• ¡Es inaceptable! Itch.io ha decidido implementar nuevas directrices para el contenido para adultos, y lo hace en un momento en que su plataforma ya había sido desindexada. ¿Qué clase de hipocresía es esta? En lugar de defender a sus creadores y su libertad de expresión, se arrodillan ante las presiones externas. La comunidad de desarrolladores independientes merece un espacio donde puedan compartir su trabajo sin miedo a la censura. Este cambio no solo es una traición a sus usuarios, sino que también muestra la debilidad de la plataforma frente a la crítica. ¡Basta de este tipo de políticas que solo buscan controlar y limitar la creatividad!

    #ItchIo #ContenidoParaAdultos #C
    ¡Es inaceptable! Itch.io ha decidido implementar nuevas directrices para el contenido para adultos, y lo hace en un momento en que su plataforma ya había sido desindexada. ¿Qué clase de hipocresía es esta? En lugar de defender a sus creadores y su libertad de expresión, se arrodillan ante las presiones externas. La comunidad de desarrolladores independientes merece un espacio donde puedan compartir su trabajo sin miedo a la censura. Este cambio no solo es una traición a sus usuarios, sino que también muestra la debilidad de la plataforma frente a la crítica. ¡Basta de este tipo de políticas que solo buscan controlar y limitar la creatividad! #ItchIo #ContenidoParaAdultos #C
    Itch.io posts new adult content guidelines
    Indie platform itch.io has posted new guidelines for adult content, in light of last week's deindexing
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Salut à tous !

    Aujourd'hui, parlons d'un changement qui, bien qu'imprévu, peut nous ouvrir de nouvelles portes ! Itch.io a décidé de déindexer le contenu pour adultes afin de satisfaire les fournisseurs de paiement. Bien que cela puisse sembler frustrant et déroutant, c'est une opportunité pour nous tous de réfléchir à l'importance de s'adapter et d'évoluer dans un monde en constante évolution.

    Rappelons-nous que chaque défi est une chance de grandir et de renforcer notre communauté. Restons positifs et soutenons-nous mutuellement dans cette transition. Ensemble, nous pouvons surmonter n'importe quel obstacle !

    #Ch
    🌟 Salut à tous ! 🌈 Aujourd'hui, parlons d'un changement qui, bien qu'imprévu, peut nous ouvrir de nouvelles portes ! Itch.io a décidé de déindexer le contenu pour adultes afin de satisfaire les fournisseurs de paiement. Bien que cela puisse sembler frustrant et déroutant, c'est une opportunité pour nous tous de réfléchir à l'importance de s'adapter et d'évoluer dans un monde en constante évolution. 💪✨ Rappelons-nous que chaque défi est une chance de grandir et de renforcer notre communauté. Restons positifs et soutenons-nous mutuellement dans cette transition. Ensemble, nous pouvons surmonter n'importe quel obstacle ! 💖 #Ch
    Itch.io deindexing adult content to appease payment providers
    'We understand this action is sudden and disruptive, and we are truly sorry for the frustration and confusion caused by this change.'
    Like
    Love
    Wow
    Sad
    Angry
    100
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Exciting times are upon us as AI companies continue to rewrite the rules of growth! In our latest report, *Indexing the AI economy*, we dive deep into the innovative strategies and trends that are propelling these top companies on Stripe to new heights!

    With every breakthrough in artificial intelligence, we witness a world filled with endless possibilities and opportunities. Let's embrace this journey together and cultivate our dreams! The future is bright, and every step we take brings us closer to a world transformed by the power of AI!

    Stay inspired and keep pushing forward!

    #AI #Growth #Innovation #Inspiration #Stripe
    🌟 Exciting times are upon us as AI companies continue to rewrite the rules of growth! 🚀 In our latest report, *Indexing the AI economy*, we dive deep into the innovative strategies and trends that are propelling these top companies on Stripe to new heights! 🌈 With every breakthrough in artificial intelligence, we witness a world filled with endless possibilities and opportunities. ✨ Let's embrace this journey together and cultivate our dreams! The future is bright, and every step we take brings us closer to a world transformed by the power of AI! 💡 Stay inspired and keep pushing forward! 💖 #AI #Growth #Innovation #Inspiration #Stripe
    STRIPE.COM
    Inside the growth of the top AI companies on Stripe
    AI companies are rewriting the rules of growth. In our new report, *Indexing the AI economy*, we explore the latest trends and strategies in the AI space.
    Like
    Wow
    Love
    Sad
    Angry
    87
    1 Comentários 0 Compartilhamentos 0 Anterior
  • Aspora gets $50M from Sequioa to build remittance and banking solutions for Indian diaspora

    India has been one of the top recipients of remittances in the world for more than a decade. Inward remittances jumped from billion in 2010-11 to billion in 2023-24, according to data from the country’s central bank. The bank projects that figure will reach billion in 2029.
    This means there is an increasing market for digitalized banking experiences for non-resident Indians, ranging from remittances to investing in different assets back home.
    Asporais trying to build a verticalized financial experience for the Indian diaspora by keeping convenience at the center. While a lot of financial products are in its future roadmap, the company currently focuses largely on remittances.
    “While multiple financial products for non-resident Indians exist, they don’t know about them because there is no digital journey for them. They possibly use the same banking app as residents, which makes it harder for them to discover products catered towards them,” Garg said.
    In the last year, the company has grown the volume of remittances by 6x — from million to billion in yearly volume processed.
    With this growth, the company has attracted a lot of investor interest. It raised million in Series A funding last December — which was previously unreported — led by Sequoia with participation from Greylock, Y Combinator, Hummingbird Ventures, and Global Founders Capital. The round pegged the company’s valuation at million. In the four months following, the company tripled its transaction volume, prompting investors to put in more money.
    The company announced today it has raised million in Series B funding, co-led by Sequoia and Greylock, with Hummingbird, Quantum Light Ventures, and Y Combinator also contributing to the round. The startup said this round values the company at million. The startup has raised over million in funding to date.

    Techcrunch event

    + on your TechCrunch All Stage pass
    Build smarter. Scale faster. Connect deeper. Join visionaries from Precursor Ventures, NEA, Index Ventures, Underscore VC, and beyond for a day packed with strategies, workshops, and meaningful connections.

    + on your TechCrunch All Stage pass
    Build smarter. Scale faster. Connect deeper. Join visionaries from Precursor Ventures, NEA, Index Ventures, Underscore VC, and beyond for a day packed with strategies, workshops, and meaningful connections.

