• Tavernspite housing, Pembrokeshire

    The commission, valued at up to £46,000, will see the appointed architect work closely with ateb’s internal teams to deliver a 30-unit housing development, supporting the group’s mission to create better living solutions for the people and communities of West Wales.
    The two-year contract, running from July 2025 to July 2027, will require the architect to oversee all stages of design, from feasibility through to tender, in line with Welsh Government technical scrutiny and local authority planning requirements.
    The project is part of ateb’s ongoing commitment to respond to local housing need, regenerate communities, and provide a variety of affordable tenures, including social rent, rent to buy, and shared ownership.Advertisement

    According to the brief: ‘The ateb Groupis a unique set o companies that collectively has the shared purpose of 'Creating better living solutions for the people and communities of West Wales.
    ‘ateb currently has around 3,100 homes predominantly in Pembrokeshire, that we rent on either a social or intermediate rental basis.  ateb works closely with its Local Authority and other partners to develop around 150 new homes every year, to meet affordable housing need through a range of tenures such as, for rent, rent to buy or shared ownership.’
    Tavernspite is a small village of around 350 inhabitants located 9.7km southeast of Narberth in Pembrokeshire. Ateb, based in nearby Haverfordwest, is a not-for-profit housing association managing around 3,100 homes across the county.
    The group’s social purpose is supported by its subsidiaries: Mill Bay Homes, which develops homes for sale to reinvest profits into affordable housing, and West Wales Care and Repair, which supports older and vulnerable residents to remain independent in their homes.
    Bids will be assessed 60 per cent on quality and 40 per cent on price, with a strong emphasis on experience in the housing association sector and collaborative working with internal client teams.Advertisement

    Applicants must hold professional indemnity insurance of at least £2 million and be prepared to attend in-person evaluation presentations as part of the assessment process.

    Competition details
    Project title Provision of Architect Services for Tavernspite Development
    Client
    Contract value Tbc
    First round deadline Midday, 3 July 2025
    Restrictions The contract particularly welcomes submissions from small and medium-sized enterprisesand voluntary, community, and social enterprisesMore information
    #tavernspite #housing #pembrokeshire
    Tavernspite housing, Pembrokeshire
    The commission, valued at up to £46,000, will see the appointed architect work closely with ateb’s internal teams to deliver a 30-unit housing development, supporting the group’s mission to create better living solutions for the people and communities of West Wales. The two-year contract, running from July 2025 to July 2027, will require the architect to oversee all stages of design, from feasibility through to tender, in line with Welsh Government technical scrutiny and local authority planning requirements. The project is part of ateb’s ongoing commitment to respond to local housing need, regenerate communities, and provide a variety of affordable tenures, including social rent, rent to buy, and shared ownership.Advertisement According to the brief: ‘The ateb Groupis a unique set o companies that collectively has the shared purpose of 'Creating better living solutions for the people and communities of West Wales. ‘ateb currently has around 3,100 homes predominantly in Pembrokeshire, that we rent on either a social or intermediate rental basis.  ateb works closely with its Local Authority and other partners to develop around 150 new homes every year, to meet affordable housing need through a range of tenures such as, for rent, rent to buy or shared ownership.’ Tavernspite is a small village of around 350 inhabitants located 9.7km southeast of Narberth in Pembrokeshire. Ateb, based in nearby Haverfordwest, is a not-for-profit housing association managing around 3,100 homes across the county. The group’s social purpose is supported by its subsidiaries: Mill Bay Homes, which develops homes for sale to reinvest profits into affordable housing, and West Wales Care and Repair, which supports older and vulnerable residents to remain independent in their homes. Bids will be assessed 60 per cent on quality and 40 per cent on price, with a strong emphasis on experience in the housing association sector and collaborative working with internal client teams.Advertisement Applicants must hold professional indemnity insurance of at least £2 million and be prepared to attend in-person evaluation presentations as part of the assessment process. Competition details Project title Provision of Architect Services for Tavernspite Development Client Contract value Tbc First round deadline Midday, 3 July 2025 Restrictions The contract particularly welcomes submissions from small and medium-sized enterprisesand voluntary, community, and social enterprisesMore information #tavernspite #housing #pembrokeshire
    WWW.ARCHITECTSJOURNAL.CO.UK
    Tavernspite housing, Pembrokeshire
    The commission, valued at up to £46,000 (including VAT), will see the appointed architect work closely with ateb’s internal teams to deliver a 30-unit housing development, supporting the group’s mission to create better living solutions for the people and communities of West Wales. The two-year contract, running from July 2025 to July 2027, will require the architect to oversee all stages of design, from feasibility through to tender, in line with Welsh Government technical scrutiny and local authority planning requirements. The project is part of ateb’s ongoing commitment to respond to local housing need, regenerate communities, and provide a variety of affordable tenures, including social rent, rent to buy, and shared ownership.Advertisement According to the brief: ‘The ateb Group (where ateb means answer or solution In Welsh) is a unique set o companies that collectively has the shared purpose of 'Creating better living solutions for the people and communities of West Wales. ‘ateb currently has around 3,100 homes predominantly in Pembrokeshire, that we rent on either a social or intermediate rental basis.  ateb works closely with its Local Authority and other partners to develop around 150 new homes every year, to meet affordable housing need through a range of tenures such as, for rent, rent to buy or shared ownership.’ Tavernspite is a small village of around 350 inhabitants located 9.7km southeast of Narberth in Pembrokeshire. Ateb, based in nearby Haverfordwest, is a not-for-profit housing association managing around 3,100 homes across the county. The group’s social purpose is supported by its subsidiaries: Mill Bay Homes, which develops homes for sale to reinvest profits into affordable housing, and West Wales Care and Repair, which supports older and vulnerable residents to remain independent in their homes. Bids will be assessed 60 per cent on quality and 40 per cent on price, with a strong emphasis on experience in the housing association sector and collaborative working with internal client teams.Advertisement Applicants must hold professional indemnity insurance of at least £2 million and be prepared to attend in-person evaluation presentations as part of the assessment process. Competition details Project title Provision of Architect Services for Tavernspite Development Client Contract value Tbc First round deadline Midday, 3 July 2025 Restrictions The contract particularly welcomes submissions from small and medium-sized enterprises (SMEs) and voluntary, community, and social enterprises (VCSEs) More information https://www.find-tender.service.gov.uk/Notice/031815-2025
    Like
    Love
    Wow
    Sad
    Angry
    544
    2 Commentarii 0 Distribuiri
  • Rewriting SymCrypt in Rust to modernize Microsoft’s cryptographic library 

