• How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?
    thehackernews.com
    Jan 17, 2025The Hacker NewsThreat Detection / Zero TrustRecent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access, protecting data, maintaining compliance across all geographies, and ensuring business continuity.Evolved security solutions now combine zero-trust architecture with cloud-based captive portals to enhance network protection. These systems enable organizations to implement strict access controls, verify every device's security status, and maintain network separation. Through advanced features like conditional access and device registration, businesses can now offer secure guest Wi-Fi access while maintaining complete visibility and control over their network resources.Challenges in Wi-Fi Security TodayDistributed organizations implementing guest Wi-Fi networks face increasingly sophisticated security challenges. The complexity of implementing and managing secure guest Wi-Fi access while maintaining network integrity has become a critical concern for both IT administrators and Security practitioners.Common security vulnerabilitiesModern guest Wi-Fi networks face several significant security threats:Lack of Network Micro-Segmentation: Networks for unmanaged/unsecured devices often share the same infrastructure as networks for managed/corporate devices without proper isolation. This increases the risk of unauthorized access to sensitive systems or data.Weak Encryption: Most of Guest Wi-Fi Networks use "Open" authentication which may introduce a source of attack during spoofing. It's recommended to use WPA3 and OWE encryption to enforce the security for clients during association.Man-in-the-Middle (MITM) Attacks: Attackers can exploit unsecured Guest Wi-Fi to intercept communications, steal credentials, or inject malicious data.Inadequate Authentication: Some networks use too simple shared passwords or no authentication at all, making it extremely easy for attackers to connect and launch attacks.Rogue Access Points (APs): Attackers can set up rogue APs mimicking legitimate Guest Wi-Fi to lure users and steal sensitive information.If not properly secured, the Wi-Fi guest networks pose significant security risks. Weak access controls allow unauthorized users to exploit the network, leading to data interception and man-in-the-middle attacks. A critical issue is the lack of network segmentation; without proper isolation, attackers on the guest network may access internal systems, risking data breaches.Insufficient authentication and weak password practices further heighten vulnerabilities, enabling unauthorized access. To mitigate these risks, organizations should implement VLANs, strict authentication, and active monitoring. A well-segmented guest network helps maintain security while offering convenient access to visitors.Why is BYOD the most critical category to monitor?BYOD introduces a mix of unmanaged and potentially insecure devices into the network. These devices often lack corporate-level security controls and might already be compromised with malware, creating a direct entry point for attackers once connected to the network. If the attacker has access to the network through a BYOD, sensitive corporate data accessed via BYOD devices may increase the likelihood of unintentional or malicious data leakage.Here is a summary of the potential actions that can be implemented to mitigate such issues :Proper Network SegmentationAsset inventoryEncryptionAuthentication Mechanism (like Captive Portal)Profiled Security PoliciesMonitoring and Threat DetectionZero Trust ApproachPotential consequences for businessesSecurity breaches in guest Wi-Fi networks can have devastating impacts on organizations. Recent studies indicate that 40% of businesses have experienced information compromise through public Wi-Fi networks. The financial implications are significant, with some companies reporting ransomware payments exceeding $1 million to recover their data.Beyond immediate financial losses, businesses face:Damage to brand reputation and customer trustDisruption of normal business operationsPotential loss of intellectual propertyCompromise of internal network resourcesLegal and compliance considerationsOrganizations must navigate complex regulatory requirements when implementing guest Wi-Fi management systems. The legal framework includes multiple layers of compliance, they need to warrant the security level for their network while ensuring the confidentiality of the users' data, and they need to cooperate with the authorities when required while complying with limited data retention period obligation. It is even more difficult for international organizations because they need to monitor and stay updated on any regulations' changes in various countries and jurisdictions, operating at international levels creates diverse and even contradictory obligations, for example, the data retention policies are different among countries, in France, it is required to retain data logs for 1 year, but it is 6 years in Italy, while the General Data Protection Regulations (GDPR) requires users' data to be deleted after the purposes have been achieved. Some key regulations need to be taken into consideration: Therefore, businesses must implement proper documentation, monitoring systems, and security controls to maintain compliance with these regulations. Regular security audits and network infrastructure updates are essential to maintaining legal compliance while providing secure guest access.Leveraging Cloud Captive Portals for Enhanced SecurityCloud-based captive portal solutions have emerged as a cornerstone of modern network security infrastructure. These sophisticated systems provide organizations with centralized control over guest access while maintaining robust security protocols.How Cloud Captive Portals WorkCloud-captive portals function as gateway systems that authenticate users before granting network access. The system intercepts initial connection attempts and redirects users to a secure login page. Organizations can implement various authentication methods, including:Social login integrationSponsorDeclarative EmailSMS AuthenticationThese solutions operate without additional hardware requirements, making them infrastructure-agnostic and instantly deployable across global locations.Integration with Zero Trust