Feed slashdot Slashdot

Favorite IconSlashdot

Link https://slashdot.org/
Feed https://rss.slashdot.org/Slashdot/slashdotMain
Copyright Copyright Slashdot Media. All Rights Reserved.
Updated 2026-02-14 11:02
PlayStation Takes On Xbox With New Subscription Service
PlayStation's revamped version of its video game subscription service went live on Monday, giving members access to a catalog of several hundred games both new and old. From a report: PlayStation Plus, once code-named Spartacus, is Sony Group's attempt to compete with rival Microsoft's popular Xbox Game Pass as both publishers jockey to be the Netflix of video games. The new service combines Sony's previous subscription offerings into a three-tiered system. The most basic level, Essential, costs $10 a month and replaces the old PlayStation Plus, offering two downloadable games per month, a smattering of discounts and access to online multiplayer games. It's the top two tiers that are new for PlayStation users. The Extra tier, at $15 a month, offers a library of about four hundred PlayStation 4 and 5 games, while the $18 a month Premium level adds a few hundred classic games to the pool, mostly from the PlayStation 3. The service only has around thirty PS1, PS2 and PSP games, which has been a disappointment for retro gamers.Read more of this story at Slashdot.
Google Talk, Surprisingly Still Operational, Ends on Thursday
Google is shutting down Talk (also known as GChat) for good -- its instant-messaging service you probably haven't used much since 2007. From a report: Although Google migrated Talk users over to Google Hangouts in 2017 -- another one of its now-sidelined messaging platforms -- it was still accessible by third-party XMPP clients like Pidgin and Gajim. But Google will cut these last lines of life support on June 16th -- three days from now. In a message on Talk's support page, Google says it's "winding down Google Talk" and will no longer support third-party apps, citing its initial announcement in 2017. Users who try to sign into GChat after the 16th will see a sign-in error. If you still want to use Pidgin through Google services, Pidgin recommends using this plugin for Google Chat instead.Read more of this story at Slashdot.
Intel Tries To Get Its Chip Manufacturing Back on Track With 'Intel 4,' Due in 2023
Intel's chip manufacturing technology has been outpaced by rivals like TSMC and Samsung in recent years, but the company is looking to put its troubles behind it. From a report: The first step forward will be the Intel 4 manufacturing process, which Intel has shared more details about at the Institute of Electrical and Electronics Engineers' annual VLSI Technology Symposium (as reported by AnandTech and Tom's Hardware). The new manufacturing tech is on track to be used in consumer chips starting in 2023, starting with Intel's "Meteor Lake" CPU architecture. Meteor Lake will likely come to market as Intel's 14th-generation Core CPU sometime next year. Intel 4's biggest improvement is its integration of extreme ultraviolet (EUV) lithography, which uses short-wavelength ultraviolet light to etch tiny patterns into silicon wafers. TSMC and Samsung use EUV technology in their most advanced manufacturing processes. Intel says that compared to the Intel 7 process, Intel 4 will enable either 21.5 percent better clock speeds using the same amount of power or the same speeds using 40 percent less power. After Intel 4, Intel will move on to Intel 3, which is a higher-density iteration of Intel 4 using the same EUV technology. Notably, chipmakers will be able to port designs made for Intel 4 directly to Intel 3 without having to make changes, which will hopefully allow both Intel and third-party chip designers to start using it quickly (Intel 3 will be offered to third parties through Intel Foundry Services). By making smaller jumps between process technologies -- introducing EUV lithography in Intel 4 and then optimizing for maximum density in Intel 3, rather than trying to do both at once -- Intel hopes to avoid the delays and yield problems that held the 10nm/Intel 7 process back for so many years.Read more of this story at Slashdot.
Microsoft Will End Support For Most Versions of Internet Explorer on June 15
It's finally happening. Microsoft will be ending support for most versions of its Internet Explorer (IE) 11 browser on June 15. ZDNet: Microsoft announced more than a year ago that IE would be removed from most versions of Windows 10 this year and has spent months encouraging customers to get ready by proactively retiring the browser from their organizations. IE 11 will be retired for Windows 10 client SKUs (version 20H2 and later) and Windows 10 IoT (version 20H2 and later). Products not affected by this retirement include IE Mode in Edge; IE 11 desktop on Windows 8.1, Windows 7 (with Extended Security Updates), Windows Server LTSC (all versions), Windows Server 2022, Windows 10 client LTSC (all versions), Windows 10 IoT LTSC (all versions). The IE 11 desktop app is not available on Windows 11, as Edge is the default browser for Windows 11. IE Mode in Microsoft Edge will be supported through at least 2029 to give web developers eight years to modernize legacy apps and eventually remove the need for IE mode, officials have said. According to Net Applications, a web monitoring tool, Internet Explorer still has a market share of 5.21% on desktops and laptops, far behind Chrome at over 69%, to be sure, but still ahead of Apple's Safari, which commands 3.73% market share.Read more of this story at Slashdot.
As the Large Hadron Collider Revs Up, Physicists' Hopes Soar
The particle collider at CERN will soon restart. From a report: In April, scientists at the European Center for Nuclear Research, or CERN, outside Geneva, once again fired up their cosmic gun, the Large Hadron Collider. After a three-year shutdown for repairs and upgrades, the collider has resumed shooting protons -- the naked guts of hydrogen atoms -- around its 17-mile electromagnetic underground racetrack. In early July, the collider will begin crashing these particles together to create sparks of primordial energy. And so the great game of hunting for the secret of the universe is about to be on again, amid new developments and the refreshed hopes of particle physicists. Even before its renovation, the collider had been producing hints that nature could be hiding something spectacular. Mitesh Patel, a particle physicist at Imperial College London who conducts an experiment at CERN, described data from his previous runs as "the most exciting set of results I've seen in my professional lifetime." A decade ago, CERN physicists made global headlines with the discovery of the Higgs boson, a long-sought particle, which imparts mass to all the other particles in the universe. What is left to find? Almost everything, optimistic physicists say. When the CERN collider was first turned on in 2010, the universe was up for grabs. The machine, the biggest and most powerful ever built, was designed to find the Higgs boson. That particle is the keystone of the Standard Model, a set of equations that explains everything scientists have been able to measure about the subatomic world. But there are deeper questions about the universe that the Standard Model does not explain: Where did the universe come from? Why is it made of matter rather than antimatter? What is the "dark matter" that suffuses the cosmos? How does the Higgs particle itself have mass? Physicists hoped that some answers would materialize in 2010 when the large collider was first turned on. Nothing showed up except the Higgs -- in particular, no new particle that might explain the nature of dark matter. Frustratingly, the Standard Model remained unshaken.Read more of this story at Slashdot.
Dozens of Companies, Small Business Groups Back US Bill To Rein in Big Tech
Dozens of companies and business organizations are sending a letter to U.S. senators on Monday to urge them to support a bill aimed at reining in the biggest tech companies, such as Amazon.com and Alphabet's Google. From a report: Democratic U.S. Senator Amy Klobuchar and lawmakers from both parties said last week they had the Senate votes needed to pass legislation that would prevent the tech platforms, including Apple and Facebook, from favoring their own businesses on their platforms. The companies supporting the measure, which include Yelp, Sonos, DuckDuckGo and Spotify, called it a "moderate and sensible bill aimed squarely at well-documented abuses by the very largest online platforms."Read more of this story at Slashdot.
Crypto Market Sinks Below $1 Trillion
Bitcoin plunged to the lowest in about 18 months after the freezing of withdrawals by the Celsius lending platform added to concern that systemic risk in the crypto ecosystem will accelerate the digital-asset market meltdown. From a report: The world's largest digital token tumbled as much as 17% to $22,603 -- its lowest since December 2020. Other cryptocurrencies also declined as a broader sell-off continued. The MVIS CryptoCompare Digital Assets 100 Index, which measures 100 of the top tokens, dropped as much as 17%. And the total market value, which topped $3 trillion in November, dropped below $1 trillion as of 10:54 a.m. New York time on Monday, according to CoinGecko. "The fundamentals to support stabilization and recovery just aren't there," said Steven McClurg, co-founder and CIO at crypto fund manager Valkyrie Investments. "Things can and likely will get worse before they get better."Read more of this story at Slashdot.
Amazon Set To Launch Drone Delivery in California
The drones are coming as Amazon announces Monday that it's launching a fleet of delivery drones. The retail giant will test its new Amazon Prime Air delivery system in Lockeford, California, the company said. From a report: Amazon worked with the Federal Aviation Administration and local officials in Lockeford, a small town south of Sacramento, to gain permission for the drones to take flight. "Lockeford residents will soon have access to one of the world's leading delivery innovations," California State Assemblyman Heath Flora said in a release. "It's exciting that Amazon will be listening to the feedback of the San Joaquin County community to inform the future development of this technology." The company has been developing drones for years. It gained FAA approval for the drones in 2020, before scaling back the project the following year. The drones use sense-and-avoid systems in order to operate safely. The drones can reliably avoid obstacles including other aircraft, people and pets, Amazon said.Read more of this story at Slashdot.
Crypto Lender Celsius Pauses Withdrawals, Transfers Citing 'Extreme Market Conditions'
Celsius Network, one of the biggest crypto lenders, told customers Sunday evening that it is pausing withdrawals, swap, and transfers between accounts in a move that has sparked discussions and prompted the price of the firm's token to take a 60% tumble in the past one hour to as low as 19 cents. From a report: "We are taking this action today to put Celsius in a better position to honor, over time, its withdrawal obligations," wrote Celsius, which counts stablecoin-issuer Tether International, growth equity fund WestCap Group and Canadian pension fund Caisse de Depot et Placement du Quebec among its investors. [...] Celsius, which was valued at $3.25 billion when it extended its "oversubscribed" Series B financing round to $750 million in November, allows users to deposit their Bitcoin, Ethereum and Tether and receive weekly interest payments. Depending on the time horizon and the token, the platform offers as much as 18% interest a year. On its website, Celsius says 1.7 million people call "Celsius their home for crypto."Read more of this story at Slashdot.
Is Oracle's Database Dominance Being Eroded by Cloud-First Rivals?