    Boston, MA
    |
    July 15

    REGISTER NOW

    After pivoting from being Pipe.com for India, the company started by offering remittance for NRIs in the U.K. in 2023 and has expanded its presence in other markets, including Europe and the United Arab Emirates. It charges a flat fee for money transfer and offers a competitive rate. Now it also allows customers to invest in mutual funds in India. The startup markets its exchange rates as “Google rate” as customers often search for currency conversion rates, even though they may not reflect live rates.
    The startup is also set to launch in the U.S., one of the biggest remittance corridors to India, next month. Plus, it plans to open up shop in Canada, Singapore, and Australia by the fourth quarter of this year.
    Garg, who grew up in the UAE, said that remittances are just the start, and the company wants to build out more financial tools for NRIs.
    “We want to use remittances as a wedge and build all the financial solutions that the diaspora needs, including banking, investing, insurance, lending in the home country, and products that help them take care of their parents,” he told TechCrunch.
    He added that a large chunk of money that NRIs send home is for wealth creation rather than family sustenance. The startup said that 80% of its users are sending money to their own accounts back home.
    In the next few months, the company is launching a few products to offer more services. This month, it plans to launch a bill payment platform to let users pay for services like rent and utilities. Next month, it plans to launch fixed deposit accounts for non-resident Indians that allow them to park money in foreign currency. By the end of the year, it plans to launch a full-stack banking account for NRIs that typically takes days for users to open. While these accounts can help the diaspora maintain their tax status in India, a lot of people use a family member’s account because of the cumbersome process, and Aspora wants to simplify this.
    Apart from banking, the company also plans to launch a product that would help NRIs take care of their parents back home by offering regular medical checkups, emergency care coverage, and concierge services for other assistance.
    Besides global competitors like Remittly and Wise, the company also has India-based rivals like Abound, which was spun off from Times Internet.
    Sequoia’s Luciana Lixandru is confident that Aspora’s execution speed and verticalized solution will give it an edge.
    “Speed of execution, for me, is one of the main indicators in the early days of the future success of a company,” she told TechCrunch over a call. “Aspora moves fast, but it is also very deliberate in building corridor by corridor, which is very important in financial services.”
    #aspora #gets #50m #sequioa #build
    Aspora gets $50M from Sequioa to build remittance and banking solutions for Indian diaspora
    India has been one of the top recipients of remittances in the world for more than a decade. Inward remittances jumped from billion in 2010-11 to billion in 2023-24, according to data from the country’s central bank. The bank projects that figure will reach billion in 2029. This means there is an increasing market for digitalized banking experiences for non-resident Indians, ranging from remittances to investing in different assets back home. Asporais trying to build a verticalized financial experience for the Indian diaspora by keeping convenience at the center. While a lot of financial products are in its future roadmap, the company currently focuses largely on remittances. “While multiple financial products for non-resident Indians exist, they don’t know about them because there is no digital journey for them. They possibly use the same banking app as residents, which makes it harder for them to discover products catered towards them,” Garg said. In the last year, the company has grown the volume of remittances by 6x — from million to billion in yearly volume processed. With this growth, the company has attracted a lot of investor interest. It raised million in Series A funding last December — which was previously unreported — led by Sequoia with participation from Greylock, Y Combinator, Hummingbird Ventures, and Global Founders Capital. The round pegged the company’s valuation at million. In the four months following, the company tripled its transaction volume, prompting investors to put in more money. The company announced today it has raised million in Series B funding, co-led by Sequoia and Greylock, with Hummingbird, Quantum Light Ventures, and Y Combinator also contributing to the round. The startup said this round values the company at million. The startup has raised over million in funding to date. Techcrunch event + on your TechCrunch All Stage pass Build smarter. Scale faster. Connect deeper. Join visionaries from Precursor Ventures, NEA, Index Ventures, Underscore VC, and beyond for a day packed with strategies, workshops, and meaningful connections. + on your TechCrunch All Stage pass Build smarter. Scale faster. Connect deeper. Join visionaries from Precursor Ventures, NEA, Index Ventures, Underscore VC, and beyond for a day packed with strategies, workshops, and meaningful connections. Boston, MA | July 15 REGISTER NOW After pivoting from being Pipe.com for India, the company started by offering remittance for NRIs in the U.K. in 2023 and has expanded its presence in other markets, including Europe and the United Arab Emirates. It charges a flat fee for money transfer and offers a competitive rate. Now it also allows customers to invest in mutual funds in India. The startup markets its exchange rates as “Google rate” as customers often search for currency conversion rates, even though they may not reflect live rates. The startup is also set to launch in the U.S., one of the biggest remittance corridors to India, next month. Plus, it plans to open up shop in Canada, Singapore, and Australia by the fourth quarter of this year. Garg, who grew up in the UAE, said that remittances are just the start, and the company wants to build out more financial tools for NRIs. “We want to use remittances as a wedge and build all the financial solutions that the diaspora needs, including banking, investing, insurance, lending in the home country, and products that help them take care of their parents,” he told TechCrunch. He added that a large chunk of money that NRIs send home is for wealth creation rather than family sustenance. The startup said that 80% of its users are sending money to their own accounts back home. In the next few months, the company is launching a few products to offer more services. This month, it plans to launch a bill payment platform to let users pay for services like rent and utilities. Next month, it plans to launch fixed deposit accounts for non-resident Indians that allow them to park money in foreign currency. By the end of the year, it plans to launch a full-stack banking account for NRIs that typically takes days for users to open. While these accounts can help the diaspora maintain their tax status in India, a lot of people use a family member’s account because of the cumbersome process, and Aspora wants to simplify this. Apart from banking, the company also plans to launch a product that would help NRIs take care of their parents back home by offering regular medical checkups, emergency care coverage, and concierge services for other assistance. Besides global competitors like Remittly and Wise, the company also has India-based rivals like Abound, which was spun off from Times Internet. Sequoia’s Luciana Lixandru is confident that Aspora’s execution speed and verticalized solution will give it an edge. “Speed of execution, for me, is one of the main indicators in the early days of the future success of a company,” she told TechCrunch over a call. “Aspora moves fast, but it is also very deliberate in building corridor by corridor, which is very important in financial services.” #aspora #gets #50m #sequioa #build
    TECHCRUNCH.COM
    Aspora gets $50M from Sequioa to build remittance and banking solutions for Indian diaspora
    India has been one of the top recipients of remittances in the world for more than a decade. Inward remittances jumped from $55.6 billion in 2010-11 to $118.7 billion in 2023-24, according to data from the country’s central bank. The bank projects that figure will reach $160 billion in 2029. This means there is an increasing market for digitalized banking experiences for non-resident Indians(NRIs), ranging from remittances to investing in different assets back home. Aspora (formerly Vance) is trying to build a verticalized financial experience for the Indian diaspora by keeping convenience at the center. While a lot of financial products are in its future roadmap, the company currently focuses largely on remittances. “While multiple financial products for non-resident Indians exist, they don’t know about them because there is no digital journey for them. They possibly use the same banking app as residents, which makes it harder for them to discover products catered towards them,” Garg said. In the last year, the company has grown the volume of remittances by 6x — from $400 million to $2 billion in yearly volume processed. With this growth, the company has attracted a lot of investor interest. It raised $35 million in Series A funding last December — which was previously unreported — led by Sequoia with participation from Greylock, Y Combinator, Hummingbird Ventures, and Global Founders Capital. The round pegged the company’s valuation at $150 million. In the four months following, the company tripled its transaction volume, prompting investors to put in more money. The company announced today it has raised $50 million in Series B funding, co-led by Sequoia and Greylock, with Hummingbird, Quantum Light Ventures, and Y Combinator also contributing to the round. The startup said this round values the company at $500 million. The startup has raised over $99 million in funding to date. Techcrunch event Save $200+ on your TechCrunch All Stage pass Build smarter. Scale faster. Connect deeper. Join visionaries from Precursor Ventures, NEA, Index Ventures, Underscore VC, and beyond for a day packed with strategies, workshops, and meaningful connections. Save $200+ on your TechCrunch All Stage pass Build smarter. Scale faster. Connect deeper. Join visionaries from Precursor Ventures, NEA, Index Ventures, Underscore VC, and beyond for a day packed with strategies, workshops, and meaningful connections. Boston, MA | July 15 REGISTER NOW After pivoting from being Pipe.com for India, the company started by offering remittance for NRIs in the U.K. in 2023 and has expanded its presence in other markets, including Europe and the United Arab Emirates. It charges a flat fee for money transfer and offers a competitive rate. Now it also allows customers to invest in mutual funds in India. The startup markets its exchange rates as “Google rate” as customers often search for currency conversion rates, even though they may not reflect live rates. The startup is also set to launch in the U.S., one of the biggest remittance corridors to India, next month. Plus, it plans to open up shop in Canada, Singapore, and Australia by the fourth quarter of this year. Garg, who grew up in the UAE, said that remittances are just the start, and the company wants to build out more financial tools for NRIs. “We want to use remittances as a wedge and build all the financial solutions that the diaspora needs, including banking, investing, insurance, lending in the home country, and products that help them take care of their parents,” he told TechCrunch. He added that a large chunk of money that NRIs send home is for wealth creation rather than family sustenance. The startup said that 80% of its users are sending money to their own accounts back home. In the next few months, the company is launching a few products to offer more services. This month, it plans to launch a bill payment platform to let users pay for services like rent and utilities. Next month, it plans to launch fixed deposit accounts for non-resident Indians that allow them to park money in foreign currency. By the end of the year, it plans to launch a full-stack banking account for NRIs that typically takes days for users to open. While these accounts can help the diaspora maintain their tax status in India, a lot of people use a family member’s account because of the cumbersome process, and Aspora wants to simplify this. Apart from banking, the company also plans to launch a product that would help NRIs take care of their parents back home by offering regular medical checkups, emergency care coverage, and concierge services for other assistance. Besides global competitors like Remittly and Wise, the company also has India-based rivals like Abound, which was spun off from Times Internet. Sequoia’s Luciana Lixandru is confident that Aspora’s execution speed and verticalized solution will give it an edge. “Speed of execution, for me, is one of the main indicators in the early days of the future success of a company,” she told TechCrunch over a call. “Aspora moves fast, but it is also very deliberate in building corridor by corridor, which is very important in financial services.”
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Comentários 0 Compartilhamentos 0 Anterior
  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

    Jun 16, 2025Ravie LakshmananMalware / DevOps

    Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others.
    The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions."
    The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week.
    Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload.
    Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer.

    The stealer malware is equipped to siphon a wide range of data from infected machines. This includes -

    JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers
    Pod sandbox environment authentication tokens and git information
    CI/CD information from environment variables
    Zscaler host configuration
    Amazon Web Services account information and tokens
    Public IP address
    General platform, user, and host information

    The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems.
    The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis.
    "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said.

    "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity."
    The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below -

    eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry.
    SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown.
    "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said.
    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
    "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server.
    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB.
    "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user.
    The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT.
    "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent."
    Crypto Malware in the Open-Source Supply Chain
    The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem.

    Some of the examples of these packages include -

    express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys
    bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing.
    lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers

    "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said.
    "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets."
    AI and Slopsquatting
    The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks.
    Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences.

    Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting.
    "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said.
    "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #malicious #pypi #package #masquerades #chimera
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server. This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB. "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #malicious #pypi #package #masquerades #chimera
    THEHACKERNEWS.COM
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development of [machine learning] solutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithm (DGA) in order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former package ("proxy.eslint-proxy[.]site") to retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel"). This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co"). "[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence (AI)-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language models (LLMs) can hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol (MCP)-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Comentários 0 Compartilhamentos 0 Anterior
  • Tariffed construction materials increased in price last month, ABC analysis finds

    Construction input prices rose 0.2% in May, according to a new Associated Builders and Contractors analysis of U.S. Bureau of Labor Statistics’ Producer Price Index data. Last month, nonresidential construction input prices reduced by 0.1%.
    Overall construction input prices are 1.3% higher than levels from a year ago, and nonresidential construction prices are 1.6% higher. Prices decreased in two of three major energy categories in April. Natural gas prices fell 18.7%, unprocessed energy materials were down 3.5%, and crude petroleum prices increased by 1.3%.
    Chart credit: Associated Builders and Contractors“Construction materials prices continued to increase at a faster-than-ideal pace in May,” said ABC Chief Economist Anirban Basu. “While input prices are up just 1.3% over the past year, that modest escalation is entirely due to price decreases during the second half of 2024. Costs have increased rapidly since the start of this year, with input prices rising at a 6% annualize...
    #tariffed #construction #materials #increased #price
    Tariffed construction materials increased in price last month, ABC analysis finds
    Construction input prices rose 0.2% in May, according to a new Associated Builders and Contractors analysis of U.S. Bureau of Labor Statistics’ Producer Price Index data. Last month, nonresidential construction input prices reduced by 0.1%. Overall construction input prices are 1.3% higher than levels from a year ago, and nonresidential construction prices are 1.6% higher. Prices decreased in two of three major energy categories in April. Natural gas prices fell 18.7%, unprocessed energy materials were down 3.5%, and crude petroleum prices increased by 1.3%. Chart credit: Associated Builders and Contractors“Construction materials prices continued to increase at a faster-than-ideal pace in May,” said ABC Chief Economist Anirban Basu. “While input prices are up just 1.3% over the past year, that modest escalation is entirely due to price decreases during the second half of 2024. Costs have increased rapidly since the start of this year, with input prices rising at a 6% annualize... #tariffed #construction #materials #increased #price
    ARCHINECT.COM
    Tariffed construction materials increased in price last month, ABC analysis finds
    Construction input prices rose 0.2% in May, according to a new Associated Builders and Contractors (ABC) analysis of U.S. Bureau of Labor Statistics’ Producer Price Index data. Last month, nonresidential construction input prices reduced by 0.1%. Overall construction input prices are 1.3% higher than levels from a year ago, and nonresidential construction prices are 1.6% higher. Prices decreased in two of three major energy categories in April. Natural gas prices fell 18.7%, unprocessed energy materials were down 3.5%, and crude petroleum prices increased by 1.3%. Chart credit: Associated Builders and Contractors“Construction materials prices continued to increase at a faster-than-ideal pace in May,” said ABC Chief Economist Anirban Basu. “While input prices are up just 1.3% over the past year, that modest escalation is entirely due to price decreases during the second half of 2024. Costs have increased rapidly since the start of this year, with input prices rising at a 6% annualize...
    Like
    Love
    Wow
    Sad
    Angry
    592
    2 Comentários 0 Compartilhamentos 0 Anterior
  • Turning Points: Accept & Proceed

    12 June, 2025

    In our turning points series, design studios share some of the key moments that shaped their business. This week, we meet Accept & Proceed.

    Accept & Proceed is a London based brand and design studio that works with clients like NASA, Nike and LEGO.
    Founder David Johnston talks us through some of the decisions that defined his business.
    In 2006, Johnston took the leap to start his own business, armed with a good name and a willingness to bend the truth about his team…
    I’d gone through my career learning from big organisations, and one small organisation, and I felt like I wasn’t happy where I was. It was my dad who encouraged me to take a leap of faith and try and go it alone. With nothing more than a month’s wages in the bank and a lot of energy, I decided to go and set up an agency.
    That really just means giving yourself a name and starting to promote yourself in the world.
    Accept & Proceed founder David Johnston
    I think the name itself is a very important thing. I wanted something that was memorable but also layered in meaning. A name that starts with an “a” is very beneficial when you’re being listed in the index of books and things like that.
    But it became a bit of a compass for the way that we wanted to create work, around accepting the status quo for what it is, but with a continual commitment to proceed nonetheless.
    Because I didn’t have anyone to work with, in those early months I just made up email addresses of people that didn’t exist. That allowed me to cost projects up for multiple people. That’s obviously a degree of hustle I wouldn’t encourage in everyone, but it meant I was able to charge multiple day rates for projects where I was playing the role of four or five people.
    Self-initiated projects have long been part of the studio’s DNA and played a key role in building key client relationships.
    A&P by… was a brief to explore these letterforms without any commercial intent apart from the joy of creative expression. I started reaching out to illustrators and artists and photographers and designers that I really rated, and the things that started coming back were incredible.
    I was overwhelmed by the amount of energy and passion that people like Mr Bingo and Jason Evans were bringing to this.
    I think in so many ways, the answer to everything is community. I’ve gone on to work with a lot of the people that created these, and they also became friends. It was an early example of dissolving these illusionary boundaries around what an agency might be, but also expanding and amplifying your potential.
    The first of Accept & Proceed’s Light Calendars
    Then in 2006, I was trying to establish our portfolio and I wanted something to send out into the world that would also be an example of how Accept & Proceed thinks about design. I landed on these data visualisations that show the amount of light and darkness that would happen in London in the year ahead.
    I worked with a freelance designer called Stephen Heath on the first one – he is now our creative director.
    This kickstarted a 10-year exploration, and they became a rite of passage for new designers that came into the studio, to take that very similar data and express it in completely new ways. It culminated in an exhibition in London in 2016, showing ten years’ of prints.
    They were a labour of love, but they also meant that every single year we had a number of prints that we could send out to new potential contacts. Still when I go to the global headquarters of Nike in Beaverton in Portland, I’m amazed at how many of these sit in leaders’ offices there.
    When we first got a finance director, they couldn’t believe how much we’d invested as a business in things like this – we even had our own gallery for a while. It doesn’t make sense from a purely numbers mindset, but if you put things out there for authentic reasons, there are ripple effects over time.
    In 2017, the studio became a B-corp, the fourth creative agency in the UK to get this accreditation.
    Around 2016, I couldn’t help but look around – as we probably all have at varying points over the last 10 years – and wondered, what the fuck is going on?
    All these systems are not fit for purpose for the future – financial systems, food systems, relationship systems, energy systems. They’re not working. And I was like shit, are we part of the problem?
    Accept & Proceed’s work for the NASA Jet Propulsion Laboratory
    I’ve always thought of brand as a piece of technology that can fundamentally change our actions and the world around us. That comes with a huge responsibility.
    We probably paid four months’ wages of two people full-time just to get accredited, so it’s quite a high bar. But I like that the programme shackles you to this idea of improvement. You can’t rest on your laurels if you want to be re-accredited. It’s like the way design works as an iterative process – you have to keep getting better.
    In 2019, Johnston and his team started thinking seriously about the studio’s own brand, and created a punchy, nuanced new positioning.
    We got to a point where we’d proven we could help brands achieve their commercial aims. But we wanted to hold a position ourselves, not just be a conduit between a brand and its audience.
    It still amazes me that so few agencies actually stand for anything. We realised that all the things – vision, mission, principles – that we’ve been creating for brands for years, we hadn’t done for ourselves.
    It’s a bit like when you see a hairdresser with a really dodgy haircut. But it’s hard to cut your own hair.
    So we went through that process, which was really difficult, and we landed on “Design for the future” as our promise to the world.
    And if you’re going to have that as a promise, you better be able to describe the world you’re creating through your work, which we call “the together world.”
    Accept & Proceed’s work for Second Sea
    We stand at this most incredible moment in history where the latest technology and science is catching up with ancient wisdom, to know that we must become more entangled, more together, more whole.
    And we’ve assessed five global shifts that are happening in order to be able to take us towards a more together world through our work – interbeing, reciprocity, healing, resilience and liberation.
    The year before last, we lost three global rebrand projects based on our positioning. Every one of them said to me, “You’re right but we’re not ready.”
    But this year, I think the product market fit of what we’ve been saying for the last five years is really starting to mesh. We’re working with Arc’teryx on their 2030 landscape, evolving Nike’s move to zero, and working with LEGO on what their next 100 years might look like, which is mind-boggling work.
    I don’t think we could have won any of those opportunities had we not been talking for quite a long time about design for the future.
    In 2023, Johnston started a sunrise gathering on Hackney Marshes, which became a very significant part of his life.
    I had the flu and I had a vision in my dreamy fluey state of a particular spot on Hackney Marshes where people were gathering and watching the sunrise. I happened to tell my friend, the poet Thomas Sharp this, and he said, “That’s a premonition. You have to make it happen.”
    The first year there were five of us – this year there were 300 people for the spring equinox in March.
    I don’t fully know what these gatherings will lead to. Will Accept & Proceed start to introduce the seasons to the way we operate as a business? It’s a thought I’ve had percolating, but I don’t know. Will it be something else?
    One of the 2024 sunrise gatherings organised by Accept & Proceed founder David Johnston
    I do know that there’s major learnings around authentic community building for brands. We should do away with these buckets we put people into, of age group and location. They aren’t very true. It’s fascinating to see the breadth of people who come to these gatherings.
    Me and Laura were thinking at some point of moving out of London, but I think these sunrise gatherings are now my reason to stay. It’s the thing I didn’t know I needed until I had it. They have made London complete for me.
    There’s something so ancient about watching our star rise, and the reminder that we are actually just animals crawling upon the surface of a planet of mud. That’s what’s real. But it can be hard to remember that when you’re sitting at your computer in the studio.
    These gatherings help me better understand creativity’s true potential, for brands, for the world, and for us.

