0 Комментарии
0 Поделились
39 Просмотры
Каталог
Каталог
-
Войдите, чтобы отмечать, делиться и комментировать!
-
WWW.MACWORLD.COMYou dont know it yet, but you need this in your lifeMacworldYou never realize how much you need a pen until you dont have one. Whether its jotting down a million-dollar idea or catching someones phone number before they lose interest, not having one is a real buzzkill. This keychain pen fixes that problem forever.And get this: it writes with titanium, meaning it writes on any surface and is inkless, smudge-free, and capable of writing underwater because you never know when a mermaid might give you her number. The ForeverPenis only $23.99 here (reg. $40).Its also a great multi-toolWith this 1-inch-long gadget on your keyring, you can do more than write. Its so durable that it can withstand fires, so you can use the keyring multi-tool to open Amazon packages, mark wood surfaces, clean your nails, cut lightweight cords, and maybe even strike up a fire.Grab this small EDC tool to always have a pen and other tools handy while its only $23.99 (reg. $40).ForeverPen Tiny Inkless Pen & Multi-Tool $23.99See DealStackSocial prices subject to change.0 Комментарии 0 Поделились 39 Просмотры
-
-
WWW.MARKTECHPOST.COMRAG-Check: A Novel AI Framework for Hallucination Detection in Multi-Modal Retrieval-Augmented Generation SystemsLarge Language Models (LLMs) have revolutionized generative AI, showing remarkable capabilities in producing human-like responses. However, these models face a critical challenge known as hallucination, the tendency to generate incorrect or irrelevant information. This issue poses significant risks in high-stakes applications such as medical evaluations, insurance claim processing, and autonomous decision-making systems where accuracy is most important. The hallucination problem extends beyond text-based models to vision-language models (VLMs) that process images and text queries. Despite developing robust VLMs such as LLaVA, InstructBLIP, and VILA, these systems struggle with generating accurate responses based on image inputs and user queries.Existing research has introduced several methods to address hallucination in language models. For text-based systems, FactScore improved accuracy by breaking long statements into atomic units for better verification. Lookback Lens developed an attention score analysis approach to detect context hallucination, while MARS implemented a weighted system focusing on crucial statement components. For RAG systems specifically, RAGAS and LlamaIndex emerged as evaluation tools, with RAGAS focusing on response accuracy and relevance using human evaluators, while LlamaIndex employs GPT-4 for faithfulness assessment. However, no existing works provide hallucination scores specifically for multi-modal RAG systems, where the contexts include multiple pieces of multi-modal data.Researchers from the University of Maryland, College Park, MD, and NEC Laboratories America, Princeton, NJ have proposed RAG-check, a comprehensive method to evaluate multi-modal RAG systems. It consists of three key components designed to assess both relevance and accuracy. The first component involves a neural network that evaluates the relevancy of each retrieved piece of data to the user query. The second component implements an algorithm that segments and categorizes the RAG output into scorable (objective) and non-scorable (subjective) spans. The third component utilizes another neural network to evaluate the correctness of objective spans against the raw context, which can include both text and images converted to text-based format through VLMs.The RAG-check architecture uses two primary evaluation metrics: the Relevancy Score (RS) and Correctness Score (CS) to evaluate different aspects of RAG system performance. For evaluating selection mechanisms, the system analyzes the relevancy scores of the top 5 retrieved images across a test set of 1,000 questions, providing insights into the effectiveness of different retrieval methods. In terms of context generation, the architecture allows for flexible integration of various model combinations either separate VLMs (like LLaVA or GPT4) and LLMs (such as LLAMA or GPT-3.5), or unified MLLMs like GPT-4. This flexibility enables a comprehensive evaluation of different model architectures and their impact on response generation quality.The evaluation results demonstrate significant performance variations across different RAG system configurations. When using CLIP models as vision encoders with cosine similarity for image selection, the average relevancy scores ranged from 30% to 41%. However, implementing the RS model for query-image pair evaluation dramatically improves relevancy scores to between 71% and 89.5%, though at the cost of a 35-fold increase in computational requirements when using an A100 GPU. GPT-4o emerges as the superior configuration for context generation and error rates, outperforming other setups by 20%. The remaining RAG configurations show comparable performance, with an accuracy rate between 60% and 68%.In conclusion, researchers RAG-check, a novel evaluation framework for multi-modal RAG systems to address the critical challenge of hallucination detection across multiple images and text inputs. The frameworks three-component architecture, comprising relevancy scoring, span categorization, and correctness assessment shows significant improvements in performance evaluation. The results reveal that while the RS model substantially enhances relevancy scores from 41% to 89.5%, it comes with increased