• Apple unveils beautiful 2025 Black Unity Collection Sport Loop, watch face, and iPhone/iPad wallpapers
    9to5mac.com
    In honor of Black History Month, Apple has unveiled its 2025 Black Unity Collection of wallpapers, watch faces, and watch straps. This years set is inspired by the rhythm of humanity, according to Apple:Black creatives and allies at Apple collaborated on the design of the new collection. The collection, Unity Rhythm, weaves together the colors of the Pan-African flag: black, green, and red.Black Unity Rhythm Sport LoopFirst up is the Black Unity Rhythm Sport Loop, which features a unique lenticular effect using red and green:The Black Unity Sport Loop is woven in a custom pattern of raised and recessed loops that creates a lenticular effect, revealing green on one side of each loop, and red on the other. When the band is worn, the colors appear dynamic, shifting from green to red as a user moves their wrist, and the color yellow appears in the transition, as if by magic. Heres how it looks:Find it exclusively in Apple retail stores and online here starting today for $49.Unity Rhythm watch faceFollowing tradition, Apple has created a corresponding face for Apple Watch that will be available shortly through a software update to iPhone and Apple Watch:The matching Unity Rhythm watch face features custom numerals formed by intertwined threads of red, green, and yellow. The watch face reacts to the gyroscope, so when a user raises their wrist to check the time, the strands coalesce from a series of abstract brush strokes into digits. When using the Unity Rhythm watch face, distinctive, rhythmic chimes mark every hour and half hour.Also coming in the software update, which should be iOS 18.3 and iPadOS 18.3, is the latest edition of the Unity wallpaper:The Unity Rhythm iPhone and iPad wallpapers feature the same custom lettering writing the word Unity, which changes orientation when the device is unlocked and locked.Look for it in the Unity collection once iOS 18.3 becomes available.Greater impactApple also says it will support a variety of organizations focused on creativity, community, and rhythm, including groups in New Orleans and Los Angeles:As part of the launch, Apple is supporting several global organizations whose work focuses on elements of rhythm, creativity, and community. This includes grants to the Ellis Marsalis Center for Music in New Orleans; Battersea Arts Centre in London; Music Forward Foundation in Los Angeles; Art Gallery of New South Wales in Sydney; and The National Museum of African American Music in Nashville, Tennessee. Apples support for these organizations builds upon the companys longstanding commitment to advancing economic, educational, and creative opportunities in communities around the world.Best Apple Watch and accessoriesAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 التعليقات ·0 المشاركات ·23 مشاهدة
  • Judge limits FBI powers to trawl data from Apple and others; Cloudflare privacy flaw
    9to5mac.com
    A judge has limited FBI powers to trawl through data obtained from tech giants like Apple, Google, and ISPs under FISA (the Foreign Intelligence Surveillance Act).Separately, a Cloudflare privacy flaw has been identified in one of Apples IT service providers, which could have exposed the rough location of millions of web and app users before it was fixed Judge limits FBI powers to use FISA dataOne of the most controversial surveillance powers granted to US agencies is Section 702 of the Foreign Intelligence Surveillance Act (FISA).Agencies like the NSA and FBI apply to a FISA court for permission to access data from tech companies. These court hearings are held in secret, meaning that the media and public is unable to scrutinize the decisions made. When companies like Apple are required to give access to user data under a FISA warrant, they are not permitted to say that they have done so.Intelligence agencies can only apply for a FISA warrant for the purpose of surveilling foreign entities. However, once the data had been handed over, they could then search it for private information on US citizens without a further warrant.Wired reports that a judge has just ruled this practice illegal.The FBI could perform backdoor searches for information on US citizens or residents who communicated with foreigners, and it did so without first obtaining a warrant. Judge DeArcy Hall found that these searches do require a warrant. To hold otherwise would effectively allow law enforcement to amass a repository of communications under Section 702including those of US personsthat can later be searched on demand without limitation, the judge wrote.Cloudflare privacy flawWhen you visit many websites, or use many apps, your request is first sent to a content delivery network (CDN). Cloudflare is one of the biggest CDNs, and handles traffic for around 19% of all websites and app servers.Cloudflare performs two functions. First, it checks requests to see whether they appear to originate from a genuine web or app user, or a bot. This allows the company to detect and block a common method for an attacker to take a server offline hitting it with so many simultaneous requests that it crashes. This is known as a DDoS (distributed denial of service) attack.Second, Cloudflare keeps cached copies of server data in hundreds of different cities around the world. By serving data from your nearest cache, it can reduce traffic to the main server.Apple is one of Cloudflares clients, and uses the companys services for iCloud Private Relay.A security researcher found a way to work out which CDN server handled your request, and thus get a rough idea of your location.The security researcher, who goes by Daniel, found a way to send an image to a target, collect the URL, then use a custom-built tool to query Cloudflare to find out which data center delivered the imageand thus the state or possibly the city the target is in.He reported the issue to Cloudflare, which has now fixed it.Photo: FBIAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 التعليقات ·0 المشاركات ·21 مشاهدة
  • THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
    thehackernews.com
    Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals could also compromise them? This week, we're breaking down the sophisticated world of AI-driven threats, key updates in regulations, and some urgent vulnerabilities in healthcare tech that need our attention.As we unpack these complex topics, we'll equip you with sharp insights to navigate these turbulent waters. Curious about the solutions? They're smarter and more unexpected than you might think. Let's dive in. Threat of the WeekJuniper Networks Routers Targeted by J-magic A new campaign targeted enterprise-grade Juniper Networks routers between mid-2023 and mid-2024 to infect them with a backdoor dubbed J-magic when certain precise conditions. The malware is a variant of a nearly 25-year-old, publicly available backdoor referred to as cd00r, and is designed to establish a reverse shell to an attacker-controlled IP address and port. Semiconductor, energy, manufacturing, and information technology (IT) sectors were the most targeted. Top NewsPalo Alto Firewalls Found Vulnerable to Firmware Exploits An analysis of three firewall models from Palo Alto Networks PA-3260, PA-1410, and PA-415 uncovered that they are vulnerable to known security flaws that could be exploited to achieve Secure Boot bypass and modify device firmware. In response to the findings, Palo Alto Networks said exploiting the flaws requires an attacker to first compromise PAN-OS software through other means and obtain elevated privileges to access or modify the BIOS firmware. It also said it will be working with third-party vendors to develop firmware updates for some of them.PlushDaemon Linked to Supply Chain Compromise of South Korean VPN Provider A never-before-seen China-aligned hacking group named PlushDaemon carried out a supply chain attack targeting a South Korean virtual private network (VPN) provider in 2023 to deliver malware known as SlowStepper, a fully-featured backdoor with an extensive set of information gathering features. The threat actor is also said to have exploited an unknown vulnerability in Apache HTTP servers and conducted adversary-in-the-middle (AitM) attacks to breach other targets of interest. Active since at least 2019, the group has singled out individuals and entities in China, Taiwan, Hong Kong, South Korea, the United States, and New Zealand.Mirai Botnet Launches Record 5.6 Tbps DDoS Attack Cloudflare revealed that a Mirai botnet comprising over 13,000 IoT devices was responsible for a record-breaking 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack aimed at an unnamed internet service provider (ISP) from Eastern Asia. The attack lasted about 80 seconds. The web infrastructure company said the average unique source IP address observed per second was 5,500, and the average contribution of each IP address per second was around 1 Gbps.Over 100 Flaws in LTE and 5G Implementations A group of academics has disclosed 119 security vulnerabilities impacting LTE and 5G implementations, Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC, srsRAN, that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. Some of the identified vulnerabilities could be weaponized to breach the cellular core network, and leverage that access to monitor cellphone location and connection information for all subscribers at a city-wide level, carry out targeted attacks on specific subscribers, and perform further malicious actions on the network itself.Ex-CIA Analyst Pleads Guilty to Sharing Top Secret Docs Asif William Rahman, a former analyst working for the U.S. Central Intelligence Agency (CIA), pleaded guilty to transmitting top secret National Defense Information (NDI) to unauthorized personnel and attempted to cover up the activity. The incident, which took place in October 2024, involved Rahman sharing documents prepared by the National Geospatial-Intelligence Agency and the National Security Agency. They were related to Israel's plans to attack Iran, and were subsequently shared on Telegram by an account called Middle East Spectator. He has pleaded guilty to two counts of willful retention and transmission of classified information related to the national defense. He is expected to be sentenced on May 15, 2025, potentially facing a maximum penalty of 10 years in prison. Trending CVEsYour go-to software could be hiding dangerous security flawsdon't wait until it's too late! Update now and stay ahead of the threats before they catch you off guard.This week's list includes CVE-2025-23006 (SonicWall), CVE-2025-20156 (Cisco Meeting Management), CVE-2025-21556 (Oracle Agile