frameworksModern Cloud Captive Portals should align seamlessly with Zero Trust security principles by implementing continuous verification and limited access protocols. The integration enables:Device Profiling & AuthenticationIntegrity Access Control Policy EnforcementAutomationTraffic Monitoring & ComplianceRequired security features to deploy a cloud captive portals solutionModern captive portal solutions shall incorporate multiple layers of security protection. Innovative solutions now integrate with leading security solutions, enabling administrators to implement granular access controls and URL filtering.Cloudi-Fi platform supports comprehensive compliance requirements through regional data center deployment, ensuring adherence to local privacy regulations. Automated encryption of personal data and transparent collection processes provide users and administrators complete control over information handling.Advanced features include integration with cloud-based security platforms, enabling:Cloud firewall implementationContent filtering capabilitiesBandwidth ControlAutomated device onboardingThese capabilities offer a robust security framework that protects both the organization's network and user data while maintaining seamless access for authorized users.Benefits of a Zero Trust Captive Portal SolutionThe implementation of Zero Trust Architecture represents a paradigm shift in securing guest Wi-Fi networks, moving away from traditional perimeter-based security to a more comprehensive verification model. This approach fundamentally changes how organizations manage and secure guest network access.Zero Trust Cloud Captive Portal solutions provide a scalable, centralized access control layer across multiple sites or large office campuses. By leveraging cloud-based infrastructure, they allow seamless deployment without needing extensive on-prem hardware, ensuring consistent policy enforcement and secure, device-specific access. The cloud-based platform dynamically scales to handle high volumes of traffic and multiple entry points, while continuously monitoring user behaviors. This architecture not only simplifies management but also enhances security, as threats are isolated, and access is tightly controlled based on identity, device, and risk assessment, all through a unified, cloud-driven approach.Adapting Zero Trust principles for guest accessOrganizations must carefully adapt Zero Trust principles to maintain security while ensuring a seamless guest experience. The implementation requires a balanced approach that considers security requirements and user convenience. Key adaptation strategies include:Role-based permissions for the access controlSponsoring, social login with MFA, mail address, for user authenticationSegmentation for network isolationTime-limited access tokens for session managementBenefits of traditional security modelsZero Trust Architecture offers significant advantages compared to conventional security approaches. The model eliminates the inherent vulnerabilities of traditional perimeter-based security by implementing continuous verification and granular access controls.The transformation from traditional to zero-trust security brings multiple operational improvements:Enhanced Security PostureElimination of lateral movement threatsReal-time threat detection and responseComprehensive audit trailsOperational EfficiencyAutomated device onboardingCentralized policy managementSimplified compliance reportingThe architecture's ability to maintain strict security controls while supporting dynamic access requirements makes it particularly effective for guest Wi-Fi environments. By implementing least-privilege access principles, organizations can ensure that guests receive only the necessary network resources while maintaining complete visibility and control over all network activities.Integrating Zero Trust principles with cloud-based management platforms enables distributed organizations to effortlessly scale their guest Wi-Fi security efficiently. This combination offers network and security administrators powerful tools for monitoring network usage, enforcing security policies, and responding to potential threats in real time.ConclusionThe transformation of guest Wi-Fi security through cloud-captive portals and Zero Trust Architecture marks a significant advancement in corporate network protection. Modern organizations require robust security solutions that extend beyond traditional perimeter defenses. The combination of continuous verification, granular access controls, and advanced monitoring capabilities creates a comprehensive security framework that addresses current and emerging threats while maintaining operational efficiency.Business leaders must recognize the critical role of secure guest Wi-Fi in maintaining regulatory compliance and protecting sensitive data. Organizations ready to strengthen their network security should consider implementing a Zero Trust Captive Portal solution - Cloudi-Fi offers extensive resources and guidance for this essential security upgrade. This strategic approach positions businesses to meet future security challenges while providing secure, seamless guest access that supports operational goals and protects valuable digital assets.Note: This article is expertly written and contributed by RJ Singh, Chief Revenue Officer at Cloudi-Fi, with extensive experience in sales leadership and business development, and Simon Mesnage, Senior Network Engineer with 8 years of expertise in Wi-Fi infrastructure design and troubleshooting.Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Commenti ·0 condivisioni ·14 Views
  • Why Liberal Arts Grads Could Be the Best Programmers of the AI Era
    www.informationweek.com
