• What is an encryption backdoor?
    techcrunch.com
    Talk of backdoors in encrypted services is once again doing the rounds after reports emerged that the U.K. government is seeking to force Apple to open up iClouds end-to-end encrypted (E2EE) device backup offering. Officials were said to be leaning on Apple to create a backdoor in the service that would allow state actors to access data in the clear.The U.K. has had sweeping powers to limit technology firms use of strong encryption since passing a 2016 update to state surveillance powers. According to reporting by the Washington Post, U.K. officials have used the Investigatory Powers Act (IPA) to place the demand on Apple seeking blanket access to data that its iCloud Advanced Data Protection (ADP) service is designed to protect from third-party access, including Apple itself.The technical architecture of Apples ADP service has been designed in such a way that even the tech giant does not hold encryption keys thanks to the use of end-to-end encryption (E2EE) allowing Apple to promise it has zero knowledge of its users data.A backdoor is a term typically deployed to describe a secret vulnerability inserted into code to circumvent, or otherwise undermine, security measures in order to enable third parties. In the iCloud case, the order allows U.K. intelligence agents or law enforcement to gain access to users encrypted data.While the U.K. government routinely refuses to confirm or deny reports of notices issued under the IPA, security experts have warned that such a secret order could have global ramifications if the iPhone maker is forced to weaken security protections it offers to all users, including those located outside the United Kingdom.Once a vulnerability in software exists, there is a risk that it could be exploited by other types of agents, say hackers and other bad actors wanting to gain access for nefarious purposes such as identity theft, or to acquire and sell sensitive data, or even to deploy ransomware.This may explain why the predominant phrasing used around state-driven attempts to gain access to E2EE is this visual abstraction of a backdoor; asking for a vulnerability to be intentionally added to code makes the trade-offs plainer.To use an example: When it comes to physical doors in buildings, walls, or the like it is never guaranteed that only the propertys owner or key holder will have exclusive use of that point of entry.Once an opening exists, it creates a potential for access someone could obtain a copy of the key, for example, or even force their way in by breaking the door down.The bottom line: There is no perfectly selective doorway that exists to let only a particular person pass through. If someone can enter, it logically follows that someone else might be able to use the door too.The same access risk principle applies to vulnerabilities added to software (or, indeed, hardware).The concept of NOBUS (nobody but us) backdoors has been floated by security services in the past. This specific kind of backdoor typically rests on an assessment of their technical capabilities to exploit a particular vulnerability being superior to all others essentially an ostensibly more-secured backdoor that can only be exclusively accessed by their own agents.But by very nature, technology prowess and capability is a movable feat. Assessing the technical capabilities of unknown others is also hardly an exact science. The NOBUS concept sits on already questionable assumptions; any third-party access creates the risk of opening up fresh vectors for attack, such as social engineering techniques aimed at targeting the person with the authorized access.Unsurprisingly, many security experts dismiss NOBUS as a fundamentally flawed idea. Simply put, any access creates risk; therefore, pushing for backdoors is antithetical to strong security.Yet, regardless of these clear and present security concerns, governments continue pressing for backdoors. Which is why we keep having to talk about them.The term backdoor also implies that such requests can be clandestine, rather than public just as backdoors arent public-facing entry points. In Apples iCloud case, a request to compromise encryption made under the U.K.s IPA by way of a technical capability notice, or TCN cannot be legally disclosed by the recipient. The laws intention is that any such backdoors are secret by design. (Leaking details of a TCN to the press is one mechanism for circumventing an information block, but its important to note that Apple has yet to make any public comment on these reports.)According to the rights group the Electronic Frontier Foundation, the term backdoor dates back to the 1980s, when backdoor (and trapdoor) were used to refer to secret accounts and/or passwords created to allow someone unknown access into a system. But over the years, the word has been used to label a wide range of attempts to degrade, circumvent, or otherwise compromise the data security enabled by encryption.While backdoors are in the news again, thanks to the U.K. going after Apples encrypted iCloud backups, its important to be aware that data access demands date back decades.Back in the 1990s, for example, the U.S. National Security Agency (NSA) developed encrypted hardware for processing voice and data messages that had a backdoor baked into it with the goal of allowing the security services to intercept encrypted communications. The Clipper Chip, as it was known, used a system of key escrow meaning an encryption key was created and stored by government agencies in order to facilitate access to the encrypted data in the event that state authorities wanted in.The NSAs attempt to flog chips with baked-in backdoors failed over a lack of adoption following a security and privacy backlash. Though the Clipper Chip is credited with helping to fire up cryptologists efforts to develop and spread strong encryption software in a bid to secure