• Inside Dev Threatens Legal Action Against Studio Co-Founder As "Bullying" Allegations Arise
    www.nintendolife.com
    Image: PlaydeadPlaydead, the studio behind indie hits Limbo and Inside, has demanded compensation and reimbursement from studio co-founder Dino Patti on claims of copyright infringement an act that Patti describes as "bullying" from fellow co-founder Arnt Jensen (thanks for the heads up, Game Developer).The pair split shortly after Inside's release in 2016, with Patti leaving to form Somerville studio Jumpship and, this week, the feud between the two has gone public.In a recent LinkedIn post, Patti claims that he has "repeatedly" received "legal love letters" from Playdead in the nine years since his departure. The latest of which, the dev shares, is dated 3rd March 2025 and threatens an IP lawsuit if Patti fails to pay 500,000 DKK (56,000 / $73,000) in "compensation and reimbursement" for sharing an "unauthorised" Limbo picture in a now-deleted LinkedIn post.Subscribe to Nintendo Life on YouTube798kWatch on YouTube In a statement released to Game Developer, Playdead confirmed that it had, indeed, "submitted demands" to Patti regarding copyright infringement. "We have found it necessary to take this action to protect our trademarks and copyrights," the studio continued, "which are essential to Playdead's business and reputation".The post in question, according to the legal letter shared in full on Patti's LinkedIn, "constitutes an infringement of Playdead's intellectual property rights" in which Patti was "falsely giving the impression that [he] played a significant role, including a creative role, in the development of the game".Patti has since removed the LinkedIn post with which Playdead seemingly took issue, though, posting the letter online, he shared the following "hard truth": You know I was a significant part of building Playdead from the ground upI know it too. Those first years were a battle like no other. We fought, built, and pushed through together. Without me, Playdead wouldnt have existed. Thats not ego. That's a fact.After stating that he will "never erase [his] own history", Patti concludes, "Arnt, please stop the bullying. I will not stop being who I am." Spoilers! Many spoilers!!Still absolutely heavenIf we hear any updates on this matter, we'll be sure to keep you updated.[source linkedin.com, via gamedeveloper.com]Related GamesSee AlsoShare:00 Jim came to Nintendo Life in 2022 and, despite his insistence that The Minish Cap is the best Zelda game and his unwavering love for the Star Wars prequels (yes, really), he has continued to write news and features on the site ever since. Hold on there, you need to login to post a comment...Related ArticlesCapcom Provides Update On Game Changes In 'Fighting Collection 2'Here's what you can expect20 Years After Its Demise, Publisher 'Acclaim' Is Being ResurrectedWill look to "support indie developers and reignite classic franchises"Video: Digital Foundry's Technical Analysis Of Metal Gear Solid: Master Collection 2.0 UpdateMGS2 and 3 have definitely "improved"Was That Pokmon Legends: Z-A Footage Running On Switch 2? Digital Foundry Weighs InPrepare for a pretty obvious answerAnalyst Fears U.S. Tariffs Could Spell Disaster For Physical Games"What a mess"
    0 Comments ·0 Shares ·53 Views
  • Podcast app Pocket Casts makes its web player free
    techcrunch.com
    Pocket Casts, the podcast app acquired by Automattic in 2021, is now making its web player free. The company says the move offers an alternative to the big platforms closed ecosystems, where algorithmic-driven content is prioritized and podcasts are kept behind paywalls.Podcasts were built on open technology the open, decentralized standard RSS, which was designed to make online audio as well as other content, like news and blog posts available to anyone on the web for free. Starting Tuesday, Pocket Casts will honor the open nature of podcasts by making its web player free to use.That means anyone can visit the Pocket Casts website and stream any episode they want, without having to pay a subscription fee or even creating an account.However, if users want to personalize their experience, they can create a free account to unlock features like syncing playback across web, mobile, and desktop devices; managing their queue; and saving their subscriptions and other preferences.Meanwhile, the companys Pocket Casts Plus paid subscription will offer features that give users additional control over their listening experience, including access to tools and features like folders, smart shuffle, bookmarks, wearable and cloud support, extra themes and icons, and more.The company also notes that AI-powered discovery is not a part of its offering. Instead of providing users with algorithmic-driven podcast suggestions, Pocket Casts wants users to decide for themselves what they want to listen to. This message could appeal to people who think that Spotify has gotten too pushy with its own recommendations, making it difficult for users to keep up with the shows they actually wanted to follow.Support for free streaming on the web could also help the company challenge Apple Podcasts, which rolled out web streaming in August 2024.Free streaming is coming to Pocket Casts Mac and Windows apps, as well, as a part of this update.
