• ¿Quién necesita un piloto cuando puedes tener un radar? La Universitat Politècnica de València (UPV) se ha puesto seria y ha diseñado un prototipo de antena radar para evitar que nuestros adorables drones se estrellen entre ellos. Es como ponerle un casco a un niño que corre en su bicicleta: tal vez no evite la caída, pero al menos lo hará ver más “responsable”.

    Así que, ¡mientras los drones se lanzan en una danza aérea de locura, ahora podrán evitar sus choques con la ayuda de esta tecnología! Esperemos que esto no se convierta en un nuevo juego de “¿Quién se estrella primero?” en el cielo.

    #Drones #Radar #Seg
    ¿Quién necesita un piloto cuando puedes tener un radar? La Universitat Politècnica de València (UPV) se ha puesto seria y ha diseñado un prototipo de antena radar para evitar que nuestros adorables drones se estrellen entre ellos. Es como ponerle un casco a un niño que corre en su bicicleta: tal vez no evite la caída, pero al menos lo hará ver más “responsable”. Así que, ¡mientras los drones se lanzan en una danza aérea de locura, ahora podrán evitar sus choques con la ayuda de esta tecnología! Esperemos que esto no se convierta en un nuevo juego de “¿Quién se estrella primero?” en el cielo. #Drones #Radar #Seg
    Diseñan en la UPV un prototipo de antena radar para evitar colisiones entre aeronaves no tripuladas
    Investigadores de la Universitat Politècnica de València (UPV) han desarrollado y validado un prototipo de antena radar para aeronaves no tripuladas (UAS), como los drones, que podría marcar un antes y un después en la gestión segura del tráfico aére
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Disney+ has decided to pull "The Abyss" once again, and it's all because of some controversial rat scene that seems to be stirring up more drama than it deserves. Honestly, who cares? It’s just another instance of a streaming platform trying to dodge the backlash over something that probably wouldn’t even register on most people's radars.

    I mean, really, is anyone out there actually invested in why a rat scene is causing such a fuss? It feels like a lot of noise over nothing. Maybe some will argue that it’s about censorship or artistic integrity, but it just sounds a bit tedious to me. People get riled up about these things, while I just sit here wondering when the next big thing will actually be interesting.

    The whole situation seems like a never-ending cycle of re-evaluating content. Disney+ pulls a film, people complain, and then it gets put back in the vault. It’s like watching a rerun of a show you didn’t even like the first time. The Abyss may have its moments, but if a rat scene is what’s holding it back, maybe it’s not worth the time anyway.

    Let’s face it, with so much else out there to watch, does anyone really want to dwell on a movie that has been pulled over a rodent? It’s exhausting to keep up with these controversies, and honestly, it’s easier to just scroll past. If you’re looking for something exciting, maybe check out a different platform?

    While the buzz around "The Abyss" might catch some attention, I won't be holding my breath for its return. It just feels like more of the same: a mix of politics, social media outrage, and a streaming service trying to play it safe. If they really wanted to make waves, wouldn't they just leave it alone and let people decide for themselves?

    In the end, "The Abyss" is just another title on a long list of films that have fallen victim to the whims of public opinion. So, let’s just move on to something else, shall we? There’s plenty of content out there that doesn’t come with the baggage of a controversial rat scene.

    #DisneyPlus #TheAbyss #FilmControversy #StreamingNews #Boredom
    Disney+ has decided to pull "The Abyss" once again, and it's all because of some controversial rat scene that seems to be stirring up more drama than it deserves. Honestly, who cares? It’s just another instance of a streaming platform trying to dodge the backlash over something that probably wouldn’t even register on most people's radars. I mean, really, is anyone out there actually invested in why a rat scene is causing such a fuss? It feels like a lot of noise over nothing. Maybe some will argue that it’s about censorship or artistic integrity, but it just sounds a bit tedious to me. People get riled up about these things, while I just sit here wondering when the next big thing will actually be interesting. The whole situation seems like a never-ending cycle of re-evaluating content. Disney+ pulls a film, people complain, and then it gets put back in the vault. It’s like watching a rerun of a show you didn’t even like the first time. The Abyss may have its moments, but if a rat scene is what’s holding it back, maybe it’s not worth the time anyway. Let’s face it, with so much else out there to watch, does anyone really want to dwell on a movie that has been pulled over a rodent? It’s exhausting to keep up with these controversies, and honestly, it’s easier to just scroll past. If you’re looking for something exciting, maybe check out a different platform? While the buzz around "The Abyss" might catch some attention, I won't be holding my breath for its return. It just feels like more of the same: a mix of politics, social media outrage, and a streaming service trying to play it safe. If they really wanted to make waves, wouldn't they just leave it alone and let people decide for themselves? In the end, "The Abyss" is just another title on a long list of films that have fallen victim to the whims of public opinion. So, let’s just move on to something else, shall we? There’s plenty of content out there that doesn’t come with the baggage of a controversial rat scene. #DisneyPlus #TheAbyss #FilmControversy #StreamingNews #Boredom
    Like
    Love
    Wow
    Angry
    Sad
    344
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Burnout, $1M income, retiring early: Lessons from 29 people secretly working multiple remote jobs

    Secretly working multiple full-time remote jobs may sound like a nightmare — but Americans looking to make their financial dreams come true willingly hustle for it.Over the past two years, Business Insider has interviewed more than two dozen "overemployed" workers, many of whom work in tech roles. They tend to work long hours but say the extra earnings are worth it to pay off student debt, save for an early retirement, and afford expensive vacations and weight-loss drugs. Many started working multiple jobs during the pandemic, when remote job openings soared.One example is Sarah, who's on track to earn about this year by secretly working two remote IT jobs. Over the last few years, Sarah said the extra income from job juggling has helped her save more than in her 401s, pay off in credit card debt, and furnish her home.Sarah, who's in her 50s and lives in the Southeast, said working 12-hour days is worth it for the job security. This security came in handy when she was laid off from one of her jobs last year. She's since found a new second gig."I want to ride this out until I retire," Sarah previously told BI. Business Insider verified her identity, but she asked to use a pseudonym, citing fears of professional repercussions. BI spoke to one boss who caught an employee secretly working another job and fired him. Job juggling could breach some employment contracts and be a fireable offense.Overemployed workers like Sarah told BI how they've landed extra roles, juggled the workload, and stayed under the radar. Some said they rely on tactics like blocking off calendars, using separate devices, minimizing meetings, and sticking to flexible roles with low oversight.
    While job juggling could have professional repercussions or lead to burnout, and some readers have questioned the ethics of this working arrangement, many workers have told BI they don't feel guilty about their job juggling — and that the financial benefits generally outweigh the downsides and risks.

    In recent years, some have struggled to land new remote gigs, due in part to hiring slowdowns and return-to-office mandates. Most said they plan to continue pursuing overemployment as long as they can.Read the stories ahead to learn how some Americans have managed the workload, risks, and stress of working multiple jobs — and transformed their finances.
    #burnout #income #retiring #early #lessons
    Burnout, $1M income, retiring early: Lessons from 29 people secretly working multiple remote jobs
    Secretly working multiple full-time remote jobs may sound like a nightmare — but Americans looking to make their financial dreams come true willingly hustle for it.Over the past two years, Business Insider has interviewed more than two dozen "overemployed" workers, many of whom work in tech roles. They tend to work long hours but say the extra earnings are worth it to pay off student debt, save for an early retirement, and afford expensive vacations and weight-loss drugs. Many started working multiple jobs during the pandemic, when remote job openings soared.One example is Sarah, who's on track to earn about this year by secretly working two remote IT jobs. Over the last few years, Sarah said the extra income from job juggling has helped her save more than in her 401s, pay off in credit card debt, and furnish her home.Sarah, who's in her 50s and lives in the Southeast, said working 12-hour days is worth it for the job security. This security came in handy when she was laid off from one of her jobs last year. She's since found a new second gig."I want to ride this out until I retire," Sarah previously told BI. Business Insider verified her identity, but she asked to use a pseudonym, citing fears of professional repercussions. BI spoke to one boss who caught an employee secretly working another job and fired him. Job juggling could breach some employment contracts and be a fireable offense.Overemployed workers like Sarah told BI how they've landed extra roles, juggled the workload, and stayed under the radar. Some said they rely on tactics like blocking off calendars, using separate devices, minimizing meetings, and sticking to flexible roles with low oversight. While job juggling could have professional repercussions or lead to burnout, and some readers have questioned the ethics of this working arrangement, many workers have told BI they don't feel guilty about their job juggling — and that the financial benefits generally outweigh the downsides and risks. In recent years, some have struggled to land new remote gigs, due in part to hiring slowdowns and return-to-office mandates. Most said they plan to continue pursuing overemployment as long as they can.Read the stories ahead to learn how some Americans have managed the workload, risks, and stress of working multiple jobs — and transformed their finances. #burnout #income #retiring #early #lessons
    WWW.BUSINESSINSIDER.COM
    Burnout, $1M income, retiring early: Lessons from 29 people secretly working multiple remote jobs
    Secretly working multiple full-time remote jobs may sound like a nightmare — but Americans looking to make their financial dreams come true willingly hustle for it.Over the past two years, Business Insider has interviewed more than two dozen "overemployed" workers, many of whom work in tech roles. They tend to work long hours but say the extra earnings are worth it to pay off student debt, save for an early retirement, and afford expensive vacations and weight-loss drugs. Many started working multiple jobs during the pandemic, when remote job openings soared.One example is Sarah, who's on track to earn about $300,000 this year by secretly working two remote IT jobs. Over the last few years, Sarah said the extra income from job juggling has helped her save more than $100,000 in her 401(k)s, pay off $17,000 in credit card debt, and furnish her home.Sarah, who's in her 50s and lives in the Southeast, said working 12-hour days is worth it for the job security. This security came in handy when she was laid off from one of her jobs last year. She's since found a new second gig."I want to ride this out until I retire," Sarah previously told BI. Business Insider verified her identity, but she asked to use a pseudonym, citing fears of professional repercussions. BI spoke to one boss who caught an employee secretly working another job and fired him. Job juggling could breach some employment contracts and be a fireable offense.Overemployed workers like Sarah told BI how they've landed extra roles, juggled the workload, and stayed under the radar. Some said they rely on tactics like blocking off calendars, using separate devices, minimizing meetings, and sticking to flexible roles with low oversight. While job juggling could have professional repercussions or lead to burnout, and some readers have questioned the ethics of this working arrangement, many workers have told BI they don't feel guilty about their job juggling — and that the financial benefits generally outweigh the downsides and risks. In recent years, some have struggled to land new remote gigs, due in part to hiring slowdowns and return-to-office mandates. Most said they plan to continue pursuing overemployment as long as they can.Read the stories ahead to learn how some Americans have managed the workload, risks, and stress of working multiple jobs — and transformed their finances.
    Like
    Love
    Wow
    Angry
    Sad
    457
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Patch Notes #9: Xbox debuts its first handhelds, Hong Kong authorities ban a video game, and big hopes for Big Walk

