0 Comments
0 Shares
28 Views
Directory
Directory
-
Please log in to like, share and comment!
-
9TO5MAC.COMRayNeo X3 Pro AR take us another step closer to Apple GlassesApples long-term goal for Vision Pro is believed to be an Apple Glasses product, in which an ordinary-looking pair of glasses will be able to display both text and AR content.Weve seen some competitors take early steps in that direction, and the RayNeo X3 Pro AR glasses look like the closest thing weve yet seen in a real-world product A glasses form factor is also believed to beApples long-term goal, with Vision Pro just an early step along the way. Back in 2019, it was reported that Apple believes that AR glasses willeventually replace the iPhone.Meta showed off an early prototype of itsOrion AR glasseslast summer, providing a persuasive look at what we can one day expect in something that looks and feels more like the companys existing smart glasses. However, the prototype was massive clunky, and reputedly cost $10,000 apiece just to manufacture.In the meantime, a new model of the companys existing RayBan Meta smart glasses are said to be in line to get a display next year.RayNeo X3 Pro AREngadgets Karissa Bell got a chance to try RayNeos latest glasses at CES.RayNeo use microLED projectors and waveguides to produce a full-color AR display. The field of view is just 25 degrees [] but its impressively bright. Even under the fairly bright lights of a Las Vegas casino ballroom, I had no problem seeing the menus or even reading text (the display outputs 2,500 nits, according to the company).What stood out the most, though, was the size. At less than 3 ounces, the RayNeo X3 Pro are impressively lightweight. Like other AR glasses Ive tried, they dont quite look like a normal pair of frames, but they dont feel that far off either.The glasses of course have a ChatGTP-powered AI assistant, and also support real-time translation of speech to text, which Bell said works well even in the noisy environment of CES.There are two notable downsides, though. Battery-life is said to be just 30 minutes in heavy use, and the price is expected to be around $1500. Theres no specific word on availability, but the launch is promised for later this year.While the exact form factor is hard to see in RayNeos promo image, you can get a better idea of the real-life look in the photos over at Engadget.Image: RayNeoAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel0 Comments 0 Shares 24 Views
-
9TO5MAC.COMMultiple Apple employees fired for Matching Grants fraud; six charged so farAround fifty Apple employees have been fired for allegedly defrauding the company via its Matching Grants program, in which the company agrees to match charitable donations made by employees.So far, six of the former Bay Area employees have also been charged with tax fraud relating to fake donations Apples Matching Grants programApple CEO Tim Cook launched a charitable donation matching program back in 2018. The deal is that for every dollar donated to a charity by an employee, Apple will match it with two dollars. The annual limit was capped at $10,000 per employee.We also know how much our employees value giving back to the communities where we all work and live. Im happy to announce that starting immediately [] Apple will match all employee charitable donations, up to $10,000 annually, at a rate of two to one.For example, if an employee donates the maximum of $10k, Apple will provide an additional $20k, giving the charity $30k in total.Employees fired and charged with fraudIndia Today reports that around 50 employees have been fired, and six of them have so far been charged with criminal offenses.The allegations suggest that some employees, in collaboration with specific nonprofit organisations including associations reportedly linked to the Indian community falsified donations to exploit the program.According to these claims, employees donated funds to nonprofits, which were then matched by Apple. However, the nonprofits allegedly funnelled the original donations back to the employees, allowing them to retain Apples matching contributions. If accurate, this would not only breach corporate policies but also violate US tax laws, as the employees false claims could amount to tax fraud.The charges relate to approximately $152k over a period of three years.If the allegations are proven, it will mean that Apple was tricked into making charitable donations to specific charities, while the state of California was defrauded by tax write-offs for non-existent employee donations.Photo byGiorgio TrovatoonUnsplashAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel0 Comments 0 Shares 26 Views
-