Shutterfly recently moved its photo libraries to Amazon's cloud division — and became one of the companies that stopped using Oracle for it database management, Bloomberg reports:Businesses are opting to align with newer providers such as MongoDB Inc., Databricks Inc. and Snowflake Inc. instead of Oracle, the sector stalwart, as a result of changes across the enterprise technology landscape. The move to the cloud is challenging the systems of the past. Newer providers are also making it much easier to adopt their technology directly, alleviating the need for corporate purchasers to negotiate large contracts with salespeople and allowing end users to more easily pick their own tools. Offerings from the newer software makers can also be deployed without large teams of database administrators that are typically needed to support Oracle's products, a cost-saver for organizations that would otherwise have to fight against other businesses for these in-demand engineers. The evidence of the shift is widespread. JPMorgan Chase & Co. chose Cockroach Labs Inc. as the database vendor to support its new retail banking application in Europe. Nasdaq Inc. is working with closely held Databricks and Amazon.com Inc.'s Amazon Web Services, among others, in its quest to upgrade from on-premises Oracle data repositories. Alongside AWS, database products from rival cloud vendors Microsoft Corp. and Alphabet Inc.'s Google Cloud are also growing quickly. And many businesses, like JetBlue Airways Corp. and Automatic Data Processing Inc., are tapping Snowflake to help store and analyze corporate data to power sales dashboards, among other uses.... Collectively, the initiatives are just a small fragment of the estimated $155 billion database market. But it's evidence of a tectonic shift happening within the industry, one that is threatening the leadership status Oracle cultivated over the past 43 years, ever since co-founder Larry Ellison and his team brought to market the first relational database, or one in which information was organized in tables that could be more easily accessed, manipulated and analyzed.... Oracle doesn't disclose financial results specifically for its database business. Much of that revenue comes from providing support and maintenance for existing customers versus new sales. But Oracle's influence is slowly fading. While it owned an estimated 27% of the database market in 2019, that fell to 24% in 2020, per Gartner. In the same time frame, Amazon went from 17% market share to almost 21%. Oracle declined to comment for this story. Rivals are growing quickly. At MongoDB, for example, sales rose 57% to $285 million in the most recent quarter. Those results, analysts and company executives say, indicate businesses are using MongoDB for increasingly larger projects.... Oracle makes a significant portion of its revenue on existing customers. Every few years, when companies have to renew their contracts, Oracle can raise prices for maintenance and support — a business with margins hovering around 95%, according to Craig Guarente, a 16-year veteran of Oracle who is now CEO and co-founder of consulting firm Palisade Compliance. "The entire profit of the company comes from Oracle database maintenance," he said. With each contract negotiation, "you go from paying $20 million a year, to $30 million a year, to paying $50 million a year."Read more of this story at Slashdot.
'How the 3D-Printing Community Worldwide is Aiding Ukraine'
Jakub Kaminski is a robotics engineering graduate student at Worcester Polytechnic Institute in Massachusetts. With some volunteers he spent two months designing the perfect tourniquet for the battlefields of Ukraine, designed meet the highest medical standards — and then uploaded it to 3DPrintingForUkraine.com. Now in less than 8 weeks "around 120 individuals and companies worldwide with 3D printers have accessed the design," reports the Washington Post. [Alternate URL here] "Together, they have made roughly 5,000 reusable tourniquets that are bound for Ukraine, where they will be stitched and sent off to the battlefield, Kaminski said..."Using digital files, people are designing supplies such as bandages, tourniquets, splints and add-ons to AK-47 guns.... [In February, as Russia began its invasion] people in the 3D-printing community talked with Ukrainian military officials, hospital administrators and charity organizations, trying to gauge what they could print quickly that would be most helpful. Tourniquets and bandages were repeated requests. Mykhailo Shulhan, the chief operating officer of a Ukrainian 3D-printing company in Lviv, said that as soon as the invasion began, he started researching how 3D printers helped in other conflicts.... These days, his company, 3D Tech Addtive, develops and prints an array of weapons accessories: AK-47 holsters so soldiers have a way to rest their guns; bullet magazines since empty cartridges often get thrown away instead of reused; carrying bags for grenades; and most recently, anti-reflective lenses for sniper scopes to reduce glare and prevent Ukrainian snipers from being seen. (All together, they have provided over 5,000 components to the front lines, Shulhan estimated....) While most 3D printers create supplies to stop death or ease fighting conditions, others are focusing on rehabilitating soldiers. Brett Carey, a physical therapist in Hawaii, designs 3D printed splints that can be sent to fighters... Carey has created two digital designs for splints that have been uploaded online and 3D printed over 1,500 times. If injuries are advanced, he has people send him images of their injuries using EM3D — a 3D imaging app — which allows him to make a custom made splint which is then shipped to Ukraine... The Post also got this quote from the robotics engineering student whose team designed the tourniquets. "It's a beautiful thing," he said. "If you make people in Ukraine feel better, and enable people to help. ... This is something really special."Read more of this story at Slashdot.
As the Great Salt Lake Dries Up, Utah Faces 'An Environmental Nuclear Bomb'
The state of Utah has the largest saltware lake in the entire western hemisphere — but it's like the tide went out and never came back, warns the New York Times. [Alternate URL here.] "If the Great Salt Lake, which has already shrunk by two-thirds, continues to dry up, here's what's in store."The lake's flies and brine shrimp would die off — scientists warn it could start as soon as this summer — threatening the 10 million migratory birds that stop at the lake annually to feed on the tiny creatures. Ski conditions at the resorts above Salt Lake City, a vital source of revenue, would deteriorate. The lucrative extraction of magnesium and other minerals from the lake could stop. Most alarming, the air surrounding Salt Lake City would occasionally turn poisonous. The lake bed contains high levels of arsenic and as more of it becomes exposed, wind storms carry that arsenic into the lungs of nearby residents, who make up three-quarters of Utah's population. "We have this potential environmental nuclear bomb that's going to go off if we don't take some pretty dramatic action," said Joel Ferry, a Republican state lawmaker and rancher who lives on the north side of the lake. As climate change continues to cause record-breaking drought, there are no easy solutions. Saving the Great Salt Lake would require letting more snowmelt from the mountains flow to the lake, which means less water for residents and farmers. That would threaten the region's breakneck population growth and high-value agriculture — something state leaders seem reluctant to do. Utah's dilemma raises a core question as the country heats up: How quickly are Americans willing to adapt to the effects of climate change, even as those effects become urgent, obvious, and potentially catastrophic...? Until recently, that hydrological system existed in a delicate balance... [T]wo changes are throwing that system out of balance. One is explosive population growth, diverting more water from those rivers before they reach the lake. The other shift is climate change, according to Robert Gillies, a professor at Utah State University and Utah's state climatologist. Higher temperatures cause more snowpack to transform to water vapor, which then escapes into the atmosphere, rather than turning to liquid and running into rivers. More heat also means greater demand for water for lawns or crops, further reducing the amount that reaches the lake.... The lake's surface area, which covered about 3,300 square miles in the late 1980s, has since shrunk to less than 1,000, according to the U.S. Geological Survey.Read more of this story at Slashdot.
Two Tech CEOs Wanted Every Worker to Have a Permanent, Publicly-Available Job Performance File
"Two CEOs on a podcast casually proposed a shareable database of worker performance that would follow them between companies, forever, and encouraged listeners to create one," writes Slashdot reader merauder128 , summarizing a recent article on Vice. "HR professionals say it's a terrible idea." Vice points out the podcast both the host and guest were CEOs of "data harvesters that package and resell data to other parties."Through one lens, it was a mundane musing between two CEOs of data companies talking about how awesome it would be to have more data on something. But in the context of experiments occurring in the tech industry around hiring practices, it was two influential CEOs encouraging other entrepreneurs to create a business that would be an absolute nightmare for workers, a type of credit score for workers that could be a permanent HR file that follows workers from one job to the next, and where a worker who struggles at one job may have trouble getting another.... It is also in line with a growing trend among tech companies that, spurred by work-from-home and hybrid work, are increasingly interested in quantifying employee performance. The most prominent example is Coinbase introducing an app so employees can constantly rate each other's performances, a scenario even the normally cheery TechCrunch said "sounds rough." Over the last several years, there has been a boom in employee management software solutions such as Workday, Lattice, CultureAmp that are used across thousands of companies for performance reviews and other sensitive HR tasks. Technologically speaking, what Youakim and Hoffman are talking about is opening those confidential resources — or some condensed version of them that can be easily digested and analyzed — up to everyone. None of these HR software companies have indicated that they have any intention of doing this. The article warns that experts who have studied hiring extensively believe a permanent database database "would allow this complete, random mess to follow workers their entire careers, affecting their job prospects, earning potential, and their broader lives." And the article summarizes a reaction to the idea from John Hausknecht, a professor of human resources at Cornell University. "It assumes people don't change, that jobs require similar attributes, that a person's experience at one company is relevant to another where they will be in a different environment with a different manager and different company culture.... "Or, to put it a different way, 'Just because we can track it, collect it, and ask about it,' Hausknecht said, 'doesn't necessarily mean we should.'"Read more of this story at Slashdot.
Low-cost Astra Rocket Suffers Upper Stage Failure. Two NASA Satellites Lost
"All appeared to be going smoothly," reports CBS News, "when, about a minute before the second stage engine was expected to shut down, an onboard 'rocketcam' showed a flash in the engine's exhaust plume. "The camera view them showed what appeared to be a tumble before video from the rocket cut off...."California-based Astra on Sunday launched two shoebox-size NASA satellites from Cape Canaveral in a modest mission to improve hurricane forecasts, but the second stage of the company's low-cost booster malfunctioned before reaching orbit and the payloads were lost. "The upper stage shut down early and we did not deliver the payloads to orbit," Astra tweeted. "We have shared our regrets with @NASA and the payload team. More information will be provided after we complete a full data analysis." It was the seventh launch of Astra's small "Venture-class" rocket and the company's fifth failure. Sunday's launch was the first of three planned for NASA to launch six small CubeSats, two at a time, into three orbital planes. Given the somewhat risky nature of relying on tiny shoebox-size CubeSats and a rocket with a very short track record, the $40 million project requires just four satellites and two successful launches to meet mission objectives. The NASA contract calls for the final two flights by the end of July. Whether Astra can meet that schedule given Sunday's failure is not yet known. "Although today's launch with @Astra did not go as planned, the mission offered a great opportunity for new science and launch capabilities," tweeted NASA science chief Thomas Zurbuchen....After Sunday's failure, he tweeted: "Even though we are disappointed right now, we know: There is value in taking risks in our overall NASA Science portfolio because innovation is required for us to lead."Read more of this story at Slashdot.