    In the world of programming, technical chops have always been the golden ticket. But over the years, some of the best programmers Ive hired and worked with didnt come from computer science backgrounds. They came from the humanities -- music, philosophy, literature. These liberal arts grads brought a fresh perspective to programming, one thats not always easy to find.And as generative AI changes the game, this edge will only become more valuable. With AI handling the ABCs of programming -- the line-by-line code writing -- whats left is the harder stuff: understanding problems deeply, communicating with stakeholders, and designing solutions that make sense in the real world.Programming Isnt Just About CodeProgramming has never been purely about logic. Sure, you need what used to be called left-brain skill -- the ability to translate technical specs into precise code. But a programmers real value comes when they push beyond that: recognizing patterns, solving complex problems, and seeing connections that others miss.I first noticed this long ago. A talented colleague used to entertain a roomful of fellow IT workers by playing and singing Eric Clapton tunes. He was also a gifted coder, capable of recognizing patterns, and solving problems in a different way.Related:Programming is a creative process, not unlike music. The notes matter, but so does knowing when to riff, how to structure, and how to build something thats more than the sum of its parts. Its no coincidence that the best developer I ever worked with, period, was a music major.Liberal arts majors dont come to work burdened with technical rigidity. Theyve spent their time dissecting ideas, making connections between concepts, and thinking critically. Theyve honed their writing and storytelling. Those skills are incredibly valuable, especially now.GenAI Is Changing the JobGenAI is fundamentally changing what it means to be a programmer. Tools like GitHub Copilot and Googles Gemini can write code, debug simple issues, and automate many of the tasks that used to take up time. But AI doesnt know how to ask the right questions, interpret user needs, or mold its output into something that makes sense in a broader context. Thats still a human job.The role of the programmer is evolving, possibly splitting into two paths. There will always be a place for the hardcore programmer with a computer science background, someone to make systems talk to one another. For others, call them citizen programmers, the work is no longer just about writing code line by line; its about knowing how to work with AI, guiding it, and knowing when and where human input is most needed.Related:This is where that liberal arts mindset comes in -- being able to understand the nuances, think critically about user experience, explain things simplistically, and piece together ideas in new ways.Preparing for the AI FutureSo, what should businesses do with this insight? First, its time to rethink talent and look for people who can adapt, think on their feet, and see the big picture. This outreach could start at the university level where IT recruiters begin visiting leading liberal arts and music colleges in addition to the traditional technical schools on their lists.We also need to recognize that the most valuable skills dont always show up on a resume. How do you measure the ability to see a new solution that nobody else considered? Or the capacity to understand what a user is really asking for, even if they cant quite articulate it? These are the skills that will matter most, even if they dont fit neatly into a job description.And once these new minds are hired, theres a need to change how we approach development within our teams. AI isnt going to stop evolving, and neither can we. For the next few years, people will focus on learning how to use these new tools. But beyond that, itll be about figuring out how to create with them. And thats going to require people who arent afraid to question how things have always been done.Related:All this change isnt mere theory; its happening right now. Instead of looking for people who tick all the technical boxes, Im looking for those who bring a creative mindset to the table. Hiring cannot be merely about pulling in more STEM graduates. It must be about building an environment where people with different backgrounds can work together to solve problems.The future of tech work will be shaped by those who can use AI to amplify their creativity, their empathy, and their ability to solve tough problems. In my experience, thats often the person with a background in the humanities.
    0 Commenti ·0 condivisioni ·15 Views
  • We need to protect the protocol that runs Bluesky
    www.technologyreview.com
    Last week, when Mark Zuckerberg announced Meta would be ending third-party fact-checking, it was a shocking pivot, but not exactly surprising. Its just the latest example of a billionaire flip-flop affecting our social lives on the internet. After January 6th, Zuckerberg bragged to Congress about Facebooks industry-leading fact-checking program and banned President Trump from the platform. But just two years later, he welcomed Trump back. And last year Zuckerberg was privately reassuring conservative rep Jim Jordan that Meta will no longer demote questionable content while its being fact-checked. Now, not only is Meta ending fact-checking completely, it is loosening rules around hate speech, allowing horrendous personal attacks on migrants or trans people, for example, on its platforms. And Zuckerberg isnt the only social media CEO careening all over the road: Elon Musk, since buying Twitter in 2022 and touting free speech as the bedrock of a functioning democracy, has suspended journalists, restored tens of thousands of banned users (including White Nationalists), brought back political advertising, and weakened verification and harassment policies. Unfortunately, these capricious billionaires can do whatever they want because of an ownership model that privileges singular, centralized control in exchange for shareholder returns. And this has led to a constantly shifting, opaque digital environment in which people can lose their communication pathways and livelihoods in a second, with no recourse as the rules shift. The internet doesnt need to be like this. But as luck would have it, a new way is emerging just in time. If youve heard of Bluesky, youve probably heard of it as a clone of Twitter where liberals can take refuge. But under the hood its structured fundamentally differently in a way that could point us to a healthier internet for everyone, regardless of politics or identity. Just like email, Bluesky sits on top of an open protocol. In practice, that means that anyone can build on it. Just like you wouldnt need anyones permission to start a newsletter company built on email, people are starting to share remixed versions of their social media feed, built on Bluesky. This sounds like a small thing, but think about all the harms done by social media companies through their