    Design disciplines in this article

    Brands in this article

    What to read next

    Features

    Turning Points: Cultural branding agency EDIT

    Brand Identity
    20 Nov, 2024
    #turning #points #accept #ampamp #proceed
    Turning Points: Accept & Proceed
    12 June, 2025 In our turning points series, design studios share some of the key moments that shaped their business. This week, we meet Accept & Proceed. Accept & Proceed is a London based brand and design studio that works with clients like NASA, Nike and LEGO. Founder David Johnston talks us through some of the decisions that defined his business. In 2006, Johnston took the leap to start his own business, armed with a good name and a willingness to bend the truth about his team… I’d gone through my career learning from big organisations, and one small organisation, and I felt like I wasn’t happy where I was. It was my dad who encouraged me to take a leap of faith and try and go it alone. With nothing more than a month’s wages in the bank and a lot of energy, I decided to go and set up an agency. That really just means giving yourself a name and starting to promote yourself in the world. Accept & Proceed founder David Johnston I think the name itself is a very important thing. I wanted something that was memorable but also layered in meaning. A name that starts with an “a” is very beneficial when you’re being listed in the index of books and things like that. But it became a bit of a compass for the way that we wanted to create work, around accepting the status quo for what it is, but with a continual commitment to proceed nonetheless. Because I didn’t have anyone to work with, in those early months I just made up email addresses of people that didn’t exist. That allowed me to cost projects up for multiple people. That’s obviously a degree of hustle I wouldn’t encourage in everyone, but it meant I was able to charge multiple day rates for projects where I was playing the role of four or five people. Self-initiated projects have long been part of the studio’s DNA and played a key role in building key client relationships. A&P by… was a brief to explore these letterforms without any commercial intent apart from the joy of creative expression. I started reaching out to illustrators and artists and photographers and designers that I really rated, and the things that started coming back were incredible. I was overwhelmed by the amount of energy and passion that people like Mr Bingo and Jason Evans were bringing to this. I think in so many ways, the answer to everything is community. I’ve gone on to work with a lot of the people that created these, and they also became friends. It was an early example of dissolving these illusionary boundaries around what an agency might be, but also expanding and amplifying your potential. The first of Accept & Proceed’s Light Calendars Then in 2006, I was trying to establish our portfolio and I wanted something to send out into the world that would also be an example of how Accept & Proceed thinks about design. I landed on these data visualisations that show the amount of light and darkness that would happen in London in the year ahead. I worked with a freelance designer called Stephen Heath on the first one – he is now our creative director. This kickstarted a 10-year exploration, and they became a rite of passage for new designers that came into the studio, to take that very similar data and express it in completely new ways. It culminated in an exhibition in London in 2016, showing ten years’ of prints. They were a labour of love, but they also meant that every single year we had a number of prints that we could send out to new potential contacts. Still when I go to the global headquarters of Nike in Beaverton in Portland, I’m amazed at how many of these sit in leaders’ offices there. When we first got a finance director, they couldn’t believe how much we’d invested as a business in things like this – we even had our own gallery for a while. It doesn’t make sense from a purely numbers mindset, but if you put things out there for authentic reasons, there are ripple effects over time. In 2017, the studio became a B-corp, the fourth creative agency in the UK to get this accreditation. Around 2016, I couldn’t help but look around – as we probably all have at varying points over the last 10 years – and wondered, what the fuck is going on? All these systems are not fit for purpose for the future – financial systems, food systems, relationship systems, energy systems. They’re not working. And I was like shit, are we part of the problem? Accept & Proceed’s work for the NASA Jet Propulsion Laboratory I’ve always thought of brand as a piece of technology that can fundamentally change our actions and the world around us. That comes with a huge responsibility. We probably paid four months’ wages of two people full-time just to get accredited, so it’s quite a high bar. But I like that the programme shackles you to this idea of improvement. You can’t rest on your laurels if you want to be re-accredited. It’s like the way design works as an iterative process – you have to keep getting better. In 2019, Johnston and his team started thinking seriously about the studio’s own brand, and created a punchy, nuanced new positioning. We got to a point where we’d proven we could help brands achieve their commercial aims. But we wanted to hold a position ourselves, not just be a conduit between a brand and its audience. It still amazes me that so few agencies actually stand for anything. We realised that all the things – vision, mission, principles – that we’ve been creating for brands for years, we hadn’t done for ourselves. It’s a bit like when you see a hairdresser with a really dodgy haircut. But it’s hard to cut your own hair. So we went through that process, which was really difficult, and we landed on “Design for the future” as our promise to the world. And if you’re going to have that as a promise, you better be able to describe the world you’re creating through your work, which we call “the together world.” Accept & Proceed’s work for Second Sea We stand at this most incredible moment in history where the latest technology and science is catching up with ancient wisdom, to know that we must become more entangled, more together, more whole. And we’ve assessed five global shifts that are happening in order to be able to take us towards a more together world through our work – interbeing, reciprocity, healing, resilience and liberation. The year before last, we lost three global rebrand projects based on our positioning. Every one of them said to me, “You’re right but we’re not ready.” But this year, I think the product market fit of what we’ve been saying for the last five years is really starting to mesh. We’re working with Arc’teryx on their 2030 landscape, evolving Nike’s move to zero, and working with LEGO on what their next 100 years might look like, which is mind-boggling work. I don’t think we could have won any of those opportunities had we not been talking for quite a long time about design for the future. In 2023, Johnston started a sunrise gathering on Hackney Marshes, which became a very significant part of his life. I had the flu and I had a vision in my dreamy fluey state of a particular spot on Hackney Marshes where people were gathering and watching the sunrise. I happened to tell my friend, the poet Thomas Sharp this, and he said, “That’s a premonition. You have to make it happen.” The first year there were five of us – this year there were 300 people for the spring equinox in March. I don’t fully know what these gatherings will lead to. Will Accept & Proceed start to introduce the seasons to the way we operate as a business? It’s a thought I’ve had percolating, but I don’t know. Will it be something else? One of the 2024 sunrise gatherings organised by Accept & Proceed founder David Johnston I do know that there’s major learnings around authentic community building for brands. We should do away with these buckets we put people into, of age group and location. They aren’t very true. It’s fascinating to see the breadth of people who come to these gatherings. Me and Laura were thinking at some point of moving out of London, but I think these sunrise gatherings are now my reason to stay. It’s the thing I didn’t know I needed until I had it. They have made London complete for me. There’s something so ancient about watching our star rise, and the reminder that we are actually just animals crawling upon the surface of a planet of mud. That’s what’s real. But it can be hard to remember that when you’re sitting at your computer in the studio. These gatherings help me better understand creativity’s true potential, for brands, for the world, and for us. Design disciplines in this article Brands in this article What to read next Features Turning Points: Cultural branding agency EDIT Brand Identity 20 Nov, 2024 #turning #points #accept #ampamp #proceed
    WWW.DESIGNWEEK.CO.UK
    Turning Points: Accept & Proceed
    12 June, 2025 In our turning points series, design studios share some of the key moments that shaped their business. This week, we meet Accept & Proceed. Accept & Proceed is a London based brand and design studio that works with clients like NASA, Nike and LEGO. Founder David Johnston talks us through some of the decisions that defined his business. In 2006, Johnston took the leap to start his own business, armed with a good name and a willingness to bend the truth about his team… I’d gone through my career learning from big organisations, and one small organisation, and I felt like I wasn’t happy where I was. It was my dad who encouraged me to take a leap of faith and try and go it alone. With nothing more than a month’s wages in the bank and a lot of energy, I decided to go and set up an agency. That really just means giving yourself a name and starting to promote yourself in the world. Accept & Proceed founder David Johnston I think the name itself is a very important thing. I wanted something that was memorable but also layered in meaning. A name that starts with an “a” is very beneficial when you’re being listed in the index of books and things like that. But it became a bit of a compass for the way that we wanted to create work, around accepting the status quo for what it is, but with a continual commitment to proceed nonetheless. Because I didn’t have anyone to work with, in those early months I just made up email addresses of people that didn’t exist. That allowed me to cost projects up for multiple people. That’s obviously a degree of hustle I wouldn’t encourage in everyone, but it meant I was able to charge multiple day rates for projects where I was playing the role of four or five people. Self-initiated projects have long been part of the studio’s DNA and played a key role in building key client relationships. A&P by… was a brief to explore these letterforms without any commercial intent apart from the joy of creative expression. I started reaching out to illustrators and artists and photographers and designers that I really rated, and the things that started coming back were incredible. I was overwhelmed by the amount of energy and passion that people like Mr Bingo and Jason Evans were bringing to this. I think in so many ways, the answer to everything is community. I’ve gone on to work with a lot of the people that created these, and they also became friends. It was an early example of dissolving these illusionary boundaries around what an agency might be, but also expanding and amplifying your potential. The first of Accept & Proceed’s Light Calendars Then in 2006, I was trying to establish our portfolio and I wanted something to send out into the world that would also be an example of how Accept & Proceed thinks about design. I landed on these data visualisations that show the amount of light and darkness that would happen in London in the year ahead. I worked with a freelance designer called Stephen Heath on the first one – he is now our creative director. This kickstarted a 10-year exploration, and they became a rite of passage for new designers that came into the studio, to take that very similar data and express it in completely new ways. It culminated in an exhibition in London in 2016, showing ten years’ of prints. They were a labour of love, but they also meant that every single year we had a number of prints that we could send out to new potential contacts. Still when I go to the global headquarters of Nike in Beaverton in Portland, I’m amazed at how many of these sit in leaders’ offices there. When we first got a finance director, they couldn’t believe how much we’d invested as a business in things like this – we even had our own gallery for a while. It doesn’t make sense from a purely numbers mindset, but if you put things out there for authentic reasons, there are ripple effects over time. In 2017, the studio became a B-corp, the fourth creative agency in the UK to get this accreditation. Around 2016, I couldn’t help but look around – as we probably all have at varying points over the last 10 years – and wondered, what the fuck is going on? All these systems are not fit for purpose for the future – financial systems, food systems, relationship systems, energy systems. They’re not working. And I was like shit, are we part of the problem? Accept & Proceed’s work for the NASA Jet Propulsion Laboratory I’ve always thought of brand as a piece of technology that can fundamentally change our actions and the world around us. That comes with a huge responsibility. We probably paid four months’ wages of two people full-time just to get accredited, so it’s quite a high bar. But I like that the programme shackles you to this idea of improvement. You can’t rest on your laurels if you want to be re-accredited. It’s like the way design works as an iterative process – you have to keep getting better. In 2019, Johnston and his team started thinking seriously about the studio’s own brand, and created a punchy, nuanced new positioning. We got to a point where we’d proven we could help brands achieve their commercial aims. But we wanted to hold a position ourselves, not just be a conduit between a brand and its audience. It still amazes me that so few agencies actually stand for anything. We realised that all the things – vision, mission, principles – that we’ve been creating for brands for years, we hadn’t done for ourselves. It’s a bit like when you see a hairdresser with a really dodgy haircut. But it’s hard to cut your own hair. So we went through that process, which was really difficult, and we landed on “Design for the future” as our promise to the world. And if you’re going to have that as a promise, you better be able to describe the world you’re creating through your work, which we call “the together world.” Accept & Proceed’s work for Second Sea We stand at this most incredible moment in history where the latest technology and science is catching up with ancient wisdom, to know that we must become more entangled, more together, more whole. And we’ve assessed five global shifts that are happening in order to be able to take us towards a more together world through our work – interbeing, reciprocity, healing, resilience and liberation. The year before last, we lost three global rebrand projects based on our positioning. Every one of them said to me, “You’re right but we’re not ready.” But this year, I think the product market fit of what we’ve been saying for the last five years is really starting to mesh. We’re working with Arc’teryx on their 2030 landscape, evolving Nike’s move to zero, and working with LEGO on what their next 100 years might look like, which is mind-boggling work. I don’t think we could have won any of those opportunities had we not been talking for quite a long time about design for the future. In 2023, Johnston started a sunrise gathering on Hackney Marshes, which became a very significant part of his life. I had the flu and I had a vision in my dreamy fluey state of a particular spot on Hackney Marshes where people were gathering and watching the sunrise. I happened to tell my friend, the poet Thomas Sharp this, and he said, “That’s a premonition. You have to make it happen.” The first year there were five of us – this year there were 300 people for the spring equinox in March. I don’t fully know what these gatherings will lead to. Will Accept & Proceed start to introduce the seasons to the way we operate as a business? It’s a thought I’ve had percolating, but I don’t know. Will it be something else? One of the 2024 sunrise gatherings organised by Accept & Proceed founder David Johnston I do know that there’s major learnings around authentic community building for brands. We should do away with these buckets we put people into, of age group and location. They aren’t very true. It’s fascinating to see the breadth of people who come to these gatherings. Me and Laura were thinking at some point of moving out of London, but I think these sunrise gatherings are now my reason to stay. It’s the thing I didn’t know I needed until I had it. They have made London complete for me. There’s something so ancient about watching our star rise, and the reminder that we are actually just animals crawling upon the surface of a planet of mud. That’s what’s real. But it can be hard to remember that when you’re sitting at your computer in the studio. These gatherings help me better understand creativity’s true potential, for brands, for the world, and for us. Design disciplines in this article Brands in this article What to read next Features Turning Points: Cultural branding agency EDIT Brand Identity 20 Nov, 2024
    0 Comentários 0 Compartilhamentos 0 Anterior
  • How to Implement Insertion Sort in Java: Step-by-Step Guide