Product Lifecycle Management Framework), CVE-2025-0411 (7-Zip), CVE-2025-21613 (go-git), CVE-2024-32444 (RealHomes theme for WordPress), CVE-2024-32555 (Easy Real Estate plugin), CVE-2016-0287 (IBM i Access Client Solutions), CVE-2024-9042 (Kubernetes). Around the Cyber WorldIndia and the U.S. Sign Cybercrime MoU India and the United States have signed a memorandum of understanding (MoU) to bolster cooperation in cybercrime investigations. "The MoU allows the respective agencies of the two countries to step up the level of cooperation and training with respect to the use of cyber threat intelligence and digital forensics in criminal investigations," the Indian Ministry of External Affairs (MEA) said in a statement.Critical Security Flaws in ABB ASPECT-Enterprise, NEXUS, and MATRIX Products More than a 100 security flaws have been disclosed in ABB ASPECT-Enterprise, NEXUS, and MATRIX series of products that could enable an attacker to disrupt operations or execute remote code. Gjoko Krstikj of Zero Science Lab has been credited with discovering and reporting the flaws.91% of Exposed Exchange Server Instances Still Vulnerable to ProxyLogon One of the vulnerabilities exploited by the China-linked Salt Typhoon hacking group for initial access is CVE-2021-26855 (aka ProxyLogon), a nearly four-year-old flaw in Microsoft Exchange Server. According to a new analysis from cybersecurity company Tenable, 91% of the nearly 30,000 external-facing instances of Exchange vulnerable to CVE-2021-26855 have not been updated to close the defect to date. "Salt Typhoon is known for maintaining a stealthy presence on victim networks and remaining undetected for a significant time period," it said.IntelBroker Resigns from BreachForums The threat actor known as IntelBroker has announced his resignation as the owner of an illicit cybercrime forum called BreachForums, citing lack of time. The development marks the latest twist in the tumultuous history of the online criminal bazaar, which has been the subject of law enforcement scrutiny, resulting in a takedown of its infrastructure and the arrest of its previous administrators. Its original creator and owner Conor Brian Fitzpatrick (aka Pompompurin) was sentenced to time served and 20 years of supervised release exactly a year ago. However, newly filed court documents show that his sentence has been vacated -- i.e., declared void. "While released on bond awaiting sentencing, Fitzpatrick violated his conditions of release immediately by secretly downloading a virtual private network, which he then used virtually every day to access the Internet without the knowledge of his probation officer," the document reads. "Not only did Fitzpatrick commit serious offenses, but he also showed a lack of remorse, joking about committing additional crimes even after entering a guilty plea."Cloudflare CDN Bug Leaks User Locations A new piece of research from a 15-year-old security researcher who goes by the name Daniel has uncovered a novel "deanonymization attack" in the widely used Cloudflare content delivery network (CDN) that can expose someone's location by sending them an image on platforms like Signal, Discord, and X. The flaw allows an attacker to extract the location of any target within a 250-mile radius when a vulnerable app is installed on a target's phone, or as a background application on their laptop, simply by sending a specially-crafted payload. Using either a one-click or zero-click approach, the attack takes advantage of the fact that Cloudflare stores caches copies of frequently accessed content on data centers located in close proximity to the users to improve performance. The security researcher developed a Teleport tool that let them check which of Cloudflare's data centers had cached an image, which allowed them to triangulate the approximate location a Discord, Signal, or X user might be in. Although the specific issue was closed, Daniel noted that the fix could be bypassed using a VPN. While the geolocation capability of the attack is not precise, it can provide enough information to infer the geographic region where a person lives, and use it as a stepping stone for follow-on intelligence gathering. "The attack leverages fundamental design decisions in caching and push notification systems, demonstrating how infrastructure meant to enhance performance can be misused for invasive tracking," the researcher said.Belsen Group Leaks Fortinet FortiGate Firewall Configs A little-known hacking group named Belsen Group has leaked configuration data for over 15,000 Fortinet FortiGate firewalls on the dark web for free. This includes configurations and plaintext VPN user credentials, device serial numbers, models, and other data. An analysis of the data dump conducted by security researcher Kevin Beaumont has revealed that the configuration data has likely been put together by exploiting CVE-2022-40684, an authentication bypass zero-day vulnerability disclosed in October 2022, as a zero-day. Of the 15,469 distinct affected IP addresses, 8,469 IPs have been found to be still online and reachable in scans. As many as 5,086 IPs are continuing to expose the compromised FortiGate login interfaces. A majority of the exposures are in Mexico, Thailand, and the U.S. "If your organization has consistently adhered to routine best practices in regularly refreshing security credentials