computational costs. Among various configurations tested, GPT-4o emerged as the most effective model for context generation, highlighting the potential of unified multi-modal language models in improving RAG system accuracy and reliability.Check out the Paper. All credit for this research goes to the researchers of this project. Also,dont forget to follow us onTwitter and join ourTelegram Channel andLinkedIn Group. Dont Forget to join our65k+ ML SubReddit. Sajjad Ansari+ postsSajjad Ansari is a final year undergraduate from IIT Kharagpur. As a Tech enthusiast, he delves into the practical applications of AI with a focus on understanding the impact of AI technologies and their real-world implications. He aims to articulate complex AI concepts in a clear and accessible manner. [Recommended Read] Nebius AI Studio expands with vision models, new language models, embeddings and LoRA (Promoted)0 Комментарии 0 Поделились 37 Просмотры
-
REALTIMEVFX.COMMagical Spell - Inspired by Zoe's Trouble Bubble Spell, League of LegendsThis effect is inspired by Zoes ability Sleepy Trouble bubble from League of Legends, reimagined with references in my own style using Unity, focusing only on Shader Graph. Blender for Mesh and Photoshop for Textures (Generated and Hand Painted). Please feel free to give any suggestions or question in the comments, Im a new VFX artist, hoping to improve and make cool looking VFX. Thankyou!My art station post for a Breakdown0 Комментарии 0 Поделились 37 Просмотры
-
WWW.FORBES.COMEverything You Want To Know About Nvidia Project Digits AI SupercomputerProject DigitsNvidiaAt CES 2025, Nvidia announced its first personal AI supercomputer, Project Digits. The rise of generative AI demands access to a new generation of CPUs and GPUs for data scientists and AI engineers working on state-of-the-art models and solutions. Digits is targeted at developers and data scientists looking for an affordable and accessible hardware and software platform to handle the lifecycle of generative AI models. From inference to fine-tuning to developing agents, Digits has everything it takes to build an end-to-end generative AI solution.Here is a deep-dive analysis of Project Digits:With a price tag that starts at $3000, Nvidia Project Digits is a compact device driven by the innovative Nvidia GB10 Grace Blackwell Superchip. It empowers developers to prototype, fine-tune and execute massive AI models locally. This accessibility marks a significant step toward democratizing AI training, making it more accessible for individuals and smaller organizations.Project DigitsNvidiaIndependent software vendors can leverage Digits as an appliance to run their AI-powered software deployed at a customer location. This reduces the reliance on the cloud and delivers unmatched privacy, confidentiality and compliance.Hardware Specs: AI Powerhouse on the DesktopAt the heart of Digits lies the Nvidia GB10 Grace Blackwell Superchip, a marvel of engineering that combines a powerful Blackwell GPU with a 20-core Grace CPU. These two powerhouses are interconnected using NVLink-C2C technology, a high-speed, chip-to-chip interconnect that facilitates rapid data transfer between the GPU and CPU. Think of it as a superhighway connecting two bustling cities, allowing seamless and efficient communication. This tight integration is crucial for Digits impressive performance, enabling it to handle complex AI tasks quickly and efficiently.MORE FOR YOUHeres a breakdown of the key specs:Blackwell GPU: Includes CUDA cores and fifth-generation Tensor Cores for accelerating AI calculations.Nvidia Grace CPU: Features 20 power-efficient Arm cores complementing the GPU for balanced AI workloads.NVLink-C2C interconnect: Provides a high-bandwidth, low-latency connection between the GPU and CPU for efficient data transfer.128GB of unified memory: Shared memory pool for CPU and GPU, eliminating data copying and speeding up processing.High-speed NVMe storage: Ensures rapid access to data for AI model training and execution.1 petaflop of AI performance: Handles complex AI tasks and large AI models.Power-efficient design: Operates using a standard wall outlet.Digits also boasts an impressive 128GB of unified memory. This means the CPU and GPU share the same memory pool, eliminating the need to copy data back and forth and significantly speeding up processing. This is particularly beneficial for AI workloads, which often involve large datasets and complex computations. Digits incorporates high-speed NVMe storage to enhance performance further, ensuring rapid access to the data required for AI model training and execution.Despite its impressive performance capabilities, Digits is designed with power efficiency in mind. Unlike traditional supercomputers that often require specialized power and cooling infrastructure, Digits can operate using a standard wall outlet. This makes it a practical and accessible solution for individuals and smaller teams who may not have access to the resources required to run larger, more power-hungry systems.Proven AI Software Stack Powered by CUDAProject Digits is designed to seamlessly integrate into Nvidias extensive AI ecosystem, providing developers with a cohesive and efficient environment for AI development. Based on the Linux-based Nvidia DGX OS, it ensures a stable and robust platform tailored for high-performance computing tasks. Preloaded with Nvidias comprehensive AI software stack, including the Nvidia AI Enterprise software platform, Project Digits offers immediate access to a wide array of familiar tools and frameworks