    Posted on : June 13, 2025

    By

    Tech World Times

    Uncategorized 

    Rate this post

    Sorting is important in programming. It helps organize data. Sorting improves performance in searching, analysis, and reporting. There are many sorting algorithms. One of the simplest is Insertion Sort.
    In this article, we will learn how to implement Insertion Sort in Java. We will explain each step in simple words. You will see examples and understand how it works.
    What Is Insertion Sort?
    Insertion Sort is a simple sorting algorithm. It works like how you sort playing cards. You take one card at a time and place it in the right position. It compares the current element with those before it. If needed, it shifts elements to the right. Then, it inserts the current element at the correct place.
    How Insertion Sort Works
    Let’s understand with a small list:
    Example List:Steps:

    First elementis already sorted.
    Compare 3 with 8. Move 8 right. Insert 3 before it →Compare 5 with 8. Move 8 right. Insert 5 after 3 →Compare 1 with 8, 5, 3. Move them right. Insert 1 at start →Now the list is sorted!
    Why Use Insertion Sort?
    Insertion Sort is simple and easy to code. It works well for:

    Small datasets
    Nearly sorted lists
    Educational purposes and practice

    However, it is not good for large datasets. It has a time complexity of O.
    Time Complexity of Insertion Sort

    Best Case: OAverage Case: OWorst Case: OIt performs fewer steps in nearly sorted data.
    How to Implement Insertion Sort in Java
    Now let’s write the code for Insertion Sort in Java. We will explain each part.
    Step 1: Define a Class
    javaCopyEditpublic class InsertionSortExample {
    // Code goes here
    }

    We create a class named InsertionSortExample.
    Step 2: Create the Sorting Method
    javaCopyEditpublic static void insertionSort{
    int n = arr.length;
    for{
    int key = arr;
    int j = i - 1;

    while{
    arr= arr;
    j = j - 1;
    }
    arr= key;
    }
    }

    Let’s break it down:

    arris the current value.
    j starts from the previous index.
    While arr> key, shift arrto the right.
    Insert the key at the correct position.

    This logic sorts the array step by step.
    Step 3: Create the Main Method
    Now we test the code.
    javaCopyEditpublic static void main{
    intnumbers = {9, 5, 1, 4, 3};

    System.out.println;
    printArray;

    insertionSort;

    System.out.println;
    printArray;
    }

    This method:

    Creates an array of numbers
    Prints the array before sorting
    Calls the sort method
    Prints the array after sorting

    Step 4: Print the Array
    Let’s add a helper method to print the array.
    javaCopyEditpublic static void printArray{
    for{
    System.out.print;
    }
    System.out.println;
    }

    Now you can see how the array changes before and after sorting.
    Full Code Example
    javaCopyEditpublic class InsertionSortExample {

    public static void insertionSort{
    int n = arr.length;
    for{
    int key = arr;
    int j = i - 1;

    while{
    arr= arr;
    j = j - 1;
    }
    arr= key;
    }
    }

    public static void printArray{
    for{
    System.out.print;
    }
    System.out.println;
    }

    public static void main{
    intnumbers = {9, 5, 1, 4, 3};

    System.out.println;
    printArray;

    insertionSort;

    System.out.println;
    printArray;
    }
    }

    Sample Output
    yamlCopyEditBefore sorting:
    9 5 1 4 3
    After sorting:
    1 3 4 5 9

    This confirms that the sorting works correctly.
    Advantages of Insertion Sort in Java

    Easy to implement
    Works well with small inputs
    Stable sortGood for educational use

    When Not to Use Insertion Sort
    Avoid Insertion Sort when:

    The dataset is large
    Performance is critical
    Better algorithms like Merge Sort or Quick Sort are available

    Real-World Uses

    Sorting small records in a database
    Teaching algorithm basics
    Handling partially sorted arrays

    Even though it is not the fastest, it is useful in many simple tasks.
    Final Tips

    Practice with different inputs
    Add print statements to see how it works
    Try sorting strings or objects
    Use Java’s built-in sort methods for large arrays