and taken the recommended actions in the preceding years, the risk of the organization's current config or credential detail in the threat actor's disclosure is small," Fortinet said in response to the disclosure. The disclosure comes as another critical flaw in FortiGate devices (CVE-2024-55591 aka Console Chaos) has come under active exploitation in the wild since November 1, 2024. Expert WebinarNo More Trade-Offs: Secure Code at Full Speed Tired of security slowing down developmentor risky shortcuts putting you at risk? Join Sarit Tager, VP of Product Management at Palo Alto Networks, in this must-attend webinar to discover how to break the Dev-Sec standoff. Learn how to embed smart, seamless security guardrails into your DevOps pipeline, prioritize code issues with full ecosystem context, and replace "shift left" confusion with the clarity of "start left" success. If speed and security feel like a trade-off, this webinar will show you how to have both. Save your spot now.The Clear Roadmap to Identity Resilience Struggling with identity security gaps that increase risks and inefficiencies? Join Okta's experts, Karl Henrik Smith and Adam Boucher, to discover how the Secure Identity Assessment (SIA) delivers a clear, actionable roadmap to strengthen your identity posture. Learn to identify high-risk gaps, streamline workflows, and adopt a scalable, phased approach to future-proofing your defenses. Don't let identity debt hold your organization backgain the insights you need to reduce risk, optimize operations, and secure business outcomes.P.S. Know someone who could use these? Share it. Cybersecurity ToolsExtension Auditor: With cyber threats becoming more sophisticated, tools like Extension Auditor are essential for maintaining online safety. This tool evaluates your browser extensions for security and privacy risks, providing a clear analysis of permissions and potential vulnerabilities. Extension Auditor helps you identify and manage extensions that could expose you to danger, ensuring your browsing is secure and your data remains private.AD Threat Hunting Tool: It is a simple yet powerful PowerShell tool that helps detect suspicious activities in your Active Directory, like password spray attacks or brute force attempts. It provides real-time alerts, smart analysis of attack patterns, and detailed reports with easy export options. With built-in testing to simulate attacks, this tool is a must-have for keeping your AD environment secure and identifying threats quickly. Tip of the WeekEssential Network Security Practices To effectively secure your network, you don't need complex solutions. Keep your network safe with these easy tips: Use a VPN like NordVPN to protect your data and keep your online activities private. Make sure your firewall is turned on to stop unwanted access. Keep your software and devices updated to fix security weaknesses. Choose strong, unique passwords for all your accounts and consider using a password manager to keep track of them. Teach yourself and others how to spot phishing scams to avoid giving away sensitive information. These basic actions can greatly improve your network's security and are simple to implement.ConclusionAs we close this week's newsletter, let's focus on the crucial issue of vulnerabilities in healthcare technology. These gaps highlight a pressing need for enhanced security measures and more dynamic regulatory frameworks that can quickly adapt to new threats. How can we fortify our defenses to better protect critical infrastructure? Your expertise is essential as we tackle these challenges and push for more effective solutions. Let's keep the dialogue open and continue to drive progress in our field. Stay informed and engaged.Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.
    0 التعليقات ·0 المشاركات ·23 مشاهدة
  • How Must Staffing Change in Relation to AI?
    www.informationweek.com
    TechTarget and Informa Techs Digital Business Combine.TechTarget and InformaTechTarget and Informa Techs Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.How Must Staffing Change in Relation to AI?How Must Staffing Change in Relation to AI?From the C-suite to new hires, the impact of AI on relevant job skills and career longevity may deliver aftershocks for years to come.Joao-Pierre S. Ruth, Senior EditorJanuary 27, 2025Debate continues over how artificial intelligence might upend current jobs and future careers, as nuances emerge in such discussions.The assumption that AI equals immediate job cuts to deliver efficiency might not be that simple, especially as more divisions within organizations and their leadership start to understand how they can leverage this technology. Certain jobs might be eliminated, yet other jobs could evolve with AI.This episode of DOS Wont Hunt features Luke Behnke, vice president of product for Grammarly; Cliff Jurkiewicz, vice president of global Strategy for Phenom; Ryan Bergstrom, chief product and technology officer for Paycor; Daniel Avancini, co-founder and chief data officer for Indicium; and Arun Varadarajan, co-founder and chief commercial officer for Ascendion.They discussed how AI already changes staffing, what skillsets organizations want in an AI-powered world, fears about job loss, what this may mean for executives in the C-suite who need to get up to speed on AI, and when organizations can comfortably rely on AI to enhance their workforce.Listen to the full podcast here.About the AuthorJoao-Pierre S. RuthSenior EditorJoao-Pierre S. Ruth covers tech policy, including ethics, privacy, legislation, and risk; fintech; code strategy; and cloud & edge computing for InformationWeek. He has been a journalist for more than 25 years, reporting on business and technology first in New Jersey, then covering the New York tech startup community, and later as a freelancer for such outlets as TheStreet, Investopedia, and Street Fight.See more from Joao-Pierre S. RuthNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports
    0 التعليقات ·0 المشاركات ·25 مشاهدة
  • Build a Cloud Engagement Plan
    www.informationweek.com
    Theres network as a service (NaaS), infrastructure as a service (IaaS),platform as a service (PaaS) and software as a service (SaaS). All offer opportunities to outsource major areas of IT operations to third-party vendors in turnkey fashion if desired. In other words, all you need to do is to call the vendor, much as an end user will call IT if a service goes down, gets slow or develops a bug.The oft-cited value point of these outsourcing approaches is that IT will have more time to focus on strategy, and not so much on the mundane tasks of daily operations. However, consider whether cloud management and operations should be a totally hands off practice or are there levels of management and control that IT should keep?Whether building or buying technology, its critical for companies to consider how they choose their systems, devices and applications, said PWC in a recent paper on technology and ethics. However, even if you exclude ethics and are just talking about day-to-day IT, there is a responsibility to oversee technology for the company and its stakeholders, even if the technology is tucked away in a cloud.IT in the CloudThe initial role that IT plays with the cloud is determined when the company decides to move to the cloud and then meets with vendors to determine which cloud provider to sign with. In many cases, getting contracts signed and services started is all IT does in the process, unless there is a cloud service interruption or its contract renewal time.Related:Very small companies of 20 or fewer employees live in this world. The cloud benefits them greatly because theyre able to subscribe to IT services and support they otherwise could not afford, and then they simply dont think much about it anymore.However, for mid-sized and large companies with large IT portfolios and in-house IT staff, a totally hands off role with the cloud that fails to address questions of cloud risk or management control is less than optimal. IT departments in these organizations recognize this, so they ask staff members to manage the cloud as needed. The problem with that approach is this: More IT is shifting to the cloud, making the cloud a more dominant IT hosting platform, and it becomes less viable to handle day-to-day cloud issues on an informal, as needed basis. That is why more mid-sized and large companies are codifying IT responsibilities for the cloud by writing them into staff job descriptions.Cloud Roles That IT Staff Members PlayHere are some IT cloud responsibilities that need to be more formally addressed.Related:Contracts and SLAs. A contract for a mission-critical system like cloud-based ERP involves more than just signing up for a service. Companies with large ERP systems depend on ERP applications as the operational driveline of the entire business. An ERP vendor should take the criticality of this system as seriously as the company does. During contract negotiation, this means hammering out service level agreements (SLAs) that are more robust in their performance and uptime requirements than what a vendor would typically offer in a boilerplate contract. There is also room to negotiate on pricing and support.Who does this? Enterprise IT departments hire contract administrators to do this work.Medium-sized companies that cant afford a dedicated contract administrator should consult with attorneys.Cloud contract negotiation and administrative responsibilities should be written into contract administrator job descriptions. For companies employing outside legal counsel, the CIO or an upper-level IT manager should be tasked with the responsibility of cloud contract negotiation and coordination with the legal team.Compliance. In large enterprises, there are dedicated internal regulatory groups that monitor and ensure compliance, whether the company standards are HIPAA (healthcare), PCI, Sarbanes Oxley (finance) or something else. SMBs without dedicated regulatory staff turn to attorneys. The goal is to ensure that prospective and existing cloud vendors are compliant with various regulations.Related:Who does this? IT gets involved because almost always,IT owns the cloud vendor relationship.Typically, a senior business analyst in IT coordinates and verifies cloud vendor compliance, working with the regulatory group and attorneys. In the past, this responsibility often was performed informally. It should be formalized as part of the business analysts job responsibilities.Security. Cloud vendor security audits and methods must be reviewed annually to assure that vendors continue to adhere to company security requirements. At the same time, IT is responsible for configuring the security levels