essential for AI research and development.The systems compatibility with widely used AI frameworks and tools, such as PyTorch, Python and Jupyter Notebooks, empowers developers to use familiar environments for model development and experimentation. Additionally, it supports the Nvidia NeMo framework, which enables the fine-tuning of large language models, and the RAPIDS libraries, which accelerate data science workflows.In terms of connectivity and scalability, Project Digits employs Nvidia ConnectX networking, enabling high-speed data transfer and efficient communication between systems. This feature allows two Project Digits units to be interconnected, effectively doubling the capacity to handle models with up to 405 billion parameters. This scalability ensures that as complex AI models grow, Project Digits can adapt to meet the increasing computational demands.Moreover, Project Digits is engineered to seamlessly integrate cloud and data center infrastructures. Thanks to the consistent architecture and software platforms across Nvidias ecosystem, developers can prototype and fine-tune AI models locally on the device and then deploy them to larger-scale environments without compatibility issues. This flexibility streamlines the transition from development to production, enhancing efficiency and reducing time to deployment.Nvidia Project Digits comes with the below software stack:Linux-based Nvidia DGX OS: Runs on a robust, Linux-based operating system optimized for AI workloads, ensuring stability and performance.Pre-installed Nvidia AI Software Stack: Provides immediate access to Nvidias extensive AI tools and frameworks, streamlining the development process.Nvidia AI Enterprise: Delivers a suite of AI and data analytics software, ensuring enterprise-grade support and security for AI workflows.Nvidia NGC Catalog: Offers a rich repository of software development kits, frameworks, and pre-trained models, facilitating efficient AI model development and deployment.Nvidia NeMo Framework: Enables fine-tuning and deploying large language models, supporting advanced natural language processing tasks.Nvidia RAPIDS Libraries: Accelerates data science workflows by leveraging GPU-optimized libraries for data processing and machine learning.Support for Popular AI Frameworks: Compatible with widely used tools such as PyTorch, Python and Jupyter Notebooks, allowing developers to work within familiar environments.With its petaflop of AI performance and integrated software stack, Project Digits can handle massive AI models 200 billion parameters. This capability was previously limited to large-scale supercomputers, but Digits brings this power to the desktop, enabling developers to experiment with and deploy cutting-edge AI models locally.Ecosystem Support for Project DigitsNvidias CEO Jensen Huang shed light on the development of Digits and a key partnership that played a crucial role in its creation. He highlighted the collaboration with MediaTek, a leading fabless semiconductor company, in designing an energy-efficient CPU specifically for Digits. This partnership allowed Nvidia to leverage MediaTeks expertise in low-power CPU design, contributing to Digits impressive power efficiency.Huang also emphasized how Digits bridges the gap between Linux and Windows environments. While Digits itself runs on a Linux-based operating system, it is designed to seamlessly integrate with Windows PCs through the Windows Subsystem for Linux technology. This allows developers primarily working in Windows environments to easily utilize the power of Digits for their AI projects.Target Audience and Use CasesNvidia Digits is specifically designed for AI researchers, data scientists, students and developers working with large AI models. It empowers these users to prototype, fine-tune and run AI models locally, in the cloud, or within a data center, providing flexibility and control over their AI development workflows.By bringing the power of an AI supercomputer to the desktop, Digits addresses the growing need for greater AI performance in a compact and accessible form factor. This allows individuals and smaller teams to tackle complex AI challenges without relying on expensive cloud computing resources or large-scale supercomputing infrastructure.Potential use cases for Digits are vast and varied. Developers can use it to prototype new AI applications, fine-tune LLMs for specific tasks, generate AI-powered content, and research new AI algorithms and architectures. The ability to run large AI models locally opens up new possibilities for AI development, enabling faster iteration and experimentation.Nvidia Digits is expected to be available in May from Nvidia and its partners, with a starting price of $3,000. This competitive pricing makes it a viable option for a broader range of users, further contributing to the democratization of AI development.ConclusionNvidia Digits represents a significant leap forward in AI technology. By combining powerful hardware, a comprehensive software stack and a compact, power-efficient design, Digits brings the capabilities of an AI supercomputer to the desktop. This can potentially democratize AI development, making it more accessible to individuals, researchers and smaller organizations. The ability to run large AI models locally and the flexibility to deploy in the cloud or data center provides developers unprecedented control and power over their AI workflows. As Digits becomes available, witnessing the innovative applications and advancements that emerge from this powerful new platform will be exciting.0 Комментарии 0 Поделились 37 Просмотры