    Outdated coding practices and memory-unsafe languages like C are putting software, including cryptographic libraries, at risk. Fortunately, memory-safe languages like Rust, along with formal verification tools, are now mature enough to be used at scale, helping prevent issues like crashes, data corruption, flawed implementation, and side-channel attacks.
    To address these vulnerabilities and improve memory safety, we’re rewriting SymCrypt—Microsoft’s open-source cryptographic library—in Rust. We’re also incorporating formal verification methods. SymCrypt is used in Windows, Azure Linux, Xbox, and other platforms.
    Currently, SymCrypt is primarily written in cross-platform C, with limited use of hardware-specific optimizations through intrinsicsand assembly language. It provides a wide range of algorithms, including AES-GCM, SHA, ECDSA, and the more recent post-quantum algorithms ML-KEM and ML-DSA. 
    Formal verification will confirm that implementations behave as intended and don’t deviate from algorithm specifications, critical for preventing attacks. We’ll also analyze compiled code to detect side-channel leaks caused by timing or hardware-level behavior.
    Proving Rust program properties with Aeneas
    Program verification is the process of proving that a piece of code will always satisfy a given property, no matter the input. Rust’s type system profoundly improves the prospects for program verification by providing strong ownership guarantees, by construction, using a discipline known as “aliasing xor mutability”.
    For example, reasoning about C code often requires proving that two non-const pointers are live and non-overlapping, a property that can depend on external client code. In contrast, Rust’s type system guarantees this property for any two mutably borrowed references.
    As a result, new tools have emerged specifically for verifying Rust code. We chose Aeneasbecause it helps provide a clean separation between code and proofs.
    Developed by Microsoft Azure Research in partnership with Inria, the French National Institute for Research in Digital Science and Technology, Aeneas connects to proof assistants like Lean, allowing us to draw on a large body of mathematical proofs—especially valuable given the mathematical nature of cryptographic algorithms—and benefit from Lean’s active user community.
    Compiling Rust to C supports backward compatibility  
    We recognize that switching to Rust isn’t feasible for all use cases, so we’ll continue to support, extend, and certify C-based APIs as long as users need them. Users won’t see any changes, as Rust runs underneath the existing C APIs.
    Some users compile our C code directly and may rely on specific toolchains or compiler features that complicate the adoption of Rust code. To address this, we will use Eurydice, a Rust-to-C compiler developed by Microsoft Azure Research, to replace handwritten C code with C generated from formally verified Rust. Eurydicecompiles directly from Rust’s MIR intermediate language, and the resulting C code will be checked into the SymCrypt repository alongside the original Rust source code.
    As more users adopt Rust, we’ll continue supporting this compilation path for those who build SymCrypt from source code but aren’t ready to use the Rust compiler. In the long term, we hope to transition users to either use precompiled SymCrypt binaries, or compile from source code in Rust, at which point the Rust-to-C compilation path will no longer be needed.

    Microsoft research podcast

    Ideas: AI and democracy with Madeleine Daepp and Robert Osazuwa Ness
    As the “biggest election year in history” comes to an end, researchers Madeleine Daepp and Robert Osazuwa Ness and Democracy Forward GM Ginny Badanes discuss AI’s impact on democracy, including the tech’s use in Taiwan and India.