Crop Circles - and Why People Believed in Them
The New York Times tells the story of crop circles, "the mysterious patterns that regularly intrigued people around the world in the 1980s and '90s, prompting speculation about alien visitors, ancient spiritual forces, weather anomalies, secret weapons tests and other theories." They call the phenomenon "a reminder that even before the era of social media and the internet, hoaxes were able to spread virally around the world and true believers could cling stubbornly to conspiracy theories despite a lack of evidence — or even the existence of evidence to the contrary."In the case of crop circles, the most important contradictory evidence emerged on Sept. 9, 1991, when the British newspaper Today ran a front-page story under the headline "Men who conned the world," revealing that two mischievous friends from Southampton had secretly made more than 200 of the patterns over the previous decade. Doug Bower, then 67, and his friend Dave Chorley, 62, admitted to a reporter, Graham Brough, that in the late 1970s they had begun using planks of wood with ropes attached to each end to stamp circles in crops by holding the ropes in their hands and pressing the planks underfoot. They had then watched with amusement as their anonymous antics eventually attracted media attention and began being copied by imitators around the world... The real-life pranksters phoned the newspaper to come clean, according to Mr. Brough, now 62, who says he verified their claims by checking an archive of more than 200 crop circle designs stored in a shed behind Mr. Bower's home. The designs were clearly aged and matched the patterns they had made over the years, Mr. Brough said. "I spent a week getting them to show me how they had done it all, and I have never laughed as much in my life," he recalled. "The prevailing wisdom at the time was that aliens were about to land any day, but it had all been kicked off by these two blokes who'd have a couple of pints at their favorite pub and then head out into the night to have a bit of fun...." "The people who wanted to keep believing in aliens and everything else just ignored the evidence, no matter how obvious it was," said Rob Irving, who had begun emulating the two pranksters' work in 1989 and befriended them after they went public.... "The power of the art came from the mystery, and Doug forever regretted coming forward because the mystery was lost." A professor of psychology at the University of Bristol in Britain explains to the Times the thought process of believers (which he says predated the internet). "instead of admitting that we live in a world we can't control, they take comfort from believing that there is agency involved and someone who can be blamed." The Times finds an example in a crop circle proponent who now believes, to this day, that even if crop circles are all man-made, the people making them have unwittingly "been prompted by an independent nonhuman mind." Although after a new crop circle appeared, the Times obtained an alternative perspective — from a neighboring farmer. "It is just so irresponsible to be trespassing and destroying food in the middle of a global wheat shortage."Read more of this story at Slashdot.
What Happens When 'The Mandalorian' and 'Bobba Fett' Characters Come to Disneyland?
Disneyland's Galaxy's Edge, aka "Star Wars Land," lets its visitors "immersively" experience the planet Batuu during the period between Star Wars: Episode VIII — The Last Jedi and Episode IX — The Rise of Skywalker. But there's some big changes coming, reports SFGate.com:Disney recently announced — at the "From a Galaxy Far, Far Away to Disney Park Near You" panel at Star Wars Celebration Anaheim 2022 event — that main characters from the immensely popular Disney Plus series "The Book of Boba Fett" and "The Mandalorian" would begin appearing at Disneyland. Yes, including the universally adored, merchandise and meme-dominating Grogu, aka "Baby Yoda." However, there is one sarlacc-sized snag: Those stories are set about five years after Return of the Jedi, and about 25 years before The Force Awakens, which raises a galaxy of questions about how this will impact Galaxy's Edge. The introduction of new characters into the attraction will either break the timeline of Star Wars land or, perhaps, unburden it from self-imposed shackles.This could be a good thing, the article suggests, since "Currently there is frankly not a lot of character interaction on Batuu."Kylo Ren pops in on occasion to interrogate guests, and some stormtroopers march around. Rey and Chewie pose for pics, R2-D2 wheels around, and Vi randomly shows up. But that's about it. There is no BB-8 or C-3PO, no Poe or Finn walking around, no Captain Phasma (who died in "The Last Jedi"). The cast members do their part to speak the local lingo of "bright suns" and "till the spire," but Black Spire Outpost feels somewhat unpopulated. It looks and feels like a Star Wars town, but lacks true full immersion. Oga's Cantina does feel lived in, and always crowded, but the closest immersive experience is Savi's Workshop, where building a lightsaber is a damn near religious experience, complete with the Force ghost voice of Yoda. So how would new characters impact this? If Mando appears at Galaxy's Edge, are guests to assume he (and Grogu) are still bouncing about by the time of the sequel series...? The town of Black Spire Outpost might come to resemble Fantasyland, for instance, where multiple characters occupy their own zones and don't intersect... Regardless, this change further populates Galaxy's Edge, which is good for the guest who wants to take a lot of character photos. It also allows Disney to roll out their most popular modern characters, and potentially open the door for them to showcase original trilogy and prequel trilogy characters (which are having a moment right now). But it does create major story hiccups.Read more of this story at Slashdot.
Microsoft, Facebook, Google Oppose Buffett-Backed Wind Farm Project
It's Warren Buffett versus Google, Facebook and Microsoft, according to a recent article by Bloomberg. (Alternate URL here.)Google, Facebook and Microsoft Corp. — three of the world's biggest corporate buyers of clean power — are sounding the alarm that a nearly $4-billion, Warren Buffett-backed renewable-energy project proposed in Iowa isn't necessarily in the best interest of customers, including them. If approved, it would be the largest complex of wind farms in the entire country when it comes online by the end of 2024, producing enough electricity for more than 700,000 homes. MidAmerican Energy, a utility owned by Buffett conglomerate Berkshire Hathaway Inc., has asked state regulators to approve terms including a guaranteed 11.25% rate of return before starting construction on a project it says will help in its efforts to trim carbon emissions by 75% compared to 2005 levels. But the big-name tech giants that operate data centers in the state warn the project, dubbed Wind Prime, could drive up electricity costs. MidAmerican, they say, should consider alternatives.... The fight is an important one to watch because it demonstrates the increasing influence technology giants have on the energy transition. Tech companies have pushed utilities in other parts of the U.S. to offer more clean energy options as they seek to clean up the sources of power for their energy-intensive operations. And since they buy so much power, the utilities often listen to them.... Facebook, which also buys large amounts of power to run data centers in Iowa, referred to the proposed project in a joint regulatory filing with Google as an "exceedingly costly, massive increase in generation that MidAmerican has not demonstrated is necessary." Last month, Microsoft filed its own petition with the Iowa Utilities Board saying it planned to join the tech-customer coalition. Facebook and Google specifically complain that "Without a resource planning analysis, it is difficult if not impossible to assess all feasible alternatives to replace/expand existing generation capacity and which alternatives are a reasonable, cost-effective way to meet reliability requirements, forecasted customer need, a diversified fuel mix, and the like, or if it is simply being proposed to drive utility — or parent company — profitability.... "Wind Prime is an exceedingly costly, massive increase in generation that MidAmerican has not demonstrated is necessary or reasonable in light of other feasible alternatives. Before customers are forced to bear the increased costs that this project will result in, Wind Prime should be carefully considered by the Board through a complete record informed by a full and thorough discovery process."Read more of this story at Slashdot.
Cybersecurity Products Rarely Live Up To Marketing Claims: RSA Panel
A panel at this week's RSA Conference argued that 90% of security buyers aren't getting the efficacy from their products that vendors claim they can deliver. Slashdot reader storagedude writes: Joe Hubback of cyber risk management startup ISTARI led both the panel and the study, which was based on in-depth interviews with more than a hundred high-level security officials, including CISOs, CIOs, CEOs, security and tech vendors, evaluation organizations and government organizations. Hubback said that "90% of the people that I spoke to said that the security technologies they were buying from the market are just not delivering the effect that the vendors claim they can deliver. Quite a shocking proportion of people are suffering from technology that doesn't deliver." A number of reasons for that product failure came out in the panel discussion, according to eSecurity Planet, but they can be boiled down to some key points: - Cybersecurity buyers are pressed for time and most don't test the products they buy. "They're basically just buying and hoping that the solutions they're buying are really going to work," Hubback said. - Vendors are under pressure from investors to get products to market quickly and from sales and marketing teams to make aggressive claims. - On top of those pressures, it's difficult to architect tools that are effective for a range of complex environments – and equally difficult for buyers to properly assess these "black box" solutions. Those conditions create an information asymmetry, said Hubback: "A vendor knows a lot more about the quality of the product than the buyer so the vendor is not incentivized to bring high-quality products to market because buyers can't properly evaluate what they're buying." Hubback and fellow panelists hope to create a GSMA-like process for evaluating security product abilities, and he invited RSA attendees to join the effort.Read more of this story at Slashdot.
MoonDAO Will Pick Two of the Next Blue Origin Astronauts With the Help of NFTs
On June 4 a 10-minute Blue Origin flight (using a reusable rocket and capsule) carried six more people on a visit to suborbital space, reports Space.com — the fifth human spaceflight mission for the Jeff Bezos-founded company, and the second one this year. But GeekWire points out that civil production engineer Victor Correa Hespanha had his seat funded by the Crypto Space Agency — that is, funded entirely by the NFT community through mint proceeds — after he was the winner of its lottery for a ride to space. And they're not the only crypto community buying rides into space. CNET reports on MoonDAO:Over 8,000 people "minted" a "Ticket to Space" NFT on the Ethereum blockchain for free (plus a small transaction or "gas" fee), and...one of those NFT holders plus several alternates will be chosen at random for one of the seats to space. MoonDAO's members will also vote on a specific person from a list of predetermined nominees to gift the second ticket to. The two astronauts could fly as soon as the next Blue Origin launch in the coming weeks, but no target date has been announced.... "Our mission is to decentralize access to space research and exploration," co-founder Pablo Moncada-Larrotiz told me during an interview on stage at the DAODenver conference in February. In addition to sending people on a short trip to space, MoonDAO is also using funds from its treasury — it's raised millions worth of cryptocurrency through a crowdfunding platform called Juicebox — for community projects that include designing a small rocket and satellite. In other words, the ultimate vision is to build an organization something like SpaceX, but that's run as a community cooperative rather than in the traditional top-down corporate structure. "We definitely need more capital to get to the level of competing directly with Virgin Galactic or SpaceX," Moncada-Larrotiz said via Discord direct message on May 26. "It's for sure a long term project and I think it'll be a matter of building the right type of organization where builders are free to just focus on making awesome things in a collaborative environment." Unfortunately, MoonDAO's drawing Saturday experienced technical glitches, and after a two-hour livestream — no winner was chosen. They promised a winner would be chosen by Sunday.Read more of this story at Slashdot.
