• WWW.TECHSPOT.COM
    AMD Threadripper 9000 "Shimada Peak" CPUs leak with up to 96 Zen 5 cores
    Forward-looking: AMD has yet to update its Threadripper and Threadripper Pro CPUs with Zen 5 cores, but that could change soon. Zen 5-based Threadripper "Shimada Peak" CPUs have been spotted in shipping manifest data on a Chinese website, revealing some key details. The leak comes from tipster @Olrak29_, who spotted two Threadripper 9000 CPUs listed in a shipping log on NBD.ltd. One of the CPUs is a 96-core model, likely the flagship SKU in the Shimada Peak lineup, while the other is a 16-core chip that could serve as the entry-level option for Zen 5-based Threadripper. The listing also confirms that both chips will use the SP6 socket and feature a 350W maximum TDP.Interestingly, the entry-level SKU in the Zen 4-based Threadripper 7000 series has 24 cores, suggesting the addition of a 16-core model may be AMD's attempt to offer a more affordable option for mainstream users. Furthermore, while the top-end chip in the standard Threadripper 7000 lineup maxes out at 64 cores, the Pro series is led by a 96-core SKU.It remains to be seen whether the leaked 96-core chip will belong to the standard Threadripper 9000 family or the Pro lineup.The latest leak didn't reveal much additional information about the upcoming CPUs, but an earlier report shed some light on the flagship SKU. According to that leak, the chip is based on the Zen 5 architecture, featuring 96 cores and 192 threads. It comprises 12 CCDs, each with eight cores and 32 MB of L3 cache, a configuration strikingly similar to the Threadripper PRO 7995WX, which also boasts 96 cores, 192 threads, and 384 MB of total L3 cache.Details about clock speeds remain unknown for now, but online speculation suggests the upcoming processors could support up to 128 PCIe lanes. Whether AMD will match the max frequencies of the Ryzen 9000 "Granite Ridge" series or push them slightly higher for improved performance remains unknown. // Related StoriesThe Threadripper 9000 family is expected to target the HEDT market, delivering optimized performance for specialized workloads such as 3D rendering, video editing, and scientific simulations. While a release is anticipated next year, AMD has not yet announced an exact launch timeframe.
    0 التعليقات 0 المشاركات 5 مشاهدة
  • WWW.WSJ.COM
    The Best Movies of 2024: Bold Visions and Rising Stars
    The years top films include thrilling adaptations and original dramas, such as Wicked and The Brutalist, as well as ideal showcases for actors Austin Butler and Glen Powell, who are deservedly ascending to the A-list.
    0 التعليقات 0 المشاركات 3 مشاهدة
  • ARSTECHNICA.COM
    Keanu Reeves voices archvillain Shadow in Sonic 3 trailer
    "Double your villains, double your fun!" Keanu Reeves voices archvillain Shadow in Sonic 3 trailer "With Shadow's power, we can rule humanity." Jennifer Ouellette Nov 25, 2024 12:36 pm | 0 Credit: YouTube/Paramount Pictures Credit: YouTube/Paramount Pictures Story textSizeSmallStandardLargeWidth *StandardWideLinksStandardOrange* Subscribers only Learn more Ben Schwartz voices the titular character in Sonic the Hedgehog 3. Some lucky folks got a heads-up last week that a trailer for Sonic the Hedgehog 3 was about to drop when Paramount Pictures released a playable Sega Genesis gaming cartridge to select individuals. Hidden among a mini-game and character posters, and accessible by entering a cheat code, was the trailer release date. True to its word, Paramount just dropped the final trailer for the third film in the successful franchise. All our favorite characters are back, as well as a couple of new ones, most notably a new villain familiar to fans of the games: Shadow, voiced by Keanu Reeves.