    We did it gang. We completed another week in the impossible survival sim that is real life. Give yourself a appreciative pat on the back and gaze wistfully towards whatever adventures or blissful respite the weekend might bring.This week I've mostly been recovering from my birthday celebrations, which entailed a bountiful Korean Barbecue that left me with a rampant case of the meat sweats and a pub crawl around one of Manchester's finest suburbs. There was no time for video games, but that's not always a bad thing. Distance makes the heart grow fonder, after all.I was welcomed back to the imaginary office with a news bludgeon to the face. The headlines this week have come thick and fast, bringing hardware announcements, more layoffs, and some notable sales milestones. As always, there's a lot to digest, so let's venture once more into the fray. The first Xbox handhelds have finally arrivedvia Game Developer // Microsoft finally stopped flirting with the idea of launching a handheld this week and unveiled not one, but two devices called the ROG Xbox Ally and ROG Xbox Ally X. The former is pitched towards casual players, while the latter aims to entice hardcore video game aficionados. Both devices were designed in collaboration with Asus and will presumably retail at price points that reflect their respective innards. We don't actually know yet, mind, because Microsoft didn't actually state how much they'll cost. You have the feel that's where the company really needs to stick the landing here.Related:Switch 2 tops 3.5 million sales to deliver Nintendo's biggest console launchvia Game Developer // Four days. That's all it took for the Switch 2 to shift over 3.5 million units worldwide to deliver Nintendo's biggest console launch ever. The original Switch needed a month to reach 2.74 million sales by contrast, while the PS5 needed two months to sell 4.5 million units worldwide. Xbox sales remain a mystery because Microsoft just doesn't talk about that sort of thing anymore, which is decidedly frustrating for those oddballswho actually enjoy sifting through financial documents in search of those juicy juicy numbers.Inside the ‘Dragon Age’ Debacle That Gutted EA’s BioWare Studiovia Bloomberg// How do you kill a franchise like Dragon Age and leave a studio with the pedigree of BioWare in turmoil? According to a new report from Bloomberg, the answer will likely resonate with developers across the industry: corporate meddling. Sources speaking to the publication explained how Dragon Age: The Veilguard, which failed to meet the expectations of parent company EA, was in constant disarray because the American publisher couldn't decide whether it should be a live-service or single player title. Indecision from leadership within EA and an eventual pivot away from the live-service model only caused more confusion, with BioWare being told to implement foundational changes within impossible timelines. It's a story that's all the more alarming because of how familiar it feels.Related:Sony is making layoffs at Days Gone developer Bend Studiovia Game Developer // Sony has continued its Tony Award-winning tun as the Grim Reaper by cutting even more jobs within PlayStation Studios. Days Gone developer Bend Studio was the latest casualty, with the first-party developer confirming a number of employees were laid off just months after the cancellation of a live-service project. Sony didn't confirm how many people lost their jobs, but Bloomberg reporter Jason Schreier heard that around 40 peoplewere let go. Embracer CEO Lars Wingefors to become executive chair and focus on M&Avia Game Developer // Somewhere, in a deep dark corner of the world, the monkey's paw has curled. Embracer CEO Lars Wingefors, who demonstrated his leadership nous by spending years embarking on a colossal merger and acquisition spree only to immediately start downsizing, has announced he'll be stepping down as CEO. The catch? Wingefors is currently proposed to be appointed executive chair of the board of Embracer. In his new role, he'll apparently focus on strategic initiatives, capital allocation, and mergers and acquisitions. And people wonder why satire is dead. Related:Hong Kong Outlaws a Video Game, Saying It Promotes 'Armed Revolution'via The New York Times// National security police in Hong Kong have banned a Taiwanese video game called Reversed Front: Bonfire for supposedly "advocating armed revolution." Authorities in the region warned that anybody who downloads or recommends the online strategy title will face serious legal charges. The game has been pulled from Apple's marketplace in Hong Kong but is still available for download elsewhere. It was never available in mainland China. Developer ESC Taiwan, part of an group of volunteers who are vocal detractors of China's Communist Party, thanked Hong Kong authorities for the free publicity in a social media post and said the ban shows how political censorship remains prominent in the territory. RuneScape developer accused of ‘catering to American conservatism’ by rolling back Pride Month eventsvia PinkNews // Runescape developers inside Jagex have reportedly been left reeling after the studio decided to pivot away from Pride Month content to focus more on "what players wanted." Jagex CEO broke the news to staff with a post on an internal message board, prompting a rush of complaints—with many workers explaining the content was either already complete or easy to implement. Though Jagex is based in the UK, it's parent company CVC Capital Partners operates multiple companies in the United States. It's a situation that left one employee who spoke to PinkNews questioning whether the studio has caved to "American conservatism." SAG-AFTRA suspends strike and instructs union members to return to workvia Game Developer // It has taken almost a year, but performer union SAG-AFTRA has finally suspended strike action and instructed members to return to work. The decision comes after protracted negotiations with major studios who employ performers under the Interactive Media Agreement. SAG-AFTRA had been striking to secure better working conditions and AI protections for its members, and feels it has now secured a deal that will install vital "AI guardrails."A Switch 2 exclusive Splatoon spinoff was just shadow-announced on Nintendo Todayvia Game Developer // Nintendo did something peculiar this week when it unveiled a Splatoon spinoff out of the blue. That in itself might not sound too strange, but for a short window the announcement was only accessible via the company's new Nintendo Today mobile app. It's a situation that left people without access to the app questioning whether the news was even real. Nintendo Today prevented users from capturing screenshots or footage, only adding to the sense of confusion. It led to this reporter branding the move a "shadow announcement," which in turn left some of our readers perplexed. Can you ever announce and announcement? What does that term even mean? Food for thought. A wonderful new Big Walk trailer melted this reporter's heartvia House House//  The mad lads behind Untitled Goose Game are back with a new jaunt called Big Walk. This one has been on my radar for a while, but the studio finally debuted a gameplay overview during Summer Game Fest and it looks extraordinary in its purity. It's about walking and talking—and therein lies the charm. Players are forced to cooperate to navigate a lush open world, solve puzzles, and embark upon hijinks. Proximity-based communication is the core mechanic in Big Walk—whether that takes the form of voice chat, written text, hand signals, blazing flares, or pictograms—and it looks like it'll lead to all sorts of weird and wonderful antics. It's a pitch that cuts through because it's so unashamedly different, and there's a lot to love about that. I'm looking forward to this one.
    #patch #notes #xbox #debuts #its
    Patch Notes #9: Xbox debuts its first handhelds, Hong Kong authorities ban a video game, and big hopes for Big Walk
    We did it gang. We completed another week in the impossible survival sim that is real life. Give yourself a appreciative pat on the back and gaze wistfully towards whatever adventures or blissful respite the weekend might bring.This week I've mostly been recovering from my birthday celebrations, which entailed a bountiful Korean Barbecue that left me with a rampant case of the meat sweats and a pub crawl around one of Manchester's finest suburbs. There was no time for video games, but that's not always a bad thing. Distance makes the heart grow fonder, after all.I was welcomed back to the imaginary office with a news bludgeon to the face. The headlines this week have come thick and fast, bringing hardware announcements, more layoffs, and some notable sales milestones. As always, there's a lot to digest, so let's venture once more into the fray. The first Xbox handhelds have finally arrivedvia Game Developer // Microsoft finally stopped flirting with the idea of launching a handheld this week and unveiled not one, but two devices called the ROG Xbox Ally and ROG Xbox Ally X. The former is pitched towards casual players, while the latter aims to entice hardcore video game aficionados. Both devices were designed in collaboration with Asus and will presumably retail at price points that reflect their respective innards. We don't actually know yet, mind, because Microsoft didn't actually state how much they'll cost. You have the feel that's where the company really needs to stick the landing here.Related:Switch 2 tops 3.5 million sales to deliver Nintendo's biggest console launchvia Game Developer // Four days. That's all it took for the Switch 2 to shift over 3.5 million units worldwide to deliver Nintendo's biggest console launch ever. The original Switch needed a month to reach 2.74 million sales by contrast, while the PS5 needed two months to sell 4.5 million units worldwide. Xbox sales remain a mystery because Microsoft just doesn't talk about that sort of thing anymore, which is decidedly frustrating for those oddballswho actually enjoy sifting through financial documents in search of those juicy juicy numbers.Inside the ‘Dragon Age’ Debacle That Gutted EA’s BioWare Studiovia Bloomberg// How do you kill a franchise like Dragon Age and leave a studio with the pedigree of BioWare in turmoil? According to a new report from Bloomberg, the answer will likely resonate with developers across the industry: corporate meddling. Sources speaking to the publication explained how Dragon Age: The Veilguard, which failed to meet the expectations of parent company EA, was in constant disarray because the American publisher couldn't decide whether it should be a live-service or single player title. Indecision from leadership within EA and an eventual pivot away from the live-service model only caused more confusion, with BioWare being told to implement foundational changes within impossible timelines. It's a story that's all the more alarming because of how familiar it feels.Related:Sony is making layoffs at Days Gone developer Bend Studiovia Game Developer // Sony has continued its Tony Award-winning tun as the Grim Reaper by cutting even more jobs within PlayStation Studios. Days Gone developer Bend Studio was the latest casualty, with the first-party developer confirming a number of employees were laid off just months after the cancellation of a live-service project. Sony didn't confirm how many people lost their jobs, but Bloomberg reporter Jason Schreier heard that around 40 peoplewere let go. Embracer CEO Lars Wingefors to become executive chair and focus on M&Avia Game Developer // Somewhere, in a deep dark corner of the world, the monkey's paw has curled. Embracer CEO Lars Wingefors, who demonstrated his leadership nous by spending years embarking on a colossal merger and acquisition spree only to immediately start downsizing, has announced he'll be stepping down as CEO. The catch? Wingefors is currently proposed to be appointed executive chair of the board of Embracer. In his new role, he'll apparently focus on strategic initiatives, capital allocation, and mergers and acquisitions. And people wonder why satire is dead. Related:Hong Kong Outlaws a Video Game, Saying It Promotes 'Armed Revolution'via The New York Times// National security police in Hong Kong have banned a Taiwanese video game called Reversed Front: Bonfire for supposedly "advocating armed revolution." Authorities in the region warned that anybody who downloads or recommends the online strategy title will face serious legal charges. The game has been pulled from Apple's marketplace in Hong Kong but is still available for download elsewhere. It was never available in mainland China. Developer ESC Taiwan, part of an group of volunteers who are vocal detractors of China's Communist Party, thanked Hong Kong authorities for the free publicity in a social media post and said the ban shows how political censorship remains prominent in the territory. RuneScape developer accused of ‘catering to American conservatism’ by rolling back Pride Month eventsvia PinkNews // Runescape developers inside Jagex have reportedly been left reeling after the studio decided to pivot away from Pride Month content to focus more on "what players wanted." Jagex CEO broke the news to staff with a post on an internal message board, prompting a rush of complaints—with many workers explaining the content was either already complete or easy to implement. Though Jagex is based in the UK, it's parent company CVC Capital Partners operates multiple companies in the United States. It's a situation that left one employee who spoke to PinkNews questioning whether the studio has caved to "American conservatism." SAG-AFTRA suspends strike and instructs union members to return to workvia Game Developer // It has taken almost a year, but performer union SAG-AFTRA has finally suspended strike action and instructed members to return to work. The decision comes after protracted negotiations with major studios who employ performers under the Interactive Media Agreement. SAG-AFTRA had been striking to secure better working conditions and AI protections for its members, and feels it has now secured a deal that will install vital "AI guardrails."A Switch 2 exclusive Splatoon spinoff was just shadow-announced on Nintendo Todayvia Game Developer // Nintendo did something peculiar this week when it unveiled a Splatoon spinoff out of the blue. That in itself might not sound too strange, but for a short window the announcement was only accessible via the company's new Nintendo Today mobile app. It's a situation that left people without access to the app questioning whether the news was even real. Nintendo Today prevented users from capturing screenshots or footage, only adding to the sense of confusion. It led to this reporter branding the move a "shadow announcement," which in turn left some of our readers perplexed. Can you ever announce and announcement? What does that term even mean? Food for thought. A wonderful new Big Walk trailer melted this reporter's heartvia House House//  The mad lads behind Untitled Goose Game are back with a new jaunt called Big Walk. This one has been on my radar for a while, but the studio finally debuted a gameplay overview during Summer Game Fest and it looks extraordinary in its purity. It's about walking and talking—and therein lies the charm. Players are forced to cooperate to navigate a lush open world, solve puzzles, and embark upon hijinks. Proximity-based communication is the core mechanic in Big Walk—whether that takes the form of voice chat, written text, hand signals, blazing flares, or pictograms—and it looks like it'll lead to all sorts of weird and wonderful antics. It's a pitch that cuts through because it's so unashamedly different, and there's a lot to love about that. I'm looking forward to this one. #patch #notes #xbox #debuts #its
    WWW.GAMEDEVELOPER.COM
    Patch Notes #9: Xbox debuts its first handhelds, Hong Kong authorities ban a video game, and big hopes for Big Walk
    We did it gang. We completed another week in the impossible survival sim that is real life. Give yourself a appreciative pat on the back and gaze wistfully towards whatever adventures or blissful respite the weekend might bring.This week I've mostly been recovering from my birthday celebrations, which entailed a bountiful Korean Barbecue that left me with a rampant case of the meat sweats and a pub crawl around one of Manchester's finest suburbs. There was no time for video games, but that's not always a bad thing. Distance makes the heart grow fonder, after all.I was welcomed back to the imaginary office with a news bludgeon to the face. The headlines this week have come thick and fast, bringing hardware announcements, more layoffs, and some notable sales milestones. As always, there's a lot to digest, so let's venture once more into the fray. The first Xbox handhelds have finally arrivedvia Game Developer // Microsoft finally stopped flirting with the idea of launching a handheld this week and unveiled not one, but two devices called the ROG Xbox Ally and ROG Xbox Ally X. The former is pitched towards casual players, while the latter aims to entice hardcore video game aficionados. Both devices were designed in collaboration with Asus and will presumably retail at price points that reflect their respective innards. We don't actually know yet, mind, because Microsoft didn't actually state how much they'll cost. You have the feel that's where the company really needs to stick the landing here.Related:Switch 2 tops 3.5 million sales to deliver Nintendo's biggest console launchvia Game Developer // Four days. That's all it took for the Switch 2 to shift over 3.5 million units worldwide to deliver Nintendo's biggest console launch ever. The original Switch needed a month to reach 2.74 million sales by contrast, while the PS5 needed two months to sell 4.5 million units worldwide. Xbox sales remain a mystery because Microsoft just doesn't talk about that sort of thing anymore, which is decidedly frustrating for those oddballs (read: this writer) who actually enjoy sifting through financial documents in search of those juicy juicy numbers.Inside the ‘Dragon Age’ Debacle That Gutted EA’s BioWare Studiovia Bloomberg (paywalled) // How do you kill a franchise like Dragon Age and leave a studio with the pedigree of BioWare in turmoil? According to a new report from Bloomberg, the answer will likely resonate with developers across the industry: corporate meddling. Sources speaking to the publication explained how Dragon Age: The Veilguard, which failed to meet the expectations of parent company EA, was in constant disarray because the American publisher couldn't decide whether it should be a live-service or single player title. Indecision from leadership within EA and an eventual pivot away from the live-service model only caused more confusion, with BioWare being told to implement foundational changes within impossible timelines. It's a story that's all the more alarming because of how familiar it feels.Related:Sony is making layoffs at Days Gone developer Bend Studiovia Game Developer // Sony has continued its Tony Award-winning tun as the Grim Reaper by cutting even more jobs within PlayStation Studios. Days Gone developer Bend Studio was the latest casualty, with the first-party developer confirming a number of employees were laid off just months after the cancellation of a live-service project. Sony didn't confirm how many people lost their jobs, but Bloomberg reporter Jason Schreier heard that around 40 people (roughly 30 percent of the studio's headcount) were let go. Embracer CEO Lars Wingefors to become executive chair and focus on M&Avia Game Developer // Somewhere, in a deep dark corner of the world, the monkey's paw has curled. Embracer CEO Lars Wingefors, who demonstrated his leadership nous by spending years embarking on a colossal merger and acquisition spree only to immediately start downsizing, has announced he'll be stepping down as CEO. The catch? Wingefors is currently proposed to be appointed executive chair of the board of Embracer. In his new role, he'll apparently focus on strategic initiatives, capital allocation, and mergers and acquisitions. And people wonder why satire is dead. Related:Hong Kong Outlaws a Video Game, Saying It Promotes 'Armed Revolution'via The New York Times (paywalled) // National security police in Hong Kong have banned a Taiwanese video game called Reversed Front: Bonfire for supposedly "advocating armed revolution." Authorities in the region warned that anybody who downloads or recommends the online strategy title will face serious legal charges. The game has been pulled from Apple's marketplace in Hong Kong but is still available for download elsewhere. It was never available in mainland China. Developer ESC Taiwan, part of an group of volunteers who are vocal detractors of China's Communist Party, thanked Hong Kong authorities for the free publicity in a social media post and said the ban shows how political censorship remains prominent in the territory. RuneScape developer accused of ‘catering to American conservatism’ by rolling back Pride Month eventsvia PinkNews // Runescape developers inside Jagex have reportedly been left reeling after the studio decided to pivot away from Pride Month content to focus more on "what players wanted." Jagex CEO broke the news to staff with a post on an internal message board, prompting a rush of complaints—with many workers explaining the content was either already complete or easy to implement. Though Jagex is based in the UK, it's parent company CVC Capital Partners operates multiple companies in the United States. It's a situation that left one employee who spoke to PinkNews questioning whether the studio has caved to "American conservatism." SAG-AFTRA suspends strike and instructs union members to return to workvia Game Developer // It has taken almost a year, but performer union SAG-AFTRA has finally suspended strike action and instructed members to return to work. The decision comes after protracted negotiations with major studios who employ performers under the Interactive Media Agreement. SAG-AFTRA had been striking to secure better working conditions and AI protections for its members, and feels it has now secured a deal that will install vital "AI guardrails."A Switch 2 exclusive Splatoon spinoff was just shadow-announced on Nintendo Todayvia Game Developer // Nintendo did something peculiar this week when it unveiled a Splatoon spinoff out of the blue. That in itself might not sound too strange, but for a short window the announcement was only accessible via the company's new Nintendo Today mobile app. It's a situation that left people without access to the app questioning whether the news was even real. Nintendo Today prevented users from capturing screenshots or footage, only adding to the sense of confusion. It led to this reporter branding the move a "shadow announcement," which in turn left some of our readers perplexed. Can you ever announce and announcement? What does that term even mean? Food for thought. A wonderful new Big Walk trailer melted this reporter's heartvia House House (YouTube) //  The mad lads behind Untitled Goose Game are back with a new jaunt called Big Walk. This one has been on my radar for a while, but the studio finally debuted a gameplay overview during Summer Game Fest and it looks extraordinary in its purity. It's about walking and talking—and therein lies the charm. Players are forced to cooperate to navigate a lush open world, solve puzzles, and embark upon hijinks. Proximity-based communication is the core mechanic in Big Walk—whether that takes the form of voice chat, written text, hand signals, blazing flares, or pictograms—and it looks like it'll lead to all sorts of weird and wonderful antics. It's a pitch that cuts through because it's so unashamedly different, and there's a lot to love about that. I'm looking forward to this one.
    Like
    Love
    Wow
    Sad
    Angry
    524
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Reclaiming Control: Digital Sovereignty in 2025