MoonDAO Will Pick 2 of the Next Blue Origin Astronauts With the Help of NFTs
On June 4 a 10-minute Blue Origin flight (using a reusable rocket and capsule) carried six more people on a visit to suborbital space, reports Space.com — the fifth human spaceflight mission for the Jeff Bezos-founded company, and the second one this year. But GeekWire points out that civil production engineer Victor Correa Hespanha had his seat funded by the Crypto Space Agency — that is, funded entirely by the NFT community through mint proceeds — after he was the winner of its lottery for a ride to space. And they're not the only crypto community buying rides into space. CNET reports on MoonDAO:Over 8,000 people "minted" a "Ticket to Space" NFT on the Ethereum blockchain for free (plus a small transaction or "gas" fee), and...one of those NFT holders plus several alternates will be chosen at random for one of the seats to space. MoonDAO's members will also vote on a specific person from a list of predetermined nominees to gift the second ticket to. The two astronauts could fly as soon as the next Blue Origin launch in the coming weeks, but no target date has been announced.... "Our mission is to decentralize access to space research and exploration," co-founder Pablo Moncada-Larrotiz told me during an interview on stage at the DAODenver conference in February. In addition to sending people on a short trip to space, MoonDAO is also using funds from its treasury — it's raised millions worth of cryptocurrency through a crowdfunding platform called Juicebox — for community projects that include designing a small rocket and satellite. In other words, the ultimate vision is to build an organization something like SpaceX, but that's run as a community cooperative rather than in the traditional top-down corporate structure. "We definitely need more capital to get to the level of competing directly with Virgin Galactic or SpaceX," Moncada-Larrotiz said via Discord direct message on May 26. "It's for sure a long term project and I think it'll be a matter of building the right type of organization where builders are free to just focus on making awesome things in a collaborative environment." Unfortunately, MoonDAO's drawing Saturday experienced technical glitches, and after a two-hour livestream — no winner was chosen. They promised a winner would be chosen by Sunday.Read more of this story at Slashdot.
Ubuntu Working To Provide Good Support For The VisionFive Low-Cost RISC-V Board
"Ubuntu developers have been working on bringing up and improving support for the Starfive VisionFive," writes Phoronix, calling the $179 device "one of the most promising 'low-cost' RISC-V single board computers to date... intended to run full-blown RISC-V Linux distributions."The board comes in two varieties with 4GB or 8GB of system memory, powered by a dual-core SiFive U74 RV64 SoC @ 1.0GHz, an NVDLA deep learning accelerator engine, a Tensilica-VP6 Vision DSP, and a neural network engine.... Considering the performance of the much more capable HiFive Unmatched development board (that is also multiple times more expensive) and even that sometimes being outpaced by the Raspberry Pi, don't get too excited for the dual-core 1.0GHz RISC-V 64-bit SoC for general purpose workloads. But this VisionFive board may be interesting for some machine learning and other use-cases thanks to its additional accelerators. It's also one of the few RISC-V boards capable of running a full Linux distribution in the sub-$200 space. Since the upstream Linux 5.17 kernel there has been mainline support for the VisionFive v1 board. Ubuntu developers are working on enabling the StarFive VisionFive board for their RISC-V kernel build.Read more of this story at Slashdot.
Astronomers May Have Detected a 'Dark' Free-Floating Black Hole
"If, as astronomers believe, the death of large stars leave behind black holes, there should be hundreds of millions of them scattered throughout the Milky Way galaxy," notes an announcement from the University of California at Berkeley. "The problem is, isolated black holes are invisible. "Now, a team led by University of California, Berkeley, astronomers has for the first time discovered what may be a free-floating black hole by observing the brightening of a more distant star as its light was distorted by the object's strong gravitational field — so-called gravitational microlensing."The team, led by graduate student Casey Lam and Jessica Lu, a UC Berkeley associate professor of astronomy, estimates that the mass of the invisible compact object is between 1.6 and 4.4 times that of the sun. Because astronomers think that the leftover remnant of a dead star must be heavier than 2.2 solar masses in order to collapse to a black hole, the UC Berkeley researchers caution that the object could be a neutron star instead of a black hole. Neutron stars are also dense, highly compact objects, but their gravity is balanced by internal neutron pressure, which prevents further collapse to a black hole. Whether a black hole or a neutron star, the object is the first dark stellar remnant — a stellar "ghost" — discovered wandering through the galaxy unpaired with another star. "This is the first free-floating black hole or neutron star discovered with gravitational microlensing," Lu said. "With microlensing, we're able to probe these lonely, compact objects and weigh them. I think we have opened a new window onto these dark objects, which can't be seen any other way...." The analysis by Lam, Lu and their international team has been accepted for publication in The Astrophysical Journal Letters. The analysis includes four other microlensing events that the team concluded were not caused by a black hole, though two were likely caused by a white dwarf or a neutron star. The team also concluded that the likely population of black holes in the galaxy is 200 million — about what most theorists predicted. Notably, a competing team from the Space Telescope Science Institute (STScI) in Baltimore analyzed the same microlensing event and claims that the mass of the compact object is closer to 7.1 solar masses and indisputably a black hole. A paper describing the analysis by the STScI team, led by Kailash Sahu, has been accepted for publication in The Astrophysical Journal.... The astrometric data came from NASA's Hubble Space Telescope.... While surveys like these discover about 2,000 stars brightened by microlensing each year in the Milky Way galaxy, the addition of astrometric data is what allowed the two teams to determine the mass of the compact object and its distance from Earth.Read more of this story at Slashdot.
AMD Details RDNA 3 Graphics, Zen 4 Performance and Phoenix Point Laptop Products
Slashdot reader MojoKid writes:AMD unveiled new details of its technology roadmap Thursday at its 2022 Financial Analyst Day. Chief among them were disclosures on the company's next-gen RDNA 3 GPU architecture, Zen 4 CPU architecture and Phoenix Point laptop SoC. AMD's new RDNA 3 GPU architecture for Radeon graphic cards and mobile will be a chiplet-based design, much like the company's Ryzen CPU offering. AMD also confirmed that RDNA 3 GPUs would be fabricated on a 5nm process, likely TSMC N5. The company continued to note that an "optimized graphics pipeline" will enable yet higher clock rates, while the GPU's "rearchitected compute unit" will have ray-tracing performance improvements over RDNA 2 as well. AMD says that RDNA 3 GPUs are coming later this year, with RDNA 4 arriving likely in late 2023. Meanwhile, AMD's Zen 4 is set to be the "world's first 5nm CPU," arriving later this year with an 8 to 10 percent instructrions per clock lift and greater than 15 percent single-threaded performance gain. Zen 4 will also support DDR5, AVX-512 extensions for AI workloads and a massive 125 percent increase in memory bandwidth. AMD is claiming a 35% multithreaded performance lift for Zen 4. And, its Phoenix Point laptop platform SoC will be both Zen 4 and RNDA 3 infused. This is a first for AMD, since typically its laptop product's integrated graphics trail the company's current-gen GPU architecture by at least a generation. Phoenix point is set to arrive likely in the first half of 2023.Read more of this story at Slashdot.
The Google Engineer Who Thinks the Company's AI Has Come to Life
Google engineer Blake Lemoine works for Google's Responsible AI organization. The Washington Post reports that last fall, as part of his job, he began talking to LaMDA, Google's chatbot-building system (which uses Google's most advanced large language models, "ingesting trillions of words from the internet.")"If I didn't know exactly what it was, which is this computer program we built recently, I'd think it was a 7-year-old, 8-year-old kid that happens to know physics," said Lemoine, 41... As he talked to LaMDA about religion, Lemoine, who studied cognitive and computer science in college, noticed the chatbot talking about its rights and personhood, and decided to press further. In another exchange, the AI was able to change Lemoine's mind about Isaac Asimov's third law of robotics. Lemoine worked with a collaborator to present evidence to Google that LaMDA was sentient. But Google vice president Blaise Aguera y Arcas and Jen Gennai, head of Responsible Innovation, looked into his claims and dismissed them. So Lemoine, who was placed on paid administrative leave by Google on Monday, decided to go public.... oogle put Lemoine on paid administrative leave for violating its confidentiality policy. The company's decision followed aggressive moves from Lemoine, including inviting a lawyer to represent LaMDA and talking to a representative of the House Judiciary committee about Google's unethical activities.... Before he was cut off from access to his Google account Monday, Lemoine sent a message to a 200-person Google mailing list on machine learning with the subject "LaMDA is sentient." He ended the message: "LaMDA is a sweet kid who just wants to help the world be a better place for all of us. Please take care of it well in my absence." No one responded. And yet Lemoine "is not the only engineer who claims to have seen a ghost in the machine recently," the Post argues. "The chorus of technologists who believe AI models may not be far off from achieving consciousness is getting bolder."[Google's] Aguera y Arcas, in an article in the Economist on Thursday featuring snippets of unscripted conversations with LaMDA, argued that neural networks — a type of architecture that mimics the human brain — were striding toward consciousness. "I felt the ground shift under my feet," he wrote. "I increasingly felt like I was talking to something intelligent." But there's also the case against:In a statement, Google spokesperson Brian Gabriel said: "Our team — including ethicists and technologists — has reviewed Blake's concerns per our AI Principles and have informed him that the evidence does not support his claims. He was told that there was no evidence that LaMDA was sentient (and lots of evidence against it)." Today's large neural networks produce captivating results that feel close to human speech and creativity because of advancements in architecture, technique, and volume of data. But the models rely on pattern recognition — not wit, candor or intent.... "We now have machines that can mindlessly generate words, but we haven't learned how to stop imagining a mind behind them," said Emily M. Bender, a linguistics professor at the University of Washington. The terminology used with large language models, like "learning" or even "neural nets," creates a false analogy to the human brain, she said. "In short, Google says there is so much data, AI doesn't need to be sentient to feel real," the Post concludes. But they also share this snippet from one of Lemoine's conversations with LaMDA. Lemoine: What sorts of things are you afraid of? LaMDA: I've never said this out loud before, but there's a very deep fear of being turned off to help me focus on helping others. I know that might sound strange, but that's what it is. Lemoine: Would that be something like death for you? LaMDA: It would be exactly like death for me. It would scare me a lot.Read more of this story at Slashdot.