(Spoilers for the first two films below.)As previously reported, in the first film, Sonic (Ben Schwartz) teamed up with local town sheriff Tom Wachowski (James Marsden) to stop the sinister mad scientist Dr. Robotnik (Jim Carrey). Robotnik wanted to catch and experiment on the hedgehog, and if he could also frame Tom as a domestic terrorist, even better.Sonic the Hedgehog 2 picked up with a defeated Robotnik trapped on a faraway mushroom planet and plotting revenge. Robotnik escaped and teamed up with Knuckles (Idris Elba), a Sonic-like CGI echidna, to track down Sonic. Oh, and they were also hunting for an emerald with the power to destroy civilization. Sonic teamed up with his own sidekick, Tails (Colleen O'Shaughnessey), to find the emerald before it fell into the wrong hands. They naturally succeeded and decided to live a life of ease with the Wachowskis. As noted in our 2022 review, while the film wasn't exactly a cinematic triumph, it was still an enjoyable, family-friendly option.All the main cast members have returned for this third outing: Schwartz; Marsden; Carrey; Elba; O'Shaugnessey; Tika Sumpter as Tom's wife Maddie; Natasha Rothwell as Maddie's sister, Rachel; Lee Majdoub as Agent Stone, evil sidekick to Robotnik; Tom Butler as Commander Walters; Adam Pally as dim-witted deputy sheriff Wade Whipple; and Shemar Moore as Rachel's husband, Randall.In addition to Reeves, new cast members include Krysten Ritter as Director Rockwell; Alyla Browne as Maria, a young girl from Shadow's past; and Sofia Pernas, Cristo Fernandez, James Wolk, and Jorma Taccone cast in as-yet-undisclosed roles. Sonic 3 will also introduce the Chao creatures of Chao Gardens.A tragic backstory Sonic, Tails, and Knuckles are captured. YouTube/Paramount Pictures Sonic, Tails, and Knuckles are captured. YouTube/Paramount Pictures Jim Carrey plays both Ivo Robotnik and Ivo's grandfather, Gerald Robotnik. YouTube/Paramount Pictures Jim Carrey plays both Ivo Robotnik and Ivo's grandfather, Gerald Robotnik. YouTube/Paramount Pictures Sonic and friends end up in the living room of Tom (James Marsden) and Maddie (Tika Sumpter) Wachowski. YouTube/Paramount Pictures Sonic and friends end up in the living room of Tom (James Marsden) and Maddie (Tika Sumpter) Wachowski. YouTube/Paramount Pictures Jim Carrey plays both Ivo Robotnik and Ivo's grandfather, Gerald Robotnik. YouTube/Paramount Pictures Sonic and friends end up in the living room of Tom (James Marsden) and Maddie (Tika Sumpter) Wachowski. YouTube/Paramount Pictures Keanu Reeves signed on to voice Shadow. YouTube/Paramount Pictures Blast from the past: Shadow was besties with Maria (Alyla Browne). YouTube/Paramount Pictures Maria's death meant Shadow vowed revenge. YouTube/Paramount Pictures The film comes out just in time for the Christmas season, so naturally Gerald Robotnik disguises himself as Santa. YouTube/Paramount Pictures It's no surprise that Carrey is back once again as "Eggman" Robotnik, and this time, he's playing a dual role: Robotnik and the character's grandfather, Professor Gerald Robotnik, a genetic engineer who created Shadow while trying to cure his daughter Maria from a deadly disease. In the games, Shadow suffers from past trauma associated with Maria's death; the two were close friends.When she is killed by the Guardian Units of Nations (GUN), Shadow sets out for revenge before remembering his promise to Maria to prevent the destruction of the world. He eventually becomes an anti-hero ally to Sonic. We already knew that the third film would probably feature Shadow, thanks to a mid-credits scene in Sonic 2 informing us about the discovery of a secret research facility for something called "Project Shadow." (Director Jeff Fowler once worked as a character animator, and Shadow was one of his first jobs.)It's clear from the new trailer that Shadow is in his early villain phase here. The trailer opens with Sonic and pals in a kid-friendly eatery, where one child mistakes Tails for Pikachubefore they are rudely attacked. Cut to Roobotnik Sr. intoning, "It's time, Shadow"time for revenge. The trio is captured by the Robotniks but they escape and end up in the Wachowskis' living room, and naturally the couple joins them on a super dangerous top-secret mission. We see a flashback to Shadow's friendship with Maria as well as Sonic and Shadow getting ready to throw down ("This ends now"). The smart money, as always, is on Team Sonic.Sonic the Hedgehog 3 opens in theaters on December 20, 2024.Jennifer OuelletteSenior WriterJennifer OuelletteSenior Writer Jennifer is a senior reporter at Ars Technica with a particular focus on where science meets culture, covering everything from physics and related interdisciplinary topics to her favorite films and TV series. Jennifer lives in Baltimore with her spouse, physicist Sean M. Carroll, and their two cats, Ariel and Caliban. 0 Comments Prev story
    0 التعليقات 0 المشاركات 3 مشاهدة
  • ARSTECHNICA.COM
    Sony is reportedly working on a PS5 portable