    0 Comments ·0 Shares ·65 Views
  • Flower Labs launches a new service that automatically switches from local to cloud AI
    techcrunch.com
    Flower Labs, a Y Combinator-backed startup, on Tuesday launched a preview of its distributed cloud platform for serving AI models, called Flower Intelligence. Mozilla is already using it to power the upcoming Assist summarization add-on for its Thunderbird email client.What makes Flower Intelligence unique, Flower Labs said in a post on X, is that it can drive on-device AI mobile, PC, and web apps that automatically hand off to a private cloud when needed (with a users permission) Apps default to an AI model running locally for speed and privacy but switch to Flowers cloud when they require extra computational oomph.Companies like Microsoft and Apple have adopted similar approaches across their operating systems and devices. However, Flower is one of the first to build a hybrid cloud-local AI platform entirely on open models, including models from Metas Llama family, Chinese AI lab DeepSeek, and Mistral.Flower Labs claims that its cloud, the Flower Confidential Remote Compute service, employs end-to-end encryption and other techniques to protect sensitive user data. In a statement, Ryan Sipes, managing director for Mozilla Thunderbird, said that Flower Intelligence enables Mozilla to ship on-device AI that works locally with the most sensitive data. Developers can apply for early access to Flower Intelligence as of Tuesday. Flower Labs says that it plans to make the service more widely available in the near future and introduce capabilities including model customization, fine-tuning, and federated training in the cloud. Flower Labs is hosting an online and in-person summit in London on March 26, where the company is promising to reveal additional Flower Intelligence details and features.Since launching in 2023, Flower Labs has raised around $23.6 million in venture capital from investors including Felicis, Hugging Face CEO Clem Delangue, Betaworks, and Pioneer Fund. Brave, the open source web browser, was an early partner and collaborator.
    0 Comments ·0 Shares ·63 Views
  • HandCraft Pro Mocap Tool Now Available
    www.awn.com
    HandCraft Pro, a new tool that allows users to capture real-time hand motion with a webcam and bake directly onto characters in Maya, has been released by animator Tal Minks.Using advanced machine learning algorithms through a Mediapipe integration, the tool tracks hand movement with accuracy, providing clean, ready-to-edit curves. Minks, who developed the system, says that HandCraft Pro is ideal for both keyframe animators who need to block in hand poses quickly, and for mocap productions with artists looking to refine hand motion during cleanup. Artists can edit poses in real-time during the capture process with hand motions.HandCraft Pro is available now to purchase for both freelancers and studios.Check out a tutorial:Source: HandCraft Pro Journalist, antique shop owner, aspiring gemologistL'Wrenbrings a diverse perspective to animation, where every frame reflects her varied passions.
    0 Comments ·0 Shares ·45 Views
  • DNEG X Denis Villeneuve
    www.artofvfx.com
    Breakdown & ShowreelsDNEG X Denis VilleneuveBy Vincent Frei - 11/03/2025 Decades of collaboration. Countless breathtaking visuals. Multiple prestigious awards. From Blade Runner 2049 to Dune: Part Two, DNEG and Denis Villeneuve have redefined cinematic storytelling together. Dive into the highlights in their showreel!WANT TO KNOW MORE?Blade Runner 2049: Heres my interview of Paul Lambert, VFX Supervisor at DNEG, about Blade Runner 2049.Dune: Heres my interview of Paul Lambert (Production VFX Supervisor), Tristan Myles (VFX Supervisor Vancouver), Brian Connor (VFX Supervisor Montreal), Robyn Luckham (Animation Supervisor) DNEG Vincent Frei The Art of VFX 2025
    0 Comments ·0 Shares ·50 Views
  • Vasilisa Romanenkos Lush Portraits Wrap Common Birds in Decadent Patterns
    www.thisiscolossal.com
    American Crow (2025),acrylic on canvas, 8 x 8 inches. All images courtesy of Vasilisa Romanenko and Arch Enemy Arts, shared with permissionVasilisa Romanenkos Lush Portraits Wrap Common Birds in Decadent PatternsMarch 11, 2025ArtNatureGrace EbertBeauty and natures resilience are at the core of Vasilisa Romanenkos work. The Connecticut-based artist paints faithful depictions of common yet dignified birds amid clusters of fruits and flowers, exploring the power of opulence in times of upheaval.A stately crow poses amid rust-colored roses, a great blue heron poses amid clusters of tangerines and lilies, and a small warbler perches amid pink poppies. Referencing the defiantly decorative works of English textile designer William Morris (18341896), Romanenko embraces the entrancing nature of decadent patterns.Great Blue Heron (2025), acrylic on canvas, 22 x 28 inchesI want my work to feel like an escape from everyday life, like taking a moment to be still and appreciate nature, she says about her solo exhibition, BIRDS & BLOOMS, at Arch Enemy Arts. Enveloped by flora at full bloom, the winged subjects exude a sense of calm and strength as they perch and prepare for their next flight.BIRDS & BLOOMS is on view through March 30 in Philadelphia. Find more from Romanenko on her website and Instagram.Northern Mockingbird (2025), acrylic on canvas, 11 x 14 inchesBlack-capped Chickadee (2025), acrylic on canvas, 5 x 7 inchesOrange-crowned Warbler (2025), acrylic on canvas, 5 x 7 inchesDark-eyed Juncos (2025), acrylic on canvas, 9 x 12 inchesPalm Warbler (2025), acrylic on canvas, 8 x 10 inchesBrewers Blackbird (2025), acrylic on canvas, 9 x 12 inchesNext article