data against prying government overreach.The Clipper Chip is also a good example of where an attempt to mandate system access was done publicly. Its worth noting that backdoors dont always have to be secret. (In the U.K.s iCloud case, state agents clearly wanted to gain access without Apple users knowing about it.)Add to that, governments frequently deploy emotive propaganda around demands to access data in a bid to drum up public support and/or put pressure on service providers to comply such as by arguing that access to E2EE is necessary to combat child abuse, or terrorism, or prevent some other heinous crime.Backdoors can have a way of coming back to bite their creators, though. For example, China-backed hackers were behind the compromise of federally mandated wiretap systems last fall apparently gaining access to data of users of U.S. telcos and ISPs thanks to a 30-year-old federal law that had mandated the backdoor access (albeit, in that case, of non-E2EE data), underscoring the risks of intentionally baking blanket access points into systems.Governments also have to worry about foreign backdoors creating risks for their own citizens and national security.There have been multiple instances of Chinese hardware and software being suspected of harboring backdoors over the years. Concerns over potential backdoor risks led some countries, including the U.K., to take steps to remove or limit the use of Chinese tech products, such as components used in critical telecoms infrastructure, in recent years. Fears of backdoors, too, can also be a powerful motivator.
    0 Comentários ·0 Compartilhamentos ·69 Visualizações
  • How cyberscams are draining Americans wallets by the billions
    www.foxnews.com
    Published February 15, 2025 10:00am EST close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt 'CyberGuy' Knutsson joins 'FOX & Friends' to warn of new cyberscams and his tips on how to avoid them. Cyberscams have reached alarming levels in the U.S., with nearly 30% of Americans falling victim to fraudulent schemes in the past year alone.The financial toll is staggering scams cost Americans over $159 billion annually, with average individual losses now exceeding $3,500 per victim. This epidemic is not just a financial crisis but also a human rights issue, as many scams originate from forced labor operations in Southeast Asia.With nearly 90% of Americans targeted by scam attempts and 40% receiving suspicious messages daily, the question remains: how can we protect ourselves and hold perpetrators accountable in an increasingly digital world?STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW The word scam with data in the background (Kurt "CyberGuy" Knutsson)The mechanics of "pig butchering"One of the most pervasive scams today is the so-called "pig butchering" scheme. Originating in China and spreading across Southeast Asia, this scam involves criminals building trust with victims through social media or messaging apps. Once trust is established, victims are lured into fraudulent cryptocurrency investment schemes. These scams are meticulously crafted to appear legitimate, often involving fake trading platforms and simulated profits. Victims are encouraged to invest more until they are "slaughtered," losing theirentire savings when the scammers vanish with their funds.Forced labor behind these scam centersWhat makes these scams even more horrifying is their reliance on human trafficking. Criminal syndicates in countries like Myanmar, Cambodia and Laos force trafficked individuals to run these operations under threat of violence. These "scam centers" operate in lawless regions controlled by rebel groups or corrupt officials, making international intervention challenging. Survivors describe conditions akin to modern slavery, with physical abuse and even torture being common. Illustration of a scam on a computer key. (Kurt "CyberGuy" Knutsson)Why America is a prime targetCyberscams have taken hold in the U.S. for several reasons that make it particularly vulnerable. As an American, youre likely connected to the digital world through social media platforms, messaging apps and other online tools. This high level of connectivity makes it easier for scammers to reach you directly, whether through a text message, email or social media chat. The sheer number of people online in the U.S. creates a vast pool of potential targets for cybercriminals.Additionally, the growing popularity of cryptocurrency in the U.S. has made it aprime medium for fraud. Cryptocurrency transactions are fast, anonymous and difficult to trace, which makes them ideal for scammers looking to steal funds without leaving a trail. Many scams are designed to exploit this lack of transparency, leaving victims with little chance of recovering their money once its gone.Another major issue is the lack of a centralized reporting system for cyberscams in the U.S. If youve ever been scammed or know someone who has, you might have noticed how confusing it can be to figure out where to report the crime whether to the FBI, the Federal Trade Commission (FTC) or another agency. This fragmented system not only makes it harder for victims to seek help but also prevents authorities from gathering comprehensive data to tackle the problem effectively. These factors combined have made Americans some of the most targeted individuals in the world when it comes to cyberscams. Illustration of a scammer at work. (Kurt "CyberGuy" Knutsson)Global solutions: Lessons from other nationsSeveral countries have implemented innovative measures to combat cyberscams, offering valuable lessons for the U.S. Singapore, for instance, has introduced a mandatory SMS Sender ID Registry (SSIR) that requires organizations to register their alphanumeric Sender IDs. This system effectively blocks unregistered SMS senders, significantly reducing impersonation scams. In fact, cases involving scam SMSes in Singapore fell by 70% over three months after mandating the SSIR.Britain has taken a different approach by establishing a dedicated "159" hotline, allowing residents to instantly verify suspicious calls. This simple yet effective system provides a quick way for individuals to check the legitimacy of unexpected communications, potentially preventing many scams before they occur.