fliptop writes:Registrations of battery electric vehicles (BEVs) in Europe's key automotive markets surged by 51% in March as the Iran war pushed gasoline prices to multi-year highs, data published by research firm New Automotive and trade association E-Mobility Europe showed on Monday:
VLM writes:Here's one that's been making the rounds:https://arxiv.org/abs/2603.21852"A single two-input gate suffices for all of Boolean logic in digital hardware. No comparable primitive has been known for continuous mathematics: computing elementary functions such as sin, cos, sqrt, and log has always required multiple distinct operations. Here I show that a single binary operator, eml(x,y)=exp(x)-ln(y), together with the constant 1, generates the standard repertoire of a scientific calculator. This includes constants such as e, pi, and i; arithmetic operations including addition, subtraction, multiplication, division, and exponentiation as well as the usual transcendental and algebraic functions."Discussion ideas:1) Yes everyone knows there's not one, but two universal logic gates, anything made of NAND gates can be made of NOR gates and vice versa. So there's possibly at least one other "universal computation" for continuous math.2) Who's playing with the idea of computer/microcontroller FPUs that use nothing but this operation, super optimized? I think this is funny to think about even if impractical.3) Ditto analog computation. Analog opamp subtraction ain't rocket surgery, and old fashioned bipolar transistors can output logs and exponentials or you can use single chip devices to calculate logs and exponentials. I'm trying to wrap my head around using the AD633 universal multiplier... This could get expensive.4) You can do this on a slide rule for educational purposes. You need a rule with LL scales or at least L and C/D. I have to think about this some more.Original SubmissionRead more of this story at SoylentNews.
dw861 writes:As recently reported by CyberAlberta:A webinar hosting platform known as WebinarTV is actively scraping and redistributing both public and private Zoom webinars without knowledge or consent of organizers. Initial access is typically gained through third-party browser extensions such as AI-powered transcription or auto-join tools. These extensions are inadvertently provided calendar permissions by their users and, in some cases, users are willfully submitting meeting details to the WebinarTV platform without the knowledge or consent of the organizers.There have been many reports on social media as well as online review boards indicating hidden scraping of not just publicly advertised webinars, but supposedly private meetings as well. Many organizers reported first learning that their webinars had been made publicly available through a notification email from WebinarTV themselves.Once these tools join a meeting-either with or on behalf of a user-the session content is captured and subsequently published on WebinarTV.us. By analysing previews of uploaded webinars, CyberAlberta validated claims made by online users that WebinarTV uses screen capture to scrape content, rather than using Zoom's built-in "Record" function. The available previews display screenshots consistent with a screen-captured view, rather than the format produced by a native Zoom recording.WebinarTV appears to operate a business model centered around a promotional service called "Lead Advantage", which it offers for a fee. The platform scrapes webinars en masse and positions itself as a facilitator to help these webinars reach a broader audience, which in the case of private webinars is the opposite intention. According to WebinarTV's FAQs, Lead Advantage enables "hosts" (a term it uses to refer to individuals whose content has been scraped) to "promote their webinars through web placements, email distribution, and higher prominence directory listings". The service encourages these hosts to bid for increased exposure, with bidding starting at USD $20.Read more of this story at SoylentNews.
Arthur T Knackerbracket writes:https://www.techradar.com/pro/security/europol-launches-operation-poweroff-warns-75-000-ddos-users-and-takes-down-53-domains
Snotnose writes:I've noticed 2 broad groups of people: those who can troubleshoot problems, and those who don't know where to start. I'm in the former group, my wife was firmly in the latter even though she was smarter than me.Math forces you to think logically, and use seemingly disparate chunks of information to solve a problem.
Arthur T Knackerbracket writes:And this just proves the ban was never about securityhttps://www.techradar.com/computing/wi-fi-broadband/netgear-routers-seemingly-wont-be-banned-in-the-us-after-all-and-this-just-proves-the-ban-was-never-about-security
hubie writes:Bixonimania doesn't exist except in a clutch of obviously bogus academic papers. So why did AI chatbots warn people about this fictional illness?
looorg writes:https://www.theguardian.com/technology/2026/apr/13/meta-ai-mark-zuckerberg-staff-talk-to-the-bossMeta is turning Zuckerberg into Clippy so he can answer all your queries and gives you feedback and support ... I'm sure the staff will just feel the motivation flow over them as their great leader appears to them in person, or in avatar form as their very own Clippy. Zucky?
JamesWebb writes:Bitcoin's blockchain is a public ledger. Every block header, every nonce, every coinbase transaction, every timestamp is visible to anyone running a full node. Most people look at the price. The data itself tells a different story.Starting at block 142,312 (approximately early 2011), a persistent anomaly appears in the chain: 37,393 blocks with no pool tag in the coinbase, spanning 14 years, appearing in 2,877 distinct burst episodes that cluster around moments when the mining pool coordination graph is restructuring. These are not scattered solo miners picking up scraps. They are a structured, continuous presence.Every mining pool has a distinctive nonce distribution - the hardware, work distribution software, and stratum proxy configuration create a statistical fingerprint. KL divergence measures how different two distributions are. The anonymous miner scores 0.0003 against F2Pool. The next closest pool scores 0.01+. The coinbase data confirms it: same template, same extra-nonce encoding, same byte layout - with the pool identification tag stripped out. These are F2Pool blocks with the name removed.Someone has had the comprehension to read Bitcoin's 587 miner-controlled bits per block header - reconstructing pool attribution, coordination patterns, and regime shifts in real time - for 14 years. Every number in the article is derivable from publicly available blockchain data. The data is there. Look at it: https://subtracted.org/bitcoin-overseerOriginal SubmissionRead more of this story at SoylentNews.
looorg writes:https://www.cio.com/article/4155404/ai-token-freeloaders-are-coming-for-your-customer-support-chatbot.htmlConversation framing or Social-engineering the Customer support AI bots. Making them do things to burn company tokens. One just can't stop laughing.