    0 Comments ·0 Shares ·55 Views
  • Musk claims of Ukraine DDoS attack derided by cyber community
    www.computerweekly.com
    Tech oligarch Elon Musk has drawn criticism from cyber security experts following unsubstantiated claims that Ukraine was behind an apparent distributed denial of service (DDoS) attack on his social media platform, X, formerly known as Twitter.Musk, who currently heads the US governments Department of Government Efficiency (Doge) that has fired thousands of federal workers, accused the Ukrainian government of being behind the incident that brought down X services for many users on Monday 10 March. Speaking to the Fox Business news channel, he claimed a massive cyber attack targeting X appeared to have originated from IP addresses located in Ukraine.The incident came amid a serious deterioration in relations between Ukraine and the US, and just days after US Cyber Command, the countrys military offensive and defensive cyber unit, suspended offensive operations against Russia in a significant climbdown.Ukrainian officials were quick to refute the suggestion Kyiv was behind the cyber attack, and in conversation with the BBC, former National Cyber Security Centre head Ciaran Martin described Musks accusations as unconvincing and pretty much garbage.Martin told the BBC he would be hard-pressed to think of an organisation of Xs scale that has been so badly impacted by such an incident in recent years and suggested the incident did not paint a good picture of the platforms wider cyber resilience.In a DDoS attack, malicious actors bombard a server with junk web traffic to overwhelm it, forcing it offline and leaving legitimate users unable to access it.Such crude forms of cyber attack are well-known and relatively common they frequently form a key element in hacktivist actions thanks to their accessibility, which at first glance lends a certain element of credibility to Musks claims.However, DDoS attacks are launched via geographically disperse networks of computers and other devices that have been co-opted into botnets without their owners knowledge or consent. This makes it very hard to accurately locate the individuals responsible for them.Tom Parker, cyber security author and chief technology officer (CTO) at NetSPI, said the magnitude of the attack did strongly suggest the involvement of a sophisticated threat actor but it was important to understand that accurately attributing DDoS incidents is notoriously difficult.Such adversaries are highly adept at concealing their tracks. We must be extremely cautious about pointing fingers and sabre rattling without clear and compelling evidence to demonstrate capability, motive,and likely benefit for the party involved, Parker told Computer Weekly.Despite recent events, I do believe Ukraine is still seeking to foster a more positive relationship with the US, which would make it unlikely that the claims of Ukrainian involvement are well-grounded. Rather, the scenario appears to align more with a false flag operation deliberately crafted to implicate Ukraine.As we often see in these complex situations, the most straightforward explanation isnt always correct, and drawing conclusions prematurely can lead us astray, he said.Lending more weight to arguments against Musk, a pro-Palestinian hacktivist group known as Dark Storm Team subsequently claimed via Telegram that it had been behind the incident.An account on the Bluesky social media platform claiming to be associated with this group and appearing to have links to the Anonymous collective, described the DDoS attack as a peaceful protest and said attacks would continue.Jake Moore, global cyber security advisor at ESET, said: Cyber criminals attack from all angles and are incredibly fearless in their attempts. Whether they are directed by geopolitical groups or financially motivated gangs, DDoS attacks are a clever way of targeting a website without having to hack into the mainframe, and therefore the perpetrators can remain largely anonymous and difficult to point a finger at.This also makes it that much more difficult to protect from when the landscape is completely unknown apart from having generic DDoS protection. However, even with such protection, each year, threat actors become better equipped and use even more IP addresses such as home IoT devices to flood systems, making it increasingly more difficult to protect from.Added Moore: Unfortunately, X remains one of the most talked about platforms, making it a typical target for hackers marking their own territory. All that can be done to future-proof their networks is to continue to expect the unexpected and build even more robust DDoS protection layers.Read more about DDoS attacksDDoS attacks are on the rise again. While they usually strike without warning, there are some red flags to be aware of. Rapid detection is key to surviving such an attack.A DDoS attack can wreak havoc on an organisation, but a number of strategies can help stop such attacks and minimise their damage.Learn how to recover from a DDoS attack and get operations back online quickly, while minimising impact on customers and brand reputation.