-
WWW.FORBES.COMUFC 311 Fight Canceled, Once-Hyped-Contender Earning Bust LabelLAS VEGAS, NV - MARCH 8: Dana White attends the Power Slap 1 pre-event press conference on March 8, ... [+] 2023, at the UFC APEX in Las Vegas, NV. (Photo by Amy Kaplan/Icon Sportswire via Getty Images)Icon Sportswire via Getty ImagesThe UFC 311 card has taken a hit, and so has Johnny Walkers stock as a light heavyweight contender.The light heavyweight scrap between Walker and Bogdan Guskov is off. Walker suffered what he described as a bad injury that is forcing him out of the fight.Thankfully for Guskov, the UFC has moved quickly to get the hard-charging light heavyweight another opponent. Walker will be replaced by Billy Elekana, a 29-year-old with a 7-1 record.SAN ANTONIO, TX - AUGUST 04: Billy Elekana looks on before fighting Chuck Campbell during PFL 2023 ... [+] week 7 at Boeing Center at Tech Port on August 4, 2023 in San Antonio, Texas. (Photo by Cooper Neill/Getty Images)Getty ImagesElekana is the rare fighter making his UFC debut who didnt earn a spot on the roster through the Dana White Contender Series. If Elekana performs well, he should get an opportunity to join the promotion officially.Guskov is ranked No. 13, so while a tall task, its a great opportunity for Elekana. If anyone is getting a bit of a bad hand, its Guskov. Fighting Walker was an opportunity to move up in the rankings for Guskov. Walker is currently No. 10, but his stock seems to be falling.Injuries can happen to anyone, but the current situation with Walker is the latest setback since he erupted on the UFC scene in August 2018.The 6-foot-6 uber-athletic Brazilian defeated Luis Henrique da Silva on DWCS and then rolled off three straight first-round stoppage wins over Khalil Rountree Jr., Justin Ledet, and Misha Cirkunov.Read More: UFC Vegas 101 Results, Bonus Winners, Highlights And ReactionWalker was being mentioned as the guy who could ultimately dethrone Jon Jones. Yes, it got that serious.After the win over Cirkunov at UFC 235, Walker dislocated his shoulder doing the Worm as a wild celebration. Quite honestly, he hasnt been the same since the mishap.LAS VEGAS, NV - MARCH 02: Johnny Walker of Brazil celebrates his victory over Misha Cirkunov of ... [+] Latvia in their light heavyweight bout during the UFC 235 event at T-Mobile Arena on March 2, 2019 in Las Vegas, Nevada. (Photo by Jeff Bottari/Zuffa LLC/Zuffa LLC)Zuffa LLCSince beating Cirkunov and injuring his shoulder, Walker is 3-6-1. He was promptly stopped by Corey Anderson in his next fight and then lost a unanimous decision to Nikita Krylov.Walker got back on the winning track by defeating Ryan Spann in September 2020, but he went on another two-fight losing streak when he was defeated by Thiago Santos and Jamahal Hill in 2021 and early 2022.It seemed like Walker might be back on track as he reeled off wins over Ion Cutelaba, Paul Craig, and Anthony Smith, but he hit his ceiling in 2023 when he fought Magomed Ankalaev.In a fight Ankalaev looked set to win, Walker said he was unable to continue after being hit with an accidental illegal knee.In the rematch, Ankalaev made quick work of Walker with a second-round KO. Walker met the same fate against Volkan Oezdemir in June 2024.Gone are the thoughts that Walker can be a serious championship contender, and thats crazy considering hes only 32 years old. The recent injury only makes the fading shot at contention all the more unlikely.Is Walker a bust?CHARLOTTE, NORTH CAROLINA - MAY 13: Johnny Walker of Brazil has his hands wrapped backstage during ... [+] the UFC Fight Night event at Spectrum Center on May 13, 2023 in Charlotte, North Carolina. (Photo by Mike Roach/Zuffa LLC via Getty Images)Zuffa LLC via Getty ImagesIf that term can be applied in mixed martial arts, he probably fits the definition as much as anyone in recent memory.Hopefully, Walker can rebound and make a run in his mid-30s. Perhaps he can make some noise at heavyweight. At 66, its not out of the question.0 Комментарии 0 Поделились 38 Просмотры
-
WWW.BUSINESSINSIDER.COMTake it from me: never, ever get a new phone numberTwo years ago, I got a new phone number. In the eyes of my social media and ride-hailing apps, Amazon, my bank, and the state of Pennsylvania, that effectively meant I lost my identity. Only recently have I emerged from this technology-induced quagmire.Sitting at my desk with a new smartphone in hand, I slowly rotated my head up and down while staring into the front-facing camera. Then, without breaking eye contact with the lens, I carefully turned my head from one ear to the other. The short clip was supposed to prove to Instagram's security system what I had been insisting for weeks: that I was not an imposter that I was, in fact, me."Thank you for your selfie video," the automated email from Instagram said. "We received this information and it's pending review."I not only had forgotten my Instagram password but also no longer had access to my old phone number: Since I'd last logged in, I'd switched to a money-saving family plan with a new mobile provider. To get past Instagram's two-factor authentication security where the app verifies your identity by texting you a secret code and regain access to 12 years of cat photos and filtered city skylines, I had to upload a video of my face.As I awaited Instagram's response, I imagined somebody from the company's security team watching my selfie video, eyeballing the pictures I'd posted to my account over the years, and confirming my identity once