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Many nations have also implemented stricter authentication measures, such as biometric checks and in-app verifications, which have proven highly effective in reducing fraud. For example, Singapore has required facial verification for higher-risk transactions through Singpass since 2022, resulting in no further reports of malware-enabled scams involving unauthorized CPF withdrawals since its implementation in June 2023.Some countries are exploring ways to slow down cryptocurrency transactions or cap transfer amounts, which could significantly hinder scammers who rely on quick, anonymous transfers. These measures, combined with a coordinated global response involving major victim nations like the U.S. and China, could prove instrumental in dismantling criminal networks more effectively. By learning from these international examples and adapting them to the American context, the U.S. could significantly strengthen its defenses against the rising tide of cyberscams. Illustration of scamming techniques. (Kurt "CyberGuy" Knutsson)Tips to protect yourself and your loved onesRecognizing red flags is essential to avoid falling victim to scams. Here are some important red flags to be aware of:Unsolicited calls or emails: Be wary of anyone asking for personal or financial information. Legitimate organizations will not ask for sensitive information in this manner.Urgent requests for payment: Scammers often demand immediate action to avoid scrutiny. Take a moment to verify the request through official channels before responding.Unfamiliar contact information: Be cautious if the contact information provided does not match the official contact details of the company or organization.Untraceable payment methods: Requests for payment via gift cards, cryptocurrency or wire transfers are major warning signs. Reputable companies will not ask for these types of payments.Too good to be true offers: If an offer seems too good to be true, it likely is. Research and verify any claims before proceeding.10 ways to protect yourself from being scammedProtecting yourself and your loved ones from scams requires vigilance and awareness. Here are eight effective ways to safeguard against scammers:1. Verify before you act: Always verify the identity of the person or organization contacting you. Use official contact information to reach out directly and confirm the legitimacy of the request.2. Limit personal information sharing: Avoid sharing personal or financial information over the phone, email or online unless you are certain of the recipient's identity and legitimacy.3. Use strong, unique passwords for all your accounts:A robust password should include a mix of uppercase and lowercase letters, numbers and symbols. Avoid reusing passwords across multiple platforms, and consider using a reputablepassword manager to store and generate complex passwords securely.4. Enable two-factor authentication (2FA) wherever possible:2FA adds an extra layer of security by requiring a secondary verification method, such as a code sent to your phone or biometric authentication. This ensures that even if your password is compromised, unauthorized access remains highly unlikely.5. Keep your devices and software up to date:By regularly installing thelatest updates and security patches, you can ensure your devices are equipped with the latest security features and bug fixes, reducing the risk of becoming a target for cyberattacks. Many cyberattacks exploit unpatched vulnerabilities, so enabling automatic updates for your operating system, apps and antivirus software can significantly reduce your risk.GET FOX BUSINESS ON THE GO BY CLICKING HERE6. Invest in personal data removal services: Consider using a service that specializes in removing your personal information from the internet to reduce your exposure to potential scammers. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.7. Monitor financial accounts: Regularly check your bank and credit card statements for any unusual or unauthorized transactions. Promptly report any suspicious activity.8. Be skeptical of unsolicited requests: Treat unexpected requests for money or personal information with caution. Scammers often create a sense of urgency to pressure you into acting quickly.9. Be vigilant against phishing attempts and use strong antivirus software:Avoid clicking on links or downloading attachments from unsolicited emails or messages. Ensure your devices are protected with strong antivirus software that can detect and block malicious activities. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.10. Report Suspected Scams: If you suspect you've encountered a scam, report it to your local authorities, the Federal Trade Commission (FTC), and any relevant financial institutions.Kurts key takeawaysThe rise of cyberscams is not just an economic issue but a moral one that demands immediate action. With billions lost annually and countless lives disrupted, we cannot afford complacency in addressing this crisis. By learning from global best practices and fostering international collaboration, we can begin to dismantle these criminal networks. Be sure to follow the steps I outlined to keep yourself safe.CLICK HERE TO GET THE FOX NEWS APPWhat do you think should be done to tackle cyberscams more effectively? Should governments focus on stricter regulations or public education campaigns? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários ·0 Compartilhamentos ·77 Visualizações
  • When Did Ocean Acidity Allow Life To Start?