    0 Comments ·0 Shares ·53 Views
  • UK government under-prepared for catastrophic cyber attack, hears PAC
    www.computerweekly.com
    zgphotography - stock.adobe.comNewsUK government under-prepared for catastrophic cyber attack, hears PACThe Commons Public Accounts Committee heard government IT leaders respond to recent National Audit Office findings that the governments cyber resilience is under parByBrian McKenna,Enterprise Applications EditorPublished: 11 Mar 2025 15:00 The government is under-prepared for a catastrophic cyber attack and still dogged by legacy IT, but making progress, the Public Accounts Committee of the House of Commons has heard.The committee, chaired by Geoffrey Clifton-Brown, Conservative MP for North Cotswolds, took testimony on 10 March from four high-ranking government IT leaders about the cyber resilience of Whitehall departments. This followed the publication, in January, of a report by the National Audit Office (NAO), which found government cyber resilience lacking, weakened by legacy IT and skills shortages, and facing mounting threats.In itsGovernment cyber resiliencereport, thepublic spending watchdogwarned that the cyber threat to the UK government is severe and advancing quickly. It found that 58 critical government IT systems, assessed in 2024, had significant gaps in cyber resilience, and the government does not know how vulnerable at least 228 legacy IT systems are to cyber attack.The NAO spotted that the governments cyber assurance scheme,GovAssure, found significant gaps in cyber resilience, with multiple fundamental system controls at low levels of maturity across departments.GovAssureassesses the critical systems of government organisations. It was set up in April 2023.The question, according to the report under review at the PAC committee session, is no longer if the government will face a damaging cyber attack, but how severe the impacts may be, as the sophistication and number of attacks continues to rise.As the governments operations become increasingly digitised, so too does the severity of potential impacts resulting from cyber attacks. In an effort to combat this, the government published a Cyber Security Strategy in 2022, which set out plans to make the public sector resilient to cyber attacks by 2030. The PAC chair said the committee would look at how the government understands the severity of the cyber threat that it faces, how it can best achieve the aim of the strategy, and build the governments resilience to cyber attacks.Testifying before the committee were: Cat Little, chief operating officer for the Civil Service and permanent secretary to the Cabinet Office; Vincent Devine, government chief security officer and head of the Cabinet Offices Government Security Function; Joanna Davinson, interim government chief digital officer at the Department for Science, Innovation and Technology; and Bella Powell, cyber director of the Cabinet Offices Government Security Group.One matter of concern to the MPs on the committee is the lack of visibility civil servants seem to have into the very number of government IT systems, spread across departments and arms-length bodies, and to what extent they are legacy systems especially vulnerable to cyber attack.Clive Betts, Labour MP for Sheffield South East, said: This is quite a critical issue. This is about the threat from potential cyber attack that could be launched against a legacy system, and we dont yet know what the systems are to begin with. This is quite a critical issue. This is about the threat from potential cyber attack that could be launched against a legacy system, and we dont yet know what the systems are to begin with Clive BettsLabour MP for Sheffield South East Davinson responded: Its not a simple, Whats the list? Weve asked that question of departments, and have had responses through our legacy risk framework. Weve got that understanding and we are continuing to expand that out to other organisations. [But] its not a resource-free exercise.Little added: What this part of our discussion really brings to light is that government, in a period of scarce resources, has got to make prioritised decisions based on risks and how much assurance is desired. And its for the government to set its risk appetite, and to use that risk appetite and information to allocate resources accordingly.Weve made huge progress in understanding the most significant issues that weve got [in terms of legacy], and whilst its not every single system, it is the vast majority ... [and] were using both GovAssure and our technical expertise in legacy IT to set out for ministers the choices about risk and how much risk they want to buy out. That is the fundamental question. If youve got X billion pounds available to fund people, resources, skills, to remediate legacy IT, and to invest in new technology, how you use your allocative resource has got to be risk based, and its got to be outcome based. The whole point of the Spending Review process is to bring outcomes and risks together so that ministers can make a funding allocation choice.Powell said: We are ramping up the number of systems that