9TO5MAC.COMPlugable dock lets even an M1 MacBook Pro support five external monitorsDepending on the model, an Apple Silicon MacBook Pro officially supports between one and three external displays, but a software workaround lets you boost that number.The new Plugable UD-7400PD dock takes advantage of that fact to provide a very neat way to allow even an M1 MacBook Pro to simultaneously drive up to five external monitors MacBook Pro external monitor supportApple Silicon Macs were a vast improvement on Intel machines in almost every respect, but one downgrade in the specs of the base model M1 MacBook Pro was that it only supported a single external monitor. This contrasted with up to four monitors with some Intel models.More powerful models increased the number to three, but a software workaround actually allows even the M1 model to support up to six monitors.M1 Macs can indeed run up to 6 external displays with good performance, at least in early testing. The workaround isnt too complicated and involves downloading the DisplayLink software for macOS and picking up a 4K DisplayPort to USB 3.0 adapter (and/or HDMI adapter).Plugable UD-7400PD dockYou dont need any dedicated hardware to use DisplayLink approach, but given the mix of cables and adapters required, you might still be interested in Plugables UD-7400PD dock, intended to make this as neat as possible.The UD-7400PD, powered by DisplayLinks DL-7400 chipset, is the first docking station to support up to five displays, including four 4K and one 8K screen. Also offering 140W Power Delivery, this dock ensures even power-hungry laptops remain charged during demanding tasks. Its universal compatibility delivers an ideal solution for mixed-platform offices and IT departments that OEM docks cant support.The dock also features an intelligent splash screen that appears when powered on but not connected to a computer, providing real-time status and asset information, as well as a QR code linking to set up and support resources. This innovation simplifies setup and asset management, particularly for IT administrators in flexible work environments.You get three USB-C ports which support DisplayLink for up to 8K monitors, an HDMI Alt Mode port also supporting 8K, and an HDMI DisplayLink port offering 4K. Exact capacity depends on the resolution of your monitors, but you can have, for example, one 6K monitor and four 4K ones.Additionally, theres a 2.5Gbps Ethernet port, a USC-C 10Gbps 30W one, two USB-A 10Gbps ports, and an audio in/out socket. Finally, theres one more USB-C 140W PD socket to enable a single-cable connection for both powering your MacBook display and feeding the monitors.The dock costs $264.95. Theres no exact word yet on availability, but the company says it is coming soon.Image: 9to5Mac composite of images from Plugable and Alexander GreyonUnsplashAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel0 Comments 0 Shares 26 Views
-
THEHACKERNEWS.COMResearchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion TechniquesJan 08, 2025The Hacker NewsMalware / Windows SecurityCybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems."The NonEuclid remote access trojan (RAT), developed in C#, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques," Cyfirma said in a technical analysis published last week."It employs various mechanisms, including antivirus bypass, privilege escalation, anti-detection, and ransomware encryption targeting critical files."NonEuclid has been advertised in underground forums since at least late November 2024, with tutorials and discussions about the malware discovered on popular platforms like Discord and YouTube. This points to a concerted effort to distribute the malware as a crimeware solution.At its core, the RAT commences with an initialization phase for a client application, after which it performs a series of checks to evade detection prior to setting up a TCP socket for communication with a specified IP and port.It also configures Microsoft Defender Antivirus exclusions to prevent the artifacts from being flagged by the security tool, and keeps tabs on processes like "taskmgr.exe," "processhacker.exe," and "procexp.exe" which are often used for analysis and process management."It uses Windows API calls (CreateToolhelp32Snapshot, Process32First, Process32Next) to enumerate processes and check if their executable names match the specified targets," Cyfirma said. "If a match is found, depending on the AntiProcessMode setting, it either kills the process or triggers an exit for the client application."Some of the anti-analysis techniques adopted by the malware include checks to determine if it's running in a virtual or sandboxed environment, and if found to be so, immediately terminate the program. Furthermore, it incorporates features to bypass the Windows Antimalware Scan Interface (AMSI).While persistence is accomplished by means of scheduled tasks and Windows Registry changes, NonEuclid also attempts to elevate privileges by circumventing User Account Control (UAC) protections and execute commands.A relatively uncommon feature is its ability to encrypt files matching certain extension types (e.g., .CSV, .TXT, and .PHP) and renaming them with the extension ". NonEuclid," effectively turning into ransomware."The NonEuclid RAT exemplifies the increasing sophistication of modern malware, combining advanced stealth mechanisms, anti-detection features, and ransomware capabilities," Cyfirma said."Its widespread promotion across underground forums, Discord servers, and tutorial platforms demonstrates its appeal to cyber-criminals and highlights the challenges in combating such threats. The integration of features like privilege escalation, AMSI bypass, and process blocking showcases the malware's adaptability in evading security measures."Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE0 Comments 0 Shares 26 Views