    www.forbes.com
    The Danakil desert in Ethiopia with its acidic lakes gives an mpression of how Earth may have looked ... [+] around 4 billion years ago.gettyPockets of liquid water existed on Earth already 4.1 billion years ago, with the first oceans forming around 4 billion years ago. But these oceans were highly acidic, preventing life on Earth from developing for the planets first 500 million years."To understand the origin of life, it becomes important to understand when and how Earth began hosting an ocean with a more neutral pH," says Meng Guo, a former Yale graduate student who is now a presidential postdoctoral fellow at Nanyang Technological University in Singapore and first author of a new study addressing this problem.An acidic pH lower than 7 can inhibit the synthesis of organic molecules and damage living tissue; modern-day seawater has a neutral pH of about 8."But modeling the long-term evolution of ocean pH is a notoriously difficult problem, as it involves almost all of the components of the Earth system: the atmosphere, the ocean, the crust, and the mantle," explains Guo."This is a tour-de-force theoretical endeavor, bridging a longstanding gap between surface processes and processes deep in the Earth," adds co-author Jun Korenaga, a professor of Earth and planetary sciences in Yales Faculty of Arts and Sciences.For example, ocean pH depends to a large extent on atmospheric carbon dioxide, which, in turn, is influenced by a variety of other factors. Early Earth was covered by a dense atmosphere composed mostly of water vapor and carbon dioxide, a result of volcanic degassing of the still partially molten planet. Only over time did the concentration of carbon dioxide decrease thanks to various geological processes.For their study, Korenaga and Guo carefully calibrated and set parameters for how each of these processes functionedand then had them interact."I think the main reason why we are able to do this modeling now is that our understanding of early Earth tectonics has been drastically improved in the last few years," so Korenaga.Rocks like the 4.01-billion-year-old Acasta Gneiss suggest that plate tectonics was already active on Earth at the time. When two plates collide, the resulting mountain building process typically accelerates both weathering and erosion. When a tectonic plate is pushed beneath another plate during subduction, sediments containing carbon dioxide, like limestone, are buried underground. Both processes gradually remove carbon dioxide from the atmosphere and the oceans.Using their new model, Guo and Korenaga estimated that it would have taken Earth 500 million years to neutralize ocean acidity enough to support life.So far, the oldest verified signs of life on Earth are 3.5 billion-year old dome-like sedimentary structures formed by microbial activity. But some experts believe that iron and carbon concretions found in hydrothermal veins of the Nuvvuagittuq Greenstone Belt in Quebec, Canada, could be the remains of microbes. This succession of former sediments and volcanic rocks is over 4 billion years old. The new model makes it seem unlikely that the observed concretions are indeed fossils.The researchers conclude that their findings can shed light not only on early Earth processes, but also on the role those processes play in modern day climate and its long-term evolution.The study, "Rapid rise of early ocean pH under elevated weathering rates," was published in the journal Nature Geoscience.Additional material and interviews provided by Jim Shelton, Yale University.