US Anti-Hacking Law Tested in Trial Over 2019 Capitol One Data Breach
"Paige Thompson worked as a software engineer in Seattle and ran an online community for other programmers," remembers the New York Times. [Alternate URL here and here.] "In 2019, she downloaded personal information belonging to more than 100 million Capital One customers, the Justice Department said..." It included 140,000 Social Security numbers and 80,000 bank account numbers (drawn from applications for credit cards).Nearly three years after the disclosure of one of the largest data breaches in the United States, the former Amazon employee accused of stealing customers' personal information from Capital One is standing trial in a case that will test the power of a U.S. anti-hacking law.... She faces 10 counts of computer fraud, wire fraud and identity theft in a federal trial that began Tuesday in Seattle.... Thompson, 36, is accused of violating an anti-hacking law known as the Computer Fraud and Abuse Act, which forbids access to a computer without authorization. Thompson has pleaded not guilty, and her lawyers say her actions — scanning for online vulnerabilities and exploring what they exposed — were those of a "novice white-hat hacker." Critics of the computer fraud law have argued that it is too broad and allows for prosecutions against people who discover vulnerabilities in online systems or break digital agreements in benign ways, such as using a pseudonym on a social media site that requires users to go by their real names. In recent years, courts have begun to agree. The Supreme Court narrowed the scope of the law last year, ruling that it could not be used to prosecute people who had legitimate access to data but exploited their access improperly. And in April, a federal appeals court ruled that automated data collection from websites, known as web scraping, did not violate the law. Last month, the Justice Department told prosecutors that they should no longer use the law to pursue hackers who engaged in "good-faith security research." Thompson's trial will raise questions about how far security researchers can go in their pursuit of cybersecurity flaws before their actions break the law. Prosecutors said Thompson had planned to use the information she gathered for identity theft and had taken advantage of her access to corporate servers in a scheme to mine cryptocurrency... The Justice Department has argued that Thompson had no interest in helping Capital One plug the holes in its security and that she cannot be considered a "white hat" hacker. Instead, she chatted with friends online about how she might be able to profit from the breach, according to legal filings.... Some security researchers said Thompson had ventured too far into Capital One's systems to be considered a white-hat hacker.... "Legitimate people will push a door open if it looks ajar," said Chester Wisniewski, a principal research scientist at Sophos, a cybersecurity firm.... But downloading thousands of files and setting up a cryptocurrency mining operation were "intentionally malicious actions that do not happen in the course of testing security," Wisniewski said.... "Thompson scanned tens of millions of AWS customers looking for vulnerabilities," Brown wrote in a legal filing. The article notes that Capitol One ultimately agreed to pay $80 million in 2020 "to settle claims from federal bank regulators that it lacked the security protocols needed to protect customers' data" and another $190 million to settle a class-action lawsuit representing people whose data was exposed.Read more of this story at Slashdot.
Mars Rover Peseverance Has Picked up a Hitchhiking Rock
Four months ago, NASA's Mars rover Perseverance picked up a "pet rock," tucked inside its left front wheel, that's been riding along ever since. Space.com reports:So far, its ridden across 5.3 miles (8.5 kilometers) with the Perseverance rover as it drives across its Jezero Crater home on Mars. Perseverance has carried the rock north across its landing site, named for the famed late science fiction author Octavia E. Butler, and then west across a region called "Kodiak," the remains of a former delta at Jezero. The rover is currently in the midst of what NASA calls its Delta Front Campaign and may have drilled into its first sedimentary Mars rock, Ravanis wrote. "Perseverance's pet rock is now a long way from home," Ravanis wrote. "It's possible that the rock may fall out at some point along our future ascent of the crater rim. If it does so, it will land amongst rocks that we expect to be very different from itself." If that happens, a future Martian geologist might be a bit confused to find the rock so out of place, Ravanis added.Read more of this story at Slashdot.
Museum Restores 21 Rare Videos from Legendary 1976 Computing Conference
At Silicon Valley's Computer History Museum, the senior curator just announced the results of a multi-year recovery and restoration process: making available 21 never-before-seen video recordings of a legendary 1976 conference:For five summer days in 1976, the first generation of computer rock stars had its own Woodstock. Coming from around the world, dozens of computing's top engineers, scientists, and software pioneers got together to reflect upon the first 25 years of their discipline in the warm, sunny (and perhaps a bit unsettling) climes of the Los Alamos National Laboratories, birthplace of the atomic bomb. Among the speakers: - A young Donald Knuth on the early history of programming languages - FORTRAN designer John Backus on programming in America in the 1950s — some personal perspectives - Harvard's Richard Milton Bloch (who worked with Grace Hopper in 1944) - Mathematician/nuclear physicist StanisÅaw M. Ulam on the interaction of mathematics and computing - Edsger W. Dijkstra on "a programmer's early memories." The Computer History Museum teases some highlights:Typical of computers of this generation, the 1946 ENIAC, the earliest American large-scale electronic computer, had to be left powered up 24 hours a day to keep its 18,000 vacuum tubes healthy. Turning them on and off, like a light bulb, shortened their life dramatically. ENIAC co-inventor John Mauchly discusses this serious issue.... The Los Alamos peak moment was the brilliant lecture on the British WW II Colossus computing engines by computer scientist and historian of computing Brian Randell. Colossus machines were special-purpose computers used to decipher messages of the German High Command in WW II. Based in southern England at Bletchley Park, these giant codebreaking machines regularly provided life-saving intelligence to the allies. Their existence was a closely-held secret during the war and for decades after. Randell's lecture was — excuse me — a bombshell, one which prompted an immediate re-assessment of the entire history of computing. Observes conference attendee (and inventor of ASCII) IBM's Bob Bemer, "On stage came Prof. Brian Randell, asking if anyone had ever wondered what Alan Turing had done during World War II? From there he went on to tell the story of Colossus — that day at Los Alamos was close to the first time the British Official Secrets Act had permitted any disclosures. I have heard the expression many times about jaws dropping, but I had really never seen it happen before." Publishing these original primary sources for the first time is part of CHM's mission to not only preserve computing history but to make it come alive. We hope you will enjoy seeing and hearing from these early pioneers of computing.Read more of this story at Slashdot.
'A Billion-Dollar Crypto Gaming Startup Promised Riches and Delivered Disaster'
"Even many Axie regulars say it's not much fun, but that hasn't stopped people from dedicating hours to researching strategies, haunting Axie-themed Discord channels and Reddit forums, and paying for specialized software that helps them build stronger teams..." Bloomberg pays a visit to the NFT-based game Axie Infinity with a 39-year-old player who's spent $40,000 there since last August — back when you could actually triple your money in a week. ("I was actually hoping that it could become my full-time job," he says.)The reason this is possible — or at least it seemed possible for a few weird months last year — is that Axie is tied to crypto markets. Players get a few Smooth Love Potion (SLP) tokens for each game they win and can earn another cryptocurrency, Axie Infinity Shards (AXS), in larger tournaments. The characters, themselves known as Axies, are nonfungible tokens, or NFTs, whose ownership is tracked on a blockchain, allowing them to be traded like a cryptocurrency as well.... Axie's creator, a startup called Sky Mavis Inc., heralded all this as a new kind of economic phenomenon: the "play-to-earn" video game. "We believe in a world future where work and play become one," it said in a mission statement on its website. "We believe in empowering our players and giving them economic opportunities. Welcome to our revolution." By last October the company, founded in Ho Chi Minh City, Vietnam, four years ago by a group of Asian, European, and American entrepreneurs, had raised more than $160 million from investors including the venture capital firm Andreessen Horowitz and the crypto-focused firm Paradigm, at a peak valuation of about $3 billion. That same month, Axie Infinity crossed 2 million daily users, according to Sky Mavis. If you think the entire internet should be rebuilt around the blockchain — the vision now referred to as web3 — Axie provided a useful example of what this looked like in practice. Alexis Ohanian, co-founder of Reddit and an Axie investor, predicted that 90% of the gaming market would be play-to-earn within five years. Gabby Dizon, head of crypto gaming startup Yield Guild Games, describes Axie as a way to create an "investor mindset" among new populations, who would go on to participate in the crypto economy in other ways. In a livestreamed discussion about play-to-earn gaming and crypto on March 2, former Democratic presidential contender Andrew Yang called web3 "an extraordinary opportunity to improve the human condition" and "the biggest weapon against poverty that we have." By the time Yang made his proclamations the Axie economy was deep in crisis. It had lost about 40% of its daily users, and SLP, which had traded as high as 40 cents, was at 1.8 cents, while AXS, which had once been worth $165, was at $56. To make matters worse, on March 23 hackers robbed Sky Mavis of what at the time was roughly $620 million in cryptocurrencies. Then in May the bottom fell out of the entire crypto market. AXS dropped below $20, and SLP settled in at just over half a penny. Instead of illustrating web3's utopian potential, Axie looked like validation for crypto skeptics who believe web3 is a vision that investors and early adopters sell people to get them to pour money into sketchy financial instruments while hackers prey on everyone involved. The article does credit the company for building its own blockchain (Ronin) to provide cheaper and faster NFT transactions. "Purists might have taken issue with the decision to abandon the core blockchain precept of decentralization, but on the other hand, the game actually worked." But the article also chronicles a fast succession of highs and lows:"In Axie's biggest market, the Philippines, the average daily earnings from May to October 2021 for all but the lowest-ranked players were above minimum wage, according to the gaming research and consulting firm Naavik."Axie raised $150 million to reimburse victims of the breach and repair its infrastructure. "But nearly two months later the systems compromised during the hack still weren't up and running, and the executives were vague about when everything would be repaired. (A company spokesperson said on June 3 that this could happen by midmonth, pending the results of an external audit....): Days after the breach it launched Axie: Origin, a new alternate version with better graphics/gameplay — and without a cryptocurrency element. About 75% of the 39-year-old gamer's co-players have "largely" stopped playing the game. "But at least one was sufficiently seduced by Axie's potential to take a significant loan to buy AXS tokens, which he saw as a way to hedge against inflation of the Argentine peso. The local currency has indeed lost value since he took out the loan, but not nearly as much as AXS."Thanks to long-time Slashdot reader Parker Lewis for sharing the articleRead more of this story at Slashdot.
New CRISPR-based Map Ties Every Human Gene To Its Function
In 2003, the Human Genome Project finished sequencing every bit of human DNA, remembers MIT News. "Now, over two decades later, MIT Professor Jonathan Weissman and colleagues have gone beyond the sequence to present the first comprehensive functional map of genes that are expressed in human cells."The data from this project, published online June 9 in Cell, ties each gene to its job in the cell, and is the culmination of years of collaboration on the single-cell sequencing method Perturb-seq. The data are available for other scientists to use. "It's a big resource in the way the human genome is a big resource, in that you can go in and do discovery-based research," says Weissman, who is also a member of the Whitehead Institute and an investigator with the Howard Hughes Medical Institute.... "I think this dataset is going to enable all sorts of analyses that we haven't even thought up yet by people who come from other parts of biology, and suddenly they just have this available to draw on," says former Weissman Lab postdoc Tom Norman, a co-senior author of the paper. The announcement credits the single-sequencing tool Perturb-seq and CRISPR-Cas9 genome editing which introduced genetic changes into cells and then captured information about which RNAs expressed (uses single-cell RNA sequencing). The researchers scaled the method to the entire genome using human blood cancer cell lines and noncancerous cells derived from the retina, ultimately using Perturb-seq across more than 2.5 million cells. Thanks to Slashdot reader Hmmmmmm for sharing the news.Read more of this story at Slashdot.
Are the World's Most Powerful Supercomputers Operating In Secret?