-
WWW.INFORMATIONWEEK.COMWho Should Lead the AI Conversation in the C-Suite?Many executives have opinions on the technology and its use, but does that translate into understanding of the opportunities and capabilities of AI?0 Comments 0 Shares 26 Views
-
WWW.INFORMATIONWEEK.COMWhat CISOs Think About GenAILisa Morgan, Freelance WriterJanuary 8, 20257 Min ReadMilan Surkala via Alamy StockGenAI is everywhere -- available as a standalone tool, proprietary LLMs or embedded in applications. Since everyone can easily access it, it also presents security and privacy risks, so CISOs are doing what they can to stay up on it while protecting their companies with policies.As a CISO who has to approve an organizations usage of GenAI, I need to have a centralized governance framework in place, says Sammy Basu CEO & founder of cybersecurity solution provider Careful Security.We need to educate employees about what information they can enter into AI tools, and they should refrain from uploading client confidential or restricted information because we dont have clarity on where the data may land up.Specifically, Basu created security policies and simple AI dos and donts addressing AI usage for Careful Security clients. As is typical these days, people are uploading information into AI models to stay competitive. However, Basu says a regular user would need security gateways built into their AI tools to identify and redact sensitive information. In addition, GenAI IP laws are ambiguous, so its not always clear who owns the copyright of AI generated content that has been altered by a human.From Cautious Curiosity to Risk-Aware AdoptionRelated:Ed Gaudet, CEO and founder of healthcare risk management solution provider Censinet says over the years as a user and as a CISO, his GenAI experience has transitioned from cautious curiosity to a more structured, risk-aware adoption of GenAI capabilities.It is undeniable that GenAI opens a vast array of opportunities, though careful planning and continuous learning remain critical to contain the risks that it brings, says Gaudet. I was initially cautious about GenAI at the start because of the privacy of data, IP protection and misuse. Early versions of GenAI tools, for instance, highlighted how input data was stored or used for further training. But as the technology has improved and providers have put better safeguards in place -- opt-out data and secure APIs -- I have come to see what it can do when used responsibly.Gaudet believes sensitive or proprietary data should never be input into GenAI systems, such as OpenAI or proprietary LLMs. He has also made it mandatory for teams to use only vetted and authorized tools, preferably those that run on secure, on-premises environments to reduce data exposure.Ed Gaudet, CensinetOne of the significant challenges has been educating non-technical teams on these policies, says Gaudet. GenAI is considered a black box solution by many users, and they do not always understand all the potential risks associated with data leaks or the creation of misinformation.Related:Patricia Thaine, co-founder and CEO at data privacy solution provider Private AI, says curating data for machine learning is complicated enough without having to additionally think about access controls, purpose limitation, and the security of personal and confidential company information going to third parties.This was never going to be an easy task, no matter when it happened, says Thaine. The success of this gargantuan endeavor depends almost entirely on whether organizations can maintain trust with proper AI governance in place and whether we have finally understood just how fundamentally important meticulous data curation and quality annotations are, regardless of how large a model we throw at a task.The Risks Can Outweigh the BenefitsMore workers are using GenAI for brainstorming, generating content, writing code, research, and analysis. While it has the potential to provide valuable contributions to various workflows as it matures, too much can go wrong without the proper safeguards.As a [CISO], I view this technology as presenting more risks than benefits without proper safeguards, says Harold Rivas, CISO at global cybersecurity company Trellix. Several companies have poorly adopted the technology in the hopes of promoting their products as innovative, but the technology itself has continued to impress me with its staggeringly rapid evolution. Related:However, hallucinations can get in the way. Rivas recommends conducting experiments in controlled environments and implementing guardrails for GenAI adoption. Without them, companies can fall victim to high-profile cyber incidents like they