algorithms in the last decade: insurrection, radicalization, self-harm, bullying. Similarly, Bluesky enables users to share blocklists and labels, to collaborate on verification and moderation. Letting people shape their own experience of social media is nothing short of revolutionary. And importantly, if you decide that you dont agree with Blueskys design and moderation decisions, you can build something else on the same infrastructure and use that instead. This is fundamentally different from the dominant, centralized social media that has come before. At the core of Blueskys philosophy is the idea that instead of being centralized in the hands of one person or institution, social media governance should obey the principle of subsidiarity. Nobel Prize-winning economist Elinor Ostrom found, through studying grassroots solutions to local environmental problems around the world, that some problems are best solved locally, while others are best solved at a higher level. In terms of content moderation, posts related to CSAM or terrorism are best handled by professionals keeping millions or billions safe. But a lot of decisions about speech can be solved in each community, or even user by user by assembling a Bluesky blocklist. So all the right elements are currently in place at Bluesky to usher in this new architecture for social media: independent ownership, newfound popularity, a stark contrast with other dominant platforms, and right-minded leadership. But challenges remain, and we cant count on Bluesky doing this right without support. Critics have pointed out that Bluesky has yet to turn a profit and is currently running on venture capital, the same corporate structure that brought us Facebook, Twitter, and other social media companies. As of now, theres no option to exit Bluesky and take your data and network with you, because there are no other servers that run the AT Protocol. Bluesky CEO Jay Graber deserves credit for her stewardship so far, and for attempting to avoid the dangers of advertising incentives. But the process of capitalism degrading tech products is so predictable that Cory Doctorow coined a now-popular term for it: enshittification. Thats why we need to act now to secure the foundation of this digital future and make it enshittification-proof.Free Our Feeds. There are three parts: First, Free Our Feeds wants to create a nonprofit foundation to govern and protect the AT Protocol, outside of Bluesky the company. We also need to build redundant servers so anyone can leave with their data or build anything they wantregardless of policies set by Bluesky. Finally, we need to spur the development of a whole ecosystem built on this tech with seed money and expertise. Its worth noting that this is not a hostile takeover: Bluesky and Graber recognize the importance of this effort and have signaled their approval. But the point is, this effort cant rely on them. To free us from fickle billionaires, some of the power has to reside outside Bluesky Inc. If we get this right, so much is possible. Not too long ago, the internet was full of builders and people working together: the open web. Email. Podcasts. Wikipedia is one of the best examples a collaborative project to create one of the webs best free, public resources. And the reason we still have it today is the infrastructure built up around it: the nonprofit Wikimedia Foundation protects the project and insulates it from the pressures of capitalism. Whens the last time we collectively built anything as good? We can shift the balance of power and reclaim our social lives from these companies and their billionaires. This an opportunity to bring much more independence, innovation, and local control to our online conversations. We can finally build the Wikipedia of social media, or whatever we want. But we need to act, because the future of the internet cant depend on whether one of the richest men on earth wakes up on the wrong side of the bed. Eli Pariser is author of The Filter Bubble and co-director of New_ Public, a nonprofit R&D lab thats working to reimagine social media. Deepti Doshi is a co-director of New_ Public and was a director at Meta.
    0 Commenti ·0 condivisioni ·15 Views
  • William Sutton Prize 2025
    www.architectsjournal.co.uk
    The competition, now in its sixth edition, features two prizes. The William Sutton Prize for Sustainability focuses on promoting the restoration and preservation of our natural world while the William Sutton Prize for Connected Communities aims to enhance community ties, promote inclusion, and strengthen the social fabric of Clarion neighbourhoods.The 125,000 overall prize pot will be split across the winners of each category. In addition to funding, the winners will also receive a tailored package of business support and the chance to collaborate with Clarion and their partners and sector-leading experts to turn their boldest and brightest ideas into reality.The initiative is open to English organisations and all UK individuals aged over 18. It is named after Clarion Housing Groups founder, a Victorian entrepreneur who bequeathed his fortune to providing public housing.AdvertisementClarions chief executive Clare Miller said: Through The William Sutton Prizewe are proud to collaborate with those who are pioneering new innovations and cutting-edge thinking. Kickstarting our 125th year anniversary celebrations, this years prize is our most ambitious to date and we are delighted to be able to increase the value of the funding thanks to the support of our partners.Were focusing our efforts on tackling two major societal issues preserving and restoring nature, and the need for truly connected communities and I cant wait to see what innovative ideas are put forward.Bell Phillips Architects won the 2023 prize alongside Building with Nature, an organisation that provides planners and developers with guidance on delivering high-quality green infrastructure. Bell Phillips Architects winning concept (pictured) imagined a pathway to net zero through the development of a new vernacular architecture for all buildings below 11m, using natural building materials.Tim Bell, director of Bell Phillips Architects, said:Winning The William Sutton Prize has enabled Bell Phillips to expand our focus on reducing embodied carbon in all the buildings we design.The Prize has provided us with dedicated research and