for its own assets in the cloud.Who does this? The IT security staff should have written accountabilities for configuring and monitoring security in the cloud. This includes setting up of security for cloud-based IT assets and annual reviews of cloud vendor security audits.Asset deployment, management, and performance optimization. Applications and IT infrastructure components that support the production environment should be deployed, monitored, and optimized for performance in the cloud as part of ITs daily work. In some cases, there will be joint responsibility for sharing these tasks between IT and cloud vendors, but ultimately it is IT that is responsible for ensuring that applications and the supporting infrastructure are running in the cloud as they should be.Who does this? In PaaS and IaaS cloud environments, it will be the systems group that should have an individual assigned to maintaining performance levels in the cloud and in working with cloud vendors as needed. On the applications side, it will be a senior applications group staff member or manager who would carry out this responsibility for applications.Data stewardship and testing. Cloud services sell data, and other cloud services are in charge of maintaining data in a safe and secure environment. In still other cases, cloud services are being used to provision and de-provision test databases and infrastructure for IT unit application testing. Someone in IT should be formally assigned the responsibility of assuring that cloud data is safe, and that IT test environments are correctly configured.Who does this? The database group should be tasked with data management and stewardship of cloud data.The DBA or a data analyst should also be assigned the responsibility of setting up or taking down testing facilities, or in many cases, supervising the application programmers themselves to ensure they are doing this correctly.Final ThoughtsCloud-based data, applications and infrastructure are a major part of IT portfolios, so IT cant afford to consign these responsibilities to third parties, especially if these IT departments are in very large enterprises.Its time to formalize cloud responsibilities throughout the IT organization, and to provide the time for IT staff members to get up to speed with cloud-based tools that they will need in performing their cloud-based responsibilities.The task now for CIOs and senior IT leaders is to map these cloud responsibilities across the IT organization, because different individuals in diverse areas of IT will be needed to do them.
    0 التعليقات ·0 المشاركات ·12 مشاهدة
  • The Download: Chinas DeepSeek, and useful quantum computing
    www.technologyreview.com
    This is today's edition ofThe Download,our weekday newsletter that provides a daily dose of what's going on in the world of technology. How a top Chinese AI model overcame US sanctions The AI community is abuzz over DeepSeek R1, a new open-source reasoning model. The model was developed by the Chinese AI startup DeepSeek, which claims that R1 matches or even surpasses OpenAIs ChatGPT o1 on multiple key benchmarks but operates at a fraction of the cost. DeepSeeks success is even more remarkable given the constraints facing Chinese AI companies in the form of increasing US export controls on cutting-edge chips. But early evidence shows that these measures are not working as intended. Rather than weakening Chinas AI capabilities, the sanctions appear to be driving startups like DeepSeek to innovate in ways that prioritize efficiency, resource-pooling, and collaboration.Read the full story. Caiwei Chen Useful quantum computing is inevitableand increasingly imminent Peter Barrett is a general partner at Playground Global, which invests in early-stage deep-tech companies On January 8, Nvidia CEO Jensen Huang jolted the stock market by saying that practical quantum computing is still 15 to 30 years away, at the same time suggesting those computers will need Nvidia GPUs in order to implement the necessary error correction. However, history shows that brilliant people are not immune to making mistakes. Huangs predictions miss the mark, both on the timeline for useful quantum computing and on the role his companys technology will play in that future. Ive been closely following developments in quantum computing as an investor, and its clear to me that useful quantum computing is inevitable and increasingly imminent. And thats good news, because the hope is that they will be able to perform calculations that no amount of AI or classical computation could ever achieve. Read the full story.The must-reads Ive combed the internet to find you todays most fun/important/scary/fascinating stories about technology. 