did when first adopting cloud.Dev Nag, CEO of support automation company QueryPal, says he had initial, well-founded concerns around data privacy and control, but the landscape has matured significantly in the past year.The emergence of edge AI solutions, on-device inference capabilities, and private LLM deployments has fundamentally changed our risk calculation. Where we once had to choose between functionality and data privacy, we can now deploy models that never send sensitive data outside our control boundary, says Nag. We're running quantized open-source models within our own infrastructure, which gives us both predictable performance and complete data sovereignty.The standards landscape has also evolved. The release of NIST's AI Risk Management Framework and concrete guidance from major cloud providers on AI governance, provide clear frameworks to audit against.We've implemented these controls within our existing security architecture, treating AI much like any other data-processing capability that requires appropriate safeguards. From a practical standpoint, we're now running different AI workloads based on data sensitivity, says Nag. Public-facing functions might leverage cloud APIs with appropriate controls, while sensitive data processing happens exclusively on private infrastructure using our own models. This tiered approach lets us maximize utility while maintaining strict control over sensitive data.Dev Nag, QueryPalThe rise of enterprise-grade AI platforms with SOC 2 compliance, private instances and no data retention policies has also expanded QueryPals options for semi-sensitive workloads.When combined with proper data classification and access controls, these platforms can be safely integrated into many business processes. That said, we maintain rigorous monitoring and access controls around all AI systems, says Nag. We treat model inputs and outputs as sensitive data streams that need to be tracked, logged and audited. Our incident response procedures specifically account for AI-related data exposure scenarios, and we regularly test these procedures.GenAI Is Improving Cybersecurity Detection and ResponseGreg Notch, CISO at managed detection and responseservice provider Expel, says GenAIs ability to quickly explain what happened during a security incident to both SOC analysts and impacted parties goes a long way toward improving efficiency and increasing accountability in the SOC.[GenAI] is already proving to be a game-changer for security operations, says Notch. As AI technologies flood the market, companies face the dual challenge of evaluating these tools' potential and managing risks effectively. CISOs must cut through the noise of various GenAI technologies to identify actual risks and align security programs accordingly investing significant time and effort into crafting policies, assessing new tools and helping the business understand tradeoffs. Plus, training cybersecurity teams to assess and use these tools is essential, albeit costly. It's simply the cost of doing business with GenAI.Adopting AI tools can also inadvertently shift a company's security perimeter, making it crucial to educate employees about the risks of sharing sensitive information with GenAI tools both in their professional and personal lives. Clear acceptable use policies or guardrails should be in place to guide them.The real game-changer is outcome-based planning, says Notch. Leaders should ask, What results do we need to support our business goals? What security investments are required to support these goals? And do these align with our budget constraints and business objectives? This might involve scenario planning, imagining the costs of potential data loss, legal costs and other negative business impacts as well as prevention measures, to ensure budgets cover both immediate and future security needs.Scenario-based budgets help organizations allocate resources thoughtfully and proactively, maximizing long-term value from AI investments and minimizing waste. Its about being prepared, not panicked, he says.Concentrating on basic security hygiene is the best way to protect your organization, says Notch. The No. 1 danger is letting unfounded AI threats distract organizations from hardening their standard security practices. Craft a plan for when an attack is successful whether AI was a factor or not. Having visibility and a way to remediate is crucial for when, not if, an attacker succeeds.About the AuthorLisa MorganFreelance WriterLisa Morgan is a freelance writer who covers business and IT strategy and emergingtechnology for InformationWeek. She has contributed articles, reports, and other types of content to many technology, business, and mainstream publications and sites including tech pubs, The Washington Post and The Economist Intelligence Unit. Frequent areas of coverage include AI, analytics, cloud, cybersecurity, mobility, software development, and emerging cultural issues affecting the C-suite.See more from Lisa MorganNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports0 Comments 0 Shares 24 Views