development time for our in-house carbon calculation tool and to implement the findings of that into live projects across a range of building types it truly has been invaluable.AdvertisementMole Architects the 2022 prize with a zero-carbon community homebuilding system. Previous winners included AJ 40 under 40 star and emerging practice Surman Weston whose Hackney School of Food created a seed-to-spoon food education hub for primary school children within an old building and area of disused land.Clarion Housing Group formed nine years ago following a merger of Circle Housing Group and Affinity Sutton, which was founded after Suttons death in 1900. The housing association is today the largest in the UK, managing 125,000 homes across 170 local authorities.Sutton was born in the City of London in 1833 and created Sutton Carriers, the countrys first door-to-door parcel service. He bequeathed his entire fortune to a range of charitable projects including providing much-needed public housing across the capital.Judges for the latest edition of the prize will include Peter Murray OBE, co-founder of New London Architecture, Tara Gbolade, co-founding director of Gbolade Design Studio, Matt Harvey-Agyemang, co-founder of The POoR Collective, and Greg Fitzgerald, chief executive of Vistry Group.Murray said: It is an honour and privilege to be asked to judge The William Sutton Prize in Clarions 125th anniversary year. We need the best brains with the most ambition to match the transformative impact of Clarions founder, and Im really looking forward to receiving the submissions and meeting the people behind them.Competition detailsProject title William Sutton Prize 2025Client Clarion Housing GroupContract value125,000First round deadline Midday, 8 April 2025Restrictions Applications can be accepted from both not-for-profit and commercial organisations.These may be registered charities, community interest companies, social enterprises, community groups or registered companies, amongst others. Organisations must be registered to work in England and must be able to specify how their idea will make a positive contribution to helping the affordable housing sector and its communities achieve net zero by 2050. Successful projects should take place in EnglandMore information www.clarionhg.com/william-sutton-prize
    0 Commenti ·0 condivisioni ·22 Views
  • This AI Feature on Duolingo Could Give Your Language Lessons a Boost
    www.cnet.com
    "Duolingo at this point is really all in on AI," Klinton Bicknell, Duolingo's head of AI, told me in an interview this month.The company said it's been invested in AI features since its launch in 2012, but advances in generative AI have propelled its latest efforts. Those advances helped create the features Explain My Answer and Roleplay, and the AI-powered feature Video Call, which launched on iOS in September.Video Call is a GPT-4 powered feature that lets you video call with one of Duolingo's characters named Lily. You and Lily then have a conversation in the language you're learning. Duolingo said Thursday the feature is now available on Android devices, and it can be used to converse in more languages, like German, Italian and Portuguese, on all devices and Japanese and Korean on iOS.The company also said that Lily is now more expressive in these calls, you can also access call transcripts to help you look back at your call and Lily will call you by surprise as opposed to you always calling her. But like Explain My Answer and Roleplay, Video Call is available only on Duolingo Max, which costs $30 a month or $168 a year. DuolingoArtificial intelligence has made a lot of news in the last few years as it has seeped into more products, to varying degrees of success. While many people aren't interested in AI features in products like smartphones, the AI in mobile apps global market is expected to be worth $250 billion by 2033, according to the market and research group Market. And similar to other companies likeAdobe, Duolingo is doubling down on the technology.Video Call is focused on conversing in whatever language you're learning while other lessons on Duolingo revolve around reading and comprehension in your desired language. While reading and listening comprehension are beneficial to learning a second language, a study published in Psychological Science suggests that producing a language (writing or speaking it) may be a more effective way to learn than just practicing comprehension."Producing language is an incredibly strong learning experience (when the production involves generating the language yourself and you are provided with feedback)," the study's authors wrote.Bicknell said Duolingo experimented with a feature where you would converse with another person in the language you were learning, but the company didn't pursue that feature."When you're having a conversation [in another language] with humans, most adults feel kind of embarrassed," Bicknell said. "If you're talking to an AI, they're not judging you so you can be free to just try things." DuolingoI used the feature a few times and I still felt silly at first despite knowing I was talking with an AI. Lily has a robotic sounding voice similar to Siri or Alexa, so talking with her felt impersonal. We also talked about my language learning experience the first few calls, which felt awkward.After the first couple calls, Lily started asking me about books I'm reading and pets. I also asked Lily questions like you would in any conversation, like if she has any pets. Lily said she has an old dog named Harold who she said sleeps most of the day.Our conversations weren't too long -- about a minute in length -- and they weren't too complicated. It was a lot of Lily asking me questions about myself and me responding and asking her a few questions. Lily would then say something like, "I have to go," and we'd say goodbye and the calls ended.With each call, it felt easier to talk to Lily, and I felt more comfortable with the conversations. The calls also helped break out of the rote memorization of some lessons, and forced me to really think about what to say next and how to say it. This feature makes me wonder if Duolingo will ever revisit the idea of calls with another person for advanced learners in the future. For now, Video Calls with Lily feels like a helpful tool in learning a new language. DuolingoAnd some leaders