    0 Comentários ·0 Compartilhamentos ·73 Visualizações
  • The U.S. Is Dustier - Its Costing $154 Billion Each Year
    www.forbes.com
    [UNVERIFIED CONTENT] A haboob as it approaches Phoenix, Arizona from the east during the monsoon ... [+] season.Flickr VisionExtreme weather events can be quite disruptive to our lives, property, and the economy. It is easy to see the economic toll of storms like Hurricane Helene or Milton. However, a new study by scholars at University of Texas at El Paso, George Mason University and the U.S. Department of Agriculture finds that blowing dust and wind erosion account for $154 billion in damages each year across many sectors of the economy. Heres why.Saharan dust storm on the Algeria-Niger border as seen from Space Shuttle Endeavour during NASA's ... [+] Mission STS-49, 13th May 1992. (Photo by Space Frontiers/Archive Photos/Getty Images)Getty ImagesWhat Are Dust Storms?According to the National Oceanic and Atmospheric Administration, a dust storm is, A wall of dust and debris that is blown into an area by strong winds from thunderstorms. The wall of dust created by a dust storm can be miles long and several thousand feet high. Particularly strong dust storms, according to the Glossary of the American Meteorological Society are referred to as haboobs, "An intense sandstorm or dust storm with sand and/or dust often lofted to heights as high as 1500 m (~5000 ft), resulting in a wall of dust along the leading edge." NOAA says the word haboob is derived from Arabic word haab (wind or blow). They are common in parts of northern Africa, the Saharan desert, and even in the desert Southwest of the U.S. They can be quite a sight to see from the ground or from space (picture above).Some Historical Context As U.S. Becomes DustierA press release issued by University of Texas at El Paso describes the new study published in the journal Nature Sustainability. One of the co-authors, Tom Gill, happens to be a friend and colleague. He mentioned this work to me a few weeks ago because he knew $154 billion per year in societal costs from wind erosion and blowing dust was a shocking number. Gill is a professor of Earth, environmental and resource sciences at UTEP. He said, "It might seem strange to think that tiny specks of dust could add up to such huge consequences. This should be a wake-up call that blowing dust is a major expense and creates great societal harm.Professor Gill certainly has a point. As context, there were 27 billion-dollar+ disasters in 2024, according to NOAA. In aggregate, they resulted in roughly $182.7 billion in damages. This suggests that dust storms and wind erosion damages are at the same scale as hurricanes, flooding, and tornadic storms.MORE FOR YOUA farm about to be enveloped by a dust storm during the great Dust Bowl of the 1930s. (Photo by ... [+] CORBIS/Corbis via Getty Images)Corbis via Getty ImagesLike most weather processes, wind erosion is naturally-occurring. Dust storms and wind erosion are certainly not new. In fact, drought conditions in the 1930s are often used as benchmarks. Associated Press reporter Robert Geiger described the Great Plains region, ravaged by dust storms, as the Dust Bowl. However, increasing drought conditions, population-driven stress on water resources and human land use have led to even dustier conditions, according to scholars. The 1930s are often cited as counter-narrative to anthropogenic climate change. However, I wrote previously in Forbes.com, The best way to place current warming and past heat records in context is to think about a young basketball player with outstanding jumping ability. The 1930s can symbolize his natural ability to jump. In that piece, I was trying to overcome false narratives of either/or when it comes to natural and anthropogenic climate change. I went on to write, As time goes on, climate change added a few layers of wood to the basketball court such that the player, even with his natural ability, has an easier time dunking the basketball. Even as that happens, it takes nothing away from the fact that the kid always had amazing bunnies as the kids say today.KAYENTA, ARIZONA - JUNE 23: In an aerial view, the Kayenta Solar Plant is seen on June 23, 2024 in ... [+] Kayenta, Arizona. In late February, the U.S. Department of Energy announced that it would begin plans to provide $76.5 million in federal financing to the Navajo Nation's Red Mesa Tapaha Solar Farm in southeast Utah. The move is intended to provide tribal lands with greater accessibility to power grids and further generate energy sales for the nonprofit Navajo Tribal Utility Authority. The nonprofit oversees and provides power to approximately 40,000 homes within the Navajo Nation, spanning