-
WEWORKREMOTELY.COMNative Camp: Online English TeacherAbout us:Native Camp is Japans No.1 Online English Service counting the highest number of both teachers and students who are learning the English language through our platform. Since 2017, we have started hiring teachers from all around the world, and we have created an environment that makes it easy for them to work and earn while having full flexibility.We are continuously expanding, introducing new features and teaching materials, and as a result of these efforts, more than 1.3 million members are using our service. Lessons are provided via a unique language platform developed by our company. We have simplified our application process and made it as quick as possible, so joining our team of teachers has never been easier. Join us today to experience the benefits that we provide.ONLINE ENGLISH TEACHER(Home-Based job position)What we offer:Complete flexibility (24/7)100% remoteEasy-to-follow teaching materials providedNo minimum hours per week requiredFrequent incentives offeredNo CV or experience requiredOnline support availableRequirements:English ProficiencyLaptop or PC with a webcamHeadset with a microphoneStable Internet connection and speedQuiet environment and plain backgroundApplication Process:Apply through our websiteDo the English Proficiency TestDo the System Check and the Demo LessonComplete your profileStart TeachingThe whole application process is done online, via desktop. Just follow step by step and the system will guide you through it.If you have any questions please contact us via our website (Contact Us page). Related Jobs See more All Other Remote jobs0 Comments 0 Shares 28 Views
-
WEWORKREMOTELY.COMFixa: Lead Engineer (Full-Stack)Role Overview:We have made the decision to redevelop our SaaS platform from scratch. As the Lead Engineer, you will take ownership for this project, leading the development of the backend API, web application, mobile application, USSD Application and infrastructure setup.You will collaborate closely with a dedicated UI/UX designer, CTO and technical advisors to build a scalable, secure, and robust platform.This is a full-scope development role, encompassing everything from backend architecture to frontend implementation.While you will work alone initially to ensure rapid development of the MVP, you will get the opportunity to hire and manage a development team after a few months.Key ResponsibilitiesBackend Development:Design and develop a scalable REST API using one of the following frameworks: Laravel (PHP), FastAPI (Python), or Node.js (Express.js or NestJS).Implement core modules, including user management, worker onboarding, attendance tracking, payroll processing, and communication tools.Ensure the API supports multiple clients, including a Web App, Mobile Apps, and a USSD interfaceFrontend Development:Build a responsive web application using React or Vue.js.Collaborate with the UI/UX designer to implement user-friendly interfaces for customer-facing and admin applications.Infrastructure and DevOps:Deploy applications on GCP, AWS, or Azure.Set up CI/CD pipelines using GitHub Actions.Collaboration:Work closely with stakeholders to understand project requirements and translate them into technical specifications.Lead code reviews and ensure adherence to best practices for code quality and security.Required QualificationsAt least 7 year of professional experience in developing full-stack applications.Expertise in at least one backend framework: Laravel, FastAPI, or Node.js.Proficiency in frontend technologies such as React or Vue.js.Familiarity with SQL databases (e.g., PostgreSQL, MySQL) and API design.Excellent problem-solving skills and attention to detail.Strong communication skills and the ability to work collaboratively in a remote environment.Preferred SkillsExperience building HR/Payroll PlatformsExperience building Payment PlatformsExperience with USSD application development.Experience with DevOps and cloud infrastructure.Knowledge of biometric or IoT integrations.Familiarity with mobile app development (iOS and Android).Prior experience in building platforms for diverse and underserved demographics.Why Join Us?Opportunity to lead the development of a transformative platform with significant social impact.Work with a passionate team committed to innovation and excellence.Competitive compensation and flexible work arrangements.How to Apply:Interested candidates are encouraged to submit their resume and a brief cover letter detailing their relevant experience and why they are the perfect fit for this role to [emailprotected].Please include links to your GitHub, Portfolio, or any relevant projects.Join us in building a platform that empowers businesses and workers across Africa!0 Comments 0 Shares 26 Views
-