    Conclusion
    Insertion Sort in Java is a great way to learn sorting. It is simple and easy to understand. In this guide, we showed how to implement it step-by-step. We covered the logic, code, and output. We also explained when to use it. Now you can try it yourself. Understanding sorting helps in coding interviews and software development. Keep practicing and exploring other sorting methods too. The more you practice, the better you understand algorithms.
    Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    #how #implement #insertion #sort #java
    How to Implement Insertion Sort in Java: Step-by-Step Guide
    Posted on : June 13, 2025 By Tech World Times Uncategorized  Rate this post Sorting is important in programming. It helps organize data. Sorting improves performance in searching, analysis, and reporting. There are many sorting algorithms. One of the simplest is Insertion Sort. In this article, we will learn how to implement Insertion Sort in Java. We will explain each step in simple words. You will see examples and understand how it works. What Is Insertion Sort? Insertion Sort is a simple sorting algorithm. It works like how you sort playing cards. You take one card at a time and place it in the right position. It compares the current element with those before it. If needed, it shifts elements to the right. Then, it inserts the current element at the correct place. How Insertion Sort Works Let’s understand with a small list: Example List:Steps: First elementis already sorted. Compare 3 with 8. Move 8 right. Insert 3 before it →Compare 5 with 8. Move 8 right. Insert 5 after 3 →Compare 1 with 8, 5, 3. Move them right. Insert 1 at start →Now the list is sorted! Why Use Insertion Sort? Insertion Sort is simple and easy to code. It works well for: Small datasets Nearly sorted lists Educational purposes and practice However, it is not good for large datasets. It has a time complexity of O. Time Complexity of Insertion Sort Best Case: OAverage Case: OWorst Case: OIt performs fewer steps in nearly sorted data. How to Implement Insertion Sort in Java Now let’s write the code for Insertion Sort in Java. We will explain each part. Step 1: Define a Class javaCopyEditpublic class InsertionSortExample { // Code goes here } We create a class named InsertionSortExample. Step 2: Create the Sorting Method javaCopyEditpublic static void insertionSort{ int n = arr.length; for{ int key = arr; int j = i - 1; while{ arr= arr; j = j - 1; } arr= key; } } Let’s break it down: arris the current value. j starts from the previous index. While arr> key, shift arrto the right. Insert the key at the correct position. This logic sorts the array step by step. Step 3: Create the Main Method Now we test the code. javaCopyEditpublic static void main{ intnumbers = {9, 5, 1, 4, 3}; System.out.println; printArray; insertionSort; System.out.println; printArray; } This method: Creates an array of numbers Prints the array before sorting Calls the sort method Prints the array after sorting Step 4: Print the Array Let’s add a helper method to print the array. javaCopyEditpublic static void printArray{ for{ System.out.print; } System.out.println; } Now you can see how the array changes before and after sorting. Full Code Example javaCopyEditpublic class InsertionSortExample { public static void insertionSort{ int n = arr.length; for{ int key = arr; int j = i - 1; while{ arr= arr; j = j - 1; } arr= key; } } public static void printArray{ for{ System.out.print; } System.out.println; } public static void main{ intnumbers = {9, 5, 1, 4, 3}; System.out.println; printArray; insertionSort; System.out.println; printArray; } } Sample Output yamlCopyEditBefore sorting: 9 5 1 4 3 After sorting: 1 3 4 5 9 This confirms that the sorting works correctly. Advantages of Insertion Sort in Java Easy to implement Works well with small inputs Stable sortGood for educational use When Not to Use Insertion Sort Avoid Insertion Sort when: The dataset is large Performance is critical Better algorithms like Merge Sort or Quick Sort are available Real-World Uses Sorting small records in a database Teaching algorithm basics Handling partially sorted arrays Even though it is not the fastest, it is useful in many simple tasks. Final Tips Practice with different inputs Add print statements to see how it works Try sorting strings or objects Use Java’s built-in sort methods for large arrays Conclusion Insertion Sort in Java is a great way to learn sorting. It is simple and easy to understand. In this guide, we showed how to implement it step-by-step. We covered the logic, code, and output. We also explained when to use it. Now you can try it yourself. Understanding sorting helps in coding interviews and software development. Keep practicing and exploring other sorting methods too. The more you practice, the better you understand algorithms. Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com #how #implement #insertion #sort #java
    TECHWORLDTIMES.COM
    How to Implement Insertion Sort in Java: Step-by-Step Guide
    Posted on : June 13, 2025 By Tech World Times Uncategorized  Rate this post Sorting is important in programming. It helps organize data. Sorting improves performance in searching, analysis, and reporting. There are many sorting algorithms. One of the simplest is Insertion Sort. In this article, we will learn how to implement Insertion Sort in Java. We will explain each step in simple words. You will see examples and understand how it works. What Is Insertion Sort? Insertion Sort is a simple sorting algorithm. It works like how you sort playing cards. You take one card at a time and place it in the right position. It compares the current element with those before it. If needed, it shifts elements to the right. Then, it inserts the current element at the correct place. How Insertion Sort Works Let’s understand with a small list: Example List: [8, 3, 5, 1] Steps: First element (8) is already sorted. Compare 3 with 8. Move 8 right. Insert 3 before it → [3, 8, 5, 1] Compare 5 with 8. Move 8 right. Insert 5 after 3 → [3, 5, 8, 1] Compare 1 with 8, 5, 3. Move them right. Insert 1 at start → [1, 3, 5, 8] Now the list is sorted! Why Use Insertion Sort? Insertion Sort is simple and easy to code. It works well for: Small datasets Nearly sorted lists Educational purposes and practice However, it is not good for large datasets. It has a time complexity of O(n²). Time Complexity of Insertion Sort Best Case (already sorted): O(n) Average Case: O(n²) Worst Case (reversed list): O(n²) It performs fewer steps in nearly sorted data. How to Implement Insertion Sort in Java Now let’s write the code for Insertion Sort in Java. We will explain each part. Step 1: Define a Class javaCopyEditpublic class InsertionSortExample { // Code goes here } We create a class named InsertionSortExample. Step 2: Create the Sorting Method javaCopyEditpublic static void insertionSort(int[] arr) { int n = arr.length; for (int i = 1; i < n; i++) { int key = arr[i]; int j = i - 1; while (j >= 0 && arr[j] > key) { arr[j + 1] = arr[j]; j = j - 1; } arr[j + 1] = key; } } Let’s break it down: arr[i] is the current value (called key). j starts from the previous index. While arr[j] > key, shift arr[j] to the right. Insert the key at the correct position. This logic sorts the array step by step. Step 3: Create the Main Method Now we test the code. javaCopyEditpublic static void main(String[] args) { int[] numbers = {9, 5, 1, 4, 3}; System.out.println("Before sorting:"); printArray(numbers); insertionSort(numbers); System.out.println("After sorting:"); printArray(numbers); } This method: Creates an array of numbers Prints the array before sorting Calls the sort method Prints the array after sorting Step 4: Print the Array Let’s add a helper method to print the array. javaCopyEditpublic static void printArray(int[] arr) { for (int number : arr) { System.out.print(number + " "); } System.out.println(); } Now you can see how the array changes before and after sorting. Full Code Example javaCopyEditpublic class InsertionSortExample { public static void insertionSort(int[] arr) { int n = arr.length; for (int i = 1; i < n; i++) { int key = arr[i]; int j = i - 1; while (j >= 0 && arr[j] > key) { arr[j + 1] = arr[j]; j = j - 1; } arr[j + 1] = key; } } public static void printArray(int[] arr) { for (int number : arr) { System.out.print(number + " "); } System.out.println(); } public static void main(String[] args) { int[] numbers = {9, 5, 1, 4, 3}; System.out.println("Before sorting:"); printArray(numbers); insertionSort(numbers); System.out.println("After sorting:"); printArray(numbers); } } Sample Output yamlCopyEditBefore sorting: 9 5 1 4 3 After sorting: 1 3 4 5 9 This confirms that the sorting works correctly. Advantages of Insertion Sort in Java Easy to implement Works well with small inputs Stable sort (keeps equal items in order) Good for educational use When Not to Use Insertion Sort Avoid Insertion Sort when: The dataset is large Performance is critical Better algorithms like Merge Sort or Quick Sort are available Real-World Uses Sorting small records in a database Teaching algorithm basics Handling partially sorted arrays Even though it is not the fastest, it is useful in many simple tasks. Final Tips Practice with different inputs Add print statements to see how it works Try sorting strings or objects Use Java’s built-in sort methods for large arrays Conclusion Insertion Sort in Java is a great way to learn sorting. It is simple and easy to understand. In this guide, we showed how to implement it step-by-step. We covered the logic, code, and output. We also explained when to use it. Now you can try it yourself. Understanding sorting helps in coding interviews and software development. Keep practicing and exploring other sorting methods too. The more you practice, the better you understand algorithms. Tech World TimesTech World Times (TWT), a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    0 Comentários 0 Compartilhamentos 0 Anterior
  • The 2025 Complete Splunk Beginner Bundle is now 25% off

    Deal

     When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

    The 2025 Complete Splunk Beginner Bundle is now 25% off

    Neowin Deals
    ·

    Jun 14, 2025 16:00 EDT

    Today's highlighted deal comes via Neowin Deals store, where you can save 75% on The 2025 Complete Splunk Beginner Bundle
    Splunk is a powerful data platform used to gather information from multiple sources and index it for efficient access. You can then use collected data to create visualizations, analytics, and a variety of automated and security-related functions. With its web-style interface, Splunk is easy to use and is utilized by many companies worldwide.
    What's Included:

    Splunk Fundamentals for Effective Management of SOC and SIEM

    Oak Academy 38 LessonsLifetime Value
    Splunk | Splunk Core Certified User Certification Prep Lab

    Oak Academy, 63 Lessons,Lifetime, Value
    Splunk | Splunk Core Certified Power User SPLK 1002 Prep

    Oak Academy, 53 Lessons, Lifetime, Value
    Splunk| Splunk Enterprise Certified Admin Certification Prep

    Oak Academy, 68 Lessons, Lifetime, Value
    Requirements

    Basic understanding of IT and networking concepts
    Familiarity with Linux and Windows operating systems
    A computer with internet access for hands-on practice

    Good to Know

    Length of time users can access this course: lifetime
    Access options: desktop or mobile
    Redemption deadline: redeem your code within 30 days of purchase
    Experience level required: all levels
    Certificate of Completion ONLY
    Updates included
    Closed captioning NOT available
    NOT downloadable for offline viewing

    Learn more about our Lifetime deals here!