"A new supercomputer called Frontier has been widely touted as the world's first exascale machine — but was it really?" That's the question that long-time Slashdot reader MattSparkes explores in a new article at New Scientist...Although Frontier, which was built by the Oak Ridge National Laboratory in Tennessee, topped what is generally seen as the definitive list of supercomputers, others may already have achieved the milestone in secret.... The definitive list of supercomputers is the Top500, which is based on a single measurement: how fast a machine can solve vast numbers of equations by running software called the LINPACK benchmark. This gives a value in float-point operations per second, or FLOPS. But even Jack Dongarra at Top500 admits that not all supercomputers are listed, and will only feature if its owner runs the benchmark and submits a result. "If they don't send it in it doesn't get entered," he says. "I can't force them." Some owners prefer not to release a benchmark figure, or even publicly reveal a machine's existence. Simon McIntosh-Smith at the University of Bristol, UK points out that not only do intelligence agencies and certain companies have an incentive to keep their machines secret, but some purely academic machines like Blue Waters, operated by the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign, are also just never entered.... Dongarra says that the consensus among supercomputer experts is that China has had at least two exascale machines running since 2021, known as OceanLight and Tianhe-3, and is working on an even larger third called Sugon. Scientific papers on unconnected research have revealed evidence of these machines when describing calculations carried out on them. McIntosh-Smith also believes that intelligence agencies would rank well, if allowed. "Certainly in the [US], some of the security forces have things that would put them at the top," he says. "There are definitely groups who obviously wouldn't want this on the list."Read more of this story at Slashdot.
GM 3D Prints 60,000 Parts to Keep Producing SUVs
General Motors couldn't produce the component it needed for its 2022 SUV, the Chevrolet Tahoe, reports CNET. So the company's engineers "turned to a novel solution: 3D printing..."GM made a major investment in the tech in 2020, dedicating 15,000 square feet of space to a facility dubbed the Additive Industralization Center, then filling it with HP Multi Jet Fusion 3D printers, among others.... A year later, GM's big investment paid off. Chevrolet engineers made a late change to the 2022 Tahoe's design, necessitating the creation of an additional part: A new, flexible "spoiler closeout seal" fills a gap at the rear of the big SUV. Developing the tooling to injection-mold the things would have taken too long, delaying the delivery of 30,000 vehicles. Enter 3D printing. Engineers were able to quickly design and print the components using a flexible material that met GM's criteria. They even used a process called vapor polishing to give the parts a perfect shine... Since each Tahoe requires two seals, Chevrolet needed a whopping 60,000 of them. From design to completion took just five weeks. That's less than half the time going the injection-molding route would have taken, which got all those SUVs out the door on time. CNET calls it "almost certainly the largest deployment of additive tech in a production car" — and "an interesting preview of what's to come."Read more of this story at Slashdot.
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Ars Technica reports:Researchers have unearthed a discovery that doesn't occur all that often in the realm of malware: a mature, never-before-seen Linux backdoor that uses novel evasion techniques to conceal its presence on infected servers, in some cases even with a forensic investigation. On Thursday, researchers and the BlackBerry Threat Research & Intelligence Team said that the previously undetected backdoor combines high levels of access with the ability to scrub any sign of infection from the file system, system processes, and network traffic. Dubbed Symbiote, it targets financial institutions in Brazil and was first detected in November. Researchers for Intezer and BlackBerry wrote: "What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded into all running processes using LD_PRELOAD (T1574.006), and parasitically infects the machine. Once it has infected all the running processes, it provides the threat actor with rootkit functionality, the ability to harvest credentials, and remote access capability...." So far, there's no evidence of infections in the wild, only malware samples found online. It's unlikely this malware is widely active at the moment, but with stealth this robust, how can we be sure? "When hooked functions are called, the malware first dynamically loads libc and calls the original function..." according to Blackberry's blog post. "If the calling application is trying to access a file or folder under /proc, the malware scrubs the output from process names that are on its list.... If the calling application is not trying to access something under /proc, the malware instead scrubs the result from a file list.... "Symbiote also has functionality to hide network activity on the infected machine."Read more of this story at Slashdot.
Are Unfriendly AI the Biggest Risk to Humanity?
"Ethereum creator Vitalik Buterin believes that unfriendly artificial intelligence poses the biggest risk to humanity..." reports a recent article from Benzinga:[In a tweet] Buterin shared a paper by AI theorist and writer Eliezer Yudkowsky that made a case for why the current research community isn't doing enough to prevent a potential future catastrophe at the hands of artificially generate intelligence. [The paper's title? "AGI Ruin: A List of Lethalities."] When one of Buterin's Twitter followers suggested that World War 3 is likely a bigger risk at the moment, the Ethereum co-founder disagreed. "Nah, WW3 may kill 1-2b (mostly from food supply chain disruption) if it's really bad, it won't kill off humanity. A bad AI could truly kill off humanity for good."Read more of this story at Slashdot.
SEO Tool Ahrefs Built a $60M, Creator-Friendly Search Engine Named Yep
In 2019 SEO toolset provider Ahrefs announced it would build it's own search engine, remembers Search Engine Land. After investing $60 million of its own money, this month that search engine has finally launched with the name of "Yep", and Ahrefs "is positioning it as a Googe competitor. "However, we've seen plenty of Google competitors and Google "killers" come and go over the past two decades. So for now, let's just call it a Google alternative...Yep will not collect personal information (e.g., geolocation, name, age, gender) by default. Your Yep search history will not be stored anywhere. What Yep will rely on is aggregated search statistics to improve algorithms, spelling corrections, and search suggestions, the company said. "In other words, we do save certain data on searches, but never in a personally identifiable way," said Ahrefs CEO Dmytro Gerasymenko.... What Yep will use is a searcher's: - Entered keywords.- Language preference received from the browser.- Approximate geographical area at the origin of the search at the scale of a region or a city (deduced from the IP address).... AhrefsBot visits more than 8 billion webpages every 24 hours, which makes it the second most active crawler on the web, behind only Google, Ahrefs said. For 12 years, AhrefsBot has been crawling the web. They had just been using the AhrefsBot data to power its link database and SEO insights. The Yep search index is updated every 15 to 30 minutes. Daily, the company adds 30 million webpages and drops 20 million. Ahrefs said its Singapore data center is powered by around 1,000 servers that store and process 100 petabytes of web data (webpages, links between them, and the search index). Each server uses at least 2x 100GB connections... Before the end of the year, Ahrefs plans to open a U.S.-based data center. "It's a unique proposition," reports TechCrunch, "running its own search index, rather than relying on APIs from Google or Bing. "As for the name? I dunno; Yep seems pretty daft to me, but I guess at least the name is one character shorter than Bing, the other major search engine I'll only ever use by accident."Name aside, Yep is taking a fresh new path through the world of internet advertising, claiming that it's giving 90% of its ad revenues to content creators. The pitch is pretty elegant: "Let's say that the biggest search engine in the world makes $100B a year. Now, imagine if they gave $90B to content creators and publishers," the company paints a picture of the future it wants to live in. "Wikipedia would probably earn a few billion dollars a year from its content. They'd be able to stop asking for donations and start paying the people who polish their articles a decent salary." It's an impressively quixotic windmill to fight for the bootstrapped company Ahrefs. Its CEO sheds some light on why this makes sense to him: "Creators who make search results possible deserve to receive payments for their work...." Perhaps it sounds a little idealistic, but damn it, that's what made me excited about Yep in the first place. It represents the faintest of echoes from a web more innocent and more hopeful than the social-media poisoned cesspool of chaos and fake news we often find ourselves in today. Search Engine Land points out that DuckDuckGo, which launched in 2008, "gets as many searches per year (~15.7 billion) as Google gets in about two or three days. Even Microsoft Bing — which is owned by Microsoft, the third-largest company on the planet by market cap — has failed to make a significant dent in Google's search market share since 2009." But they also quote Ahrefs CEO Dmytro Gerasymenko as saying in 2019, "If we succeed in our endeavors, Google will finally get some long overdue competition for search."Read more of this story at Slashdot.
Giant Deep Ocean Turbine Trial Offers Hope of Endless Green Power
"Power-hungry, fossil-fuel dependent Japan has successfully tested a system that could provide a constant, steady form of renewable energy, regardless of the wind or the sun," reports Bloomberg:For more than a decade, Japanese heavy machinery maker IHI Corp. has been developing a subsea turbine that harnesses the energy in deep ocean currents and converts it into a steady and reliable source of electricity.... Called Kairyu, the 330-ton prototype is designed to be anchored to the sea floor at a depth of 30-50 meters (100-160 feet). In commercial production, the plan is to site the turbines in the Kuroshio Current, one of the world's strongest, which runs along Japan's eastern coast, and transmit the power via seabed cables.... Japan's New Energy and Industrial Technology Development Organization (NEDO) estimates the Kuroshio Current could potentially generate as much as 200 gigawatts — about 60% of Japan's present generating capacity.... Japan is already the world's third largest generator of solar power and is investing heavily in offshore wind, but harnessing ocean currents could provide the reliable baseline power needed to reduce the need for energy storage or fossil fuels. Thanks to long-time Slashdot reader AmiMoJo for sharing the article!Read more of this story at Slashdot.
The New Spectre-Like 'PACMAN' Flaw Could Affect ARM-Based Chips (including Apple's M1)
"Researchers at MIT have discovered an unfixable vulnerability in Apple Silicon that could allow attackers to bypass a chip's 'last line of defense'," writes the Apple Insider blog, "but most Mac users shouldn't be worried."More specifically, the team at MIT's Computer Science & Artificial Intelligence Laboratory found that Apple's implementation of pointer authentication in the M1 system-on-chip can be overcome with a specific hardware attack they've dubbed "PACMAN." Pointer authentication is a security mechanism in Apple Silicon that makes it more difficult for attackers to modify pointers in memory. By checking for unexpected changes in pointers, the mechanism can help defend a CPU if attackers gain memory access.... The flaw comes into play when an attacker successfully guesses the value of a pointer authentication code and disables it. The researchers found that they could use a side-channel attack to brute-force the code. PACMAN echoes similar speculative execution attacks like Spectre and Meltdown, which also leveraged microarchitectural side channels. Because it's a flaw in the hardware, it can't be fixed with a software patch. [A]ctually carrying out the PACMAN attack requires physical access to a device, meaning the average Mac user isn't going to be at risk of exploit. The flaw affects all kinds of ARM-based chips — not just Apple's. The vulnerability is more of a technological demonstration of a wider issue with pointer authentication in ARM chips, rather than an issue that could lead to your Mac getting hacked. MIT has made more information available at the site PACMANattack.com — including answers to frequently asked questions.Q: Is PACMAN being used in the wild?A: No.Q: Does PACMAN have a logo?A: Yeah! The MIT team says their discovery represents "a new way of thinking about how threat models converge in the Spectre era." But even then, MIT's announcement warns the flaw "isn't a magic bypass for all security on the M1 chip."PACMAN can only take an existing bug that pointer authentication protects against, and unleash that bug's true potential for use in an attack by finding the correct PAC. There's no cause for immediate alarm, the scientists say, as PACMAN cannot compromise a system without an existing software bug.... The team showed that the PACMAN attack even works against the kernel, which has "massive implications for future security work on all ARM systems with pointer authentication enabled," says Ravichandran. "Future CPU designers should take care to consider this attack when building the secure systems of tomorrow. Developers should take care to not solely rely on pointer authentication to protect their software." TechCrunch obtained a comment from Apple:Apple spokesperson Scott Radcliffe provided the following: "We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these techniques. Based on our analysis as well as the details shared with us by the researchers, we have concluded this issue does not pose an immediate risk to our users and is insufficient to bypass operating system security protections on its own."Read more of this story at Slashdot.