    PS5P? Sony is reportedly working on a PS5 portable Miniaturized hardware is still "likely years away from launch." Kyle Orland Nov 25, 2024 11:34 am | 21 Artist's conception of God breathing new life into the sadly neglected PlayStation Vita. Credit: Sony Artist's conception of God breathing new life into the sadly neglected PlayStation Vita. Credit: Sony Story textSizeSmallStandardLargeWidth *StandardWideLinksStandardOrange* Subscribers only Learn moreBloomberg reports that Sony is "in the early stages" of work on a fully portable console that can play PlayStation 5 software. The device is still "likely years away from launch," according to "people familiar with its development" that spoke to Bloomberg anonymously.The report comes less than a year after the launch of the PlayStation Portal, a Sony portable device designed to stream PS5 games running on a console on the same local network. Recently, Sony updated the Portal firmware to let PlayStation Plus subscribers also stream PS5 games from Sony's centralized servers at up to 1080p and 60 fps.Sony's reported PS5 portable plans also come after months of rumors that Microsoft has also been working on a new Xbox console with a portable form factor. In June, Microsoft Gaming CEO Phil Spencer added fuel to those rumors by directly saying, "I think we should have a handheld, too... I like my ROG Ally, my Lenovo Legion Go, my Steam Deck... I think being able to play games locally is really important."Nintendo's follow-up to the Switch, which will be formally announced in the next few months, is also widely expected to mimic the hybrid portable/console design of Nintendo's last console.Sony first dipped its toes in the portable gaming arena with 2005's PlayStation Portable, which is still the only major handheld console to make use of optical discs (in Sony's own proprietary UMD format). Sony followed that up with 2012's PlayStation Vita, a well-loved console that brought a full analog stick and a larger high-resolution screen to the portable console space. But both efforts struggled to find much market success compared to the sales juggernauts of Nintendo's cheaper Nintendo DS and 3DS hardware lines.Honey, I shrunk the PS5A portable PS5 would continue a trend toward portable console design kicked off by Nintendo's hugely successful Switch in 2017 and supercharged by the Steam Deck in early 2022 (and its many PC-based and Android-based imitators). The ability to play games on the go at the lower-end of HD resolutionswithout the need to take up the living room TVhas proven popular with a market segment that's seeing diminishing returns from the push for even higher-fidelity graphics in many games and genres. The massive PS5 might seem like one of the hardest consoles to squeeze into a portable form factor. Credit: Reddit / GREB07 Squeezing the entire PS5 hardware stack into a portable form factor might seem difficult considering the PS5 was among the largest consoles ever released when it launched in 2020. But Sony has already made strides in shrinking the form factor somewhatthis year's more powerful PS5 Pro was distinctly smaller than the original console, for example.A portable PS5 might also not need to push the original console's full 4K resolution graphics eithereven the largest portable-sized gaming devices still max out at 1080p resolution these days. The hardware needed for this kind of "scaled down" PS5 software could end up taking up much less physical space, much like the reduced hardware power and overall size of Microsoft's Xbox Series S compared to the higher-end Xbox Series X.Sony revealed in May that the PS5 had sold a healthy 56 million units since launch. Still, the number of PS5 units in active use each month was matched by active use of the decade-old PS4, suggesting many gamers are still hesitant to upgrade.Kyle OrlandSenior Gaming EditorKyle OrlandSenior Gaming Editor Kyle Orland has been the Senior Gaming Editor at Ars Technica since 2012, writing primarily about the business, tech, and culture behind video games. He has journalism and computer science degrees from University of Maryland. He once wrote a whole book about Minesweeper. 21 Comments
    0 التعليقات 0 المشاركات 3 مشاهدة
  • WWW.INFORMATIONWEEK.COM
    Beyond Washington, DC: The State of State-Based Data Privacy Laws
    In the absence of federal law, how will state-based data privacy laws due to take effect in 2025 and beyond affect business operations?