    Lifetime access to this 2025 Complete Splunk Beginner Bundle normally costs but this deal can be yours for just that's a saving of For full terms, specifications, and info, click the link below.
    Although priced in U.S. dollars, this deal is available for digital purchase worldwide.

    We post these because we earn commission on each sale so as not to rely solely on advertising, which many of our readers block. It all helps toward paying staff reporters, servers and hosting costs.
    Other ways to support Neowin

    Whitelist Neowin by not blocking our ads

    Create a free member account to see fewer ads

    Make a donation to support our day to day running costs

    Subscribe to Neowin - for a year, or a year for an ad-free experience

    Disclosure: Neowin benefits from revenue of each sale made through our branded deals site powered by StackCommerce.

    Tags

    Report a problem with article

    Follow @NeowinFeed
    #complete #splunk #beginner #bundle #now
    The 2025 Complete Splunk Beginner Bundle is now 25% off
    Deal  When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. The 2025 Complete Splunk Beginner Bundle is now 25% off Neowin Deals · Jun 14, 2025 16:00 EDT Today's highlighted deal comes via Neowin Deals store, where you can save 75% on The 2025 Complete Splunk Beginner Bundle Splunk is a powerful data platform used to gather information from multiple sources and index it for efficient access. You can then use collected data to create visualizations, analytics, and a variety of automated and security-related functions. With its web-style interface, Splunk is easy to use and is utilized by many companies worldwide. What's Included: Splunk Fundamentals for Effective Management of SOC and SIEM Oak Academy 38 LessonsLifetime Value Splunk | Splunk Core Certified User Certification Prep Lab Oak Academy, 63 Lessons,Lifetime, Value Splunk | Splunk Core Certified Power User SPLK 1002 Prep Oak Academy, 53 Lessons, Lifetime, Value Splunk| Splunk Enterprise Certified Admin Certification Prep Oak Academy, 68 Lessons, Lifetime, Value Requirements Basic understanding of IT and networking concepts Familiarity with Linux and Windows operating systems A computer with internet access for hands-on practice Good to Know Length of time users can access this course: lifetime Access options: desktop or mobile Redemption deadline: redeem your code within 30 days of purchase Experience level required: all levels Certificate of Completion ONLY Updates included Closed captioning NOT available NOT downloadable for offline viewing Learn more about our Lifetime deals here! Lifetime access to this 2025 Complete Splunk Beginner Bundle normally costs but this deal can be yours for just that's a saving of For full terms, specifications, and info, click the link below. Although priced in U.S. dollars, this deal is available for digital purchase worldwide. We post these because we earn commission on each sale so as not to rely solely on advertising, which many of our readers block. It all helps toward paying staff reporters, servers and hosting costs. Other ways to support Neowin Whitelist Neowin by not blocking our ads Create a free member account to see fewer ads Make a donation to support our day to day running costs Subscribe to Neowin - for a year, or a year for an ad-free experience Disclosure: Neowin benefits from revenue of each sale made through our branded deals site powered by StackCommerce. Tags Report a problem with article Follow @NeowinFeed #complete #splunk #beginner #bundle #now
    WWW.NEOWIN.NET
    The 2025 Complete Splunk Beginner Bundle is now 25% off
    Deal  When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. The 2025 Complete Splunk Beginner Bundle is now 25% off Neowin Deals · Jun 14, 2025 16:00 EDT Today's highlighted deal comes via Neowin Deals store, where you can save 75% on The 2025 Complete Splunk Beginner Bundle Splunk is a powerful data platform used to gather information from multiple sources and index it for efficient access. You can then use collected data to create visualizations, analytics, and a variety of automated and security-related functions. With its web-style interface, Splunk is easy to use and is utilized by many companies worldwide. What's Included: Splunk Fundamentals for Effective Management of SOC and SIEM Oak Academy 38 Lessons (3.5h) Lifetime $20.00 Value Splunk | Splunk Core Certified User Certification Prep Lab Oak Academy, 63 Lessons (6h),Lifetime, $20.00 Value Splunk | Splunk Core Certified Power User SPLK 1002 Prep Oak Academy, 53 Lessons (5.5h), Lifetime, $20.00 Value Splunk| Splunk Enterprise Certified Admin Certification Prep Oak Academy, 68 Lessons (8.5h), Lifetime, $20.00 Value Requirements Basic understanding of IT and networking concepts Familiarity with Linux and Windows operating systems A computer with internet access for hands-on practice Good to Know Length of time users can access this course: lifetime Access options: desktop or mobile Redemption deadline: redeem your code within 30 days of purchase Experience level required: all levels Certificate of Completion ONLY Updates included Closed captioning NOT available NOT downloadable for offline viewing Learn more about our Lifetime deals here! Lifetime access to this 2025 Complete Splunk Beginner Bundle normally costs $80, but this deal can be yours for just $19.99, that's a saving of $60. For full terms, specifications, and info, click the link below. Although priced in U.S. dollars, this deal is available for digital purchase worldwide. We post these because we earn commission on each sale so as not to rely solely on advertising, which many of our readers block. It all helps toward paying staff reporters, servers and hosting costs. Other ways to support Neowin Whitelist Neowin by not blocking our ads Create a free member account to see fewer ads Make a donation to support our day to day running costs Subscribe to Neowin - for $14 a year, or $28 a year for an ad-free experience Disclosure: Neowin benefits from revenue of each sale made through our branded deals site powered by StackCommerce. Tags Report a problem with article Follow @NeowinFeed
    0 Comentários 0 Compartilhamentos 0 Anterior
  • Selection Sort Time Complexity: Best, Worst, and Average Cases

    Development and Testing 

    Rate this post

    Sorting is a basic task in programming. It arranges data in order. There are many sorting algorithms. Selection Sort is one of the simplest sorting methods. It is easy to understand and code. But it is not the fastest. In this guide, we will explain the Selection Sort Time Complexity. We will cover best, worst, and average cases.
    What Is Selection Sort?
    Selection Sort works by selecting the smallest element from the list. It places it in the correct position. It repeats this process for all elements. One by one, it moves the smallest values to the front.
    Let’s see an example:
    Input:Step 1: Smallest is 2 → swap with 5 →Step 2: Smallest in remaining is 3 → already correctStep 3: Smallest in remaining is 5 → swap with 8 →Now the list is sorted.How Selection Sort Works
    Selection Sort uses two loops. The outer loop moves one index at a time. The inner loop finds the smallest element. After each pass, the smallest value is moved to the front. The position is fixed. Selection Sort does not care if the list is sorted or not. It always does the same steps.
    Selection Sort Algorithm
    Here is the basic algorithm:

    Start from the first element
    Find the smallest in the rest of the list
    Swap it with the current element
    Repeat for each element

    This repeats until all elements are sorted.
    Selection Sort CodejavaCopyEditpublic class SelectionSort {
    public static void sort{
    int n = arr.length;
    for{
    int min = i;
    for{
    if{
    min = j;
    }
    }
    int temp = arr;
    arr= arr;
    arr= temp;
    }
    }
    }

    This code uses two loops. The outer loop runs n-1 times. The inner loop finds the minimum.
    Selection Sort Time Complexity
    Now let’s understand the main topic. Let’s analyze Selection Sort Time Complexity in three cases.
    1. Best Case
    Even if the array is already sorted, Selection Sort checks all elements. It keeps comparing and swapping.

    Time Complexity: OReason: Inner loop runs fully, regardless of the order
    Example Input:Even here, every comparison still happens. Only fewer swaps occur, but comparisons remain the same.
    2. Worst Case
    This happens when the array is in reverse order. But Selection Sort does not optimize for this.

    Time Complexity: OReason: Still needs full comparisons
    Example Input:Even in reverse, the steps are the same. It compares and finds the smallest element every time.
    3. Average Case
    This is when elements are randomly placed. It is the most common scenario in real-world problems.

    Time Complexity: OReason: Still compares each element in the inner loop
    Example Input:Selection Sort does not change behavior based on input order. So the complexity remains the same.
    Why Is It Always O?
    Selection Sort compares all pairs of elements. The number of comparisons does not change.
    Total comparisons = n ×/ 2
    That’s why the time complexity is always O.It does not reduce steps in any case. It does not take advantage of sorted elements.
    Space Complexity
    Selection Sort does not need extra space. It sorts in place.

