbers exponentially faster than all classical schemes. Prime factorization is at the heart of breaking the universally used RSA-based cryptography, so Shor's factorization scheme immediately attracted the attention of national governments everywhere, leading to considerable quantum-computing research funding. The only problem? Actually making a quantum computer that could do it. That depends on implementing an idea pioneered by Shor and others called quantum-error correction, a process to compensate for the fact that quantum states disappear quickly because of environmental noise (a phenomenon called "decoherence"). In 1994, scientists thought that such error correction would be easy because physics allows it. But in practice, it is extremely difficult. The most advanced quantum computers today have dozens of decohering (or "noisy") physical qubits. Building a quantum computer that could crack RSA codes out of such components would require many millions if not billions of qubits. Only tens of thousands of these would be used for computation -- so-called logical qubits; the rest would be needed for error correction, compensating for decoherence. The qubit systems we have today are a tremendous scientific achievement, but they take us no closer to having a quantum computer that can solve a problem that anybody cares about. It is akin to trying to make today's best smartphones using vacuum tubes from the early 1900s. You can put 100 tubes together and establish the principle that if you could somehow get 10 billion of them to work together in a coherent, seamless manner, you could achieve all kinds of miracles. What, however, is missing is the breakthrough of integrated circuits and CPUs leading to smartphones -- it took 60 years of very difficult engineering to go from the invention of transistors to the smartphone with no new physics involved in the process.Read more of this story at Slashdot.
A group of U.S. lawmakers says the U.S. Treasury Department may be the right government entity to create a digital dollar -- not the Federal Reserve. A new bill introduced Monday would authorize just that. CoinDesk reports: Reps. Stephen Lynch (D-Mass.), Jesus Chuy Garcia (D-Ill.), Ayanna Pressley (D-Mass.) and Rashida Tlaib (D-Mich.) introduced the "Electronic Currency And Secure Hardware Act" (ECASH Act) to direct the Treasury Secretary to develop and issue an electronic version of the U.S. dollar, with an eye to preserving privacy and anonymity in transactions. The electronic dollar, as defined in the bill, would be a bearer instrument that people could hold on their phone or a card. The system would be token-based, not account-based, meaning if someone were to lose their phone or card, they would lose the funds. In other words, it would be like losing a wallet with dollar bills in it. This electronic dollar would be deemed legal tender and be functionally identical to a physical greenback. Rohan Grey, an assistant professor at Willamette University who consulted on the bill, told CoinDesk the bill is meant to create a true digital analogue to the U.S. dollar. "We're proposing to have a genuine cash-like bearer instrument, a token-based system that doesn't have either a centralized ledger or distributed ledger because it had no ledger whatsoever. It uses secured hardware software and it's issued by the Treasury," he said. This form of e-cash would support peer-to-peer transactions, and given the nature of its setup, it would support fully anonymous transactions. Thus, it would differ from other proposals for a digital dollar, which are based on stablecoins or other decentralized ledger tools. The full text of the E-CASH Bill can be read here.Read more of this story at Slashdot.
Ukraine's state-owned telecommunications company Ukrtelecom experienced a disruption in internet service on Monday after a "powerful" cyberattack, according to Ukrainian government officials and company representatives. Reuters reports: The incident is the latest hacking attack against Ukrainian internet services since Russian military forces invaded in late February. "Today, the enemy launched a powerful cyberattack against Ukrtelecom's IT-infrastructure," said Yurii Shchyhol, chairman of the State Service of Special Communication and Information Protection of Ukraine. "The attack was repelled. And now Ukrtelecom has an ability to begin restoring its services to the clients." "Currently, the attack is repulsed, the provision of services is gradually resumed," said Ukrtelecom spokesperson Mikhail Shuranov. NetBlocks, which monitors internet service disruptions, posted on Twitter earlier on Monday that it saw "connectivity collapsing" with an "ongoing and intensifying nation-scale disruption." A similar incident took place earlier this month with Triolan, a smaller Ukrainian telecom company, Forbes previously reported. That company suffered a hack that reset some internal systems, resulting in some local subscribers losing access.Read more of this story at Slashdot.