and for all. A few minutes later far too quickly for a real person to be behind it an email arrived. "Your Information Couldn't Be Confirmed," the subject line said. My information? You mean, my face?"We weren't able to confirm your identity from the video you submitted," the message said. "You can submit a new video and we'll review it again."As fun as this game sounded, I had other things to take care of.I figured that suddenly switching phone numbers would result in some headaches, but I didn't foresee how complicated it would actually become. From Lyft and Cash App to Instagram and Amazon, I suddenly had to jump through logistical hoops that varied from one platform to the next to verify my flesh-and-blood identity and regain access to my digital life. Confirming my identity became a part-time job. And as I learned the hard way, fellow human beings who could help me sort things out were hard to come by.While the origin of text-message-based two-factor authentication goes back as far as the 1990s, it wasn't until the early 2010s that it really started to proliferate. As more people bought smartphones, it seemed convenient to use a person's phone number as a way to confirm their identity. At the same time, the growing frequency and sophistication of data breaches and cyberattacks rendered traditional passwords nearly useless, prompting then-President Barack Obama to write an op-ed in The Wall Street Journal in 2016 imploring citizens to "move beyond passwords" and embrace additional layers of security to protect their data. Even in 2024, hackable passwords like "1234" and "password" remained alarmingly common.By requiring people to take an extra step (or two) to verify themselves, multifactor authentication offers a massive security improvement over the traditional password. Thanks to remote work, MFA adoption is on the rise: 64% of people using Okta use some form of multifactor authentication, a 2023 report by the company found. Before the pandemic, it was 35%.Despite its benefits, the system developed a serious flaw somewhere along the way: SMS-based two-factor authentication, which relies on calling or texting someone's phone to verify their identity. Unlike MFA methods that rely on an authenticator app, text-based authentication is arguably the least secure way to verify someone's identity. Unfortunately, it's also one of the most common."We often see that less mature organizations have standardized on using that SMS-based code," said Cristian Rodriguez, the field chief technical officer for the Americas at the cybersecurity firm CrowdStrike. Apple, Google, Zoom, Slack, Dropbox, PayPal, and most major US banks and universities are on the long list of sites that still use it.Unlike our fingerprints or faces, our phone number is not a permanent feature of our identity."It's also easy to intercept," Rodriguez said of the method. "SIM swapping is a really easy way to circumvent that as an attacker."In a SIM-swapping attack, a hacker can gain control of someone's phone number and wreak havoc on their lives. From their bank and social media accounts to credit cards stored in digital wallets like Apple Pay, the amount of access a cybercriminal can gain is staggering. It shows just how thoroughly our lives are tied to our phone numbers.Recently, hackers aligned with the Chinese government managed to gain access to US phones via their telecommunication networks in a massive hack dubbed Salt Typhoon, which the federal government says is among the worst in the nation's history. While the exact origins and overall impact of Salt Typhoon are still being investigated, experts say that the two-year infiltration could have affected millions of Americans. In the wake of the attack, which was first reported in October, the feds are advising people to stop using SMS-based authentication.Unlike our fingerprints or faces, our phone number is not a permanent feature of our identity. It's just a sequence of digits randomly assigned to us by a cell provider when we sign up. If we stop paying, switch mobile providers, or move to a new country, the number is no longer ours. Even an email address in my case, a 20-year-old Gmail account that I'm certain will continue receiving marketing promotions long after I'm dead would make a more reliable long-term indicator of who I am than my phone number. After all, my email address will never be reassigned. It's mine. My phone number along with the roughly 35 million numbers that get reassigned each year, according to the Federal Communications Commission is another story.Few companies seem to recognize the problem: In early 2023, X decided to end support for SMS-based two-factor authentication for nonverified users, citing its weakness. Following major breaches, tech giants like Google and Microsoft have also begun to make moves away from SMS authentication. Still, X stands alone among major social media platforms in abandoning it altogether a fact that I had to learn the hard way.In most cases, regaining access to my accounts was simple. My bank, for instance, just required a quick phone call to a customer service agent to confirm my identity, bypass MFA, update my phone number, and reset my password.Instagram, an operation notably larger and more resourced than the small credit union I bank with, did not offer a customer service hotline. Instead, after about half a dozen clicks from Instagram's login screen, I found my way into the depths of a customer service FAQ page that suggested I send a video selfie. I had to send several videos into the automated void before the