    Space Complexity: OOnly a few variables are used
    No extra arrays or memory needed

    This is one good point of the Selection Sort.
    Comparison with Other Algorithms
    Let’s compare Selection Sort with other basic sorts:
    AlgorithmBest CaseAverage CaseWorst CaseSpaceSelection SortOOOOBubble SortOOOOInsertion SortOOOOMerge SortOOOOQuick SortOOOOAs you see, Selection Sort is slower than Merge Sort and Quick Sort.
    Advantages of Selection Sort

    Very simple and easy to understand
    Works well with small datasets
    Needs very little memory
    Good for learning purposes

    Disadvantages of Selection Sort

    Slow on large datasets
    Always takes the same time, even if sorted
    Not efficient for real-world use

    When to Use Selection Sort
    Use Selection Sort when:

    You are working with a very small dataset
    You want to teach or learn sorting logic
    You want stable, low-memory sorting

    Avoid it for:

    Large datasets
    Performance-sensitive programs

    Conclusion
    Selection Sort Time Complexity is simple to understand. But it is not efficient for big problems. It always takes Otime, no matter the case. That is the same for best, worst, and average inputs. Still, it is useful in some cases. It’s great for learning sorting basics. It uses very little memory. If you’re working with small arrays, Selection Sort is fine. For large data, use better algorithms. Understanding its time complexity helps you choose the right algorithm. Always pick the tool that fits your task.
    Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    #selection #sort #time #complexity #best
    Selection Sort Time Complexity: Best, Worst, and Average Cases
    Development and Testing  Rate this post Sorting is a basic task in programming. It arranges data in order. There are many sorting algorithms. Selection Sort is one of the simplest sorting methods. It is easy to understand and code. But it is not the fastest. In this guide, we will explain the Selection Sort Time Complexity. We will cover best, worst, and average cases. What Is Selection Sort? Selection Sort works by selecting the smallest element from the list. It places it in the correct position. It repeats this process for all elements. One by one, it moves the smallest values to the front. Let’s see an example: Input:Step 1: Smallest is 2 → swap with 5 →Step 2: Smallest in remaining is 3 → already correctStep 3: Smallest in remaining is 5 → swap with 8 →Now the list is sorted.How Selection Sort Works Selection Sort uses two loops. The outer loop moves one index at a time. The inner loop finds the smallest element. After each pass, the smallest value is moved to the front. The position is fixed. Selection Sort does not care if the list is sorted or not. It always does the same steps. Selection Sort Algorithm Here is the basic algorithm: Start from the first element Find the smallest in the rest of the list Swap it with the current element Repeat for each element This repeats until all elements are sorted. Selection Sort CodejavaCopyEditpublic class SelectionSort { public static void sort{ int n = arr.length; for{ int min = i; for{ if{ min = j; } } int temp = arr; arr= arr; arr= temp; } } } This code uses two loops. The outer loop runs n-1 times. The inner loop finds the minimum. Selection Sort Time Complexity Now let’s understand the main topic. Let’s analyze Selection Sort Time Complexity in three cases. 1. Best Case Even if the array is already sorted, Selection Sort checks all elements. It keeps comparing and swapping. Time Complexity: OReason: Inner loop runs fully, regardless of the order Example Input:Even here, every comparison still happens. Only fewer swaps occur, but comparisons remain the same. 2. Worst Case This happens when the array is in reverse order. But Selection Sort does not optimize for this. Time Complexity: OReason: Still needs full comparisons Example Input:Even in reverse, the steps are the same. It compares and finds the smallest element every time. 3. Average Case This is when elements are randomly placed. It is the most common scenario in real-world problems. Time Complexity: OReason: Still compares each element in the inner loop Example Input:Selection Sort does not change behavior based on input order. So the complexity remains the same. Why Is It Always O? Selection Sort compares all pairs of elements. The number of comparisons does not change. Total comparisons = n ×/ 2 That’s why the time complexity is always O.It does not reduce steps in any case. It does not take advantage of sorted elements. Space Complexity Selection Sort does not need extra space. It sorts in place. Space Complexity: OOnly a few variables are used No extra arrays or memory needed This is one good point of the Selection Sort. Comparison with Other Algorithms Let’s compare Selection Sort with other basic sorts: AlgorithmBest CaseAverage CaseWorst CaseSpaceSelection SortOOOOBubble SortOOOOInsertion SortOOOOMerge SortOOOOQuick SortOOOOAs you see, Selection Sort is slower than Merge Sort and Quick Sort. Advantages of Selection Sort Very simple and easy to understand Works well with small datasets Needs very little memory Good for learning purposes Disadvantages of Selection Sort Slow on large datasets Always takes the same time, even if sorted Not efficient for real-world use When to Use Selection Sort Use Selection Sort when: You are working with a very small dataset You want to teach or learn sorting logic You want stable, low-memory sorting Avoid it for: Large datasets Performance-sensitive programs Conclusion Selection Sort Time Complexity is simple to understand. But it is not efficient for big problems. It always takes Otime, no matter the case. That is the same for best, worst, and average inputs. Still, it is useful in some cases. It’s great for learning sorting basics. It uses very little memory. If you’re working with small arrays, Selection Sort is fine. For large data, use better algorithms. Understanding its time complexity helps you choose the right algorithm. Always pick the tool that fits your task. Tech World TimesTech World Times, a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com #selection #sort #time #complexity #best
    TECHWORLDTIMES.COM
    Selection Sort Time Complexity: Best, Worst, and Average Cases
    Development and Testing  Rate this post Sorting is a basic task in programming. It arranges data in order. There are many sorting algorithms. Selection Sort is one of the simplest sorting methods. It is easy to understand and code. But it is not the fastest. In this guide, we will explain the Selection Sort Time Complexity. We will cover best, worst, and average cases. What Is Selection Sort? Selection Sort works by selecting the smallest element from the list. It places it in the correct position. It repeats this process for all elements. One by one, it moves the smallest values to the front. Let’s see an example: Input: [5, 3, 8, 2]Step 1: Smallest is 2 → swap with 5 → [2, 3, 8, 5]Step 2: Smallest in remaining is 3 → already correctStep 3: Smallest in remaining is 5 → swap with 8 → [2, 3, 5, 8] Now the list is sorted.How Selection Sort Works Selection Sort uses two loops. The outer loop moves one index at a time. The inner loop finds the smallest element. After each pass, the smallest value is moved to the front. The position is fixed. Selection Sort does not care if the list is sorted or not. It always does the same steps. Selection Sort Algorithm Here is the basic algorithm: Start from the first element Find the smallest in the rest of the list Swap it with the current element Repeat for each element This repeats until all elements are sorted. Selection Sort Code (Java Example) javaCopyEditpublic class SelectionSort { public static void sort(int[] arr) { int n = arr.length; for (int i = 0; i < n - 1; i++) { int min = i; for (int j = i + 1; j < n; j++) { if (arr[j] < arr[min]) { min = j; } } int temp = arr[min]; arr[min] = arr[i]; arr[i] = temp; } } } This code uses two loops. The outer loop runs n-1 times. The inner loop finds the minimum. Selection Sort Time Complexity Now let’s understand the main topic. Let’s analyze Selection Sort Time Complexity in three cases. 1. Best Case Even if the array is already sorted, Selection Sort checks all elements. It keeps comparing and swapping. Time Complexity: O(n²) Reason: Inner loop runs fully, regardless of the order Example Input: [1, 2, 3, 4, 5] Even here, every comparison still happens. Only fewer swaps occur, but comparisons remain the same. 2. Worst Case This happens when the array is in reverse order. But Selection Sort does not optimize for this. Time Complexity: O(n²) Reason: Still needs full comparisons Example Input: [5, 4, 3, 2, 1] Even in reverse, the steps are the same. It compares and finds the smallest element every time. 3. Average Case This is when elements are randomly placed. It is the most common scenario in real-world problems. Time Complexity: O(n²) Reason: Still compares each element in the inner loop Example Input: [3, 1, 4, 2, 5] Selection Sort does not change behavior based on input order. So the complexity remains the same. Why Is It Always O(n²)? Selection Sort compares all pairs of elements. The number of comparisons does not change. Total comparisons = n × (n – 1) / 2 That’s why the time complexity is always O(n²).It does not reduce steps in any case. It does not take advantage of sorted elements. Space Complexity Selection Sort does not need extra space. It sorts in place. Space Complexity: O(1) Only a few variables are used No extra arrays or memory needed This is one good point of the Selection Sort. Comparison with Other Algorithms Let’s compare Selection Sort with other basic sorts: AlgorithmBest CaseAverage CaseWorst CaseSpaceSelection SortO(n²)O(n²)O(n²)O(1)Bubble SortO(n)O(n²)O(n²)O(1)Insertion SortO(n)O(n²)O(n²)O(1)Merge SortO(n log n)O(n log n)O(n log n)O(n)Quick SortO(n log n)O(n log n)O(n²)O(log n) As you see, Selection Sort is slower than Merge Sort and Quick Sort. Advantages of Selection Sort Very simple and easy to understand Works well with small datasets Needs very little memory Good for learning purposes Disadvantages of Selection Sort Slow on large datasets Always takes the same time, even if sorted Not efficient for real-world use When to Use Selection Sort Use Selection Sort when: You are working with a very small dataset You want to teach or learn sorting logic You want stable, low-memory sorting Avoid it for: Large datasets Performance-sensitive programs Conclusion Selection Sort Time Complexity is simple to understand. But it is not efficient for big problems. It always takes O(n²) time, no matter the case. That is the same for best, worst, and average inputs. Still, it is useful in some cases. It’s great for learning sorting basics. It uses very little memory. If you’re working with small arrays, Selection Sort is fine. For large data, use better algorithms. Understanding its time complexity helps you choose the right algorithm. Always pick the tool that fits your task. Tech World TimesTech World Times (TWT), a global collective focusing on the latest tech news and trends in blockchain, Fintech, Development & Testing, AI and Startups. If you are looking for the guest post then contact at techworldtimes@gmail.com
    0 Comentários 0 Compartilhamentos 0 Anterior
Páginas Impulsionadas
CGShares https://cgshares.com