were looking at. We are not doing that in an exponential fashion, but I think its also worth noting that with GovAssure, we are driving the car and building it at the same time. We launched it in April 2023 following some early pilots with departments [when] it was still at an early-stage assurance process.There is much more that we can and need to do, particularly in terms of automation of that process, in terms of providing stronger support and guidance to departments in implementing it, and also in the root cause analysis to better understand the data that we are gathering from that process. It is by no means a finished product, it is by no means a perfect product, but what its already starting to do is give us the outcomes that we need in terms of understanding resilience levels and where we can take action.MPs were also concerned about the extent to which the government has, as the NAO report states, under-estimated the extent of cyber risk.Devine was candid in relation to the lateness of the introduction of GovAssure in April 2023. We probably have woken up to the scale of cyber risk more slowly than we should have done. We were probably unrealistic in relying upon self-assessment [of government departments], he said. We didnt ramp up the government response to cyber security from assurance through to response as quickly as we should have ... because we [werent] as alive to the threats as we should have been Vincent DevineCabinet Office Despite recognising this in 2010, starting to invest money significantly in 2016, we didnt ramp up the government response to cyber security from assurance through to response as quickly as we should have, in retrospect. Why? Because I dont think we were as alive to the threats as we should have been, and probably because we hadnt had the incidents that brought it to life for us that we and our allies have had over the last five years. Its not a good answer, but it is the true answer, Devine added.To that, Little added: Its really difficult to go back in time to our predecessors. Like all good risk management, you manage risks as best you can until they become an issue. When they become an issue, and theyre live and theyre real, you step up your response. Weve always known about the risks, but it wasnt until it became a real, live issue that the scale of what we were dealing with became clear, and it needs a different sort of response.The original NAO report gave, as an example of how damaging cyber attacks can be, the instance, in June 2024, of anattack on a supplier of pathology services to the NHS in south-east London, which led to two NHS foundation trusts postponing 10,152 acute outpatient appointments and 1,710 elective procedures. It also cited the British Library ransomware attack in October 2023, which has already cost 600,000 to rebuild services. The library expects to spend many times more as it continues to recover. These were mentioned in the PAC session.The report found that the biggest risk to making the UK government resilient to cyber attack is a gaping skills gap. One in three cyber security roles in government were vacant or filled by temporary and more expensive staff in 2023-24, while more than half of cyber roles in several departments were vacant, and 70% of specialist security architects were staff on temporary contracts.In the Public Accounts Committee meeting, Little said she was sad to see a continued over-reliance on contractors, but that initiatives such as a cyber security Fast Stream and a new digital pay framework were starting to have an impact.Powell added that the overall number of digital technology professionals in the civil service has grown, and stands at nearly 6%.Its not as much as wed like it to be. We are struggling with the very technical resources, and thats a market problem they are scarce in the private sector as well as in the public sector, she said.Read more about UK government cyber resilienceNAO: UK government cyber resilience weak in face of mounting threats.Local government bodies are being invited to take advantage of a new NCSC-derived Cyber Assessment Framework to help enhance their resilience and ward off cyber attacks.Labour government plans new laws around cyber security, data sharing and skills.In The Current Issue:Digital twins map the world and guide strategic decisionsLiverpool reinvents customer service through digital platformDownload Current IssueSUSE CEO: Enterprise Linux where choice happens' Open Source InsiderSLM series - OurCrowd: Are domain-specific LLMs just as good (or better)? CW Developer NetworkView All Blogs
    0 Comments ·0 Shares ·50 Views
  • What's the best tiling window manager for a Linux beginner?
    www.zdnet.com
    If you're looking to up your Linux desktop game, a tiling window manager might be what you're looking for. Here's where I recommend you start.
    0 Comments ·0 Shares ·61 Views
  • I found an Android 15 tablet that costs less than $200 - and it's got a big screen
    www.zdnet.com
    The Blackview Mega 2 delivers a large display, long battery life, and solid performance - all at an affordable price.
    0 Comments ·0 Shares ·63 Views