    Listen now

    Opens in a new tab
    Timing analysis with Revizor 
    Even software that has been verified for functional correctness can remain vulnerable to low-level security threats, such as side channels caused by timing leaks or speculative execution. These threats operate at the hardware level and can leak private information, such as memory load addresses, branch targets, or division operands, even when the source code is provably correct. 
    To address this, we’re extending Revizor, a tool developed by Microsoft Azure Research, to more effectively analyze SymCrypt binaries. Revizor models microarchitectural leakage and uses fuzzing techniques to systematically uncover instructions that may expose private information through known hardware-level effects.  
    Earlier cryptographic libraries relied on constant-time programming to avoid operations on secret data. However, recent research has shown that this alone is insufficient with today’s CPUs, where every new optimization may open a new side channel. 
    By analyzing binary code for specific compilers and platforms, our extended Revizor tool enables deeper scrutiny of vulnerabilities that aren’t visible in the source code.
    Verified Rust implementations begin with ML-KEM
    This long-term effort is in alignment with the Microsoft Secure Future Initiative and brings together experts across Microsoft, building on decades of Microsoft Research investment in program verification and security tooling.
    A preliminary version of ML-KEM in Rust is now available on the preview feature/verifiedcryptobranch of the SymCrypt repository. We encourage users to try the Rust build and share feedback. Looking ahead, we plan to support direct use of the same cryptographic library in Rust without requiring C bindings. 
    Over the coming months, we plan to rewrite, verify, and ship several algorithms in Rust as part of SymCrypt. As our investment in Rust deepens, we expect to gain new insights into how to best leverage the language for high-assurance cryptographic implementations with low-level optimizations. 
    As performance is key to scalability and sustainability, we’re holding new implementations to a high bar using our benchmarking tools to match or exceed existing systems.
    Looking forward 
    This is a pivotal moment for high-assurance software. Microsoft’s investment in Rust and formal verification presents a rare opportunity to advance one of our key libraries. We’re excited to scale this work and ultimately deliver an industrial-grade, Rust-based, FIPS-certified cryptographic library.
    Opens in a new tab
    #rewriting #symcrypt #rust #modernize #microsofts
    Rewriting SymCrypt in Rust to modernize Microsoft’s cryptographic library 
    Outdated coding practices and memory-unsafe languages like C are putting software, including cryptographic libraries, at risk. Fortunately, memory-safe languages like Rust, along with formal verification tools, are now mature enough to be used at scale, helping prevent issues like crashes, data corruption, flawed implementation, and side-channel attacks. To address these vulnerabilities and improve memory safety, we’re rewriting SymCrypt—Microsoft’s open-source cryptographic library—in Rust. We’re also incorporating formal verification methods. SymCrypt is used in Windows, Azure Linux, Xbox, and other platforms. Currently, SymCrypt is primarily written in cross-platform C, with limited use of hardware-specific optimizations through intrinsicsand assembly language. It provides a wide range of algorithms, including AES-GCM, SHA, ECDSA, and the more recent post-quantum algorithms ML-KEM and ML-DSA.  Formal verification will confirm that implementations behave as intended and don’t deviate from algorithm specifications, critical for preventing attacks. We’ll also analyze compiled code to detect side-channel leaks caused by timing or hardware-level behavior. Proving Rust program properties with Aeneas Program verification is the process of proving that a piece of code will always satisfy a given property, no matter the input. Rust’s type system profoundly improves the prospects for program verification by providing strong ownership guarantees, by construction, using a discipline known as “aliasing xor mutability”. For example, reasoning about C code often requires proving that two non-const pointers are live and non-overlapping, a property that can depend on external client code. In contrast, Rust’s type system guarantees this property for any two mutably borrowed references. As a result, new tools have emerged specifically for verifying Rust code. We chose Aeneasbecause it helps provide a clean separation between code and proofs. Developed by Microsoft Azure Research in partnership with Inria, the French National Institute for Research in Digital Science and Technology, Aeneas connects to proof assistants like Lean, allowing us to draw on a large body of mathematical proofs—especially valuable given the mathematical nature of cryptographic algorithms—and benefit from Lean’s active user community. Compiling Rust to C supports backward compatibility   We recognize that switching to Rust isn’t feasible for all use cases, so we’ll continue to support, extend, and certify C-based APIs as long as users need them. Users won’t see any changes, as Rust runs underneath the existing C APIs. Some users compile our C code directly and may rely on specific toolchains or compiler features that complicate the adoption of Rust code. To address this, we will use Eurydice, a Rust-to-C compiler developed by Microsoft Azure Research, to replace handwritten C code with C generated from formally verified Rust. Eurydicecompiles directly from Rust’s MIR intermediate language, and the resulting C code will be checked into the SymCrypt repository alongside the original Rust source code. As more users adopt Rust, we’ll continue supporting this compilation path for those who build SymCrypt from source code but aren’t ready to use the Rust compiler. In the long term, we hope to transition users to either use precompiled SymCrypt binaries, or compile from source code in Rust, at which point the Rust-to-C compilation path will no longer be needed. Microsoft research podcast Ideas: AI and democracy with Madeleine Daepp and Robert Osazuwa Ness As the “biggest election year in history” comes to an end, researchers Madeleine Daepp and Robert Osazuwa Ness and Democracy Forward GM Ginny Badanes discuss AI’s impact on democracy, including the tech’s use in Taiwan and India. Listen now Opens in a new tab Timing analysis with Revizor  Even software that has been verified for functional correctness can remain vulnerable to low-level security threats, such as side channels caused by timing leaks or speculative execution. These threats operate at the hardware level and can leak private information, such as memory load addresses, branch targets, or division operands, even when the source code is provably correct.  To address this, we’re extending Revizor, a tool developed by Microsoft Azure Research, to more effectively analyze SymCrypt binaries. Revizor models microarchitectural leakage and uses fuzzing techniques to systematically uncover instructions that may expose private information through known hardware-level effects.   Earlier cryptographic libraries relied on constant-time programming to avoid operations on secret data. However, recent research has shown that this alone is insufficient with today’s CPUs, where every new optimization may open a new side channel.  By analyzing binary code for specific compilers and platforms, our extended Revizor tool enables deeper scrutiny of vulnerabilities that aren’t visible in the source code. Verified Rust implementations begin with ML-KEM This long-term effort is in alignment with the Microsoft Secure Future Initiative and brings together experts across Microsoft, building on decades of Microsoft Research investment in program verification and security tooling. A preliminary version of ML-KEM in Rust is now available on the preview feature/verifiedcryptobranch of the SymCrypt repository. We encourage users to try the Rust build and share feedback. Looking ahead, we plan to support direct use of the same cryptographic library in Rust without requiring C bindings.  Over the coming months, we plan to rewrite, verify, and ship several algorithms in Rust as part of SymCrypt. As our investment in Rust deepens, we expect to gain new insights into how to best leverage the language for high-assurance cryptographic implementations with low-level optimizations.  As performance is key to scalability and sustainability, we’re holding new implementations to a high bar using our benchmarking tools to match or exceed existing systems. Looking forward  This is a pivotal moment for high-assurance software. Microsoft’s investment in Rust and formal verification presents a rare opportunity to advance one of our key libraries. We’re excited to scale this work and ultimately deliver an industrial-grade, Rust-based, FIPS-certified cryptographic library. Opens in a new tab #rewriting #symcrypt #rust #modernize #microsofts
    WWW.MICROSOFT.COM
    Rewriting SymCrypt in Rust to modernize Microsoft’s cryptographic library 
    Outdated coding practices and memory-unsafe languages like C are putting software, including cryptographic libraries, at risk. Fortunately, memory-safe languages like Rust, along with formal verification tools, are now mature enough to be used at scale, helping prevent issues like crashes, data corruption, flawed implementation, and side-channel attacks. To address these vulnerabilities and improve memory safety, we’re rewriting SymCrypt (opens in new tab)—Microsoft’s open-source cryptographic library—in Rust. We’re also incorporating formal verification methods. SymCrypt is used in Windows, Azure Linux, Xbox, and other platforms. Currently, SymCrypt is primarily written in cross-platform C, with limited use of hardware-specific optimizations through intrinsics (compiler-provided low-level functions) and assembly language (direct processor instructions). It provides a wide range of algorithms, including AES-GCM, SHA, ECDSA, and the more recent post-quantum algorithms ML-KEM and ML-DSA.  Formal verification will confirm that implementations behave as intended and don’t deviate from algorithm specifications, critical for preventing attacks. We’ll also analyze compiled code to detect side-channel leaks caused by timing or hardware-level behavior. Proving Rust program properties with Aeneas Program verification is the process of proving that a piece of code will always satisfy a given property, no matter the input. Rust’s type system profoundly improves the prospects for program verification by providing strong ownership guarantees, by construction, using a discipline known as “aliasing xor mutability”. For example, reasoning about C code often requires proving that two non-const pointers are live and non-overlapping, a property that can depend on external client code. In contrast, Rust’s type system guarantees this property for any two mutably borrowed references. As a result, new tools have emerged specifically for verifying Rust code. We chose Aeneas (opens in new tab) because it helps provide a clean separation between code and proofs. Developed by Microsoft Azure Research in partnership with Inria, the French National Institute for Research in Digital Science and Technology, Aeneas connects to proof assistants like Lean (opens in new tab), allowing us to draw on a large body of mathematical proofs—especially valuable given the mathematical nature of cryptographic algorithms—and benefit from Lean’s active user community. Compiling Rust to C supports backward compatibility   We recognize that switching to Rust isn’t feasible for all use cases, so we’ll continue to support, extend, and certify C-based APIs as long as users need them. Users won’t see any changes, as Rust runs underneath the existing C APIs. Some users compile our C code directly and may rely on specific toolchains or compiler features that complicate the adoption of Rust code. To address this, we will use Eurydice (opens in new tab), a Rust-to-C compiler developed by Microsoft Azure Research, to replace handwritten C code with C generated from formally verified Rust. Eurydice (opens in new tab) compiles directly from Rust’s MIR intermediate language, and the resulting C code will be checked into the SymCrypt repository alongside the original Rust source code. As more users adopt Rust, we’ll continue supporting this compilation path for those who build SymCrypt from source code but aren’t ready to use the Rust compiler. In the long term, we hope to transition users to either use precompiled SymCrypt binaries (via C or Rust APIs), or compile from source code in Rust, at which point the Rust-to-C compilation path will no longer be needed. Microsoft research podcast Ideas: AI and democracy with Madeleine Daepp and Robert Osazuwa Ness As the “biggest election year in history” comes to an end, researchers Madeleine Daepp and Robert Osazuwa Ness and Democracy Forward GM Ginny Badanes discuss AI’s impact on democracy, including the tech’s use in Taiwan and India. Listen now Opens in a new tab Timing analysis with Revizor  Even software that has been verified for functional correctness can remain vulnerable to low-level security threats, such as side channels caused by timing leaks or speculative execution. These threats operate at the hardware level and can leak private information, such as memory load addresses, branch targets, or division operands, even when the source code is provably correct.  To address this, we’re extending Revizor (opens in new tab), a tool developed by Microsoft Azure Research, to more effectively analyze SymCrypt binaries. Revizor models microarchitectural leakage and uses fuzzing techniques to systematically uncover instructions that may expose private information through known hardware-level effects.   Earlier cryptographic libraries relied on constant-time programming to avoid operations on secret data. However, recent research has shown that this alone is insufficient with today’s CPUs, where every new optimization may open a new side channel.  By analyzing binary code for specific compilers and platforms, our extended Revizor tool enables deeper scrutiny of vulnerabilities that aren’t visible in the source code. Verified Rust implementations begin with ML-KEM This long-term effort is in alignment with the Microsoft Secure Future Initiative and brings together experts across Microsoft, building on decades of Microsoft Research investment in program verification and security tooling. A preliminary version of ML-KEM in Rust is now available on the preview feature/verifiedcrypto (opens in new tab) branch of the SymCrypt repository. We encourage users to try the Rust build and share feedback (opens in new tab). Looking ahead, we plan to support direct use of the same cryptographic library in Rust without requiring C bindings.  Over the coming months, we plan to rewrite, verify, and ship several algorithms in Rust as part of SymCrypt. As our investment in Rust deepens, we expect to gain new insights into how to best leverage the language for high-assurance cryptographic implementations with low-level optimizations.  As performance is key to scalability and sustainability, we’re holding new implementations to a high bar using our benchmarking tools to match or exceed existing systems. Looking forward  This is a pivotal moment for high-assurance software. Microsoft’s investment in Rust and formal verification presents a rare opportunity to advance one of our key libraries. We’re excited to scale this work and ultimately deliver an industrial-grade, Rust-based, FIPS-certified cryptographic library. Opens in a new tab
    0 Commentarii 0 Distribuiri
  • Ansys: UX Designer II (Remote - US)