HP has purchased Poly, the company formerly known as Plantronics, for $3.3 billion. "HP Inc sees the future of its business as one supporting a workforce partially based at home and partially in the office, and appears to have bought office telecom giant Poly for that reason," reports The Register. From the report: Formerly known as Plantronics, Poly changed its name shortly after it acquired Polycom in 2018. HP didn't mention in its acquisition announcement whether or not it would keep the Poly brand separate, but it's still early: the deal is not expected to close until the end of the 2022 calendar year. HP described the $3.3 billion purchase ($40 per share) as a bid to refocus its portfolio on growth and take advantage of what it said is a massive growth opportunity due to the likely permanence of hybrid work. Plantronics and Polycom have long had a considerable presence in the enterprise space, with Polycom's and Plantronics video conferencing hardware and headsets likely familiar to people in the world of work. Plantronics itself has a history reaching back to early airline headsets and the Apollo 11 mission: It's a Plantronics headset that relayed Neil Armstrong's "one small step" back to Earth. The value of peripherals like headsets hasn't declined in the years since, with HP saying the peripheral market is growing 9 percent annually and is worth $110 billion. Workforce solutions, like conference room telecom equipment, represents a $120 billion market segment that HP said is growing 8 percent yearly.Read more of this story at Slashdot.
More students are being exposed to historical narratives through game play -- but what exactly are they being taught? From a report: Analyzing video games is particularly difficult for two reasons. First, their influence is hard to track: Teachers may not even notice that the student asking why the Ottomans didn't colonize America or what happened to Burgundy may have a view of history that was molded by Paradox games. "The student in your class that knows what Prussia is is the student that played Europa Universalis IV," Devereaux said. And second, unlike other cultural mediums, "games are about systems; they're about the mechanics," Devereaux told me. Those systems and mechanics are how video games can "teach" people history. The presence of such mechanics, though, does not mean that players will necessarily understand them. "The major challenge is getting players to recognize and think explicitly about these systems," Marion Kruse, an assistant professor of classics at the University of Cincinnati and a dedicated gamer, told me. In my experience, Europa Universalis is particularly effective at teaching users about its systems. Playing in Spain in Europa Universalis, you'll learn the power of a good marriage when you see that Spain is actually the result of a personal union between the crowns of Castile and Aragon. If you're unlucky enough to choose a country in the Balkans, you will quickly understand the full force of the Ottoman invasions of Europe. Invade the Soviet Union in Hearts of Iron, Paradox's Second World War simulator, and you'll be reminded why Napoleon and Hitler both failed to subdue Russia: "General Frost." The processes the player engages with teach them claims about how the world works -- what The Atlantic's Ian Bogost has called "procedural rhetoric." Paradox's titles don't take a single view of history, but each game does provide a framework for understanding a particular historical period, buoyed by a number of procedural claims. Take Europa Universalis. The game essentially simulates the story of Europe's rise from a relative backwater to a continent that dominated the world. That means that no matter what exact course the game takes, it usually results in the consolidation of large, powerful, centralized states in Europe and their rise to global primacy. The game uses a mechanic of "institutions," such as the printing press and the Enlightenment, which appear in a preset order at 50-year intervals, almost always in Europe, before slowly spreading around the world. Without these institutions, new technologies can be adopted only at much greater cost, meaning that over the centuries Europe slowly pulls ahead of the rest of the world technologically. The player is taught that what made Europe exceptional was the adoption of these institutions, which allowed technological growth to flourish and thereby gave European countries the advantage they used to dominate the world.Read more of this story at Slashdot.