portions of southeast Utah, northeast Arizona and northwestern New Mexico. (Photo by Brandon Bell/Getty Images)Getty ImagesWhats Driving Increasing Costs?The study considered costs associated with numerous economic sectors including agriculture, healthcare, transportation, renewable energy, and individual households. For example, $250 million in transportation costs were analyzed in 2017 due to fatalities and accidents related to degradation of visibility by dust storms. Gill also pointed out, Dust contains ultra-fine particles that can become lodged in the lungs and exacerbate asthma, bronchitis and other upper respiratory illnesses. Valley Fever is common in the Southwest and likely accounts for almost $3 billion in medical costs and lost wages.DEATH VALLEY, PANAMINT SPRINGS, CA, UNITED STATES - 2016/06/15: Cars are stopped before a dust storm ... [+] with no visibility closed SR190 between Stovepipe Wells and Panamint Springs in Death Valley on June 15, 2016, in CA, United States. Dangerous, potentially record-breaking heat will scorch portions of California with temperatures climbing well past 100 degrees F in parts of California, Nevada, Utah, Colorado, Kansas, Texas, Oklahoma, New Mexico and Arizona. (Photo by Hugh Peterswald/Pacific Press/LightRocket via Getty Images)LightRocket via Getty ImagesWind erosion degrades soil mass, moisture, and nutrient loads, which leads to losses in agricultural productivity. Dust, on the other hand, makes solar and wind energy systems less efficient due to sunlight blockage and grime buildup. Individual household costs were associated with damage to homes and landscaping.The UTEP press release mentioned solutions from the study. It argued, . Dust mitigation efforts like conservation agricultural practices that help soil remain rooted in the ground could yield significant economic benefits. This study was funded by NASA and illustrates the value of federally-funded research to our daily lives.KINGMAN, AZ - JUNE 29: Spigots are seen on fallowed farmland as the drought worsens near Red Lake on ... [+] June 29, 2021 north of Kingman, Arizona. Large portions of the West are now classified as being in exceptional drought, the most extreme drought category. Many major reservoirs have reached historic low levels and fire officials are warning that another devastating wildfire season has already begun. (Photo by David McNew/Getty Images)Getty Images
    0 Comentários ·0 Compartilhamentos ·64 Visualizações
  • The world's largest OLED 'monitor' measures a whopping 767 inches
    www.techspot.com
    WTF?! Size definitely matters when it comes to displays, but how much? Mobile LED solutions provider Photonoics seems to believe the answer is no less than 762 inches. The company has unveiled the JUMBO162, a colossal 17 x 9.5-meter, 4K mobile LED screen, which is being billed as the largest of its kind in the world. This absolute unit of a display dwarfs Photonics' previous record holder, the 100-square-meter JUMBO100 from way back in 2014. The new screen boasts an area of 161.5 square meters and stands an imposing 13 meters tall. The company says this makes it perfect for festivals, concerts, sporting events, and other large outdoor gatherings.In its press photos, the JUMBO162 almost looks like an oversized desktop monitor. To put its scale into perspective, 162 square meters is nearly half the size of a giant IMAX screen. Yet, despite its massive proportions, the display is designed to be mobile. It can be transported via a specialized truck, delivering larger-than-life visuals to major events and exhibitions.The screen is also engineered to be wind-resistant, capable of withstanding gusts of up to 61 km/h. So it won't topple over like an ungainly giant at the first hint of a breeze.The creation of the JUMBO162 was a collaborative effort as well. Photonics owner Pieter Lambert credited INFiLED for its role in developing the lightweight yet ultra-bright AR Series panels for the display. Specifically, 374 of INFiLED's AR3.9 LED panels come together to form the massive screen.The display features a pixel pitch of 3.9mm and a brilliant peak brightness of 5,000 nits. According to Photonics, this makes it well-suited for events held in bright daylight. // Related StoriesAll those pixels are processed by the Megapixel VR Helios LED Processing Platform. Meanwhile, visuals get an extra boost from INFiLED's Infinite Colours technology, which expands the color spectrum for enhanced vibrancy.Impressively, the JUMBO162 can also be reconfigured into a more modest yet still massive 97.5-square-meter JUMBO100HD screen with an HD+ resolution. Many other sizes and shapes are available as well and can be found on the Photonics website.