app caved and let me back into my account.My Amazon account, which includes services like Audible, Alexa, and Whole Foods shopping, proved a surprisingly impenetrable fortress. After clicking my way through a labyrinth of links, I eventually reached a prompt that asked me to upload a photo of my passport to verify my identity. After not hearing anything for a week, I tried again. A few months later, Amazon let me back in. (Instagram and Amazon did not respond to multiple requests for comment.)Thanks to the ongoing AI-ification of customer service and the growing use of chatbots, the privilege of speaking with a real person is increasingly rare. To this day, I'm unable to verify my LinkedIn profile. Even after asking for my current phone number, the identity-verification platform used by LinkedIn, Clear, continues to text a six-digit code to my old phone number, which it somehow summons from the cloud. Of course, there's no one to speak with to resolve the issue. Oh well.If our tech is this advanced, why is it still so hard to convince the machines it's actually us?Getting locked out of social networks and online shops is extremely annoying. But it's nothing compared to the nightmare I suffered through when I tried to sign up for unemployment benefits after getting laid off from my journalism job.The state government of Pennsylvania uses the aptly named ID.me service to handle its website login and identity verification for services like unemployment. On its website, ID.me boasts integrations with 19 federal agencies, 35 healthcare-related organizations, and more than 600 online stores in its mission to empower consumers with "a single log-in that lets you easily prove you're you." There's just one problem: ID.me ties your digital identity to your phone number.When I tried logging in to the Pennsylvania unemployment site to claim my benefits, I discovered I already had an ID.me account presumably from some other government site I had previously accessed. That account, of course, was linked to my old phone number.Without access to that number and having no clue what my password might have been my only option was to submit a request to bypass MFA and regain access to my ID.me account through the company's customer service help desk.After I got an automated confirmation email from Roy, the self-described "virtual agent" at ID.me, my request went ignored for 48 hours. After multiple follow-ups and a great deal of patience, I was finally able to set up a phone screening with a real human. Ten days after my initial request, I was on the phone with a customer service agent who emailed me some instructions: Fill out a few forms and send them back along with digital scans of my passport and Social Security card. Normally, sending such sensitive information over email would give me pause, but in this case, the ID.me customer service agent was holding my identity and my financial security hostage, so I was inclined to do whatever he asked. I could only hope that ID.me's cybersecurity practices were more robust than its customer service operation.After 30 days of submitting and resubmitting various identifying documents, I was finally able to log in to my account. By then, I had taken care of my unemployment needs the old-fashioned way: filing my application manually over the phone a process that took nearly three hours over the course of two excruciatingly tedious phone calls. (ID.me did not respond to a request for comment.)Technology that used to promise to simplify our lives now seems to make everything more complicated. Before automated self-checkouts entered the grocery store, the checkout process was never interrupted by a confused machine thinking you forgot to scan an item, forcing you to wait for a human to help. For all the innovative "smart" technology that has wormed its way into modern cars, it often feels like we're one software glitch away from getting locked out of them, too.It's 2025 we have artificial intelligence that's capable of forming romantic relationships. I should be able to unlock my laptop with my thumbprint or scan my face to quickly access my online shopping accounts. If our tech is this advanced, why is it still so hard to convince the machines it's actually us?You don't have to take my word for it. You can ask Keith, the person who had my new phone number before me. I have no idea who Keith is, but I know he, too, is having trouble getting back into his websites and apps because I keep getting texts containing six-digit verification codes that I never asked for. While I eventually got back into most of my accounts, it seems that Keith is still struggling.Keith, if you're out there: Your prescription is ready to pick up at Rite Aid.John Paul Titlow is a freelance journalist who writes about technology, digital culture, travel, and mental health.0 Комментарии 0 Поделились 10 Просмотры
-