at Duolingo said Video Call is the kind of teaching tool the company has dreamed of."It provides the kind of learning opportunity that was previously only available to those who can afford to travel or hire a tutor," Luis von Ahn, co-founder and CEO of Duolingo, said in a news release.While Video Call might help you in your language learning journey, some people might still be cautious about using the tool because of privacy concerns over AI. More than a third of people told CNET in a survey that privacy was a key concern for them when it comes to AI.Duolingo said it's not taking and using people's sensitive information and using it to train its AI model, but it is using people's data to tailor lessons and Video Calls to each person's needs."We're really just using people's data to figure out what works, what doesn't work," Bicknell said. "Trying to figure out when people might have a call that doesn't go as well as we would like it to, what led to that and then using that to try to fix it to make it even better for future versions."The company did say the app will ask a random set of people for permission to keep audio recordings of their Video Calls. Bicknell said there are additional restrictions on who can access these recordings.Duolingo also said there are protections in place to protect people from inappropriate content. DuolingoThe company said each Video Call has a goal, and each person can get to the goal any number of ways. However, if a person goes too far astray, Lily, the cartoon avatar, will try to steer the conversation back. If the person keeps trying to take the conversation to inappropriate places, Lily will end the call.Some AI can also hallucinate and give wrong information sometimes, but Duolingo said it isn't concerned with hallucinations in Video Call."This feature is not about giving you information," Bicknell said. "It's just Lily having a conversation with you."Unfortunately, if you do run into an issue with Video Call, Duolingo said, there isn't a way to report an issue within the feature. Other Duolingo AI features, like Explain My Answer, do have ways to report issues so this feels like an odd exclusion.Despite this, Duolingo said the overall reaction to Video Call has been positive, and the company hopes the feature will encourage people to continue learning. The goal is to "simulate natural dialogue and give people this personalized, interactive practice environment," Bicknell said. "People have said things like, 'This is what Duolingo was missing.'"For more on Duolingo, here's how well the free version of the app prepared me for a trip to Italy and our review of the language learning app. You can also check out our best language learning apps. Watch this: The Coolest Mobile Gadgets We Saw at CES 02:29
    0 Commenti ·0 condivisioni ·16 Views
  • These Prime Numbers Are So Memorable That People Hunt for Them
    www.scientificamerican.com
    January 17, 20255 min readThese Prime Numbers Are So Memorable That People Hunt for ThemMath enthusiasts challenge one another to find special prime numbers, including those that are palindromes and Smarandache numbersBy Manon Bischoff edited by Daisy Yuhas klee123/Getty ImagesOne of my favorite anecdotes about prime numbers concerns Alexander Grothendieck, who was among the most brilliant mathematicians of the 20th century. According to one account, he was once asked to name a prime number during a conversation. These numbers, which are only divisible by 1 and themselves, form the atoms of number theory, so to speak, and have fascinated humankind for thousands of years.Grothendieck is said to have replied: 57. Although it is hard to determine the truth of this story, 57 has since been known in nerd circles as the Grothendieck prime numbereven though it is divisible by 3 and therefore not a prime number.A similar conversation that mathematician Neil Sloane overheard during a meal between two of his colleagues, Armand Borel and the late Freeman Dyson, had a more exciting outcome. Borel asked Dyson to name a prime number and, unlike Grothendieck, Dyson provided a number that is only divisible by 1 and itself: 231 1. But that reply did not satisfy Borel. He wanted Dyson to recite all of the digits of a large prime number. Dyson fell silent, so after a moment, Sloane jumped in and said, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1.On supporting science journalismIf you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.The number 12,345,678,910,987,654,321 is indeed prime. It consists of 20 digits and is really easy to remember: count to 10 and then count backward again until you get to 1. But it has been unclear whether other primes take the palindromic form of starting at 1, ascending to the number n and then descending again. Sloane calls them memorable primesand they can be presented as 123 ... (n 1)n(n 1) ... 321. For n = 10, you get the number mentioned by Sloane. But are there other ns for which the result is a prime number? Dyson, Borel and Sloane must have had a lively conversation about all this.Sloane was particularly interested. He created a database of number sequences in 1964 that eventually formed the backbone of the Online Encyclopedia of Integer Sequences (OEIS), which was launched in 1996. On the OEIS website, experts compile all kinds of facts about number sequences and discuss them. Sloane himself was happy to take part in the discussions and repeatedly initiated research questions, and this online activity eventually led to the hunt for memorable and similar prime numbers.Is There an Infinite Number of Memorable Primes?In 2015 Indian engineer Shyam Sunder Gupta, who has been fascinated by prime numbers since childhood, discovered that the number 123 ... (n 1)n(n 1) ... 321 for n = 2,446 is a prime number. He did not publish this in a mathematical journal but announced the result through a mailing list used in number theory for discoveries of this kind. The resulting prime number has 17,350 digits.Since prime numbers are very useful in secure communication, such easy-to-remember large prime numbers can be of great advantage in cryptography, Gupta says. Thats why Im enthusiastic about this type of prime number.Whether there are other memorable primes is not yet known. Mathematicians have checked all cases up to n = 60,000; apart from 10 and 2,446, no others have been found. But experts suspect that more exist, even if they cannot prove it.Some argue that there should be an infinite number of primes of this type. Such heuristic arguments assume that prime numbers are randomly distributed across the number line and determine how likely it is that a certain type of number (in this case the palindrome 123 ... 