    Requisition #: 16391 Our Mission: Powering Innovation That Drives Human Advancement When visionary companies need to know how their world-changing ideas will perform, they close the gap between design and reality with Ansys simulation. For more than 50 years, Ansys software has enabled innovators across industries to push boundaries by using the predictive power of simulation. From sustainable transportation to advanced semiconductors, from satellite systems to life-saving medical devices, the next great leaps in human advancement will be powered by Ansys. Innovate With Ansys, Power Your Career. Summary / Role Purpose The User Experience Designer II creates easy and delightful experiences for users interacting with ANSYS products and services. The UX designer assesses the functional and content requirements of a product, develops storyboards, creates wireframes and task flows based on user needs, and produces visually detailed mockups. A passion for visual design and familiarity with UI trends and technologies are essential in this role, enabling the UX designer to bring fresh and innovative ideas to a project. This is an intermediate role, heavily focused on content production and communication. It is intended to expose the UX professional to the nuts-and-bolts aspects of their UX career; while building on presentation, communication, and usability aspects of the design role. The User Experience Designer II will contribute to the development of a new web-based, collaborative solution for the ModelCenter and optiSLang product lines. This work will be based on an innovative modeling framework, modern web technologies, micro-services and integrations with Ansys' core products. The User Experience Designer II will contribute to the specification and design of user interactions and workflows for new features. The solution will be used by Ansys customers to design next generation systems in the most innovative industries. Location: Can be 100% Remote within US Key Duties and Responsibilities Designs, develops, and evaluates cutting-edge user interfaces Reviews UX artifacts created by other UX team members Utilizes prototyping tools and UX toolkits Creates and delivers usability studies Communicates design rationale across product creation disciplines and personnel Records usability/UX problems with clear explanations and recommendations for improvement Works closely with product managers, development teams, and other designers Minimum Education/Certification Requirements and Experience BS or BA in Human-Computer Interaction, Design Engineering, or Industrial Design with 2 years' experience or MS Working experience with technical software development proven by academic, research, or industry projects. Professional working proficiency in English Preferred Qualifications and Skills Experience with: UX design and collaboration tools: Figma, Balsamiq or similar tools Tools & technologies for UI implementation: HTML, CSS, JavaScript, Angular, React Screen-capture/editing/video-editing tools Adobe Creative Suite Ability to: Smoothly iterate on designs, taking direction, adjusting, and re-focusing towards a converged design Organize deliverables for future reflection and current investigations Communicate succinctly and professionally via email, chat, remote meetings, usability evaluations, etc. Prototype rapidly using any tools available Knowledge of Model Based System Engineeringor optimization is a plus Culture and Values Culture and values are incredibly important to ANSYS. They inform us of who we are, of how we act. Values aren't posters hanging on a wall or about trite or glib slogans. They aren't about rules and regulations. They can't just be handed down the organization. They are shared beliefs - guideposts that we all follow when we're facing a challenge or a decision. Our values tell us how we live our lives; how we approach our jobs. Our values are crucial for fostering a culture of winning for our company: • Customer focus • Results and Accountability • Innovation • Transparency and Integrity • Mastery • Inclusiveness • Sense of urgency • Collaboration and Teamwork At Ansys, we know that changing the world takes vision, skill, and each other. We fuel new ideas, build relationships, and help each other realize our greatest potential. We are ONE Ansys. We operate on three key components: our commitments to stakeholders, our values that guide how we work together, and our actions to deliver results. As ONE Ansys, we are powering innovation that drives human advancement Our Commitments:Amaze with innovative products and solutionsMake our customers incredibly successfulAct with integrityEnsure employees thrive and shareholders prosper Our Values:Adaptability: Be open, welcome what's nextCourage: Be courageous, move forward passionatelyGenerosity: Be generous, share, listen, serveAuthenticity: Be you, make us stronger Our Actions:We commit to audacious goalsWe work seamlessly as a teamWe demonstrate masteryWe deliver outstanding resultsVALUES IN ACTION Ansys is committed to powering the people who power human advancement. We believe in creating and nurturing a workplace that supports and welcomes people of all backgrounds; encouraging them to bring their talents and experience to a workplace where they are valued and can thrive. Our culture is grounded in our four core values of adaptability, courage, generosity, and authenticity. Through our behaviors and actions, these values foster higher team performance and greater innovation for our customers. We're proud to offer programs, available to all employees, to further impact innovation and business outcomes, such as employee networks and learning communities that inform solutions for our globally minded customer base. WELCOME WHAT'S NEXT IN YOUR CAREER AT ANSYS At Ansys, you will find yourself among the sharpest minds and most visionary leaders across the globe. Collectively, we strive to change the world with innovative technology and transformational solutions. With a prestigious reputation in working with well-known, world-class companies, standards at Ansys are high - met by those willing to rise to the occasion and meet those challenges head on. Our team is passionate about pushing the limits of world-class simulation technology, empowering our customers to turn their design concepts into successful, innovative products faster and at a lower cost. Ready to feel inspired? Check out some of our recent customer stories, here and here . At Ansys, it's about the learning, the discovery, and the collaboration. It's about the "what's next" as much as the "mission accomplished." And it's about the melding of disciplined intellect with strategic direction and results that have, can, and do impact real people in real ways. All this is forged within a working environment built on respect, autonomy, and ethics.CREATING A PLACE WE'RE PROUD TO BEAnsys is an S&P 500 company and a member of the NASDAQ-100. We are proud to have been recognized for the following more recent awards, although our list goes on: Newsweek's Most Loved Workplace globally and in the U.S., Gold Stevie Award Winner, America's Most Responsible Companies, Fast Company World Changing Ideas, Great Place to Work Certified.For more information, please visit us at Ansys is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics.Ansys does not accept unsolicited referrals for vacancies, and any unsolicited referral will become the property of Ansys. Upon hire, no fee will be owed to the agency, person, or entity.Apply NowLet's start your dream job Apply now Meet JobCopilot: Your Personal AI Job HunterAutomatically Apply to Remote Full-Stack Programming JobsJust set your preferences and Job Copilot will do the rest-finding, filtering, and applying while you focus on what matters. Activate JobCopilot
    #ansys #designer #remote
    Ansys: UX Designer II (Remote - US)