    Sovereignty has mattered since the invention of the nation state—defined by borders, laws, and taxes that apply within and without. While many have tried to define it, the core idea remains: nations or jurisdictions seek to stay in control, usually to the benefit of those within their borders.
    Digital sovereignty is a relatively new concept, also difficult to define but straightforward to understand. Data and applications don’t understand borders unless they are specified in policy terms, as coded into the infrastructure.
    The World Wide Web had no such restrictions at its inception. Communitarian groups such as the Electronic Frontier Foundation, service providers and hyperscalers, non-profits and businesses all embraced a model that suggested data would look after itself.
    But data won’t look after itself, for several reasons. First, data is massively out of control. We generate more of it all the time, and for at least two or three decades, most organizations haven’t fully understood their data assets. This creates inefficiency and risk—not least, widespread vulnerability to cyberattack.
    Risk is probability times impact—and right now, the probabilities have shot up. Invasions, tariffs, political tensions, and more have brought new urgency. This time last year, the idea of switching off another country’s IT systems was not on the radar. Now we’re seeing it happen—including the U.S. government blocking access to services overseas.
    Digital sovereignty isn’t just a European concern, though it is often framed as such. In South America for example, I am told that sovereignty is leading conversations with hyperscalers; in African countries, it is being stipulated in supplier agreements. Many jurisdictions are watching, assessing, and reviewing their stance on digital sovereignty.
    As the adage goes: a crisis is a problem with no time left to solve it. Digital sovereignty was a problem in waiting—but now it’s urgent. It’s gone from being an abstract ‘right to sovereignty’ to becoming a clear and present issue, in government thinking, corporate risk and how we architect and operate our computer systems.
    What does the digital sovereignty landscape look like today?
    Much has changed since this time last year. Unknowns remain, but much of what was unclear this time last year is now starting to solidify. Terminology is clearer – for example talking about classification and localisation rather than generic concepts.
    We’re seeing a shift from theory to practice. Governments and organizations are putting policies in place that simply didn’t exist before. For example, some countries are seeing “in-country” as a primary goal, whereas othersare adopting a risk-based approach based on trusted locales.
    We’re also seeing a shift in risk priorities. From a risk standpoint, the classic triad of confidentiality, integrity, and availability are at the heart of the digital sovereignty conversation. Historically, the focus has been much more on confidentiality, driven by concerns about the US Cloud Act: essentially, can foreign governments see my data?
    This year however, availability is rising in prominence, due to geopolitics and very real concerns about data accessibility in third countries. Integrity is being talked about less from a sovereignty perspective, but is no less important as a cybercrime target—ransomware and fraud being two clear and present risks.
    Thinking more broadly, digital sovereignty is not just about data, or even intellectual property, but also the brain drain. Countries don’t want all their brightest young technologists leaving university only to end up in California or some other, more attractive country. They want to keep talent at home and innovate locally, to the benefit of their own GDP.
    How Are Cloud Providers Responding?
    Hyperscalers are playing catch-up, still looking for ways to satisfy the letter of the law whilst ignoringits spirit. It’s not enough for Microsoft or AWS to say they will do everything they can to protect a jurisdiction’s data, if they are already legally obliged to do the opposite. Legislation, in this case US legislation, calls the shots—and we all know just how fragile this is right now.
    We see hyperscaler progress where they offer technology to be locally managed by a third party, rather than themselves. For example, Google’s partnership with Thales, or Microsoft with Orange, both in France. However, these are point solutions, not part of a general standard. Meanwhile, AWS’ recent announcement about creating a local entity doesn’t solve for the problem of US over-reach, which remains a core issue.
    Non-hyperscaler providers and software vendors have an increasingly significant play: Oracle and HPE offer solutions that can be deployed and managed locally for example; Broadcom/VMware and Red Hat provide technologies that locally situated, private cloud providers can host. Digital sovereignty is thus a catalyst for a redistribution of “cloud spend” across a broader pool of players.
    What Can Enterprise Organizations Do About It?
    First, see digital sovereignty as a core element of data and application strategy. For a nation, sovereignty means having solid borders, control over IP, GDP, and so on. That’s the goal for corporations as well—control, self-determination, and resilience.
    If sovereignty isn’t seen as an element of strategy, it gets pushed down into the implementation layer, leading to inefficient architectures and duplicated effort. Far better to decide up front what data, applications and processes need to be treated as sovereign, and defining an architecture to support that.
    This sets the scene for making informed provisioning decisions. Your organization may have made some big bets on key vendors or hyperscalers, but multi-platform thinking increasingly dominates: multiple public and private cloud providers, with integrated operations and management. Sovereign cloud becomes one element of a well-structured multi-platform architecture.
    It is not cost-neutral to deliver on sovereignty, but the overall business value should be tangible. A sovereignty initiative should bring clear advantages, not just for itself, but through the benefits that come with better control, visibility, and efficiency.
    Knowing where your data is, understanding which data matters, managing it efficiently so you’re not duplicating or fragmenting it across systems—these are valuable outcomes. In addition, ignoring these questions can lead to non-compliance or be outright illegal. Even if we don’t use terms like ‘sovereignty’, organizations need a handle on their information estate.
    Organizations shouldn’t be thinking everything cloud-based needs to be sovereign, but should be building strategies and policies based on data classification, prioritization and risk. Build that picture and you can solve for the highest-priority items first—the data with the strongest classification and greatest risk. That process alone takes care of 80–90% of the problem space, avoiding making sovereignty another problem whilst solving nothing.
    Where to start? Look after your own organization first
    Sovereignty and systems thinking go hand in hand: it’s all about scope. In enterprise architecture or business design, the biggest mistake is boiling the ocean—trying to solve everything at once.
    Instead, focus on your own sovereignty. Worry about your own organization, your own jurisdiction. Know where your own borders are. Understand who your customers are, and what their requirements are. For example, if you’re a manufacturer selling into specific countries—what do those countries require? Solve for that, not for everything else. Don’t try to plan for every possible future scenario.
    Focus on what you have, what you’re responsible for, and what you need to address right now. Classify and prioritise your data assets based on real-world risk. Do that, and you’re already more than halfway toward solving digital sovereignty—with all the efficiency, control, and compliance benefits that come with it.
    Digital sovereignty isn’t just regulatory, but strategic. Organizations that act now can reduce risk, improve operational clarity, and prepare for a future based on trust, compliance, and resilience.
    The post Reclaiming Control: Digital Sovereignty in 2025 appeared first on Gigaom.
    #reclaiming #control #digital #sovereignty
    Reclaiming Control: Digital Sovereignty in 2025
    Sovereignty has mattered since the invention of the nation state—defined by borders, laws, and taxes that apply within and without. While many have tried to define it, the core idea remains: nations or jurisdictions seek to stay in control, usually to the benefit of those within their borders. Digital sovereignty is a relatively new concept, also difficult to define but straightforward to understand. Data and applications don’t understand borders unless they are specified in policy terms, as coded into the infrastructure. The World Wide Web had no such restrictions at its inception. Communitarian groups such as the Electronic Frontier Foundation, service providers and hyperscalers, non-profits and businesses all embraced a model that suggested data would look after itself. But data won’t look after itself, for several reasons. First, data is massively out of control. We generate more of it all the time, and for at least two or three decades, most organizations haven’t fully understood their data assets. This creates inefficiency and risk—not least, widespread vulnerability to cyberattack. Risk is probability times impact—and right now, the probabilities have shot up. Invasions, tariffs, political tensions, and more have brought new urgency. This time last year, the idea of switching off another country’s IT systems was not on the radar. Now we’re seeing it happen—including the U.S. government blocking access to services overseas. Digital sovereignty isn’t just a European concern, though it is often framed as such. In South America for example, I am told that sovereignty is leading conversations with hyperscalers; in African countries, it is being stipulated in supplier agreements. Many jurisdictions are watching, assessing, and reviewing their stance on digital sovereignty. As the adage goes: a crisis is a problem with no time left to solve it. Digital sovereignty was a problem in waiting—but now it’s urgent. It’s gone from being an abstract ‘right to sovereignty’ to becoming a clear and present issue, in government thinking, corporate risk and how we architect and operate our computer systems. What does the digital sovereignty landscape look like today? Much has changed since this time last year. Unknowns remain, but much of what was unclear this time last year is now starting to solidify. Terminology is clearer – for example talking about classification and localisation rather than generic concepts. We’re seeing a shift from theory to practice. Governments and organizations are putting policies in place that simply didn’t exist before. For example, some countries are seeing “in-country” as a primary goal, whereas othersare adopting a risk-based approach based on trusted locales. We’re also seeing a shift in risk priorities. From a risk standpoint, the classic triad of confidentiality, integrity, and availability are at the heart of the digital sovereignty conversation. Historically, the focus has been much more on confidentiality, driven by concerns about the US Cloud Act: essentially, can foreign governments see my data? This year however, availability is rising in prominence, due to geopolitics and very real concerns about data accessibility in third countries. Integrity is being talked about less from a sovereignty perspective, but is no less important as a cybercrime target—ransomware and fraud being two clear and present risks. Thinking more broadly, digital sovereignty is not just about data, or even intellectual property, but also the brain drain. Countries don’t want all their brightest young technologists leaving university only to end up in California or some other, more attractive country. They want to keep talent at home and innovate locally, to the benefit of their own GDP. How Are Cloud Providers Responding? Hyperscalers are playing catch-up, still looking for ways to satisfy the letter of the law whilst ignoringits spirit. It’s not enough for Microsoft or AWS to say they will do everything they can to protect a jurisdiction’s data, if they are already legally obliged to do the opposite. Legislation, in this case US legislation, calls the shots—and we all know just how fragile this is right now. We see hyperscaler progress where they offer technology to be locally managed by a third party, rather than themselves. For example, Google’s partnership with Thales, or Microsoft with Orange, both in France. However, these are point solutions, not part of a general standard. Meanwhile, AWS’ recent announcement about creating a local entity doesn’t solve for the problem of US over-reach, which remains a core issue. Non-hyperscaler providers and software vendors have an increasingly significant play: Oracle and HPE offer solutions that can be deployed and managed locally for example; Broadcom/VMware and Red Hat provide technologies that locally situated, private cloud providers can host. Digital sovereignty is thus a catalyst for a redistribution of “cloud spend” across a broader pool of players. What Can Enterprise Organizations Do About It? First, see digital sovereignty as a core element of data and application strategy. For a nation, sovereignty means having solid borders, control over IP, GDP, and so on. That’s the goal for corporations as well—control, self-determination, and resilience. If sovereignty isn’t seen as an element of strategy, it gets pushed down into the implementation layer, leading to inefficient architectures and duplicated effort. Far better to decide up front what data, applications and processes need to be treated as sovereign, and defining an architecture to support that. This sets the scene for making informed provisioning decisions. Your organization may have made some big bets on key vendors or hyperscalers, but multi-platform thinking increasingly dominates: multiple public and private cloud providers, with integrated operations and management. Sovereign cloud becomes one element of a well-structured multi-platform architecture. It is not cost-neutral to deliver on sovereignty, but the overall business value should be tangible. A sovereignty initiative should bring clear advantages, not just for itself, but through the benefits that come with better control, visibility, and efficiency. Knowing where your data is, understanding which data matters, managing it efficiently so you’re not duplicating or fragmenting it across systems—these are valuable outcomes. In addition, ignoring these questions can lead to non-compliance or be outright illegal. Even if we don’t use terms like ‘sovereignty’, organizations need a handle on their information estate. Organizations shouldn’t be thinking everything cloud-based needs to be sovereign, but should be building strategies and policies based on data classification, prioritization and risk. Build that picture and you can solve for the highest-priority items first—the data with the strongest classification and greatest risk. That process alone takes care of 80–90% of the problem space, avoiding making sovereignty another problem whilst solving nothing. Where to start? Look after your own organization first Sovereignty and systems thinking go hand in hand: it’s all about scope. In enterprise architecture or business design, the biggest mistake is boiling the ocean—trying to solve everything at once. Instead, focus on your own sovereignty. Worry about your own organization, your own jurisdiction. Know where your own borders are. Understand who your customers are, and what their requirements are. For example, if you’re a manufacturer selling into specific countries—what do those countries require? Solve for that, not for everything else. Don’t try to plan for every possible future scenario. Focus on what you have, what you’re responsible for, and what you need to address right now. Classify and prioritise your data assets based on real-world risk. Do that, and you’re already more than halfway toward solving digital sovereignty—with all the efficiency, control, and compliance benefits that come with it. Digital sovereignty isn’t just regulatory, but strategic. Organizations that act now can reduce risk, improve operational clarity, and prepare for a future based on trust, compliance, and resilience. The post Reclaiming Control: Digital Sovereignty in 2025 appeared first on Gigaom. #reclaiming #control #digital #sovereignty
    GIGAOM.COM
    Reclaiming Control: Digital Sovereignty in 2025
    Sovereignty has mattered since the invention of the nation state—defined by borders, laws, and taxes that apply within and without. While many have tried to define it, the core idea remains: nations or jurisdictions seek to stay in control, usually to the benefit of those within their borders. Digital sovereignty is a relatively new concept, also difficult to define but straightforward to understand. Data and applications don’t understand borders unless they are specified in policy terms, as coded into the infrastructure. The World Wide Web had no such restrictions at its inception. Communitarian groups such as the Electronic Frontier Foundation, service providers and hyperscalers, non-profits and businesses all embraced a model that suggested data would look after itself. But data won’t look after itself, for several reasons. First, data is massively out of control. We generate more of it all the time, and for at least two or three decades (according to historical surveys I’ve run), most organizations haven’t fully understood their data assets. This creates inefficiency and risk—not least, widespread vulnerability to cyberattack. Risk is probability times impact—and right now, the probabilities have shot up. Invasions, tariffs, political tensions, and more have brought new urgency. This time last year, the idea of switching off another country’s IT systems was not on the radar. Now we’re seeing it happen—including the U.S. government blocking access to services overseas. Digital sovereignty isn’t just a European concern, though it is often framed as such. In South America for example, I am told that sovereignty is leading conversations with hyperscalers; in African countries, it is being stipulated in supplier agreements. Many jurisdictions are watching, assessing, and reviewing their stance on digital sovereignty. As the adage goes: a crisis is a problem with no time left to solve it. Digital sovereignty was a problem in waiting—but now it’s urgent. It’s gone from being an abstract ‘right to sovereignty’ to becoming a clear and present issue, in government thinking, corporate risk and how we architect and operate our computer systems. What does the digital sovereignty landscape look like today? Much has changed since this time last year. Unknowns remain, but much of what was unclear this time last year is now starting to solidify. Terminology is clearer – for example talking about classification and localisation rather than generic concepts. We’re seeing a shift from theory to practice. Governments and organizations are putting policies in place that simply didn’t exist before. For example, some countries are seeing “in-country” as a primary goal, whereas others (the UK included) are adopting a risk-based approach based on trusted locales. We’re also seeing a shift in risk priorities. From a risk standpoint, the classic triad of confidentiality, integrity, and availability are at the heart of the digital sovereignty conversation. Historically, the focus has been much more on confidentiality, driven by concerns about the US Cloud Act: essentially, can foreign governments see my data? This year however, availability is rising in prominence, due to geopolitics and very real concerns about data accessibility in third countries. Integrity is being talked about less from a sovereignty perspective, but is no less important as a cybercrime target—ransomware and fraud being two clear and present risks. Thinking more broadly, digital sovereignty is not just about data, or even intellectual property, but also the brain drain. Countries don’t want all their brightest young technologists leaving university only to end up in California or some other, more attractive country. They want to keep talent at home and innovate locally, to the benefit of their own GDP. How Are Cloud Providers Responding? Hyperscalers are playing catch-up, still looking for ways to satisfy the letter of the law whilst ignoring (in the French sense) its spirit. It’s not enough for Microsoft or AWS to say they will do everything they can to protect a jurisdiction’s data, if they are already legally obliged to do the opposite. Legislation, in this case US legislation, calls the shots—and we all know just how fragile this is right now. We see hyperscaler progress where they offer technology to be locally managed by a third party, rather than themselves. For example, Google’s partnership with Thales, or Microsoft with Orange, both in France (Microsoft has similar in Germany). However, these are point solutions, not part of a general standard. Meanwhile, AWS’ recent announcement about creating a local entity doesn’t solve for the problem of US over-reach, which remains a core issue. Non-hyperscaler providers and software vendors have an increasingly significant play: Oracle and HPE offer solutions that can be deployed and managed locally for example; Broadcom/VMware and Red Hat provide technologies that locally situated, private cloud providers can host. Digital sovereignty is thus a catalyst for a redistribution of “cloud spend” across a broader pool of players. What Can Enterprise Organizations Do About It? First, see digital sovereignty as a core element of data and application strategy. For a nation, sovereignty means having solid borders, control over IP, GDP, and so on. That’s the goal for corporations as well—control, self-determination, and resilience. If sovereignty isn’t seen as an element of strategy, it gets pushed down into the implementation layer, leading to inefficient architectures and duplicated effort. Far better to decide up front what data, applications and processes need to be treated as sovereign, and defining an architecture to support that. This sets the scene for making informed provisioning decisions. Your organization may have made some big bets on key vendors or hyperscalers, but multi-platform thinking increasingly dominates: multiple public and private cloud providers, with integrated operations and management. Sovereign cloud becomes one element of a well-structured multi-platform architecture. It is not cost-neutral to deliver on sovereignty, but the overall business value should be tangible. A sovereignty initiative should bring clear advantages, not just for itself, but through the benefits that come with better control, visibility, and efficiency. Knowing where your data is, understanding which data matters, managing it efficiently so you’re not duplicating or fragmenting it across systems—these are valuable outcomes. In addition, ignoring these questions can lead to non-compliance or be outright illegal. Even if we don’t use terms like ‘sovereignty’, organizations need a handle on their information estate. Organizations shouldn’t be thinking everything cloud-based needs to be sovereign, but should be building strategies and policies based on data classification, prioritization and risk. Build that picture and you can solve for the highest-priority items first—the data with the strongest classification and greatest risk. That process alone takes care of 80–90% of the problem space, avoiding making sovereignty another problem whilst solving nothing. Where to start? Look after your own organization first Sovereignty and systems thinking go hand in hand: it’s all about scope. In enterprise architecture or business design, the biggest mistake is boiling the ocean—trying to solve everything at once. Instead, focus on your own sovereignty. Worry about your own organization, your own jurisdiction. Know where your own borders are. Understand who your customers are, and what their requirements are. For example, if you’re a manufacturer selling into specific countries—what do those countries require? Solve for that, not for everything else. Don’t try to plan for every possible future scenario. Focus on what you have, what you’re responsible for, and what you need to address right now. Classify and prioritise your data assets based on real-world risk. Do that, and you’re already more than halfway toward solving digital sovereignty—with all the efficiency, control, and compliance benefits that come with it. Digital sovereignty isn’t just regulatory, but strategic. Organizations that act now can reduce risk, improve operational clarity, and prepare for a future based on trust, compliance, and resilience. The post Reclaiming Control: Digital Sovereignty in 2025 appeared first on Gigaom.
    0 Comentários 0 Compartilhamentos 0 Anterior
  • IBM Plans Large-Scale Fault-Tolerant Quantum Computer by 2029