321) is prime. Although these considerations are not incontrovertible proof, they at least provide an incentive for further research. Gupta, for one, is convinced that there should be an infinite number of such palindromes, even if they are rare.Other Types of Memorable PrimesOn September 29, 2015, about two months after Gupta shared his result, Sloane posted a call to the number theory mailing list to challenge others to find another variety of memorable prime in which numbers simply ascend until they hit a final digit n: 123 ... (n 2)(n 1)n. To be prime, such a number cannot end with an even digit or a 5, which excludes 60 percent of all n from the outset. Yet even in this case, heuristic arguments suggest an infinite number of such prime numbers exist.In response to Sloanes call, some prime number enthusiasts fired up their computers and began to systematically search for a Smarandache prime number, as these particular primes are called. After none appeared even for five-digit values of n, Sloane turned to the Great Internet Mersenne Prime Search team. This is a collaborative project in which volunteers make their computing power available to search for prime numbers. A group from the Mersenne prime search team liked Sloanes idea, and the search for Smarandache primes was launched under the name Great Smarandache PRPrime search. But after no prime number appeared through n = 106, the project was abandoned.At first glance, the lack of results seemed surprising. The number 1,234,567,891 is a prime numberbut 12,345,678,910, an even number, is not. If we take into account the restrictions that exista prime number cannot be divisible by 2, 3, 4, and so onwe can estimate that no prime number should appear among all numbers of the form 123 ... n from n = 1 to n = 106. At least, that is what a calculation by computer scientist Ernst Mayer suggests. According to this, the expected number of Smarandache primes up to n = 106 is around 0.6. So I would like to encourage the world to keep going and find this missing prime, Sloane said in a Numberphile YouTube video.Even though there has been little progress on this front, Sloane has encouraged people to stay curious. In 2015, for example, he urged one of his colleaguescomputational biologist Serge Batalovto seek a reverse Smarandache prime number. He noted that writing out numbers in descending order (for example 4321) had revealed two such primes to date: 82818079 ... 321 and 3776537764 ... 321.Can you get one more term? This might be childs play for you! he wrote.Batalovs response: Challenge accepted!These reverse Smarandache primes all inevitably end in 1, meaning far fewer candidates are eliminated from the outset. Yet to date, Batalov, who has contributed many insights into similar prime number problems, has not found any novel examples of this memorable variety.Gupta has also contributed to the search but to no avail. In 2023 software developer Tyler Busby stated that for the third prime number in the sequence, n must be greater than 84,300 for n(n 1) ... 321.How and whether the hunt will continue is still unclear. It is mostly amateur mathematicians who take partnot professional number theorists. Thats because prime numbers of this type do not provide any immediate new mathematical insights.Nevertheless, Sloane is not giving up. Now age 85, he continues to spread his enthusiasm for mathematics and numbers and to motivate people to have fun with it, too. He certainly does not need to convince Gupta: Im still looking for all kinds of large prime numbers that are easy to remember, Gupta says. And every now and then he finds one.This article originally appeared in Spektrum der Wissenschaft and was reproduced with permission.
    0 Commenti ·0 condivisioni ·25 Views
  • Final Fantasy 7 Rebirth verified for Steam Deck handheld
    www.eurogamer.net
    Final Fantasy 7 Rebirth verified for Steam Deck handheldQueen's Blood on the go!Image credit: Square Enix / Eurogamer News by Ed Nightingale Deputy News Editor Published on Jan. 17, 2025 Final Fantasy 7 Rebirth has been Steam Deck verified ahead of its PC release next week.It means the epic RPG will be playable handheld after all, as rumours swirl of it also heading to Nintendo's newly-revealed Switch 2 console - something Square Enix itself has not acknowledged.The PC release brings new bells and whistles to the game's visuals, though presumably these won't be available on the comparatively underpowered Steam Deck.Final Fantasy VII Rebirth Custom Chocobo Steam DeckWatch on YouTubeStill, a proper verified version of the game on Steam Deck is great to see. It means Queen's Blood on the go!The PC release boasts improved lighting, enhanced textures and modelling, DLSS, VRR and more, following an update for the game on PS5 Pro.Square Enix has already released the recommended tech specs for the game, though you'll need a strong setup for the Ultra settings to get the most out of those improvements.At the least, it's great to see Square Enix fully embracing the PC market with Final Fantasy 7 Rebirth, not just for those on PCs but on Steam Deck too.The PC release of Final Fantasy 7 Remake was notoriously disappointing thanks to performance issues. And while Final Fantasy 16 released on PC last year, it's a highly demanding game.To celebrate the Steam Deck verification, Square Enix has created a fluffy chocobo themed handheld too (see video above). For now it's just a sneak peak, though the company has teased it may be available for fans.To see this content please enable targeting cookies."Rebirth is a playful take on an emo classic that's bloated but full of character in a bid to justify its own existence," I wrote in our Final Fantasy 7 Rebirth review for the PS5 release last year."There are some divisive changes to debate, but for me the good outweighs any issues as deep down Rebirth does enhance the tone and mood of the original game. For all its cosmological and world-ending drama, it offers warmth and tenderness, its world bustling with detail and culture and extravagance, yet still full of pain."