    0 Comentários ·0 Compartilhamentos ·78 Visualizações
  • Western Digital targets 100TB disk drives with HAMR and HDMR advancements
    www.techspot.com
    Forward-looking: The data storage landscape is evolving rapidly, driven by the proliferation of artificial intelligence and the growing demand for massive data lakes. Western Digital projects that HDD exabyte shipments will grow at a compound annual growth rate of 23% from 2024 to 2028. To meet these increasing demands, the company is focusing on two key innovations that will drive capacity expansion and enhance storage efficiency. Western Digital unveiled an ambitious roadmap for advanced storage technologies at a recent investor day meeting. It plans to leverage two advanced storage technologies in the coming years: heat-assisted magnetic recording (HAMR) and heat dot magnetic recording (HDMR), which are expected to improve data storage efficiency and density in hard disk drives.This announcement comes as Western Digital prepares to separate its Flash business, with the spin-off scheduled for February 21, 2025.HAMR technology uses a small laser diode attached to each recording head to heat a tiny spot on the disk. This localized heating temporarily reduces the coercivity of the recording material, enabling the write head to alter the magnetic polarity of a single bit at a time.By allowing data to be written in much smaller regions, HAMR significantly increases storage density. This technique requires precise temperature control to ensure that only the intended area is heated, with nanosecond-level heating and cooling of individual bits.Western Digital plans to introduce its first HAMR-based HDDs in 2026, with initial capacities of 36TB for conventional magnetic recording (CMR) and 44TB for shingled UltraSMR recording. The company is already testing HAMR drives with two major hyperscale customers. By 2030, Western Digital aims to develop HDDs with capacities ranging from 80TB to 100TB using HAMR technology. // Related StoriesIn parallel, Western Digital is also developing HDMR technology, which combines heat-assisted writing with bit-patterned media (BPM). HDMR has the potential to achieve even higher areal densities, possibly exceeding 8 Tb/inch. This could enable 10-platter HDDs with capacities of 120TB or more.HDMR technology involves physically patterning disks using lithography or etching equipment in cleanroom environments. This process ensures uniform grain size and precise bit placement, resulting in more predictable magnetic properties. The combination of physical isolation of bits with energy-assisted writing enables unprecedented storage densities.However, HDMR is expected to be quite expensive due to its complex manufacturing requirements. The transition to these technologies will necessitate substantial investments, including the development of new types of lasers for highly precise localized heating.Western Digital is focusing on several key areas to support these. This includes refining servo-mechanics for precise head positioning, conducting magnetics research into advanced materials such as iron-platinum alloys, and developing new thermal management and control systems to accommodate the next generation of HDD technology.
    0 Comentários ·0 Compartilhamentos ·75 Visualizações
  • How to transmog and hide gear in Avowed
    www.digitaltrends.com
    In older RPGs, you would have to sacrifice that armor set you love the look of for the newer one that had better stats. In Avowed, it isn't exactly a secret tip or trick that wearing the more powerful gear is important, but that doesn't mean you need to sacrifice fashion. If you're playing in third-person especially, you want to make sure your character looks cool while exploring and using your flashy skills. Transmog has become more common lately, and thankfully is present in Avowed so you can wear the most powerful armor while still appearing like your old favorite. Or, you can hide all your armor completely if you want. Here's how to do both.Recommended VideosDifficultyEasyDuration5 minutesObsidianGear in Avowed only consists of your main armor and your gloves, but you can hide or transmog both of them to be as fashionable as you want. Hiding your armor can be done no matter what, but you need to have at least two sets of gear to transmog.Step 1: Pause the game and go into your Inventory.Step 2: In the armor section, equip the armor you want the stats from and highlight the other armor you want to appear wearing.RelatedStep 3: Press RT on controller or left click on PC to apply the appearance of that armor to your character.Step 4: To hide your armor, press RT or left click while highlighting the armor you are currently wearing.You can transmog your main armor, boots, and gloves individually for more variety, but you do need to own whatever armor you want to transmog so don't sell or break down any gear you like the look of.Editors Recommendations
    0 Comentários ·0 Compartilhamentos ·87 Visualizações
  • The Midnight Walk: release date, trailers, gameplay, and more
    www.digitaltrends.com