An anonymous reader quotes a report from New Atlas: One of the first products made using a novel animal-free egg white is now available in the United States. The unique macarons are the first to be made with an egg white protein that comes from engineered yeast, designed to be indistinguishable from what is found in chicken eggs. The Every Company, founded in 2014 under the name Clara Foods, is one of several food technology companies working to create real animal-free proteins using a method called precision fermentation. The idea behind the process is to break down certain animal products, such as milk and eggs, to their molecular components and then use microorganisms to produce those components. Earlier this year the first cow-free dairy milk using this method hit supermarket shelves in the United States. That product was created using whey proteins from engineered fungus, while other companies are working on similar dairy products using engineered yeast to produce the desired milk proteins. The Every Company has spent the last few years focusing on using the same technique to produce chicken-free egg whites, working with engineered yeast to produce proteins found in egg whites. The company has not disclosed the specific combination of proteins used to create its final egg white product, however it is likely ovalbumin -- the primary protein component in egg whites -- plays a strong role in the recipe. Arturo Elizondo, CEO of Every Company, said the new egg white product functions exactly like a chicken-derived egg white. It whips, aerates and bakes in ways identical to traditional egg whites, and the company has teamed up with San Francisco-based bakery Chantal Guillon to launch the product in a line of iconic French macarons. The chicken-free egg white is the third animal-free product created by the Every Company. Its first fully commercialized product was an animal-free pepsin, launched in early 2021.Read more of this story at Slashdot.
Particles of light called photons can be trapped inside mirrors to form a gas with unusual properties, New Scientist reports. From the report: A gas made of particles of light, or photons, becomes easier to compress the more you squash it. This strange property could prove useful in making highly sensitive sensors. While gases are normally made from atoms or molecules, it is possible to create a gas of photons by trapping them with lasers. But a gas made this way doesn't have a uniform density -- researchers say it isn't homogeneous, or pure -- making it difficult to study properly. Now Julian Schmitt at the University of Bonn, Germany, and his colleagues have made a homogeneous photon gas for the first time by trapping photons between two nanoscale mirrors. They then moved one of the mirrors to measure the compressibility of the photon gas and derive basic properties about it. "We can consider the system to be like an air pump, but it's not filled with air, it's filled with light," says Schmitt. "We compress it and look at how it responds. In this way, we can learn about very fundamental properties." Journal reference: Science, DOI: 10.1126/science.abm2543.Read more of this story at Slashdot.
Insecure radioactive materials are the latest worry as Russia continues occupation of infamous nuclear reservation. schwit1 shares a report: When the lights went out at Chornobyl Nuclear Power Plant on 9 March, the Russian soldiers holding Ukrainian workers at gunpoint became the least of Anatolii Nosovskyi's worries. More urgent was the possibility of a radiation accident at the decommissioned plant. If the plant's emergency generators ran out of fuel, the ventilators that keep explosive hydrogen gas from building up inside a spent nuclear fuel repository would quit working, says Nosovskyi, director of the Institute for Safety Problems of Nuclear Power Plants (ISPNPP) in Kyiv. So would sensors and automated systems to suppress radioactive dust inside a concrete "sarcophagus" that holds the unsettled remains of Chornobyl's Unit Four reactor, which melted down in the infamous 1986 accident. Although power was restored to Chornobyl on 14 March, Nosovskyi's worries have multiplied. In the chaos of the Russian advance, he told Science, looters raided a radiation monitoring lab in Chornobyl village -- apparently making off with radioactive isotopes used to calibrate instruments and pieces of radioactive waste that could be mixed with conventional explosives to form a âoedirty bombâ that would spread contamination over a wide area. ISPNPP has a separate lab in Chornobyl with even more dangerous materials: "powerful sources of gamma and neutron radiation" used to test devices, Nosovskyi says, as well as intensely radioactive samples of material leftover from the Unit Four meltdown. Nosovskyi has lost contact with the lab, he says, so "the fate of these sources is unknown to us."Read more of this story at Slashdot.