    Requisition #: 16391 Our Mission: Powering Innovation That Drives Human Advancement When visionary companies need to know how their world-changing ideas will perform, they close the gap between design and reality with Ansys simulation. For more than 50 years, Ansys software has enabled innovators across industries to push boundaries by using the predictive power of simulation. From sustainable transportation to advanced semiconductors, from satellite systems to life-saving medical devices, the next great leaps in human advancement will be powered by Ansys. Innovate With Ansys, Power Your Career. Summary / Role Purpose The User Experience Designer II creates easy and delightful experiences for users interacting with ANSYS products and services. The UX designer assesses the functional and content requirements of a product, develops storyboards, creates wireframes and task flows based on user needs, and produces visually detailed mockups. A passion for visual design and familiarity with UI trends and technologies are essential in this role, enabling the UX designer to bring fresh and innovative ideas to a project. This is an intermediate role, heavily focused on content production and communication. It is intended to expose the UX professional to the nuts-and-bolts aspects of their UX career; while building on presentation, communication, and usability aspects of the design role. The User Experience Designer II will contribute to the development of a new web-based, collaborative solution for the ModelCenter and optiSLang product lines. This work will be based on an innovative modeling framework, modern web technologies, micro-services and integrations with Ansys' core products. The User Experience Designer II will contribute to the specification and design of user interactions and workflows for new features. The solution will be used by Ansys customers to design next generation systems in the most innovative industries. Location: Can be 100% Remote within US Key Duties and Responsibilities Designs, develops, and evaluates cutting-edge user interfaces Reviews UX artifacts created by other UX team members Utilizes prototyping tools and UX toolkits Creates and delivers usability studies Communicates design rationale across product creation disciplines and personnel Records usability/UX problems with clear explanations and recommendations for improvement Works closely with product managers, development teams, and other designers Minimum Education/Certification Requirements and Experience BS or BA in Human-Computer Interaction, Design Engineering, or Industrial Design with 2 years' experience or MS Working experience with technical software development proven by academic, research, or industry projects. Professional working proficiency in English Preferred Qualifications and Skills Experience with: UX design and collaboration tools: Figma, Balsamiq or similar tools Tools & technologies for UI implementation: HTML, CSS, JavaScript, Angular, React Screen-capture/editing/video-editing tools Adobe Creative Suite Ability to: Smoothly iterate on designs, taking direction, adjusting, and re-focusing towards a converged design Organize deliverables for future reflection and current investigations Communicate succinctly and professionally via email, chat, remote meetings, usability evaluations, etc. Prototype rapidly using any tools available Knowledge of Model Based System Engineeringor optimization is a plus Culture and Values Culture and values are incredibly important to ANSYS. They inform us of who we are, of how we act. Values aren't posters hanging on a wall or about trite or glib slogans. They aren't about rules and regulations. They can't just be handed down the organization. They are shared beliefs - guideposts that we all follow when we're facing a challenge or a decision. Our values tell us how we live our lives; how we approach our jobs. Our values are crucial for fostering a culture of winning for our company: • Customer focus • Results and Accountability • Innovation • Transparency and Integrity • Mastery • Inclusiveness • Sense of urgency • Collaboration and Teamwork At Ansys, we know that changing the world takes vision, skill, and each other. We fuel new ideas, build relationships, and help each other realize our greatest potential. We are ONE Ansys. We operate on three key components: our commitments to stakeholders, our values that guide how we work together, and our actions to deliver results. As ONE Ansys, we are powering innovation that drives human advancement Our Commitments:Amaze with innovative products and solutionsMake our customers incredibly successfulAct with integrityEnsure employees thrive and shareholders prosper Our Values:Adaptability: Be open, welcome what's nextCourage: Be courageous, move forward passionatelyGenerosity: Be generous, share, listen, serveAuthenticity: Be you, make us stronger Our Actions:We commit to audacious goalsWe work seamlessly as a teamWe demonstrate masteryWe deliver outstanding resultsVALUES IN ACTION Ansys is committed to powering the people who power human advancement. We believe in creating and nurturing a workplace that supports and welcomes people of all backgrounds; encouraging them to bring their talents and experience to a workplace where they are valued and can thrive. Our culture is grounded in our four core values of adaptability, courage, generosity, and authenticity. Through our behaviors and actions, these values foster higher team performance and greater innovation for our customers. We're proud to offer programs, available to all employees, to further impact innovation and business outcomes, such as employee networks and learning communities that inform solutions for our globally minded customer base. WELCOME WHAT'S NEXT IN YOUR CAREER AT ANSYS At Ansys, you will find yourself among the sharpest minds and most visionary leaders across the globe. Collectively, we strive to change the world with innovative technology and transformational solutions. With a prestigious reputation in working with well-known, world-class companies, standards at Ansys are high - met by those willing to rise to the occasion and meet those challenges head on. Our team is passionate about pushing the limits of world-class simulation technology, empowering our customers to turn their design concepts into successful, innovative products faster and at a lower cost. Ready to feel inspired? Check out some of our recent customer stories, here and here . At Ansys, it's about the learning, the discovery, and the collaboration. It's about the "what's next" as much as the "mission accomplished." And it's about the melding of disciplined intellect with strategic direction and results that have, can, and do impact real people in real ways. All this is forged within a working environment built on respect, autonomy, and ethics.CREATING A PLACE WE'RE PROUD TO BEAnsys is an S&P 500 company and a member of the NASDAQ-100. We are proud to have been recognized for the following more recent awards, although our list goes on: Newsweek's Most Loved Workplace globally and in the U.S., Gold Stevie Award Winner, America's Most Responsible Companies, Fast Company World Changing Ideas, Great Place to Work Certified.For more information, please visit us at Ansys is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics.Ansys does not accept unsolicited referrals for vacancies, and any unsolicited referral will become the property of Ansys. Upon hire, no fee will be owed to the agency, person, or entity.Apply NowLet's start your dream job Apply now Meet JobCopilot: Your Personal AI Job HunterAutomatically Apply to Remote Full-Stack Programming JobsJust set your preferences and Job Copilot will do the rest-finding, filtering, and applying while you focus on what matters. Activate JobCopilot #ansys #designer #remote
    WEWORKREMOTELY.COM
    Ansys: UX Designer II (Remote - US)