    0 التعليقات 0 المشاركات 5 مشاهدة
  • WWW.INFORMATIONWEEK.COM
    What Does Enterprise-Wide Cybersecurity Culture Look Like?
    An enterprises culture is defined by a lot of different things: shared organizational values, how leaders behave, the way teams interact. A companys culture can make or break its business. Increasingly, cybersecurity is a risk that enterprise culture cannot ignore. Phishing scams. Zero-day vulnerabilities. Ransomware. Threat actors can levy various tools in their arsenal at anyone in an organization, from executives to members of the help desk.InformationWeek spoke to security leaders from three different companies about how they approach building a security-first culture across their organizations and what that can look like for different companies.Recognizing ObstaclesCulture is a complex concept, not easily built and maintained. What are some of the biggest obstacles cybersecurity leaders face when establishing security as a core cultural value?First of all, enterprises have a lot of priorities: driving revenue, marketing products and services, supporting customers and employees, and, of course, security. While each priority plays an important role in sustaining a business, they may compete with one another for talent, time, and budget.How do you get the organization to put security on par with increasing EBITDA or trying to maximize your revenue? asks John Cannava, CIO atPing Identity, an identity management and governance company.Related:Thats a tough question to answer, especially when enterprise teams view security as a stumbling block rather than a business enabler. Often security protocols, and with good reason, force people to slow down.As soon as employees think that it's an obstacle to overcome, they may look at creative ways to bypass that security control, Monica Landen, senior vice president and CISO at Diligent, a board and governance software company, says.Cybersecurity cannot be the sole responsibility of security and IT teams, but it is the responsibility of these team leaders to demonstrate its value to everyone in an organization.There is continuous need to not just come up with the right control set but also to figure out what are the best ways to scale those controls across such a heterogenous, large landscape, says Sebastian Lange, CSO at software and technology company SAP.Identifying Security ChampionsIdentifying the right security controls, scaling them across an organization, and threading that security-first mindset throughout an entire organization requires security champions. Oftentimes, the CISO and CIO wear that mantle, but the person or people who fill that role will vary depending on the size, structure, and maturity of an organization. At SAP, Lange and Marielle Ehrmann, the companys global security compliance and risk officer, co-lead global security and cloud compliance.Related:SAP has more than 100,000 employees around the world. Each line of business in SAP often [has its] own architectural uniqueness, sometimes even their own execution culture. How do you fit around that? asks Lange.The company has business information security officers for each line of business. They do the line of business-specific security implementation. So, within that model, we are spreading our security and compliance strategy into each and every line of business, Ehrmann explains.SAP also identifies employees throughout the business as security champions, people who teammates can turn to with security questions related to their everyday work. There are quite a few embedded in all of the different areas of the business to help further the availability of people with expertise but also context [and] knowledge of the day-to-day work [of] employees, says Lange.At Ping Identity, the head of product plays a big role in championing security initiatives. We've taken the security team and embedded it within our engineering organization so that it's not a high-friction interaction between those organizations, says Cannava.They're part of the same team who's delivering a solution that has security as part of its core value. Related:Whoever leads security efforts should be accessible to everyone in the company, from the board and C-suite on down. [Make] sure that the cybersecurity leader is visible and approachable and really sets clear organizational priorities across the company in easy-to-understand terms, says Landen.Securing Buy-InWhoever is championing enterprise-wide security needs to secure buy-in from everyone within an organization. At the top, that means getting the C-suite and board to throw their weight behind security.At the end of the day, if you don't have the CEO on board and the CEO isn't voicing the same level of prioritization, then it will be something that's viewed as a half step back from fundamental business priorities, Cannava warns.Effective communication is a big part of getting that buy-in from leadership. How can security leaders explain to their boards and fellow executives that security is an essential business enabler?Really [convert] the technology language or cyber language or jargon into how will that risk potential impact revenue or reputation or our compliance? says Landen.Tabletop exercises can be a powerful way to not just tell but show executives the value of cybersecurity. Walking through various cybersecurity incident scenarios can demonstrate the vital connection security has to operations