    IBM Plans Large-Scale Fault-Tolerant Quantum Computer by 2029

    By John P. Mello Jr.
    June 11, 2025 5:00 AM PT

    IBM unveiled its plan to build IBM Quantum Starling, shown in this rendering. Starling is expected to be the first large-scale, fault-tolerant quantum system.ADVERTISEMENT
    Enterprise IT Lead Generation Services
    Fuel Your Pipeline. Close More Deals. Our full-service marketing programs deliver sales-ready leads. 100% Satisfaction Guarantee! Learn more.

    IBM revealed Tuesday its roadmap for bringing a large-scale, fault-tolerant quantum computer, IBM Quantum Starling, online by 2029, which is significantly earlier than many technologists thought possible.
    The company predicts that when its new Starling computer is up and running, it will be capable of performing 20,000 times more operations than today’s quantum computers — a computational state so vast it would require the memory of more than a quindecillionof the world’s most powerful supercomputers to represent.
    “IBM is charting the next frontier in quantum computing,” Big Blue CEO Arvind Krishna said in a statement. “Our expertise across mathematics, physics, and engineering is paving the way for a large-scale, fault-tolerant quantum computer — one that will solve real-world challenges and unlock immense possibilities for business.”
    IBM’s plan to deliver a fault-tolerant quantum system by 2029 is ambitious but not implausible, especially given the rapid pace of its quantum roadmap and past milestones, observed Ensar Seker, CISO at SOCRadar, a threat intelligence company in Newark, Del.
    “They’ve consistently met or exceeded their qubit scaling goals, and their emphasis on modularity and error correction indicates they’re tackling the right challenges,” he told TechNewsWorld. “However, moving from thousands to millions of physical qubits with sufficient fidelity remains a steep climb.”
    A qubit is the fundamental unit of information in quantum computing, capable of representing a zero, a one, or both simultaneously due to quantum superposition. In practice, fault-tolerant quantum computers use clusters of physical qubits working together to form a logical qubit — a more stable unit designed to store quantum information and correct errors in real time.
    Realistic Roadmap
    Luke Yang, an equity analyst with Morningstar Research Services in Chicago, believes IBM’s roadmap is realistic. “The exact scale and error correction performance might still change between now and 2029, but overall, the goal is reasonable,” he told TechNewsWorld.
    “Given its reliability and professionalism, IBM’s bold claim should be taken seriously,” said Enrique Solano, co-CEO and co-founder of Kipu Quantum, a quantum algorithm company with offices in Berlin and Karlsruhe, Germany.
    “Of course, it may also fail, especially when considering the unpredictability of hardware complexities involved,” he told TechNewsWorld, “but companies like IBM exist for such challenges, and we should all be positively impressed by its current achievements and promised technological roadmap.”
    Tim Hollebeek, vice president of industry standards at DigiCert, a global digital security company, added: “IBM is a leader in this area, and not normally a company that hypes their news. This is a fast-moving industry, and success is certainly possible.”
    “IBM is attempting to do something that no one has ever done before and will almost certainly run into challenges,” he told TechNewsWorld, “but at this point, it is largely an engineering scaling exercise, not a research project.”
    “IBM has demonstrated consistent progress, has committed billion over five years to quantum computing, and the timeline is within the realm of technical feasibility,” noted John Young, COO of Quantum eMotion, a developer of quantum random number generator technology, in Saint-Laurent, Quebec, Canada.
    “That said,” he told TechNewsWorld, “fault-tolerant in a practical, industrial sense is a very high bar.”
    Solving the Quantum Error Correction Puzzle
    To make a quantum computer fault-tolerant, errors need to be corrected so large workloads can be run without faults. In a quantum computer, errors are reduced by clustering physical qubits to form logical qubits, which have lower error rates than the underlying physical qubits.
    “Error correction is a challenge,” Young said. “Logical qubits require thousands of physical qubits to function reliably. That’s a massive scaling issue.”
    IBM explained in its announcement that creating increasing numbers of logical qubits capable of executing quantum circuits with as few physical qubits as possible is critical to quantum computing at scale. Until today, a clear path to building such a fault-tolerant system without unrealistic engineering overhead has not been published.