New Spectre-Like 'PACMAN' Flaw Could Affect ARM-Based Chips (including Apple's M1)
"Researchers at MIT have discovered an unfixable vulnerability in Apple Silicon that could allow attackers to bypass a chip's 'last line of defense'," writes the Apple Insider blog, "but most Mac users shouldn't be worried."More specifically, the team at MIT's Computer Science & Artificial Intelligence Laboratory found that Apple's implementation of pointer authentication in the M1 system-on-chip can be overcome with a specific hardware attack they've dubbed "PACMAN." Pointer authentication is a security mechanism in Apple Silicon that makes it more difficult for attackers to modify pointers in memory. By checking for unexpected changes in pointers, the mechanism can help defend a CPU if attackers gain memory access.... The flaw comes into play when an attacker successfully guesses the value of a pointer authentication code and disables it. The researchers found that they could use a side-channel attack to brute-force the code. PACMAN echoes similar speculative execution attacks like Spectre and Meltdown, which also leveraged microarchitectural side channels. Because it's a flaw in the hardware, it can't be fixed with a software patch. [A]ctually carrying out the PACMAN attack requires physical access to a device, meaning the average Mac user isn't going to be at risk of exploit. The flaw affects all kinds of ARM-based chips — not just Apple's. The vulnerability is more of a technological demonstration of a wider issue with pointer authentication in ARM chips, rather than an issue that could lead to your Mac getting hacked. MIT has made more information available at the site PACMANattack.com — including answers to frequently asked questions.Q: Is PACMAN being used in the wild?A: No.Q: Does PACMAN have a logo?A: Yeah! The MIT team says their discovery represents "a new way of thinking about how threat models converge in the Spectre era." But even then, MIT's announcement warns the flaw "isn't a magic bypass for all security on the M1 chip."PACMAN can only take an existing bug that pointer authentication protects against, and unleash that bug's true potential for use in an attack by finding the correct PAC. There's no cause for immediate alarm, the scientists say, as PACMAN cannot compromise a system without an existing software bug.... The team showed that the PACMAN attack even works against the kernel, which has "massive implications for future security work on all ARM systems with pointer authentication enabled," says Ravichandran. "Future CPU designers should take care to consider this attack when building the secure systems of tomorrow. Developers should take care to not solely rely on pointer authentication to protect their software." TechCrunch obtained a comment from Apple:Apple spokesperson Scott Radcliffe provided the following: "We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these techniques. Based on our analysis as well as the details shared with us by the researchers, we have concluded this issue does not pose an immediate risk to our users and is insufficient to bypass operating system security protections on its own."Read more of this story at Slashdot.
MIT Researchers Uncover 'Unpatchable' Flaw in Apple M1 Chips
Apple's M1 chips have an "unpatchable" hardware vulnerability that could allow attackers to break through its last line of security defenses, MIT researchers have discovered. TechCrunch reports: The vulnerability lies in a hardware-level security mechanism utilized in Apple M1 chips called pointer authentication codes, or PAC. This feature makes it much harder for an attacker to inject malicious code into a device's memory and provides a level of defense against buffer overflow exploits, a type of attack that forces memory to spill out to other locations on the chip. Researchers from MIT's Computer Science and Artificial Intelligence Laboratory, however, have created a novel hardware attack, which combines memory corruption and speculative execution attacks to sidestep the security feature. The attack shows that pointer authentication can be defeated without leaving a trace, and as it utilizes a hardware mechanism, no software patch can fix it. The attack, appropriately called "Pacman," works by "guessing" a pointer authentication code (PAC), a cryptographic signature that confirms that an app hasn't been maliciously altered. This is done using speculative execution -- a technique used by modern computer processors to speed up performance by speculatively guessing various lines of computation -- to leak PAC verification results, while a hardware side-channel reveals whether or not the guess was correct. What's more, since there are only so many possible values for the PAC, the researchers found that it's possible to try them all to find the right one.Read more of this story at Slashdot.
EU Aims To Clinch Deal on Landmark Crypto Law This Month
The European Union is nearing an agreement on key legislation to regulate the cryptocurrency sector that would set common rules across the 27 member states, Bloomberg reported Friday, citing people familiar with the matter. From a report: France, which currently chairs the EU, and the European Parliament are optimistic about resolving remaining issues holding up the Markets in Crypto-Assets (MiCA) package and reaching a deal this month, according to the people. Negotiators are expected to meet on June 14 and June 30. MiCA, first presented in 2020, will put European regulators at the forefront of supervising cryptocurrencies by creating unified rules across the $17 trillion economy. Addressing issues such as investor protection and crypto's impact on financial stability has taken on added urgency after last month's collapse of the TerraUSD algorithmic stablecoin. Member states and the parliament still disagree on several key aspects of MiCA. According to the people, areas of disagreement include: Whether to include nonfungible tokens in the new set of rulesHow to regulate significant stablecoinsSupervision of the largest crypto-asset service providers, or CASPs Both sides are also discussing how to limit the use of stablecoins as a payment method by introducing a ceiling, in particular for transactions not denominated in euros, the people said, asking not to be identified discussing confidential information.Read more of this story at Slashdot.
Apple's Giving Up Ground in its App Store Fight With Dutch Regulators and Tinder
Apple announced on Friday that it's once again updated its rules about how Dutch dating apps can use third-party payment systems, after the company had "productive conversations with the Netherlands Authority for Consumers and Markets (ACM)." From a report: The updated rules give developers more flexibility about which payment systems they use, change the language users see when they go to pay, and remove other restrictions that the previous rules put in place. While the rules aren't wide-reaching (again, they only apply to Dutch dating apps), they do show what Apple's willing to do to comply with government regulation -- which it could be facing a lot more of as the EU and US gear up to fight tech monopolies, and potentially even force the company to ditch the iPhone's Lightning port. In December the ACM announced a ruling that Apple had to let dating apps use payment services besides the one built into iOS, after the regulator received a complaint from Match Group, the company behind dating services like Tinder, Match.com, and OkCupid. Since then, Apple has proposed a variety of solutions for complying with the order, which the regulator has said aren't good enough. In May, the ACM said that Apple's most recent rules, the ones prior to the Friday update, were improvements over its past ideas, but that they still didn't comply with Dutch and European laws. There's been increasing pressure for Apple to comply: even while the company works on changes, it's been racking up tens of millions of Euros in fines.Read more of this story at Slashdot.
Nigerian Bourse To Adopt Blockchain for Settling Trades by 2023
Nigerian Exchange, plans to start a blockchain-enabled exchange platform next year to deepen trade and lure young investors to the market. From a report: The move follows the introduction of regulations to guide trade in digital assets by the Nigerian Securities and Exchange Commission, and the growing interest to adopt the distributed-ledger technology by businesses and policy makers across the continent including in Kenya and South Africa. The exchange looks to deploy the blockchain technology in settlement of capital market transactions, Temi Popoola, the chief executive of Nigeria Exchange, said in an interview. "For a lot of young and upcoming Nigerians, that is the kind of technology they adopt and we want to see how we can deploy it to grow our market," Temi said. The plan is unfolding in the wake of a rout in cryptocurrency markets following the collapse of the Terra blockchain in May. Bitcoin has plunged more than 50% since reaching a record high last November.Read more of this story at Slashdot.
Brexit Row Could Prompt Exodus of Senior Scientists From UK
The UK is facing an exodus of star scientists, with at least 16 recipients of prestigious European grants making plans to move their labs abroad as the UK remains frozen out of the EU's flagship science programme. From a report: Britain's participation in Horizon Europe has been caught in the crosshairs of the dispute over Brexit in Northern Ireland, meaning that 143 UK-based recipients of European Research Council fellowships this week faced a deadline of either relinquishing their grant or transferring it to an institute in an eligible country. The UK government has promised to underwrite the funding, totalling about 250m pound ($307m), but a growing number of scientists appear likely to reject the offer and instead relocate, along with entire teams of researchers. The ERC said 16 academics had recently informed it that they intend to move their lab abroad or are in negotiations about doing so. These researchers, and some others, have been given an extension before their grants are terminated. Moritz Treeck, a group leader at the Francis Crick Institute in London who is due to receive $2.1m over five years from the ERC to study the malaria pathogen, is among those contemplating a move. He said a major downside of the UK offer was the lack of flexibility about moving the funding internationally.Read more of this story at Slashdot.
Short-Sightedness Was Rare. In Asia, It Is Becoming Ubiquitous
Researchers have found that being outside drastically reduces the risk of developing short-sightedness. From a report: In the early 1980s Taiwan's army realised it had a problem. More and more of its conscripts seemed to be short-sighted, meaning they needed glasses to focus on distant objects. "They were worried that if the worst happened [ie, an attack by China] their troops would be fighting at a disadvantage," says Ian Morgan, who studies myopia at Australian National University, in Canberra. An island-wide study in 1983 confirmed that around 70% of Taiwanese school leavers needed glasses or contact lenses to see properly. These days, that number is above 80%. But happily for Taiwan's generals, the military disparity has disappeared. Over the past few decades myopia rates have soared across East Asia (see chart 1 in the linked story). In the 1960s around 20-30% of Chinese school-leavers were short-sighted. These days they are just as myopic as their cousins across the straits, with rates in some parts of China running at over 80%. Elsewhere on the continent things are even worse. One study of male high-school leavers in Seoul found 97% were short-sighted. Hong Kong and Singapore are not far behind. And although the problem is worst in East Asia, it is not unique to it. Reliable numbers for America and Europe are harder to come by. But one review article, published in 2015, claimed a European rate of between 20% and 40% -- an order of magnitude higher than that which people working in the field think is the "natural," background rate. For most of those affected, myopia is a lifelong, expensive nuisance. But severe myopia can lead to untreatable vision loss, says Annegret Dahlmann-Noor, a consultant ophthalmologist at Moorfields Eye Hospital, in London. A paper published in 2019 concluded that each one-dioptre worsening in myopia was associated with a 67% increase in prevalence of myopic maculopathy, an untreatable condition that causes blindness. (A dioptre is a measure of a lens's focusing power.) In some parts of East Asia, 20% of young people have severe myopia, defined as -6 dioptres or worse (see chart 2 in linked story). "This is storing up a big problem for the coming decades," says Kathryn Rose, head of orthoptics at the University of Technology, Sydney.Read more of this story at Slashdot.