WWW.TECHNOLOGYREVIEW.COMThe Download: whats next for AI, and stem-cell therapiesThis is today's edition ofThe Download,our weekday newsletter that provides a daily dose of what's going on in the world of technology. Whats next for AI in 2025 For the last couple of years weve had a go at predicting whats coming next in AI. A fools game given how fast this industry moves. But were on a roll, and were doing it again. How did we score last time round? Our four hot trends to watch out for in 2024 pretty much nailed it by including what we called customized chatbots (we didnt know it yet, but we were talking about what everyone now calls agents, the hottest thing in AI right now), generative video, and more general-purpose robots that can do a wider range of tasks.So whats coming in 2025? Here are five picks from our AI team. James O'Donnell, Will Douglas Heaven & Melissa Heikkil This piece is part of MIT Technology Reviews Whats Next series, looking across industries, trends, and technologies to give you a first look at the future. You can read the rest of them here. Stem-cell therapies that work: 10 Breakthrough Technologies 2025 A quarter-century ago, researchers isolated powerful stem cells from embryos created through in vitro fertilization. These cells, theoretically able to morph into any tissue in the human body, promised a medical revolution. Think: replacement parts for whatever ails you. But stem-cell science didnt go smoothly. Even though scientists soon learned to create these make-anything cells without embryos, coaxing them to become truly functional adult tissue proved harder than anyone guessed. Now, though, stem cells are finally on the brink of delivering. Read the full story.Stem-cell therapies is one of our 10 Breakthrough Technologies for 2025, MIT Technology Reviews annual list of tech to watch. Check out the rest of the list, and cast your vote for the honorary 11th breakthroughyou have until 1 April! The must-reads Ive combed the internet to find you todays most fun/important/scary/fascinating stories about technology. 1 Meta will no longer employ fact-checkers Instead, it will outsource fact verification to its users. (NYT $)+ What could possibly go wrong!? (WSJ $)+ The third party groups it employed say they were blindsided by the decision. (Wired $)2 American workers are increasingly worried about robots The wave of automation threatening their jobs is only growing stronger. (FT $)+ Will we ever trust robots? (MIT Technology Review)3 NASA isnt sure how to bring Martian rocks and soil to Earth Its enormously expensive, and we cant guarantee itll contain the first evidence of extraterrestrial life we hope it does. (WP $)+ NASA is letting Trump decide how to do it(NYT $)4 Meta has abandoned its Quest Pro headset What does this tell us about the state of consumer VR? Nothing good. (Fast Company $)+ Turns out people dont want to spend $1,000 on a headset. (Forbes $)5 The man who blew up a Cybertruck used ChatGPT to plan the attack He asked the chatbot how much explosive was needed to trigger the blast. (Reuters) 6 Hackers claim to have stolen a huge amount of location dataIts a nightmare scenario for privacy advocates. (404 Media) 7 A bitcoin investor has been ordered to disclose secret codesFrank Richard Ahlgren III has been sentenced for tax fraud, and owes the US government more than $1 million. (Bloomberg $) 8 The world is far more interconnected than we realizedNetworks of bacteria in the ocean are shedding new light on old connections. (Quanta Magazine) 9 The social web isnt made for everyone Its constant updates are a nightmare for people with cognitive decline. (The Atlantic $)+ How to fix the internet. (MIT Technology Review)10 Is Elon Musk really one of the worlds top Diablo players? His ranking suggests he plays all day, every day. (WSJ $)Quote of the day We have completely lost the plot. A Meta employee laments the companys decision to hire new board member Dana White, 404 Media reports. The big story How generative AI could reinvent what it means to play June 2024 To make them feel alive, open-world games like Red Dead Redemption 2 are inhabited by vast crowds of computer-controlled characters. These animated peoplecalled NPCs, for nonplayer charactersmake these virtual worlds feel lived in and full. Oftenbut not alwaysyou can talk to them. After a while, however, the repetitive chitchat (or threats) of a passing stranger forces you to bump up against the truth: This is just a game. Its still fun, but the illusion starts to weaken when you poke at it. It may not always be like that. Just as it is upending other industries, generative AI is opening the door to entirely new kinds of in-game interactions that are open-ended, creative, and unexpected. The game may not always have to end. Read the full story. Niall Firth We can still have nice things A place for comfort, fun and distraction to brighten up your day. (Got any ideas? Drop me a line or skeet 'em at me.) + Why Feathers McGraw is cinemas most sinister villain, bar none. ($)+ Intrepid supper clubs sound terrible, but these other travel trends for 2025 are intriguing.+ Steve Young is a literal pinball wizard, restoring 70-year old machines for the future generations to enjoy.+ Its time to pay our respects to a legend: Perry, the donkey who inspired Shreks four-legged sidekick, is no more.0 Comments 0 Shares 26 Views