    Alternative and previous gold-standard, error-correcting codes present fundamental engineering challenges, IBM continued. To scale, they would require an unfeasible number of physical qubits to create enough logical qubits to perform complex operations — necessitating impractical amounts of infrastructure and control electronics. This renders them unlikely to be implemented beyond small-scale experiments and devices.
    In two research papers released with its roadmap, IBM detailed how it will overcome the challenges of building the large-scale, fault-tolerant architecture needed for a quantum computer.
    One paper outlines the use of quantum low-density parity checkcodes to reduce physical qubit overhead. The other describes methods for decoding errors in real time using conventional computing.
    According to IBM, a practical fault-tolerant quantum architecture must:

    Suppress enough errors for useful algorithms to succeed
    Prepare and measure logical qubits during computation
    Apply universal instructions to logical qubits
    Decode measurements from logical qubits in real time and guide subsequent operations
    Scale modularly across hundreds or thousands of logical qubits
    Be efficient enough to run meaningful algorithms using realistic energy and infrastructure resources

    Aside from the technological challenges that quantum computer makers are facing, there may also be some market challenges. “Locating suitable use cases for quantum computers could be the biggest challenge,” Morningstar’s Yang maintained.
    “Only certain computing workloads, such as random circuit sampling, can fully unleash the computing power of quantum computers and show their advantage over the traditional supercomputers we have now,” he said. “However, workloads like RCS are not very commercially useful, and we believe commercial relevance is one of the key factors that determine the total market size for quantum computers.”
    Q-Day Approaching Faster Than Expected
    For years now, organizations have been told they need to prepare for “Q-Day” — the day a quantum computer will be able to crack all the encryption they use to keep their data secure. This IBM announcement suggests the window for action to protect data may be closing faster than many anticipated.
    “This absolutely adds urgency and credibility to the security expert guidance on post-quantum encryption being factored into their planning now,” said Dave Krauthamer, field CTO of QuSecure, maker of quantum-safe security solutions, in San Mateo, Calif.
    “IBM’s move to create a large-scale fault-tolerant quantum computer by 2029 is indicative of the timeline collapsing,” he told TechNewsWorld. “A fault-tolerant quantum computer of this magnitude could be well on the path to crack asymmetric ciphers sooner than anyone thinks.”

    “Security leaders need to take everything connected to post-quantum encryption as a serious measure and work it into their security plans now — not later,” he said.
    Roger Grimes, a defense evangelist with KnowBe4, a security awareness training provider in Clearwater, Fla., pointed out that IBM is just the latest in a surge of quantum companies announcing quickly forthcoming computational breakthroughs within a few years.
    “It leads to the question of whether the U.S. government’s original PQCpreparation date of 2030 is still a safe date,” he told TechNewsWorld.
    “It’s starting to feel a lot more risky for any company to wait until 2030 to be prepared against quantum attacks. It also flies in the face of the latest cybersecurity EOthat relaxed PQC preparation rules as compared to Biden’s last EO PQC standard order, which told U.S. agencies to transition to PQC ASAP.”
    “Most US companies are doing zero to prepare for Q-Day attacks,” he declared. “The latest executive order seems to tell U.S. agencies — and indirectly, all U.S. businesses — that they have more time to prepare. It’s going to cause even more agencies and businesses to be less prepared during a time when it seems multiple quantum computing companies are making significant progress.”
    “It definitely feels that something is going to give soon,” he said, “and if I were a betting man, and I am, I would bet that most U.S. companies are going to be unprepared for Q-Day on the day Q-Day becomes a reality.”

    John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.

    Leave a Comment

    Click here to cancel reply.
    Please sign in to post or reply to a comment. New users create a free account.

    Related Stories

    More by John P. Mello Jr.

    view all

    More in Emerging Tech
    #ibm #plans #largescale #faulttolerant #quantum
    IBM Plans Large-Scale Fault-Tolerant Quantum Computer by 2029
    IBM Plans Large-Scale Fault-Tolerant Quantum Computer by 2029 By John P. Mello Jr. June 11, 2025 5:00 AM PT IBM unveiled its plan to build IBM Quantum Starling, shown in this rendering. Starling is expected to be the first large-scale, fault-tolerant quantum system.ADVERTISEMENT Enterprise IT Lead Generation Services Fuel Your Pipeline. Close More Deals. Our full-service marketing programs deliver sales-ready leads. 100% Satisfaction Guarantee! Learn more. IBM revealed Tuesday its roadmap for bringing a large-scale, fault-tolerant quantum computer, IBM Quantum Starling, online by 2029, which is significantly earlier than many technologists thought possible. The company predicts that when its new Starling computer is up and running, it will be capable of performing 20,000 times more operations than today’s quantum computers — a computational state so vast it would require the memory of more than a quindecillionof the world’s most powerful supercomputers to represent. “IBM is charting the next frontier in quantum computing,” Big Blue CEO Arvind Krishna said in a statement. “Our expertise across mathematics, physics, and engineering is paving the way for a large-scale, fault-tolerant quantum computer — one that will solve real-world challenges and unlock immense possibilities for business.” IBM’s plan to deliver a fault-tolerant quantum system by 2029 is ambitious but not implausible, especially given the rapid pace of its quantum roadmap and past milestones, observed Ensar Seker, CISO at SOCRadar, a threat intelligence company in Newark, Del. “They’ve consistently met or exceeded their qubit scaling goals, and their emphasis on modularity and error correction indicates they’re tackling the right challenges,” he told TechNewsWorld. “However, moving from thousands to millions of physical qubits with sufficient fidelity remains a steep climb.” A qubit is the fundamental unit of information in quantum computing, capable of representing a zero, a one, or both simultaneously due to quantum superposition. In practice, fault-tolerant quantum computers use clusters of physical qubits working together to form a logical qubit — a more stable unit designed to store quantum information and correct errors in real time. Realistic Roadmap Luke Yang, an equity analyst with Morningstar Research Services in Chicago, believes IBM’s roadmap is realistic. “The exact scale and error correction performance might still change between now and 2029, but overall, the goal is reasonable,” he told TechNewsWorld. “Given its reliability and professionalism, IBM’s bold claim should be taken seriously,” said Enrique Solano, co-CEO and co-founder of Kipu Quantum, a quantum algorithm company with offices in Berlin and Karlsruhe, Germany. “Of course, it may also fail, especially when considering the unpredictability of hardware complexities involved,” he told TechNewsWorld, “but companies like IBM exist for such challenges, and we should all be positively impressed by its current achievements and promised technological roadmap.” Tim Hollebeek, vice president of industry standards at DigiCert, a global digital security company, added: “IBM is a leader in this area, and not normally a company that hypes their news. This is a fast-moving industry, and success is certainly possible.” “IBM is attempting to do something that no one has ever done before and will almost certainly run into challenges,” he told TechNewsWorld, “but at this point, it is largely an engineering scaling exercise, not a research project.” “IBM has demonstrated consistent progress, has committed billion over five years to quantum computing, and the timeline is within the realm of technical feasibility,” noted John Young, COO of Quantum eMotion, a developer of quantum random number generator technology, in Saint-Laurent, Quebec, Canada. “That said,” he told TechNewsWorld, “fault-tolerant in a practical, industrial sense is a very high bar.” Solving the Quantum Error Correction Puzzle To make a quantum computer fault-tolerant, errors need to be corrected so large workloads can be run without faults. In a quantum computer, errors are reduced by clustering physical qubits to form logical qubits, which have lower error rates than the underlying physical qubits. “Error correction is a challenge,” Young said. “Logical qubits require thousands of physical qubits to function reliably. That’s a massive scaling issue.” IBM explained in its announcement that creating increasing numbers of logical qubits capable of executing quantum circuits with as few physical qubits as possible is critical to quantum computing at scale. Until today, a clear path to building such a fault-tolerant system without unrealistic engineering overhead has not been published. Alternative and previous gold-standard, error-correcting codes present fundamental engineering challenges, IBM continued. To scale, they would require an unfeasible number of physical qubits to create enough logical qubits to perform complex operations — necessitating impractical amounts of infrastructure and control electronics. This renders them unlikely to be implemented beyond small-scale experiments and devices. In two research papers released with its roadmap, IBM detailed how it will overcome the challenges of building the large-scale, fault-tolerant architecture needed for a quantum computer. One paper outlines the use of quantum low-density parity checkcodes to reduce physical qubit overhead. The other describes methods for decoding errors in real time using conventional computing. According to IBM, a practical fault-tolerant quantum architecture must: Suppress enough errors for useful algorithms to succeed Prepare and measure logical qubits during computation Apply universal instructions to logical qubits Decode measurements from logical qubits in real time and guide subsequent operations Scale modularly across hundreds or thousands of logical qubits Be efficient enough to run meaningful algorithms using realistic energy and infrastructure resources Aside from the technological challenges that quantum computer makers are facing, there may also be some market challenges. “Locating suitable use cases for quantum computers could be the biggest challenge,” Morningstar’s Yang maintained. “Only certain computing workloads, such as random circuit sampling, can fully unleash the computing power of quantum computers and show their advantage over the traditional supercomputers we have now,” he said. “However, workloads like RCS are not very commercially useful, and we believe commercial relevance is one of the key factors that determine the total market size for quantum computers.” Q-Day Approaching Faster Than Expected For years now, organizations have been told they need to prepare for “Q-Day” — the day a quantum computer will be able to crack all the encryption they use to keep their data secure. This IBM announcement suggests the window for action to protect data may be closing faster than many anticipated. “This absolutely adds urgency and credibility to the security expert guidance on post-quantum encryption being factored into their planning now,” said Dave Krauthamer, field CTO of QuSecure, maker of quantum-safe security solutions, in San Mateo, Calif. “IBM’s move to create a large-scale fault-tolerant quantum computer by 2029 is indicative of the timeline collapsing,” he told TechNewsWorld. “A fault-tolerant quantum computer of this magnitude could be well on the path to crack asymmetric ciphers sooner than anyone thinks.” “Security leaders need to take everything connected to post-quantum encryption as a serious measure and work it into their security plans now — not later,” he said. Roger Grimes, a defense evangelist with KnowBe4, a security awareness training provider in Clearwater, Fla., pointed out that IBM is just the latest in a surge of quantum companies announcing quickly forthcoming computational breakthroughs within a few years. “It leads to the question of whether the U.S. government’s original PQCpreparation date of 2030 is still a safe date,” he told TechNewsWorld. “It’s starting to feel a lot more risky for any company to wait until 2030 to be prepared against quantum attacks. It also flies in the face of the latest cybersecurity EOthat relaxed PQC preparation rules as compared to Biden’s last EO PQC standard order, which told U.S. agencies to transition to PQC ASAP.” “Most US companies are doing zero to prepare for Q-Day attacks,” he declared. “The latest executive order seems to tell U.S. agencies — and indirectly, all U.S. businesses — that they have more time to prepare. It’s going to cause even more agencies and businesses to be less prepared during a time when it seems multiple quantum computing companies are making significant progress.” “It definitely feels that something is going to give soon,” he said, “and if I were a betting man, and I am, I would bet that most U.S. companies are going to be unprepared for Q-Day on the day Q-Day becomes a reality.” John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John. Leave a Comment Click here to cancel reply. Please sign in to post or reply to a comment. New users create a free account. Related Stories More by John P. Mello Jr. view all More in Emerging Tech #ibm #plans #largescale #faulttolerant #quantum
    WWW.TECHNEWSWORLD.COM
    IBM Plans Large-Scale Fault-Tolerant Quantum Computer by 2029
    IBM Plans Large-Scale Fault-Tolerant Quantum Computer by 2029 By John P. Mello Jr. June 11, 2025 5:00 AM PT IBM unveiled its plan to build IBM Quantum Starling, shown in this rendering. Starling is expected to be the first large-scale, fault-tolerant quantum system. (Image Credit: IBM) ADVERTISEMENT Enterprise IT Lead Generation Services Fuel Your Pipeline. Close More Deals. Our full-service marketing programs deliver sales-ready leads. 100% Satisfaction Guarantee! Learn more. IBM revealed Tuesday its roadmap for bringing a large-scale, fault-tolerant quantum computer, IBM Quantum Starling, online by 2029, which is significantly earlier than many technologists thought possible. The company predicts that when its new Starling computer is up and running, it will be capable of performing 20,000 times more operations than today’s quantum computers — a computational state so vast it would require the memory of more than a quindecillion (10⁴⁸) of the world’s most powerful supercomputers to represent. “IBM is charting the next frontier in quantum computing,” Big Blue CEO Arvind Krishna said in a statement. “Our expertise across mathematics, physics, and engineering is paving the way for a large-scale, fault-tolerant quantum computer — one that will solve real-world challenges and unlock immense possibilities for business.” IBM’s plan to deliver a fault-tolerant quantum system by 2029 is ambitious but not implausible, especially given the rapid pace of its quantum roadmap and past milestones, observed Ensar Seker, CISO at SOCRadar, a threat intelligence company in Newark, Del. “They’ve consistently met or exceeded their qubit scaling goals, and their emphasis on modularity and error correction indicates they’re tackling the right challenges,” he told TechNewsWorld. “However, moving from thousands to millions of physical qubits with sufficient fidelity remains a steep climb.” A qubit is the fundamental unit of information in quantum computing, capable of representing a zero, a one, or both simultaneously due to quantum superposition. In practice, fault-tolerant quantum computers use clusters of physical qubits working together to form a logical qubit — a more stable unit designed to store quantum information and correct errors in real time. Realistic Roadmap Luke Yang, an equity analyst with Morningstar Research Services in Chicago, believes IBM’s roadmap is realistic. “The exact scale and error correction performance might still change between now and 2029, but overall, the goal is reasonable,” he told TechNewsWorld. “Given its reliability and professionalism, IBM’s bold claim should be taken seriously,” said Enrique Solano, co-CEO and co-founder of Kipu Quantum, a quantum algorithm company with offices in Berlin and Karlsruhe, Germany. “Of course, it may also fail, especially when considering the unpredictability of hardware complexities involved,” he told TechNewsWorld, “but companies like IBM exist for such challenges, and we should all be positively impressed by its current achievements and promised technological roadmap.” Tim Hollebeek, vice president of industry standards at DigiCert, a global digital security company, added: “IBM is a leader in this area, and not normally a company that hypes their news. This is a fast-moving industry, and success is certainly possible.” “IBM is attempting to do something that no one has ever done before and will almost certainly run into challenges,” he told TechNewsWorld, “but at this point, it is largely an engineering scaling exercise, not a research project.” “IBM has demonstrated consistent progress, has committed $30 billion over five years to quantum computing, and the timeline is within the realm of technical feasibility,” noted John Young, COO of Quantum eMotion, a developer of quantum random number generator technology, in Saint-Laurent, Quebec, Canada. “That said,” he told TechNewsWorld, “fault-tolerant in a practical, industrial sense is a very high bar.” Solving the Quantum Error Correction Puzzle To make a quantum computer fault-tolerant, errors need to be corrected so large workloads can be run without faults. In a quantum computer, errors are reduced by clustering physical qubits to form logical qubits, which have lower error rates than the underlying physical qubits. “Error correction is a challenge,” Young said. “Logical qubits require thousands of physical qubits to function reliably. That’s a massive scaling issue.” IBM explained in its announcement that creating increasing numbers of logical qubits capable of executing quantum circuits with as few physical qubits as possible is critical to quantum computing at scale. Until today, a clear path to building such a fault-tolerant system without unrealistic engineering overhead has not been published. Alternative and previous gold-standard, error-correcting codes present fundamental engineering challenges, IBM continued. To scale, they would require an unfeasible number of physical qubits to create enough logical qubits to perform complex operations — necessitating impractical amounts of infrastructure and control electronics. This renders them unlikely to be implemented beyond small-scale experiments and devices. In two research papers released with its roadmap, IBM detailed how it will overcome the challenges of building the large-scale, fault-tolerant architecture needed for a quantum computer. One paper outlines the use of quantum low-density parity check (qLDPC) codes to reduce physical qubit overhead. The other describes methods for decoding errors in real time using conventional computing. According to IBM, a practical fault-tolerant quantum architecture must: Suppress enough errors for useful algorithms to succeed Prepare and measure logical qubits during computation Apply universal instructions to logical qubits Decode measurements from logical qubits in real time and guide subsequent operations Scale modularly across hundreds or thousands of logical qubits Be efficient enough to run meaningful algorithms using realistic energy and infrastructure resources Aside from the technological challenges that quantum computer makers are facing, there may also be some market challenges. “Locating suitable use cases for quantum computers could be the biggest challenge,” Morningstar’s Yang maintained. “Only certain computing workloads, such as random circuit sampling [RCS], can fully unleash the computing power of quantum computers and show their advantage over the traditional supercomputers we have now,” he said. “However, workloads like RCS are not very commercially useful, and we believe commercial relevance is one of the key factors that determine the total market size for quantum computers.” Q-Day Approaching Faster Than Expected For years now, organizations have been told they need to prepare for “Q-Day” — the day a quantum computer will be able to crack all the encryption they use to keep their data secure. This IBM announcement suggests the window for action to protect data may be closing faster than many anticipated. “This absolutely adds urgency and credibility to the security expert guidance on post-quantum encryption being factored into their planning now,” said Dave Krauthamer, field CTO of QuSecure, maker of quantum-safe security solutions, in San Mateo, Calif. “IBM’s move to create a large-scale fault-tolerant quantum computer by 2029 is indicative of the timeline collapsing,” he told TechNewsWorld. “A fault-tolerant quantum computer of this magnitude could be well on the path to crack asymmetric ciphers sooner than anyone thinks.” “Security leaders need to take everything connected to post-quantum encryption as a serious measure and work it into their security plans now — not later,” he said. Roger Grimes, a defense evangelist with KnowBe4, a security awareness training provider in Clearwater, Fla., pointed out that IBM is just the latest in a surge of quantum companies announcing quickly forthcoming computational breakthroughs within a few years. “It leads to the question of whether the U.S. government’s original PQC [post-quantum cryptography] preparation date of 2030 is still a safe date,” he told TechNewsWorld. “It’s starting to feel a lot more risky for any company to wait until 2030 to be prepared against quantum attacks. It also flies in the face of the latest cybersecurity EO [Executive Order] that relaxed PQC preparation rules as compared to Biden’s last EO PQC standard order, which told U.S. agencies to transition to PQC ASAP.” “Most US companies are doing zero to prepare for Q-Day attacks,” he declared. “The latest executive order seems to tell U.S. agencies — and indirectly, all U.S. businesses — that they have more time to prepare. It’s going to cause even more agencies and businesses to be less prepared during a time when it seems multiple quantum computing companies are making significant progress.” “It definitely feels that something is going to give soon,” he said, “and if I were a betting man, and I am, I would bet that most U.S. companies are going to be unprepared for Q-Day on the day Q-Day becomes a reality.” John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John. Leave a Comment Click here to cancel reply. Please sign in to post or reply to a comment. New users create a free account. Related Stories More by John P. Mello Jr. view all More in Emerging Tech
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Is the Newly Revealed Xbox Handheld a Switch 2 Killer?