and business outcomes. Ping Identity periodically engages multiple members of the C-suite in these exercises.Not only do you know learn what the gap is, you also learn by doing you're pulled in and engaged as a member of the C-suite, and now you're invested, he says. So, when you goback to your teams, you can share with them why this is so important.Executives can and should talk about the importance of security, but employees throughout an organization are busy with their day-to-day responsibilities. Cybersecurity can easily slip through the cracks.It requires regular communication, not a single training done as a part of onboarding and quickly forgotten. We find it really important to explain to our employees the why of security and what it means to the overall companys success or brand, says Cannava.Explaining that why can come in the form of education. For example, teams can discuss real-life cybersecurity events and their consequences, like downtime and lost revenue.Security leaders can also help their enterprises adopt various ways to make security more engaging and less like a check-the-box item to be forgotten. So, we have various excellence awards in place, but we are also making it a fun topic, like with a capture the flag competition. So, gamification factors in there, Ehrmann shares.Building a Strong, Adaptable CultureCompany culture and security strategy are not one-size-fits-all. While different approaches will work for different organizations, successful security-first cultures share some commonalities. Security initiatives need to be actionable, measurable, and governable across an enterprise in order to be effective. Using an established framework, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework, can help security leaders build and track the success of that security-first culture.Technology and cyber threats are constantly changing, which means that cybersecurity culture must be adaptable. Today, security leaders are contending with the GenAI boom and its power to both defend and fuel nefarious cyber activity.As security practitioners, we do have to get ahead of it and ensure that we have adopted the right policies and practices within the organization, so we don't inadvertently expose sensitive data or potentially impact any privacy policies, says Landen.As security leaders work to ensure security-first culture keeps up with shifting technologies and threats, they need continuous engagement with employees. Does every employee know about their companys cybersecurity risks and their role in mitigating them? Do they know where to go to with questions and where to report anything suspicious?When it comes to reporting a security incident or what they might view as suspicious activity, make it really low barrier for participation, for them to be able to report that, Cannava suggests.A strong cybersecurity culture ties security to the overall goals of a business, and it lives in the everyday actions of the people who work there.It's rather like swimming or like riding a bike. The moment you need it, you should know how to do it. It needs to come naturally, says Ehrmann. You can't create that ad hoc. It needs time, the right leadership and that goes across all levels of the company from the supervisory board over to the executive board to all senior executives down to each and every employee of the company.
    0 التعليقات 0 المشاركات 5 مشاهدة
  • WWW.NEWSCIENTIST.COM
    Why gene editors want to treat fetuses when they are still in the womb
    Gene editing could be more effective before birthLeigh Prather/AlamyDoing CRISPR gene editing while fetuses are in the womb could make it easier to treat inherited conditions, especially those affecting tissues such as the heart or muscles.Kiran Musunuru at the University of Pennsylvania and his colleagues have tested gene editing in monkeys, and found that it was far more effective when given before birth. What we found was astounding, he says. It opens up the opportunity to treat diseases that have been very hard to treat after birth.
    0 التعليقات 0 المشاركات 4 مشاهدة
  • WWW.NEWSCIENTIST.COM
    Anger over COP29 finance deal threatens progress on carbon cuts
    COP President Mukhtar Babayev (second from right) applauds the end of the climate summitSean Gallup/Getty ImagesAfter a long and fraught night of talks, COP29 in Baku finally concluded in the early hours of 24 November with a deal that will see wealthier countries funnel billions of dollars to poorer countries over the next decade to pay for climate action. Despite the high numbers involved, it is a deal that seemingly pleases no one, and has called the entire COP climate summit process into question.The finance deal was the main focus of the meeting in Azerbaijans capital, with
    0 التعليقات 0 المشاركات 4 مشاهدة
  • WWW.NATURE.COM
    I fled the war in Ukraine. Now I work on ways to help the countrys soil heal
    Nature, Published online: 25 November 2024; doi:10.1038/d41586-024-03567-zSustainable-development researcher Olena Melnyk talks about moving her life and research career from Ukraine to Switzerland.
    0 التعليقات 0 المشاركات 4 مشاهدة
  • WWW.NATURE.COM
    I defend the planet from asteroid collisions
    Nature, Published online: 25 November 2024; doi:10.1038/d41586-024-03831-2Astronomer Desire Cotto-Figueora detects and characterizes near-Earth asteroids to identify potential hazards.
    0 التعليقات 0 المشاركات 4 مشاهدة