1 AI pioneers are clashing over its potential dangers Yann LeCun, Metas AI chief scientist, has branded experts grave warnings hypocritical. (FT $)+ AIs biggest cheerleaders tend to know the least about it. (Wired $)+ How existential risk became the biggest meme in AI. (MIT Technology Review)2 This surveillance tech could enable Donald Trumps deportation plans From mass biometric databases to phone jailbreaking tools. (NYT $)+ It really doesnt have to be like this. (The Atlantic $)+ Trump has declared policing the US-Mexican border his number one issue. (FT $)+ Hes ordered the end of the CBP One border migration app. (MIT Technology Review)3 The European Union is watching Big Tech like a hawk Its concerned about disinformation spreading ahead of next months German election. (Bloomberg $)4 Trumps meme coins are bad news for the crypto industry The community was hoping the President would legitimize cryptocurrency, rather than leaning into its scammier side. (WP $)+ Its a blow to the fans hoping hell make Bitcoin great again. (The Guardian)+ Trumps biggest supporters stand to lose the most from his crypto grift. (Vox) 5 AI is helping to pin down what caused the Los Angeles wildfires Determining the truth could take months. AI is speeding that process up. (Wired $)6 Elon Musks gaming skills are under fireHardcore gamers are questioning how he was seemingly playing during Trumps inauguration. (NYT $) 7 The European Medicines Agency has had enough of XAnd has moved to Bluesky instead. (Reuters) 8 Vietnam is deploying robots to help run its postal serviceIncluding delivering parcels and sorting packages in warehouses. (Rest of World) 9 Startups are in for a rough year Thousands of companies were funded between 2020 and 2021. Now, plenty are shutting down. (TechCrunch)+ Gaming startups in the UK are struggling for cash. (BBC)10 A newly-discovered asteroid turned out to be Musks Tesla RoadsterThe car and its mannequin driver have been floating in space since 2018. (USA Today) + The worlds next big environmental problem could come from space. (MIT Technology Review)Quote of the day I think within five years, nobody in their right mind would use them anymore. Yann LeCun, Metas chief AI scientist, says he believes that the technologies powering the current wave of large language models will soon become obsolete, TechCrunch reports. The big story How culture drives foul play on the internet, and how new upcode can protect us August 2023 From Bored Apes and Fancy Bears, to Shiba Inu coins, self-replicating viruses, and whales, the internet is crawling with fraud, hacks, and scams.And while new technologies come and go, they change little about the fact that online illegal operations exist because some people are willing to act illegally, and others fall for the stories they tell.Ultimately, online crime is a human story. But why does it work, and how can we protect ourselves from falling for such schemes? Read the full story.Rebecca Ackermann We can still have nice things A place for comfort, fun and distraction to brighten up your day. (Got any ideas? Drop me a line or skeet 'em at me.) + I cant believe these albums were released 50 years ago: featuring Bob Dylan, Donna Summer, and The Boss.+ What one mans search for happiness taught him about himself.+ More twins are being born than ever beforebut why? + Wolfgang Amadeus Mozart was born on this day in 1756. Enjoy this stunning piano concerto in his honor!
    0 التعليقات ·0 المشاركات ·10 مشاهدة
  • Ministers pledge to double the size of the Oxford-Cambridge economy in boost for life sciences sector
    www.bdonline.co.uk
    Initiative has potential to add 78bn in GDP to UK economyThe government has pledged to work with a group of businesses to double the economic output of theeconomy of the Oxford-Milton Keynes-Cambridge region by 2035.The announcement of the plan, which has been welcomed by firms working in the development and construction of life sciences buildings, has been inspired by the science clusters of Boston and San Francisco in the US.Source: ShutterstockThe Oxford-Cambridge arc will add 78bn to GDP by 2035, research has saidFast-tracking growth plans for the region, through measures such as planning reforms, would add 78bn of GDP to the UK economy by 2035, according to research by consultancy Public First for the Oxford-Cambridge Supercluster Board, which comprises industry and university leaders.Big projects in the Oxford-Cambridge arc, alongside life sciences work, include the delivery of East West Rail and an expanding Luton Airport.Peter Kyle, secretary of state for science, innovation and technology, said: The Oxford-Cambridge Arc is already an engine of prosperity, and a shining example of how universities, investors and innovative businesses can work together to drive growth, when they create and seize the opportunities offered by breakthroughs in science and technology.But together, we can go even further. We are determined to unleash R&D as a driving force in our mission to grow the economy in every corner of the country, under our Plan for Change.The Oxford-Cambridge Supercluster board consists of 45 organisations, including universities, pharmaceutical companies, software and cybersecurity firms, developers and investors.Simon Carter, chief executive of British Land, which sits on the board, welcome the renewed focus on Oxford-Cambridge.Carter said: The anticipated investment will help accelerate our plans along the Oxford-Cambridge corridor, where we have schemes in design, planning and under construction that will deliver hundreds of homes and 10,000 innovation jobs.Paul Weston, regional head of Prologis UK, which recently announced a further 500m investment into UK life sciences facilities at Cambridge Biomedical Campus, said: Prologis has been investing in the UK industrial logistics sector for over 25 years and is committed to supporting the Oxford Cambridge supercluster, OxCam Pan Regional economy, helping the UK achieve its ambitions of becoming a scientific superpower.