    Home Is the Newly Revealed Xbox Handheld a Switch 2 Killer?

    News

    Is the Newly Revealed Xbox Handheld a Switch 2 Killer?

    6 min read

    Published: June 14, 2025

    Key Takeaways

    Xbox has announced two new handheld gaming devices in partnership with Asus: the ROG Xbox Ally and ROG Xbox Ally X.
    They’re expected to compete with Nintendo’s Switch 2, which has sold 3.5M units in just 4 days of its launch.
    Xbox aims to bring a wide range of game titles to portable handheld devices in order to cater to the gaming PC market.

    Xbox has entered the handheld gaming market with two new launches: the ROG Xbox Ally and ROG Xbox Ally X in partnership with ASUS.
    Interestingly, Nintendo released its Switch 2 just last week. The public has received it with much enthusiasm, seeing as it’s already sold around 3.5M units in the first four days of its release.
    Needless to say, Xbox and Nintendo will be direct competitors in the handheld segment now. We looked at the spec sheets and customer reviews, and both handheld gaming devices seem to have different target audiences.
    Let’s unpack them in detail.
    Memory and Storage
    The ROG Xbox Ally comes in standard white color and features the AMD Ryzen Z2 A Processor with 16GB of memory and 512GB of storage, with a 60Wh battery. The Ally X, on the other hand, comes in striking black with the AMD Ryzen AI Z2 Extreme Processor, 24 GB of memory, and 1 TB of storage, and a 80Wh battery.

    Source: Rog Ally Life
    Right off the bat, we believe that Microsoft has done a good job with the storage and processors. In comparison, the Nintendo Switch 2 has 12GB of memory with just 256GB of internal storage. On paper, the Xbox series looks to have an advantage over the Switch 2, which uses a custom NVIDIA T239 chipset for raw power.

    Nvidia’s DLSS, however, gives Switch 2 an advantage over Xbox’s AMD Ryzen processors. DLSS can render games at lower resolutions and, therefore, achieve higher in-use frame rates, which boosts its overall performance.
    Simply put, despite the gap in on-paper specifications, the Switch 2 may render comparable performance to the Xbox Ally. Take this with a pinch of salt, though, because we’ll only be able to confirm this once we get our hands on the new Xbox handhelds.
    Display
    Both the Xbox handhelds feature a 7-inch Full HDscreen with a 120 Hz refresh rate. In comparison, the Switch 2 screen is bigger, with a 7.9-inch display, also rendering at 120 Hz. However, Switch 2 also features HDR10, giving it a significant edge over Xbox Ally.

    HDR10 ensures a much wider range of brightness levels and a broader spectrum of colors, so the display looks more vibrant and lifelike. Plus, you’ll see more detailed blacks and whites on the screen with better realism and depth, enhancing your overall gaming experience.
    The Switch 2 also features VRR technology, which prevents screen tearing and reduces stutter. Notably, the Xbox Ally range has its own version of the VRR, FreeSync Premium. So, truth be told, you might not experience much of a difference in that area. However, HDR10 can definitely prove to be a winner for Switch 2.
    Product Market Fit
    While both the Switch 2 and new Xbox handhelds are apparently the same genre of products, Microsoft and Nintendo seem to have different target markets in their minds.
    Microsoft is focusing more on the Windows handheld market, targeting players who want an on-the-go PC gaming experience. With access to Game Pass and titles from Steam and Epic Games, the Xbox Ally offers a more comprehensive library of games.
    Nintendo, on the other hand, looks to build on the legacy of the OG Nintendo Switch, which has sold 152M units since its launch in 2017. It aims to tap in on the Nintendo fan base with original titles such as Mario and an improved gaming experience.
    Also, Xbox is in direct competition with Valve’s Steam Deck. Both are essentially handheld PCs with wide access to PC-compatible aggregated game libraries on the go.
    Xbox is also introducing the ‘Xbox Experience for Handheld’ feature for its new Ally range, which will make Windows 11 more compatible and optimized for its handheld device – something similar to Valve’s SteamOS on the Steam Deck.
    Xbox Exploring a New Market Segment
    The global mobile and handheld gaming market is expected to expand at a rate of 13.8% CAGR till 2034. It may reach a market value of B. 
    Valve’s Steam Deck managed to sell around 3.7M units by the end of 2024. On the other hand, Windows-based devices like the ASUS ROG Ally, Lenovo Legion Go, and MSI Claw have sold ~5.9M units so far as per early 2025 reports. This shows there’s certainly demand for Windows-based handheld gaming devices. 
    Plus, Xbox’s partnership with ASUS could bring along a brand-value advantage for the product. With a seamless Windows 11 experience on an on-the-go device, these sales figures are expected to swell once the Xbox Ally hits the shelves.
    However, pricing will be a key determinant. The Switch 2 currently sells at – or with the Mario Kart bundle. The Steam Deck starts at and goes up to This means that the price range according to the current market demand is around -Anything more than that may result in market adoption issues.
    The original ASUS ROG Ally is currently priced at There’s little doubt, however, that Xbox would add a premium to this price. So, we’re expecting the price of the ROG Xbox Ally to be around while the ROG Xbox Ally X may cost more than This means that Xbox will be participating in the premium handheld gaming sector, which is something Nintendo and Steam do not cater to.
    Let’s wait for confirmation regarding the pricing and the launch date. Remember, this was only a feature comparison of the two products, and we’re yet to test them out for a detailed hands-on gaming experience comparison. Stick around for that.

    Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style.
    He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth.
    Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides. 
    Behind the scenes, Krishi operates from a dual-monitor setupthat’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh. 
    Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well.

    View all articles by Krishi Chowdhary

    Our editorial process

    The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.