    Requisition #: 16391 Our Mission: Powering Innovation That Drives Human Advancement When visionary companies need to know how their world-changing ideas will perform, they close the gap between design and reality with Ansys simulation. For more than 50 years, Ansys software has enabled innovators across industries to push boundaries by using the predictive power of simulation. From sustainable transportation to advanced semiconductors, from satellite systems to life-saving medical devices, the next great leaps in human advancement will be powered by Ansys. Innovate With Ansys, Power Your Career. Summary / Role Purpose The User Experience Designer II creates easy and delightful experiences for users interacting with ANSYS products and services. The UX designer assesses the functional and content requirements of a product, develops storyboards, creates wireframes and task flows based on user needs, and produces visually detailed mockups. A passion for visual design and familiarity with UI trends and technologies are essential in this role, enabling the UX designer to bring fresh and innovative ideas to a project. This is an intermediate role, heavily focused on content production and communication. It is intended to expose the UX professional to the nuts-and-bolts aspects of their UX career; while building on presentation, communication, and usability aspects of the design role. The User Experience Designer II will contribute to the development of a new web-based, collaborative solution for the ModelCenter and optiSLang product lines. This work will be based on an innovative modeling framework, modern web technologies, micro-services and integrations with Ansys' core products. The User Experience Designer II will contribute to the specification and design of user interactions and workflows for new features. The solution will be used by Ansys customers to design next generation systems in the most innovative industries (Aerospace and Defense, Automotive, semi-conductors, and others). Location: Can be 100% Remote within US Key Duties and Responsibilities Designs, develops, and evaluates cutting-edge user interfaces Reviews UX artifacts created by other UX team members Utilizes prototyping tools and UX toolkits Creates and delivers usability studies Communicates design rationale across product creation disciplines and personnel Records usability/UX problems with clear explanations and recommendations for improvement Works closely with product managers, development teams, and other designers Minimum Education/Certification Requirements and Experience BS or BA in Human-Computer Interaction, Design Engineering, or Industrial Design with 2 years' experience or MS Working experience with technical software development proven by academic, research, or industry projects. Professional working proficiency in English Preferred Qualifications and Skills Experience with: UX design and collaboration tools: Figma, Balsamiq or similar tools Tools & technologies for UI implementation: HTML, CSS, JavaScript, Angular, React Screen-capture/editing/video-editing tools Adobe Creative Suite Ability to: Smoothly iterate on designs, taking direction, adjusting, and re-focusing towards a converged design Organize deliverables for future reflection and current investigations Communicate succinctly and professionally via email, chat, remote meetings, usability evaluations, etc. Prototype rapidly using any tools available Knowledge of Model Based System Engineering (MBSE) or optimization is a plus Culture and Values Culture and values are incredibly important to ANSYS. They inform us of who we are, of how we act. Values aren't posters hanging on a wall or about trite or glib slogans. They aren't about rules and regulations. They can't just be handed down the organization. They are shared beliefs - guideposts that we all follow when we're facing a challenge or a decision. Our values tell us how we live our lives; how we approach our jobs. Our values are crucial for fostering a culture of winning for our company: • Customer focus • Results and Accountability • Innovation • Transparency and Integrity • Mastery • Inclusiveness • Sense of urgency • Collaboration and Teamwork At Ansys, we know that changing the world takes vision, skill, and each other. We fuel new ideas, build relationships, and help each other realize our greatest potential. We are ONE Ansys. We operate on three key components: our commitments to stakeholders, our values that guide how we work together, and our actions to deliver results. As ONE Ansys, we are powering innovation that drives human advancement Our Commitments:Amaze with innovative products and solutionsMake our customers incredibly successfulAct with integrityEnsure employees thrive and shareholders prosper Our Values:Adaptability: Be open, welcome what's nextCourage: Be courageous, move forward passionatelyGenerosity: Be generous, share, listen, serveAuthenticity: Be you, make us stronger Our Actions:We commit to audacious goalsWe work seamlessly as a teamWe demonstrate masteryWe deliver outstanding resultsVALUES IN ACTION Ansys is committed to powering the people who power human advancement. We believe in creating and nurturing a workplace that supports and welcomes people of all backgrounds; encouraging them to bring their talents and experience to a workplace where they are valued and can thrive. Our culture is grounded in our four core values of adaptability, courage, generosity, and authenticity. Through our behaviors and actions, these values foster higher team performance and greater innovation for our customers. We're proud to offer programs, available to all employees, to further impact innovation and business outcomes, such as employee networks and learning communities that inform solutions for our globally minded customer base. WELCOME WHAT'S NEXT IN YOUR CAREER AT ANSYS At Ansys, you will find yourself among the sharpest minds and most visionary leaders across the globe. Collectively, we strive to change the world with innovative technology and transformational solutions. With a prestigious reputation in working with well-known, world-class companies, standards at Ansys are high - met by those willing to rise to the occasion and meet those challenges head on. Our team is passionate about pushing the limits of world-class simulation technology, empowering our customers to turn their design concepts into successful, innovative products faster and at a lower cost. Ready to feel inspired? Check out some of our recent customer stories, here and here . At Ansys, it's about the learning, the discovery, and the collaboration. It's about the "what's next" as much as the "mission accomplished." And it's about the melding of disciplined intellect with strategic direction and results that have, can, and do impact real people in real ways. All this is forged within a working environment built on respect, autonomy, and ethics.CREATING A PLACE WE'RE PROUD TO BEAnsys is an S&P 500 company and a member of the NASDAQ-100. We are proud to have been recognized for the following more recent awards, although our list goes on: Newsweek's Most Loved Workplace globally and in the U.S., Gold Stevie Award Winner, America's Most Responsible Companies, Fast Company World Changing Ideas, Great Place to Work Certified (China, Greece, France, India, Japan, Korea, Spain, Sweden, Taiwan, and U.K.).For more information, please visit us at Ansys is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics.Ansys does not accept unsolicited referrals for vacancies, and any unsolicited referral will become the property of Ansys. Upon hire, no fee will be owed to the agency, person, or entity.Apply NowLet's start your dream job Apply now Meet JobCopilot: Your Personal AI Job HunterAutomatically Apply to Remote Full-Stack Programming JobsJust set your preferences and Job Copilot will do the rest-finding, filtering, and applying while you focus on what matters. Activate JobCopilot
    0 Commentarii 0 Distribuiri
  • Tutorial: Practical Lighting for Production