A "powerful" cyberattack has hit Ukraine's biggest fixed line telecommunications company, Ukrtelecom. Described as the most severe cyberattack since the start of the Russian invasion in February, it has sent the company's services across the country down. From a report: Victor Zhora, deputy head of the State Service for Special Communications and Information Protection, confirmed to Forbes that the government was investigating the attack. He said it's not yet known whether Ukrtelecom -- a telephone, internet and mobile provider -- has been hit by a distributed denial of service (DDoS) attack or a deeper, more sophisticated intrusion. The attack has only been acknowledged by Ukrtelecom in responses to customer comments on Facebook. In one, it responded by saying that services were down as a result of a "powerful cyber attack of the enemy." When Forbes messaged Ukrtelecom over Facebook, an automated response was provided, reading, "Currently, there are difficulties in using the internet service from Ukrtelecom. Our specialists are doing everything possible to resolve this issue as soon as possible. Due to the abnormal load and problems with internal systems, the operators of the contact center and Facebook can not process customer requests." NetBlocks, which tracks internet downtimes across the world, found Ukrtelecom had been dealing with a disrupted service since this morning, "collapsing to 13% of pre-war levels."Read more of this story at Slashdot.
An anonymous reader shares a report: "To wake up to one of these things is pretty special -- to have a Leonardo at home," said Joe Kennedy, the director of the contemporary art dealership Unit London, enthusing recently about an elaborately framed LED screen with a digital replica of Leonardo da Vinci's "Portrait of a Musician" glowing on his gallery wall. The original was 800 miles away in the Ambrosiana museum in Milan. The Leonardo was one of six ultra-high-resolution copies of famous paintings from across the centuries in Unit's moodily lit "Eternalizing Art History" exhibition, which closed on Saturday. The show was the latest attempt by cash-poor museums to generate money by selling nonfungible tokens, or NFTs. Last year, NFTs, usually pegged to the high-flying but volatile Ethereum cryptocurrency, took the market for art and collectibles by storm, with sales estimated in the tens of billions. Pandemic-related lockdowns and reprioritized government spending have put the world's public museums under financial pressure. Yet so far, despite the formidable sales figures being achieved by NFTs, few institutions have explored this digital asset as a fund-raising mechanism. Unit and its Florence-based technology partner Cinello forged licensing agreements with several prominent Italian museums to create a hybrid offering of limited edition LED reproductions in period-style wooden frames, each accompanied by a unique NFT. Same-size digital versions of the Leonardo portrait, Caravaggio's "Bowl of Fruit" (also in the Ambrosiana) and Raphael's "Madonna of the Goldfinch" (in the Uffizi in Florence) were offered in editions of nine, ranging in price from 100,000 euros to $549,000 per piece (around $110,000 to $550,000). Fifty percent of sales proceeds went back to the licensing museums. By the Friday after the show closed, seven sales had been confirmed up to $274.5,000, which included at least one of the Leonardo NFTs.Read more of this story at Slashdot.
The Finnish company played a key role in enabling Russia's cyberspying, documents show, raising questions of corporate responsibility. From a report: Nokia said this month that it would stop its sales in Russia and denounced the invasion of Ukraine. But the Finnish company didn't mention what it was leaving behind: equipment and software connecting the government's most powerful tool for digital surveillance to the nation's largest telecommunications network. The tool was used to track supporters of the Russian opposition leader Aleksei A. Navalny. Investigators said it had intercepted the phone calls of a Kremlin foe who was later assassinated. Called the System for Operative Investigative Activities, or SORM, it is also most likely being employed at this moment as President Vladimir V. Putin culls and silences antiwar voices inside Russia. For more than five years, Nokia provided equipment and services to link SORM to Russia's largest telecom service provider, MTS, according to company documents obtained by The New York Times. While Nokia does not make the tech that intercepts communications, the documents lay out how it worked with state-linked Russian companies to plan, streamline and troubleshoot the SORM system's connection to the MTS network. Russia's main intelligence service, the F.S.B., uses SORM to listen in on phone conversations, intercept emails and text messages, and track other internet communications. The documents, spanning 2008 to 2017, show in previously unreported detail that Nokia knew it was enabling a Russian surveillance system. The work was essential for Nokia to do business in Russia, where it had become a top supplier of equipment and services to various telecommunications customers to help their networks function. The business yielded hundreds of millions of dollars in annual revenue, even as Mr. Putin became more belligerent abroad and more controlling at home.Read more of this story at Slashdot.