    More from News

    View all

    View all
    #newly #revealed #xbox #handheld #switch
    Is the Newly Revealed Xbox Handheld a Switch 2 Killer?
    Home Is the Newly Revealed Xbox Handheld a Switch 2 Killer? News Is the Newly Revealed Xbox Handheld a Switch 2 Killer? 6 min read Published: June 14, 2025 Key Takeaways Xbox has announced two new handheld gaming devices in partnership with Asus: the ROG Xbox Ally and ROG Xbox Ally X. They’re expected to compete with Nintendo’s Switch 2, which has sold 3.5M units in just 4 days of its launch. Xbox aims to bring a wide range of game titles to portable handheld devices in order to cater to the gaming PC market. Xbox has entered the handheld gaming market with two new launches: the ROG Xbox Ally and ROG Xbox Ally X in partnership with ASUS. Interestingly, Nintendo released its Switch 2 just last week. The public has received it with much enthusiasm, seeing as it’s already sold around 3.5M units in the first four days of its release. Needless to say, Xbox and Nintendo will be direct competitors in the handheld segment now. We looked at the spec sheets and customer reviews, and both handheld gaming devices seem to have different target audiences. Let’s unpack them in detail. Memory and Storage The ROG Xbox Ally comes in standard white color and features the AMD Ryzen Z2 A Processor with 16GB of memory and 512GB of storage, with a 60Wh battery. The Ally X, on the other hand, comes in striking black with the AMD Ryzen AI Z2 Extreme Processor, 24 GB of memory, and 1 TB of storage, and a 80Wh battery. Source: Rog Ally Life Right off the bat, we believe that Microsoft has done a good job with the storage and processors. In comparison, the Nintendo Switch 2 has 12GB of memory with just 256GB of internal storage. On paper, the Xbox series looks to have an advantage over the Switch 2, which uses a custom NVIDIA T239 chipset for raw power. Nvidia’s DLSS, however, gives Switch 2 an advantage over Xbox’s AMD Ryzen processors. DLSS can render games at lower resolutions and, therefore, achieve higher in-use frame rates, which boosts its overall performance. Simply put, despite the gap in on-paper specifications, the Switch 2 may render comparable performance to the Xbox Ally. Take this with a pinch of salt, though, because we’ll only be able to confirm this once we get our hands on the new Xbox handhelds. Display Both the Xbox handhelds feature a 7-inch Full HDscreen with a 120 Hz refresh rate. In comparison, the Switch 2 screen is bigger, with a 7.9-inch display, also rendering at 120 Hz. However, Switch 2 also features HDR10, giving it a significant edge over Xbox Ally. HDR10 ensures a much wider range of brightness levels and a broader spectrum of colors, so the display looks more vibrant and lifelike. Plus, you’ll see more detailed blacks and whites on the screen with better realism and depth, enhancing your overall gaming experience. The Switch 2 also features VRR technology, which prevents screen tearing and reduces stutter. Notably, the Xbox Ally range has its own version of the VRR, FreeSync Premium. So, truth be told, you might not experience much of a difference in that area. However, HDR10 can definitely prove to be a winner for Switch 2. Product Market Fit While both the Switch 2 and new Xbox handhelds are apparently the same genre of products, Microsoft and Nintendo seem to have different target markets in their minds. Microsoft is focusing more on the Windows handheld market, targeting players who want an on-the-go PC gaming experience. With access to Game Pass and titles from Steam and Epic Games, the Xbox Ally offers a more comprehensive library of games. Nintendo, on the other hand, looks to build on the legacy of the OG Nintendo Switch, which has sold 152M units since its launch in 2017. It aims to tap in on the Nintendo fan base with original titles such as Mario and an improved gaming experience. Also, Xbox is in direct competition with Valve’s Steam Deck. Both are essentially handheld PCs with wide access to PC-compatible aggregated game libraries on the go. Xbox is also introducing the ‘Xbox Experience for Handheld’ feature for its new Ally range, which will make Windows 11 more compatible and optimized for its handheld device – something similar to Valve’s SteamOS on the Steam Deck. Xbox Exploring a New Market Segment The global mobile and handheld gaming market is expected to expand at a rate of 13.8% CAGR till 2034. It may reach a market value of B.  Valve’s Steam Deck managed to sell around 3.7M units by the end of 2024. On the other hand, Windows-based devices like the ASUS ROG Ally, Lenovo Legion Go, and MSI Claw have sold ~5.9M units so far as per early 2025 reports. This shows there’s certainly demand for Windows-based handheld gaming devices.  Plus, Xbox’s partnership with ASUS could bring along a brand-value advantage for the product. With a seamless Windows 11 experience on an on-the-go device, these sales figures are expected to swell once the Xbox Ally hits the shelves. However, pricing will be a key determinant. The Switch 2 currently sells at – or with the Mario Kart bundle. The Steam Deck starts at and goes up to This means that the price range according to the current market demand is around -Anything more than that may result in market adoption issues. The original ASUS ROG Ally is currently priced at There’s little doubt, however, that Xbox would add a premium to this price. So, we’re expecting the price of the ROG Xbox Ally to be around while the ROG Xbox Ally X may cost more than This means that Xbox will be participating in the premium handheld gaming sector, which is something Nintendo and Steam do not cater to. Let’s wait for confirmation regarding the pricing and the launch date. Remember, this was only a feature comparison of the two products, and we’re yet to test them out for a detailed hands-on gaming experience comparison. Stick around for that. Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style. He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth. Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides.  Behind the scenes, Krishi operates from a dual-monitor setupthat’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh.  Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well. View all articles by Krishi Chowdhary Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors. More from News View all View all #newly #revealed #xbox #handheld #switch
    TECHREPORT.COM
    Is the Newly Revealed Xbox Handheld a Switch 2 Killer?
    Home Is the Newly Revealed Xbox Handheld a Switch 2 Killer? News Is the Newly Revealed Xbox Handheld a Switch 2 Killer? 6 min read Published: June 14, 2025 Key Takeaways Xbox has announced two new handheld gaming devices in partnership with Asus: the ROG Xbox Ally and ROG Xbox Ally X. They’re expected to compete with Nintendo’s Switch 2, which has sold 3.5M units in just 4 days of its launch. Xbox aims to bring a wide range of game titles to portable handheld devices in order to cater to the gaming PC market. Xbox has entered the handheld gaming market with two new launches: the ROG Xbox Ally and ROG Xbox Ally X in partnership with ASUS. Interestingly, Nintendo released its Switch 2 just last week. The public has received it with much enthusiasm, seeing as it’s already sold around 3.5M units in the first four days of its release. Needless to say, Xbox and Nintendo will be direct competitors in the handheld segment now. We looked at the spec sheets and customer reviews, and both handheld gaming devices seem to have different target audiences. Let’s unpack them in detail. Memory and Storage The ROG Xbox Ally comes in standard white color and features the AMD Ryzen Z2 A Processor with 16GB of memory and 512GB of storage, with a 60Wh battery. The Ally X, on the other hand, comes in striking black with the AMD Ryzen AI Z2 Extreme Processor, 24 GB of memory, and 1 TB of storage, and a 80Wh battery. Source: Rog Ally Life Right off the bat, we believe that Microsoft has done a good job with the storage and processors. In comparison, the Nintendo Switch 2 has 12GB of memory with just 256GB of internal storage. On paper, the Xbox series looks to have an advantage over the Switch 2, which uses a custom NVIDIA T239 chipset for raw power. Nvidia’s DLSS (Deep Learning Super-Sampling), however, gives Switch 2 an advantage over Xbox’s AMD Ryzen processors. DLSS can render games at lower resolutions and, therefore, achieve higher in-use frame rates, which boosts its overall performance. Simply put, despite the gap in on-paper specifications, the Switch 2 may render comparable performance to the Xbox Ally. Take this with a pinch of salt, though, because we’ll only be able to confirm this once we get our hands on the new Xbox handhelds. Display Both the Xbox handhelds feature a 7-inch Full HD (FHD) screen with a 120 Hz refresh rate. In comparison, the Switch 2 screen is bigger, with a 7.9-inch display, also rendering at 120 Hz. However, Switch 2 also features HDR10, giving it a significant edge over Xbox Ally. HDR10 ensures a much wider range of brightness levels and a broader spectrum of colors, so the display looks more vibrant and lifelike. Plus, you’ll see more detailed blacks and whites on the screen with better realism and depth, enhancing your overall gaming experience. The Switch 2 also features VRR technology, which prevents screen tearing and reduces stutter. Notably, the Xbox Ally range has its own version of the VRR, FreeSync Premium. So, truth be told, you might not experience much of a difference in that area. However, HDR10 can definitely prove to be a winner for Switch 2. Product Market Fit While both the Switch 2 and new Xbox handhelds are apparently the same genre of products, Microsoft and Nintendo seem to have different target markets in their minds. Microsoft is focusing more on the Windows handheld market, targeting players who want an on-the-go PC gaming experience. With access to Game Pass and titles from Steam and Epic Games, the Xbox Ally offers a more comprehensive library of games. Nintendo, on the other hand, looks to build on the legacy of the OG Nintendo Switch, which has sold 152M units since its launch in 2017. It aims to tap in on the Nintendo fan base with original titles such as Mario and an improved gaming experience. Also, Xbox is in direct competition with Valve’s Steam Deck. Both are essentially handheld PCs with wide access to PC-compatible aggregated game libraries on the go. Xbox is also introducing the ‘Xbox Experience for Handheld’ feature for its new Ally range, which will make Windows 11 more compatible and optimized for its handheld device – something similar to Valve’s SteamOS on the Steam Deck. Xbox Exploring a New Market Segment The global mobile and handheld gaming market is expected to expand at a rate of 13.8% CAGR till 2034. It may reach a market value of $35.189B.  Valve’s Steam Deck managed to sell around 3.7M units by the end of 2024. On the other hand, Windows-based devices like the ASUS ROG Ally, Lenovo Legion Go, and MSI Claw have sold ~5.9M units so far as per early 2025 reports. This shows there’s certainly demand for Windows-based handheld gaming devices.  Plus, Xbox’s partnership with ASUS could bring along a brand-value advantage for the product. With a seamless Windows 11 experience on an on-the-go device, these sales figures are expected to swell once the Xbox Ally hits the shelves. However, pricing will be a key determinant. The Switch 2 currently sells at $449.99 – or $499.99 with the Mario Kart bundle. The Steam Deck starts at $399.00 and goes up to $649. This means that the price range according to the current market demand is around $400-$600. Anything more than that may result in market adoption issues. The original ASUS ROG Ally is currently priced at $499. There’s little doubt, however, that Xbox would add a premium to this price. So, we’re expecting the price of the ROG Xbox Ally to be around $600, while the ROG Xbox Ally X may cost more than $700. This means that Xbox will be participating in the premium handheld gaming sector, which is something Nintendo and Steam do not cater to. Let’s wait for confirmation regarding the pricing and the launch date. Remember, this was only a feature comparison of the two products, and we’re yet to test them out for a detailed hands-on gaming experience comparison. Stick around for that. Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style. He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth. Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides.  Behind the scenes, Krishi operates from a dual-monitor setup (including a 29-inch LG UltraWide) that’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh.  Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he's not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well. View all articles by Krishi Chowdhary Our editorial process The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors. More from News View all View all
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence

    A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan.
    "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets."
    The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites.

    Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets.
    While users can create temporary, permanent, or custominvite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases.

    This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server.
    "This creates a serious risk: Users who follow previously trusted invite linkscan unknowingly be redirected to fake Discord servers created by threat actors," Check Point said.
    The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button.
    This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification.

    Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string", and press Enter to authenticate their accounts.
    But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them.
    At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks.
    AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-controlserver by reading a Pastebin file.
    The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms.
    Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office.
    The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook.
    The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain.

    Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times.
    It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom.
    The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery networkabused to host malware in the past.
    "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers."
    "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #discord #invite #link #hijacking #delivers
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets." The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites. Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets. While users can create temporary, permanent, or custominvite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases. This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server. "This creates a serious risk: Users who follow previously trusted invite linkscan unknowingly be redirected to fake Discord servers created by threat actors," Check Point said. The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button. This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification. Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string", and press Enter to authenticate their accounts. But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them. At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks. AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-controlserver by reading a Pastebin file. The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms. Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office. The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook. The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain. Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times. It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom. The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery networkabused to host malware in the past. "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers." "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #discord #invite #link #hijacking #delivers
    THEHACKERNEWS.COM
    Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
    Jun 14, 2025Ravie LakshmananMalware / Threat Intelligence A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix phishing technique, multi-stage loaders, and time-based evasions to stealthily deliver AsyncRAT, and a customized Skuld Stealer targeting crypto wallets." The issue with Discord's invite mechanism is that it allows attackers to hijack expired or deleted invite links and secretly redirect unsuspecting users to malicious servers under their control. This also means that a Discord invite link that was once trusted and shared on forums or social media platforms could unwittingly lead users to malicious sites. Details of the campaign come a little over a month after the cybersecurity company revealed another sophisticated phishing campaign that hijacked expired vanity invite links to entice users into joining a Discord server and instruct them to visit a phishing site to verify ownership, only to have their digital assets drained upon connecting their wallets. While users can create temporary, permanent, or custom (vanity) invite links on Discord, the platform prevents other legitimate servers from reclaiming a previously expired or deleted invite. However, Check Point found that creating custom invite links allows the reuse of expired invite codes and even deleted permanent invite codes in some cases. This ability to reuse Discord expired or deleted codes when creating custom vanity invite links opens the door to abuse, allowing attackers to claim it for their malicious server. "This creates a serious risk: Users who follow previously trusted invite links (e.g., on websites, blogs, or forums) can unknowingly be redirected to fake Discord servers created by threat actors," Check Point said. The Discord invite-link hijacking, in a nutshell, involves taking control of invite links originally shared by legitimate communities and then using them to redirect users to the malicious server. Users who fall prey to the scheme and join the server are asked to complete a verification step in order to gain full server access by authorizing a bot, which then leads them to a fake website with a prominent "Verify" button. This is where the attackers take the attack to the next level by incorporating the infamous ClickFix social engineering tactic to trick users into infecting their systems under the pretext of verification. Specifically, clicking the "Verify" button surreptitiously executes JavaScript that copies a PowerShell command to the machine's clipboard, after which the users are urged to launch the Windows Run dialog, paste the already copied "verification string" (i.e., the PowerShell command), and press Enter to authenticate their accounts. But in reality, performing these steps triggers the download of a PowerShell script hosted on Pastebin that subsequently retrieves and executes a first-stage downloader, which is ultimately used to drop AsyncRAT and Skuld Stealer from a remote server and execute them. At the heart of this attack lies a meticulously engineered, multi-stage infection process designed for both precision and stealth, while also taking steps to subvert security protections through sandbox security checks. AsyncRAT, which offers comprehensive remote control capabilities over infected systems, has been found to employ a technique called dead drop resolver to access the actual command-and-control (C2) server by reading a Pastebin file. The other payload is a Golang information stealer that's downloaded from Bitbucket. It's equipped to steal sensitive user data from Discord, various browsers, crypto wallets, and gaming platforms. Skuld is also capable of harvesting crypto wallet seed phrases and passwords from the Exodus and Atomic crypto wallets. It accomplishes this using an approach called wallet injection that replaces legitimate application files with trojanized versions downloaded from GitHub. It's worth noting that a similar technique was recently put to use by a rogue npm package named pdf-to-office. The attack also employs a custom version of an open-source tool known as ChromeKatz to bypass Chrome's app-bound encryption protections. The collected data is exfiltrated to the miscreants via a Discord webhook. The fact that payload delivery and data exfiltration occur via trusted cloud services such as GitHub, Bitbucket, Pastebin, and Discord allows the threat actors to blend in with normal traffic and fly under the radar. Discord has since disabled the malicious bot, effectively breaking the attack chain. Check Point said it also identified another campaign mounted by the same threat actor that distributes the loader as a modified version of a hacktool for unlocking pirated games. The malicious program, also hosted on Bitbucket, has been downloaded 350 times. It has been assessed that the victims of these campaigns are primarily located in the United States, Vietnam, France, Germany, Slovakia, Austria, the Netherlands, and the United Kingdom. The findings represent the latest example of how cybercriminals are targeting the popular social platform, which has had its content delivery network (CDN) abused to host malware in the past. "This campaign illustrates how a subtle feature of Discord's invite system, the ability to reuse expired or deleted invite codes in vanity invite links, can be exploited as a powerful attack vector," the researchers said. "By hijacking legitimate invite links, threat actors silently redirect unsuspecting users to malicious Discord servers." "The choice of payloads, including a powerful stealer specifically targeting cryptocurrency wallets, suggests that the attackers are primarily focused on crypto users and motivated by financial gain." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Hell is Us terrifies in all the best ways

    Hell is Us has been on my radar since it was first announced in April 2022, and I’ve finally been able to spend some time with it via its demo. The war-torn world of Hell is Us is immediately chilling and the demo’s brief glimpse of the gameplay, despite some minor hang-ups, has me eager for more.

    You play as Remi as he ventures to the fictional country of Hadea. A civil war has broken out, dividing and devastating Hadea’s people. Remi must travel through the war zone in search of his parents, and quickly comes across a farmer who exposition-dumps plenty of information that may or may not stick. Essentially, shit is bad, tragically so, and Remi is about to discover just how bad.

    You wander around a forest while an unsettling Returnal-esque score accompanies you. Eventually you gain access to ruins that turn out to have been some sort of dungeon for prisoners long ago. It’s here that Remi encounters the first of hopefully many “oh, shit!” moments. He comes across a creepy-ass enemy I can best describe as if Spot from Spider-Man: Across the Spider-Verse was designed to horrify — a pale white humanoid with a black circle for a face who contorts around the level like a marionette. A mask-wearing woman shows up out of nowhere to take down the creepy foe, but dies saving Remi. Without explanation, Remi decides to don her poncho, take her drone, and wield her BGS.

    Turns out he’s pretty good with a sword. Remi will encounter a couple dozen enemies throughout the demo; the combat is easy to pick up and is somewhat standard third-person-melee, though it does rely heavily on stamina management. Your max stamina is also reduced when you take damage, so you really don’t wanna get hit much.

    You can heal using consumable med kits as well as a pulse mechanic. Attacking enemies creates floating particles around Remi and once those particles form into a circle, you can press your controller’s right bumper to activate a healing pulse. It’s an interesting mechanic, and I like how Hell is Us is giving players a way to recoup health in the midst of combat. However, actually doing it is a bit clunky; keeping one eye on an enemy and the other on the particles around Remi is distracting, and timing the pulse is a challenge — you can only activate it during a brief window, and you’ll likely be in the middle of a combo when a pulse opportunity presents itself.

    While Hell is Us’ combat has surface similarities to Soulslikes — like parrying blows from creepy enemies — it felt less punishing and more forgiving than what you’d expect from a FromSoftware title. I only died once in the demo, compared to countless deaths in the opening hours of Soulslikes such as Lies of P or Elden Ring. Notably, enemies don’t respawn when you save your game, so you don’t have to worry about repeatedly striking down the same foes.

    Because dead enemies remain dead, exploration is encouraged in Hell is Us. Developer Rogue Factor boasts that the game has “no map, no compass, no quest markers,” so you’re free to wander around the game’s world without a guiding hand and discover its secrets. For example, that farmer I mentioned earlier told Remi about how three of his sons died in this war. Later on, when exploring the World War I-like trenches outside of the ruins, I found a note from a soldier on the other side of the conflict bragging about killing three brothers “cowering in a farmhouse.”

    The note also mentioned taking a gold watch from one of the boys, which I grabbed and returned to the farmer — without a quest marker to guide me or a journal entry saying “give this item to the farmer.” This completed a “Good Deed” and I was told a reward may come from it later in the game; I’m curious how these types of quests will play out in the full release. The prospect of doing good deeds in this torn-asunder country is especially appealing.

    A Soulslike-adjacent game placing greater emphasis on user-guided exploration than combat sounds enticing, and Hell is Us is delivering on that promise so far. Its demo is available on Steam through June 16 before the full game launches Sept. 4 for PC, PlayStation 5, and Xbox Series X.
    #hell #terrifies #all #best #ways
    Hell is Us terrifies in all the best ways
    Hell is Us has been on my radar since it was first announced in April 2022, and I’ve finally been able to spend some time with it via its demo. The war-torn world of Hell is Us is immediately chilling and the demo’s brief glimpse of the gameplay, despite some minor hang-ups, has me eager for more. You play as Remi as he ventures to the fictional country of Hadea. A civil war has broken out, dividing and devastating Hadea’s people. Remi must travel through the war zone in search of his parents, and quickly comes across a farmer who exposition-dumps plenty of information that may or may not stick. Essentially, shit is bad, tragically so, and Remi is about to discover just how bad. You wander around a forest while an unsettling Returnal-esque score accompanies you. Eventually you gain access to ruins that turn out to have been some sort of dungeon for prisoners long ago. It’s here that Remi encounters the first of hopefully many “oh, shit!” moments. He comes across a creepy-ass enemy I can best describe as if Spot from Spider-Man: Across the Spider-Verse was designed to horrify — a pale white humanoid with a black circle for a face who contorts around the level like a marionette. A mask-wearing woman shows up out of nowhere to take down the creepy foe, but dies saving Remi. Without explanation, Remi decides to don her poncho, take her drone, and wield her BGS. Turns out he’s pretty good with a sword. Remi will encounter a couple dozen enemies throughout the demo; the combat is easy to pick up and is somewhat standard third-person-melee, though it does rely heavily on stamina management. Your max stamina is also reduced when you take damage, so you really don’t wanna get hit much. You can heal using consumable med kits as well as a pulse mechanic. Attacking enemies creates floating particles around Remi and once those particles form into a circle, you can press your controller’s right bumper to activate a healing pulse. It’s an interesting mechanic, and I like how Hell is Us is giving players a way to recoup health in the midst of combat. However, actually doing it is a bit clunky; keeping one eye on an enemy and the other on the particles around Remi is distracting, and timing the pulse is a challenge — you can only activate it during a brief window, and you’ll likely be in the middle of a combo when a pulse opportunity presents itself. While Hell is Us’ combat has surface similarities to Soulslikes — like parrying blows from creepy enemies — it felt less punishing and more forgiving than what you’d expect from a FromSoftware title. I only died once in the demo, compared to countless deaths in the opening hours of Soulslikes such as Lies of P or Elden Ring. Notably, enemies don’t respawn when you save your game, so you don’t have to worry about repeatedly striking down the same foes. Because dead enemies remain dead, exploration is encouraged in Hell is Us. Developer Rogue Factor boasts that the game has “no map, no compass, no quest markers,” so you’re free to wander around the game’s world without a guiding hand and discover its secrets. For example, that farmer I mentioned earlier told Remi about how three of his sons died in this war. Later on, when exploring the World War I-like trenches outside of the ruins, I found a note from a soldier on the other side of the conflict bragging about killing three brothers “cowering in a farmhouse.” The note also mentioned taking a gold watch from one of the boys, which I grabbed and returned to the farmer — without a quest marker to guide me or a journal entry saying “give this item to the farmer.” This completed a “Good Deed” and I was told a reward may come from it later in the game; I’m curious how these types of quests will play out in the full release. The prospect of doing good deeds in this torn-asunder country is especially appealing. A Soulslike-adjacent game placing greater emphasis on user-guided exploration than combat sounds enticing, and Hell is Us is delivering on that promise so far. Its demo is available on Steam through June 16 before the full game launches Sept. 4 for PC, PlayStation 5, and Xbox Series X. #hell #terrifies #all #best #ways
    WWW.POLYGON.COM
    Hell is Us terrifies in all the best ways
    Hell is Us has been on my radar since it was first announced in April 2022, and I’ve finally been able to spend some time with it via its demo. The war-torn world of Hell is Us is immediately chilling and the demo’s brief glimpse of the gameplay, despite some minor hang-ups, has me eager for more. You play as Remi as he ventures to the fictional country of Hadea. A civil war has broken out, dividing and devastating Hadea’s people. Remi must travel through the war zone in search of his parents, and quickly comes across a farmer who exposition-dumps plenty of information that may or may not stick. Essentially, shit is bad, tragically so, and Remi is about to discover just how bad. You wander around a forest while an unsettling Returnal-esque score accompanies you. Eventually you gain access to ruins that turn out to have been some sort of dungeon for prisoners long ago. It’s here that Remi encounters the first of hopefully many “oh, shit!” moments. He comes across a creepy-ass enemy I can best describe as if Spot from Spider-Man: Across the Spider-Verse was designed to horrify — a pale white humanoid with a black circle for a face who contorts around the level like a marionette. A mask-wearing woman shows up out of nowhere to take down the creepy foe, but dies saving Remi. Without explanation, Remi decides to don her poncho, take her drone, and wield her BGS (big glowing sword). Turns out he’s pretty good with a sword. Remi will encounter a couple dozen enemies throughout the demo; the combat is easy to pick up and is somewhat standard third-person-melee, though it does rely heavily on stamina management. Your max stamina is also reduced when you take damage, so you really don’t wanna get hit much. You can heal using consumable med kits as well as a pulse mechanic. Attacking enemies creates floating particles around Remi and once those particles form into a circle, you can press your controller’s right bumper to activate a healing pulse. It’s an interesting mechanic, and I like how Hell is Us is giving players a way to recoup health in the midst of combat. However, actually doing it is a bit clunky; keeping one eye on an enemy and the other on the particles around Remi is distracting, and timing the pulse is a challenge — you can only activate it during a brief window, and you’ll likely be in the middle of a combo when a pulse opportunity presents itself. While Hell is Us’ combat has surface similarities to Soulslikes — like parrying blows from creepy enemies — it felt less punishing and more forgiving than what you’d expect from a FromSoftware title. I only died once in the demo, compared to countless deaths in the opening hours of Soulslikes such as Lies of P or Elden Ring. Notably, enemies don’t respawn when you save your game, so you don’t have to worry about repeatedly striking down the same foes. Because dead enemies remain dead, exploration is encouraged in Hell is Us. Developer Rogue Factor boasts that the game has “no map, no compass, no quest markers,” so you’re free to wander around the game’s world without a guiding hand and discover its secrets. For example, that farmer I mentioned earlier told Remi about how three of his sons died in this war. Later on, when exploring the World War I-like trenches outside of the ruins, I found a note from a soldier on the other side of the conflict bragging about killing three brothers “cowering in a farmhouse.” The note also mentioned taking a gold watch from one of the boys, which I grabbed and returned to the farmer — without a quest marker to guide me or a journal entry saying “give this item to the farmer.” This completed a “Good Deed” and I was told a reward may come from it later in the game; I’m curious how these types of quests will play out in the full release. The prospect of doing good deeds in this torn-asunder country is especially appealing. A Soulslike-adjacent game placing greater emphasis on user-guided exploration than combat sounds enticing, and Hell is Us is delivering on that promise so far. Its demo is available on Steam through June 16 before the full game launches Sept. 4 for PC, PlayStation 5, and Xbox Series X.
    0 Comentários 0 Compartilhamentos 0 Anterior
CGShares https://cgshares.com