WWW.BUSINESSINSIDER.COMNATO allies worry the US can't defend Europe and counter China, but there's a wayNATO allies worry that the growing threat China poses may distract the US from Europe.A seapower expert argues the forces needed in Europe are different than in the Asia-Pacific.A confrontation over Taiwan would be primarily a naval fight; Europe would be a land battle.China's threat to Taiwan also poses a profound dilemma for NATO does it tie up its most powerful ally from European defense at a critical moment?A new study suggests that while splitting US military resources and focus is a problem, it's a manageable one. That's because the American forces needed to stop a Chinese fleet in the Strait of Taiwan are not the same as those suitable for destroying Russian tanks on the European steppe."For example, it is unclear whether armor and multiple launch rocket systems (MLRS) have as much utility in a Sino-American conflict a primarily maritime theatre as they do in Europe (although both capabilities have a role in each theatre)," wrote analyst Sidharth Kaushal in a report for the Royal United Services Institute.America has had to cope with the dichotomy between the Atlantic and the Pacific since World War II. In that war, the European theater was a ground conflict fought between huge mechanized armies and hordes of land-based aircraft, albeit with a smaller naval component in the sea battle to resupply Britain. The Pacific theater was a naval and air conflict fought among scattered islands, which put a premium on aircraft carriers, submarines and mobile amphibious units such as the US Marine Corps.Compounding the problem is that modern armies and weapons are expensive. The US could afford to fight a two-front war in 1941. Building a military sufficient to simultaneously defend Taiwan and Europe today would be ruinous, one of the many reasons the US maintains strong alliances in both regions. To be sure, the US backs Taiwan's independent government, but it's unclear whether it would commit forces to Taiwan's defense.However, Kaushal believes that the problem may be manageable by focusing on a couple of key variables. In particular, the success of an invasion of Taiwan depends upon China's ability to achieve sufficient air and naval superiority to protect the amphibious fleet ferrying assault troops and the logistics they depend upon."The crux of any defense of Taiwan will be denying it this superiority," Kaushal argued. "If this is achieved, it is likely that Taiwan's forces can mount a successful forward defense of likely landing sites on the island, making a protracted defense and the subsequent flow of US forces superfluous. If not, the battle will likely end before either of these things can be considered."In turn, this means that only some American military capabilities would be relevant, especially anti-ship missiles, submarines and mines. Naval drones, like those wielded by Ukraine, may also prove powerful weapons to attack a Chinese armada. Conversely, heavy armor and the capacity to transport it would be paramount in supporting NATO against a Russian attack.But sinking a Chinese fleet will require SEAD (suppression of enemy air defenses) missions against defensive systems protecting the invasion convoys. And it's there that the difference between the Atlantic and Pacific becomes manifest. US attack submarines are more needed in the Pacific than to defeat enemy armies in Europe, a seapower expert argues. MC1 Keenan Daniels/US Navy In Europe, Russian ground forces would be protected by land-based surface-to-air missile (SAM) batteries and radars, which are mounted or transported by truck. NATO would first have to locate them and then strike them with air-launched anti-radar missiles such as the US AGM-88 HARM, or ground fire from artillery, tactical missiles, and drones.A Chinese invasion fleet in the narrow 110-mile-wide Taiwan Strait, by contrast, would be an easily detected target and would be out of range of land-based SAMs on the Chinese mainland. Air defense would have to come from weapons on the Chinese warships, which can put out an impressive amount of firepower against hostile aircraft and missiles. China's Type 055 Renhai-class cruisers, for example, are equipped with 112 vertical launch tubes that can fire anti-aircraft or anti-ship missiles. The ships are also likely to be defended by fighter jets, many launched from airbases in China."SEAD in the European context is primarily a function of the ability to suppress or destroy a layered network of elusive and mobile ground-based SAM systems," Kaushal wrote. In the Taiwan Strait, "the challenge is not that targets are elusive, but rather that they are exceedingly well defended."SEAD weapons, such as the HARM missile, aren't really designed to hit ships. So rather than targeting Chinese air defenses specifically, the US and its allies should simply concentrate on sinking warships. Every Chinese warship destroyed is one less escort for the troop ships.In a Taiwan war, "SEAD is largely synonymous with anti-surface warfare and OCA [offensive counter-air]," Kaushal wrote. "If the picket of destroyers and cruisers protecting an invasion force suffers substantial losses and if [People's Liberation Army] aircraft, including AWACS, cannot freely operate over the Strait, the amphibious vessels on which an invasion defends are much less defensible." Advanced warning and control aircraft are flying radars that detect hostile threats for a wider force.A similar dichotomy between Europe and the Pacific applies to weapons needed for missile defense. "While all US IAMD [integrated air and missile defense] will be missed, some capabilities will leave more of a gap than others," Kaushal told Business Insider.In Europe, the threat is largely from Russian cruise missiles and short-range ballistic missiles. Against these weapons, the best defense is blast-fragmentation interceptors which detonate an explosive charge near the target or shorter-range hit-to-kill rockets (which kinetically slam into a missile) such as the US PAC-3 launched from the Patriot air defense system. In the Pacific, the threat is from Chinese intermediate- and medium-range ballistic missiles, such as the DF-21 "carrier killer" missile. Defense against them