    0 Commenti ·0 condivisioni ·48 Views
  • Is Fortnite x Godzilla live event happening this season? All we know
    www.videogamer.com
    You can trust VideoGamer. Our team of gaming experts spend hours testing and reviewing the latest games, to ensure you're reading the most comprehensive guide possible. Rest assured, all imagery and advice is unique and original. Check out how we test and review games hereThe Fortnite x Godzilla collaboration brings a new in-game event that will last for a week or two. During this time, players will be able to transform into the legendary monster and use its abilities to get a Victory Royale. On top of this, several new cosmetic items are available in the game, including Kong and Mechagodzilla, which can be purchased from the Item Shop.While this new gameplay content is certainly interesting, many players are wondering if there will be a Godzilla live event in Fortnite. If you are curious about it as well, this article explains everything you need to know.When will the Fortnite x Godzilla event start?Godzilla drops in Fortnite on January 17 at 9 AM Eastern Time. This marks the beginning of an in-game event, meaning that Epic Games will enable new content. However, this is not to be confused with a live event, which usually lasts for 10 minutes. While there have been rumors about a live event, Epic hasnt confirmed anything. Furthermore, nothing has been leaked about it as well.Considering the situation, its safe to say that there will be no Godzilla live event in Fortnite. This will simply be an in-game event, which will bring new gameplay features, such as the Godzilla transformation. This is almost identical to the Doctor Doom event, which allowed players to transform into the Marvel villain by interacting with a cauldron on the floating island.Godzilla will not have a Fortnite live event this season. Image by VideoGamerWhile Epic Games may announce a Godzilla live event later this season, its unlikely to happen. With the season ending on February 21, the game developer will probably focus on wrapping it up and teasing the next one. Due to this, there is a small chance that we will get a live event on the last day of Chapter 6 Season 1. FortnitePlatform(s):Android, iOS, macOS, Nintendo Switch, PC, PlayStation 4, PlayStation 5, Xbox One, Xbox Series S/XGenre(s):Action, Massively Multiplayer, Shooter9VideoGamerSubscribe to our newsletters!By subscribing, you agree to our Privacy Policy and may receive occasional deal communications; you can unsubscribe anytime.Share
    0 Commenti ·0 condivisioni ·44 Views
  • Blender Jobs for January 17, 2025
    www.blendernation.com
    Here's an overview of the most recent Blender jobs on Blender Artists, ArtStation and 3djobs.xyz: CupidAI | 3D Generalist Full-time 3d generalist for photorealistic product visualisation in Berlin (German speaking) Fast paid work for nodes or step by step instruction 3D Animator Looking for 3D Environment Modeler with UV Mapping Experience(Contract / Outsourced) Bode Software [...]Source
    0 Commenti ·0 condivisioni ·34 Views
  • A Lot of Americans Are Googling What Is Oligarchy? After Bidens Farewell Speech | The outgoing president warned of the growing dominance of a small, monied elite.
    gizmodo.com
    President Joe Biden used his farewell speech Wednesday to call out what he referred to as a nascent oligarchy in the United States. Perhaps unsurprisingly, Google Analytics appears to show that a lot of Americans had no idea what he was talking about. Today, an oligarchy is taking shape in America of extreme wealth, power, and influence that literally threatens our entire democracy, our basic rights and freedoms and a fair shot for everyone to get ahead, Biden said, in his address. We see the consequences all across America. Biden compared todays oligarchs to those who ran the country during the 19th century. More than a century ago, the American people stood up to the robber barons back then and busted the trusts, he said. They didnt punish the wealthy. They just made the wealthy play by the rules everybody else had. Biden added that creating labor rights for the public helped put us on the path to building the largest middle class, the most prosperous century any nation the world has ever seen. He concluded: Weve got to do that again. Confounded by Bidens use of the term oligarchy, Google search analytics shows there was a surge of searches for oligarchy meaning and oligarchy definition. Of the top five states where searches for the term were highest, three of them (Nebraska, Iowa, and Wyoming) were states that went for Trump during the election.In an homage to Eisenhowers parting address, Biden also used his speech to call out what he called a tech-industrial complex, which he said represented a dangerous concentration of technology, power and wealth in the hands of the very few. Americans are being buried under an avalanche of misinformation and disinformation enabling the abuse of power, the President said. The free press is crumbling. Editors are disappearing. Social media is giving up on fact-checking. The truth is smothered by lies told for power and for profit. Surely the fact that Silicon Valleys tech tycoons helped Trump win had some influence over Bidens decision to include this in his speech.Theres no telling whether the people who voted for Trump are the same people who have never heard of oligarchy, though if there is a crossover between those two demographics it would make sense. The Trump campaign was not particularly quiet about the fact that it planned to institute plans and policies specifically designed to benefit the wealthy while throwing the rest of America under the bus. Somehow, 50 percent of the electorate voted for him anyway. Now that Trumps administration is coming into view, its clear that it will be one of the most pro-wealthy administrations in the history of the country. Trump himself is a billionaire, as is his new political wingman, Elon Musk. Vivek Ramaswamy, Musks supposed partner for DOGEthe organization designed to wreck the federal governmentis also a billionaire, as are Trumps nominees to lead the Department of Education, the Commerce Department, the Department of the Interior, the Treasury, and NASA. Since being elected, those close to Trump have openly advocated for policies that would benefit the wealthy at the expense of the rest of us. In their pursuit of a balanced federal budget, rightwingers have suggested making cuts to Social Security, Medicare, and other federal programs designed to distribute benefits to Americans. At the same time, Trump has promised to lower taxes on the wealthya move that would paradoxically add trillions to the deficit. Trump has also suggested ending taxes on Social Security benefits, which would dry up the programs revenues, thus threatening a program that some 79 percent of Americans believe should not be reduced in any way.
    0 Commenti ·0 condivisioni ·37 Views