    Saturday, June 14th, 2025
    Posted by Jim Thacker
    Tutorial: Practical Lighting for Production

    html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" ";

    The Gnomon Workshop has released Practical Lighting for Production, a guide to VFX and cinematics workflows recorded by former Blizzard lighting lead Graham Cunningham.
    The intermediate-level workshop provides four hours of training in Maya, Arnold and Nuke.
    Discover professional workflows for lighting a CG shot to match a movie reference
    In the workshop, Cunningham sets out the complete process of lighting and compositing a shot to match a movie reference, using industry-standard software.
    He begins by setting up a basic look development light rig in Maya, importing a 3D character, assigning materials and shading components, and creating a turntable setup.
    Next, he creates a shot camera and set dresses the environment using kitbash assets.
    Cunningham also discusses strategies for lighting a character, including how to use dome lights and area lights to provide key, fill and rim lighting, and how to use HDRI maps.
    From there, he moves to rendering using Arnold, discussing render settings, depth of field, and how to create render passes.
    Cunningham then assembles the render passes in Nuke, splits out the light AOVs, and sets out how to adjust light colors and intensities.
    He also reveals how to add atmosphere, how to use cryptomattes to fine tune the results, how to add post effects, and how to apply a final color grade to match a chosen movie reference.
    As well as the tutorial videos, viewers of the workshop can download one of Cunningham’s Maya files.
    The workshop uses 3D Scan Store’s commercial Female Explorer Game Character, and KitBash3D’s Wreckage Kit, plus assets from KitBash3D’s Cargo.
    About the artist
    Graham Cunningham is a Senior Lighting, Compositing and Lookdev Artist, beginning his career as a generalist working in VFX for film and TV before moving to Blizzard Entertainment.
    At Blizzard, he contributed to cinematics for Diablo IV, Diablo Immortal, Starcraft II, Heroes of the Storm, World of Warcraft, Overwatch, and Overwatch 2, many of them as a lead lighting artist.
    Pricing and availability
    Practical Lighting for Production is available via a subscription to The Gnomon Workshop, which provides access to over 300 tutorials.
    Subscriptions cost /month or /year. Free trials are available.
    about Practical Lighting for Production on The Gnomon Workshop’s website