favors longer-range, high-altitude hit-to-kill interceptors such as the American SM-3 and THAAD.Weapons won't be the only precious commodity split between East and West. Running two regional wars comes with a problem beyond firepower: brainpower. It demands the US has enough decision-makers and staff officers to focus on their own theater, but distractions are common and even likely similar to the US loss of focus on Afghanistan after the 2003 invasion of Iraq. In World War II, the European theater had priority. Today, it's more likely to be the Pacific.Either way, Europe needs to build up its capabilities in case US resources are diverted to the Pacific. This includes air and missile defenses, hardened airbases, and improved anti-submarine warfare systems, Kaushal said.Europe accepts that America's attention will inevitably switch to the Pacific. "The prospect of the US needing to reallocate resources is increasingly viewed as a structural reality rather than a question of any given administration's policy," Kaushal said. But public discussion "tends to stop at the point where it is assumed that US resources will be stretched and that Europe must fill the gaps, with little granularity as to which resources and what gaps are of greatest concern."Michael Peck is a defense writer whose work has appeared in Forbes, Defense News, Foreign Policy magazine, and other publications. He holds an MA in political science from Rutgers Univ. Follow him on Twitter and LinkedIn.0 Комментарии 0 Поделились 10 Просмотры
-
METRO.CO.UKI have to admit: I already feel the Nintendo Switch 2 is a let-down Readers FeatureI have to admit: I already feel the Nintendo Switch 2 is a let-down Readers FeatureGameCentralPublished January 12, 2025 9:00am Have the Switch 2 links been a disappointment? (Amazon)A reader is concerned at the Nintendo Switch 2 leaks so far and worries that Nintendo will be forced to play things safe in the new generation.There have been so many Switch 2 leaks this week that I dont think anyone can be in any doubt that we already know what the console looks like. Its got so bad that even Nintendo has talked about it, although without saying whether the leaks are real or not. I think its pretty clear that, even if there are a few inaccuracies, due to them not being the final models, the Switch 2 looks like the leaks show. That is, it looks almost exactly the same as the original Switch.I can absolutely see the logic in this. The Switch has been a massive hit and the games industry is a lot more volatile than it was eight years ago, so from a business perspective it makes no sense to start getting wacky. But I wish they would.I would hate to think that the days of Nintendo going out on a limb and making something crazy like the DS or Wii are over. Sure, that means that sometimes you get a Wii U but for me, as a fan, thats well worth the risk. Even if I have to accept that bean counters arent going to see it that way.I remember only a few years ago, when Shigeru Miyamoto was hinting that the next console would be very different to the Switch, but unless there is a secret feature of the Switch 2, that is very well hidden, I think its clear thats not going to be case.Im sure Nintendo will do some clever things with a mouse and an in-built camera, if thats what the mystery button is for, but there seems little chance that they can be as game-changing as the Wii or even the Wii U.We all know the problems with games becoming more expensive to make, and taking longer to develop, and the fear is that all games will become more conservative and predictable, which is worrying given how bad things already are. But I fear that this is going to happen to Nintendo too.They may not be as cutthroat as other publishers but theyre still in the business to make money and if the Switch 2 is as powerful as a PlayStation 4 then that means its games are going to be as expensive to make as PlayStation 4 titles, which is when the current problems started to become unavoidable.I wait with bated breath to see what the launch games will be, not just out of excitement but worry. Theres been a lot of predictions of Mario Kart 9 being the main launch title, which is fine, but its also very safe. If everything else turns out to be just Splatoon 3, a Smash Bros. refresh, and a new Animal Crossing Im going to worry even more.These are the sensible business decisions but its hard for me to imagine that any of them will be amongst Nintendos most ambitious games. Itll be at least five years before we get another major Zelda, so my main hope is that the next 3D Mario manages to push the envelope; that and hopefully some kind of new IP.More TrendingIm not saying that wont happen, or that the Switch 2 hardware wont have some neat tricks up its sleeve, but Im saying that the leaks so far have done nothing to calm my worries. Knowing that, so far, everything looks a little too familiar cant help but be disappointing and I just hope that isnt true of the games as well.By reader Onibee Will we ever see something as weird as the Nintendo DS again? (Nintendo)The readers features do not necessarily represent the views of GameCentral or Metro.You can submit your own 500 to 600-word reader feature at any time, which if used will be published in the next appropriate weekend slot. Just contact us at gamecentral@metro.co.uk or use our Submit Stuff page and you wont need to send an email.GameCentralExclusive analysis, latest releases, and bonus community content.This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy0 Комментарии 0 Поделились 10 Просмотры