    Table of ContentsTable of ContentsRelease datePlatformsTrailersGameplayPreorderA game doesnt have to look real to be considered as having the best graphics. We are looking forward toGhost of Yotei just as much asSouth of Midnight despite them both having distinctly different art styles. The Midnight Walk is an upcoming video game that falls into the more creative side by presenting a world fully realized in claymation. While the visuals will get your attention, the world, characters, and atmosphere are more than enough to fully draw you in. If youre a fan of unique horror games, this upcoming PS5 game and upcoming PC game deserves your attention. Heres everything you need to know about it.MoonHoodThe Midnight Walk will release on May 8, 2025.Recommended VideosMoonHoodUnfortunately for Xbox and Nintendo fans, The Midnight Walk is going to be a PS5 and PC exclusive. However, it also supports VR headsets to play the game completely in virtual reality.Please enable Javascript to view this contentThe Midnight Walk was revealed with just a quick trailer that showed off the games dream-like style built entirely in claymation. The game has you play as a character named the Burnt One who emerges from their grave and meets a lantern called Potboy who has the ability to create fire. The two of them will team up to navigate and survive in a world that seeks to control that fire. The game will apparently be broken up into five tales of fire and darkness, though it isnt clear how that functions in terms of the story.Thats all we know about the plot itself except that we can expect to encounter many terrifying and offbeat characters and monsters along the way.The Midnight Walk | Release Date Announcement TrailerYou will play The Midnight Walk entirely in first-person, which is where the VR support comes in, as you explore the hand-crafted world. All assets of the game were modeled in clay before being scanned into the game, giving each environment, character, and monster a sense of groundedness despite the nightmarish designs.From what weve seen, gameplay looks to be divided between exploration and interacting with NPCs, and then stealth and chase sequences with aggressive creatures. There is one instance where we see the use of some kind of firearm, but it only seems to annoy the monster rather than damage or defeat it.There may also be elements of an escort quest if the goal is to protect Potboy, but it is hard to tell from what has been shown thus far.MoonHoodWith a release date of May 8, you can grab your The Midnight Walk preorder right now on the PlayStation Store page. There is only one edition, but PlayStation Plus subscribers do get it at a 10% discount.PC players cant preorder it right now, but it is still available to wishlist on Steam.Editors Recommendations
    0 Comentários ·0 Compartilhamentos ·80 Visualizações
  • How WSJ Readers Use AI at Work
    www.wsj.com
    Generative artificial intelligence tools are becoming more available, and, for some workers, indispensable for their jobs.
    0 Comentários ·0 Compartilhamentos ·72 Visualizações
  • Australian authorities 'won't let up' trying to recoup Belle Gibson's fine
    www.businessinsider.com
    Australian authorities are still pursuing Belle Gibson for the unpaid fine she owes from 2017.Gibson was ordered to pay a fine of A$410,000 after being found to have broken consumer law.A new Netflix series tells a fictionalized account of how she lied to followers about having and curing cancer.Following the release of Netflix's "Apple Cider Vinegar," Australian authorities are continuing their efforts to recoup hundreds of thousands of dollars in outstanding fines, penalties, and interest from former wellness guru Belle Gibson."Apple Cider Vinegar," which debuted earlier this month, tells a fictionalized version of how Gibson lied to friends, online followers, and major corporations like Apple and publisher Penguin about curing what she said was her terminal brain cancer through healthy eating and alternative therapies.Gibson, who admitted not having cancer following an investigation into her business by Melbourne newspaper The Age in 2015, was found guilty of five breaches of Australian consumer law in 2017.Court documents viewed by Business Insider show that an Australian Federal Court judge ordered Gibson to pay a fine of A$410,000 (around $260,000), plus A$30,000 (about $19,000) in legal costs at the time.However, Gibson said in subsequent court appearances that she was unable to pay the money, ABC reported.Although Gibson's case appeared to have been marked as finalized and abandoned in 2021, Jacinta Allan, the Premier of the Australian state of Victoria, has confirmed that local authorities are still working to recover the fine."Behind the TV stories, behind the dramatisation, are real people who have had their lives devastated by the actions of this individual," Allan said, per The Guardian. "Consumer Affairs Victoria is continuing to pursue this, particularly in the context of the orders that have been made by the court."Allan added that she was "disappointed" the matter still had not been resolved but that Consumer Affairs Victoria "won't let up." Kaitlyn Dever as Belle Gibson in "Apple Cider Vinegar." Netflix The current outstanding balance that Gibson owes has not been disclosed. Consumer Affairs Victoria did not immediately respond to BI's request for clarification, which was sent outside regular working hours.But after officers raided Gibson's home in Melbourne in 2021, it was reported that the fine amounted to more than A$500,000 (around $317,000), including penalties and interest.Gibson's case has been thrust back into the spotlight following the release of the six-part Netflix series, which has been viewed by more than 3.8 million people since its release on February 6, according to the streamer's own data.Gibson became a global influencer in the mid-2010s as she amassed more than 200,000 followers on Instagram. She went on to create a nutrition app called "The Whole Pantry" and later a cookbook of the same name.Following her confession to Australian Women's Weekly in 2015 that she had falsified her cancer diagnosis, Gibson has mostly kept a low profile, with the exception of her now infamous "60 Minutes Australia" interview.
    0 Comentários ·0 Compartilhamentos ·69 Visualizações