    0 التعليقات ·0 المشاركات ·12 مشاهدة
  • Optimism ticks up but practices still expect workloads to shrink
    www.bdonline.co.uk
    Latest RIBA Future Trends report reveals ongoing impact of governments tax-raising budgetRIBAs Future Trends survey covering December 2024 showed optimism had improved compared to NovemberOptimism in the architecture sector has ticked up slightly but practices still expect their workloads to shrink in the coming months, according to RIBA.The index for the institutes latest Future Trends report rose by four points in December but is still in negative territory at -5. Any figure below zero indicates practices on balance expect their workloads to fall over the next three months.Most surveyed regions have seen a modest improvement in sentiment, but only firms in the North of England expect workloads to grow, returning a regional index of +31, up from zero in November.The outlook across all four monitored work sectors also remains pessimistic despite improvements in three sectors, including private housing, which rallied to -5 from -11 the previous month.The surveys workload index for December 2024However, there was better news for future hiring expectations, with the staffing index bouncing into positive territory at +2 from -3 in November.RIBA head of economic research and analysis Adrian Malleson said the impact of the governments autumn budget, which raised employer National Insurance contributions (NICs), is continuing to dampen the mood in the profession.Commentary received from practices in December describes a market that has slowed following the recent budget, Malleson said.Some practices describe new enquiries and the market slowing, post-budget, and some are pausing recruitment because of the planned increase in employer NICs.He said practices had also described the year ending with familiar and ongoing challenges, including raised interest rates, project cost pressure, poor client confidence, planning delays, increased regulatory burden, and intense fee competition.Nevertheless, some practices describe thriving businesses, with increased enquiries, full workload, new staff being recruited, and sustainable fee income.
    0 التعليقات ·0 المشاركات ·18 مشاهدة
  • JV North framework 2025-29
    www.architectsjournal.co.uk
    Wythenshawe Community Housing Group is a JV North member Source:&nbsp Image by Gene HuntJV North has launched a new 20 million construction consultancy services framework [Deadline: 3 March 2025] Teams selected for the four-year agreement will have the opportunity to work on a range of affordable housing projects for JV North members who are expected to deliver around 5,000 new homes through the framework during its lifetime.The framework is divided into seven lots covering the architectural, employers agent, purchasers agent, engineering, clerk of works, principal designer, and principal designer building regulations services.According to the brief: The aims and objectives of the framework are to enable JV North members to construct good quality homes for a variety of tenures, including some community amenity and associated infrastructure provision and for a wide range of client groups and affordability levels.AdvertisementHomes are required to be built on budget and within specified programme dates. JV North and its members are committed to efficiency in building methods, low levels of waste and the minimisation of defects in its completed buildings.There is also great interest and commitment to the construction of buildings which are energy efficient and provide residents with sustainable homes that are low maintenance and minimise running costs.Founded in 2007, JV North is a Manchester-based consortium of social housing associations and local authorities spread across the North West of England. Members of the organisation include L&Q Housing Trust, One Manchester, South Liverpool Homes, Stockport Homes and Wythenshawe Community Housing Group.Bids for inclusion on the framework will be evaluated 60 per cent on cost and 40 per cent on price. Applicants must hold public liability insurance of 5 million and professional indemnity insurance of 2 million.Competition detailsProject title JV North Consultants FrameworkClient Contract valueFirst round deadline Restrictions More information https://www.find-tender.service.gov.uk/Notice/001846-20252025-01-27Merlin Fulchercomment and share
    0 التعليقات ·0 المشاركات ·16 مشاهدة
  • Sanctuary Housing Association framework 2025-29
    www.architectsjournal.co.uk
    Teams selected for the four-year agreement will have the opportunity to work on a range of new build and redevelopment projects in the South West of England with the Worcester-based housing association, which manages more than 130,000 homes across the UK.The four-year framework will focus on the renewal or relocation of former facilities used by the care home provider Cornwall Care which was acquired by the housing association in 2022. Up to six architecture practices will be appointed to the framework.According to the brief: The contract is to provide a framework of Architectural Services in the South West of England. This is a single-lot framework and successful suppliers must be able to demonstrate to Sanctuary they have the requisite capacity and experience to deliver the services outlined in this tender.AdvertisementThe framework will last for a duration of four years up to a maximum date of 23 February 2029. The services will relate to a programme of developing former Cornwall Care sites, which will comprise: Complete rebuild on site, Relocate and build, Residential rebuild on vacant Care sites, Other residential and/or commercial development opportunities.Sanctuary Housing Association is large housing provider which employs more than 14,000 people. The organisation specialises in rented, retirement living, supported housing, student and key worker accommodation, and care homes.Bids for inclusion on the framework will be evaluated 50 per cent on cost and 50 per cent on price. Applicants must hold professional indemnity insurance of 5 million.Competition detailsProject title Architect Framework for the South West RegionClient Contract valueFirst round deadline Restrictions More information https://www.find-tender.service.gov.uk/Notice/002352-2025
    0 التعليقات ·0 المشاركات ·18 مشاهدة