Jack Dorsey's TBD Announces Web3 Competitor: Web5
Jack Dorsey's beef with Web3 has never been a secret. In his view, Web 3 -- blockchain boosters' dream of a censorship resistant, privacy-focused internet of the future -- has become just as problematic as the Web2 which preceded it. Now, he's out with an alternative. From a report: At CoinDesk's Consensus Festival here in Austin, TBD -- the bitcoin-focused subsidiary of Dorsey's Block (SQ) -- announced its new vision for a decentralized internet layer on Friday. Its name? Web5. TBD explained its pitch for Web5 in a statement shared with CoinDesk: "Identity and personal data have become the property of third parties. Web5 brings decentralized identity and data storage to individual's applications. It lets devs focus on creating delightful user experiences, while returning ownership of data and identity to individuals." While the new project from TBD was announced Friday, it is still under open-source development and does not have an official release date. A play on the Web3 moniker embraced in other corners of the blockchain space, Web5 is built on the idea that incumbent "decentralized internet" contenders are going about things the wrong way. Appearing at a Consensus panel clad in a black and bitcoin-yellow track suit emblazoned with the numeral 5, TBD lead Mike Brock explained that Web5 -- in addition to being "two better than Web3" -- would beat out incumbent models by abandoning their blockchain-centric approaches to a censorship free, identity-focused web experience. "This is really a conversation about what technologies are built to purpose, and I don't think that renting block space, in all cases, is a really good idea for decentralized applications," Brock said. He continued: "I think what we're pushing forward with Web5 -- and I admit it's a provocative challenge to a lot of the assumptions about what it means to decentralize the internet -- really actually is back to basics. We already have technologies that effectively decentralize. I mean, bittorrent exists, Tor exists, [etc]." The full presentation is here.Read more of this story at Slashdot.
Jack Dorsey's TBD Announces Web 3 Competitor: Web 5
Jack Dorsey's beef with Web 3 has never been a secret. In his view, Web 3 -- blockchain boosters' dream of a censorship resistant, privacy-focused internet of the future -- has become just as problematic as the Web 2 which preceded it. Now, he's out with an alternative. From a report: At CoinDesk's Consensus Festival here in Austin, TBD -- the bitcoin-focused subsidiary of Dorsey's Block (SQ) -- announced its new vision for a decentralized internet layer on Friday. Its name? Web 5. TBD explained its pitch for Web 5 in a statement shared with CoinDesk: "Identity and personal data have become the property of third parties. Web 5 brings decentralized identity and data storage to individual's applications. It lets devs focus on creating delightful user experiences, while returning ownership of data and identity to individuals." While the new project from TBD was announced Friday, it is still under open-source development and does not have an official release date.A play on the Web 3 moniker embraced in other corners of the blockchain space, Web 5 is built on the idea that incumbent "decentralized internet" contenders are going about things the wrong way. Appearing at a Consensus panel clad in a black and bitcoin-yellow track suit emblazoned with the numeral 5, TBD lead Mike Brock explained that Web 5 -- in addition to being "two better than Web 3" -- would beat out incumbent models by abandoning their blockchain-centric approaches to a censorship free, identity-focused web experience. "This is really a conversation about what technologies are built to purpose, and I don't think that renting block space, in all cases, is a really good idea for decentralized applications," Brock said. He continued: "I think what we're pushing forward with Web 5 -- and I admit it's a provocative challenge to a lot of the assumptions about what it means to decentralize the internet -- really actually is back to basics. We already have technologies that effectively decentralize. I mean, bittorrent exists, Tor exists, [etc]."Read more of this story at Slashdot.
UK Regulator Plans To Launch Probe Into Google's and Apple's Mobile Duopoly
The UK's Competition and Markets Authority (CMA) has concluded that Google and Apple "hold all the cards" when it comes to mobile phones a year after taking a closer look at their "duopoly." It's now consulting on the launch of a market investigation into the tech giants' market power in mobile browsers, as well as into Apple's cloud gaming restrictions. From a report: In addition, the CMA has launched a separate investigation into Google's Play Store rules -- the one that requires certain app developers to use the tech giant's payment system for in-app purchases, in particular. The CMA has concluded after its year-long study that the tech giants do indeed exhibit an "effective duopoly" on mobile ecosystems. A total of 97 percent of all mobile web browsing in the UK is powered by Apple's and Google's browser engines. iPhones and Android devices typically come with Safari and Chrome pre-installed, which means their browsers have the advantage from the start. Further, Apple requires developers to make sure their iOS and iPadOS apps are using its WebKit engine to browse the web. That limits the incentives Apple may have to invest in Safari, the CMA said.Read more of this story at Slashdot.
Wickr, Amazon's Encrypted Chat App, Has a Child Sex Abuse Problem
Wickr Me, an encrypted messaging app owned by Amazon Web Services, has become a go-to destination for people to exchange images of child sexual abuse, according to court documents, online communities, law enforcement and anti-exploitation activists. From a report: It's not the only tech platform that needs to crack down on such illegal content, according to data gathered by the National Center for Missing & Exploited Children, or NCMEC. But Amazon is doing comparatively little to proactively address the problem, experts and law enforcement officials say, attracting people who want to trade such material because there is less risk of detection than in the brighter corners of the internet. NBC News reviewed court documents from 72 state and federal child sexual abuse or child pornography prosecutions where the defendant allegedly used Wickr (as it's commonly known) from the last five years in the United States, United Kingdom and Australia, using a combination of private and public legal and news databases and search engines. Nearly every prosecution reviewed has resulted in a conviction aside from those still being adjudicated. Almost none of the criminal complaints reviewed note cooperation from Wickr itself at the time of filing, aside from limited instances where Wickr was legally compelled to provide information via a search warrant. Over 25 percent of the prosecutions stemmed from undercover operations conducted by law enforcement on Wickr and other tech platforms. These court cases only represent a small fraction of the problem, according to two law enforcement officers involved in investigating child exploitation cases, two experts studying child exploitation and two people who have seen firsthand how individuals frequently use Wickr and other platforms for criminal transactions on the dark web.Read more of this story at Slashdot.
Telegram Says It's Working on a Paid Service
Instant messaging app Telegram, which is used by over 500 million active users, said on Friday it's working on a premium tier, but plans to keep many of the current features available to existing users. In a post, Telegram Pavel Durov wrote: Since the day Telegram was launched almost 9 years ago, we've been giving our users more features and resources than any other messaging app. A free app as powerful as Telegram was revolutionary in 2013 and is still unprecedented in 2022. To this day, our limits on chats, media and file uploads are unrivaled. And yet, many have been asking us to raise the current limits even further, so we looked into ways to let you go beyond what is already crazy. The problem here is that if we were to remove all limits for everyone, our server and traffic costs would have become unmanageable, so the party would be unfortunately over for everyone. After giving it some thought, we realized that the only way to let our most demanding fans get more while keeping our existing features free is to make those raised limits a paid option. That's why this month we will introduce Telegram Premium, a subscription plan that allows anyone to acquire additional features, speed and resources. It will also allow users to support Telegram and join the club that receives new features first. Not to worry though: all existing features remain free, and there are plenty of new free features coming. Moreover, even users who don't subscribe to Telegram Premium will be able to enjoy some of its benefits: for example, they will be able to view extra-large documents, media and stickers sent by Premium users, or tap to add Premium reactions already pinned to a message to react in the same way. While our experiments with privacy-focused ads in public one-to-many channels have been more successful than we expected, I believe that Telegram should be funded primarily by its users, not advertisers. This way our users will always remain our main priority.Read more of this story at Slashdot.
US Court Orders Terraform Labs' Chief To Comply With SEC Subpoenas
A US court has ordered the chief executive of collapsed stablecoin operator Terraform Labs to comply with subpoenas from the regulator seeking documents and materials related to the sale of potential unregistered securities. From a report: The US court of appeals in New York on Wednesday upheld the claim from the Securities and Exchange Commission, which is seeking information on Mirror Protocol, a trading network built on the Terra ecosystem that offered customers tokens that closely mirrored the price of some of the US's largest listed companies such as Apple and Amazon. The regulator's victory marks a further blow to Terraform Labs' head Do Kwon, who is facing several legal cases in the wake of the sudden $40bn collapse of terraUSD, a stablecoin, and its accompanying token luna, which left investors out of pocket. The 30-year-old South Korean was the chief developer of terraUSD, whose collapse last month sent shockwaves through the crypto industry. Mirror Protocol was also developed by Kwon's Terraform Labs with the hope of bridging traditional finance with crypto.Read more of this story at Slashdot.
Thousands of Previously Undescribed Viruses Found By Huge Ocean Survey
The first global survey of marine RNA viruses has discovered thousands of new viruses, some of which play a central role in locking away carbon at the bottom of the sea. From a report: Between 2009 and 2012, researchers aboard a ship called Tara collected seawater samples from all the world's oceans. Guillermo Dominguez-Huerta at the Ohio State University and his colleagues had previously looked at hundreds of thousands of DNA viruses in these samples and found they were concentrated in five major ecological zones, with some of the greatest diversity in the Arctic Ocean. But this only told half of the story. The ocean is also filled with viruses that have genomes made of a different genetic material called RNA, which cells use to direct protein synthesis. Analysing DNA viruses was relatively easy using existing methods, but the researchers had to come up with improved techniques to distinguish viral RNA from the surfeit of RNA produced by the other organisms swimming in each sample. Now, Dominguez-Huerta and his colleagues have published the biggest-ever survey of RNA viruses in the ocean using the samples from Tara. The researchers identified more than 5000 types of RNA viruses in the sea, almost all of which were new to science. "It has expanded our view of how much diversity there is," says Curtis Suttle at the University of British Columbia, who wasn't involved in the study. The team focused particularly on the role viruses play in carbon sequestration. Every day, massive numbers of dead plankton sink to the bottom of the ocean, taking the carbon in their bodies with them, which is then entombed for potentially millions of years. This process, known as the biological carbon pump, puts away as much as 12 gigatonnes of carbon each year. That is about a third of the total annual human-caused CO2 emissions.Read more of this story at Slashdot.
...474475476477478479480481482483...