    Have your say on this story by following CG Channel on Facebook, Instagram and X. As well as being able to comment on stories, followers of our social media accounts can see videos we don’t post on the site itself, including making-ofs for the latest VFX movies, animations, games cinematics and motion graphics projects.
    Full disclosure: CG Channel is owned by Gnomon.

    Latest News

    DreamWorks Animation releases MoonRay 2.15
    Check out the new features in the open-source release of DreamWorks Animation's production renderer. used on movies like The Wild Robot.
    Sunday, June 15th, 2025

    Tutorial: Practical Lighting for Production
    Master professional CG lighting workflows with former Blizzard lighting lead Graham Cunningham's tutorial for The Gnomon Workshop.
    Saturday, June 14th, 2025

    Boris FX releases Mocha Pro 2025.5
    Planar tracking tool gets new AI face recognition system for automatically obscuring identities in footage. Check out its other new features.
    Friday, June 13th, 2025

    Leopoly adds voxel sculpting to Shapelab 2025
    Summer 2025 update to the VR modeling app expands the new voxel engine for blocking out 3D forms. See the other new features.
    Friday, June 13th, 2025

    iRender: the next-gen render farm for OctaneRenderOnline render farm iRender explains why its powerful, affordable GPU rendering solutions are a must for OctaneRender users.
    Wednesday, June 11th, 2025

    Master Architectural Design for Games using Blender & UE5
    Discover how to create game environments grounded in architectural principles with The Gnomon Workshop's new tutorial.
    Monday, June 9th, 2025

    More News
    Epic Games' free Live Link Face app is now available for Android
    Adobe launches Photoshop on Android and iPhone
    Sketchsoft releases Feather 1.3
    Autodesk releases 3ds Max 2026.1
    Autodesk adds AI animation tool MotionMaker to Maya 2026.1
    You can now sell MetaHumans, or use them in Unity or Godot
    Epic Games to rebrand RealityCapture as RealityScan 2.0
    Epic Games releases Unreal Engine 5.6
    Pulze releases new network render manager RenderFlow 1.0
    Xencelabs launches Pen Tablet Medium v2
    Desktop edition of sculpting app Nomad enters free beta
    Boris FX releases Silhouette 2025
    Older Posts
    #tutorial #practical #lighting #production
    Tutorial: Practical Lighting for Production
    Saturday, June 14th, 2025 Posted by Jim Thacker Tutorial: Practical Lighting for Production html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "; The Gnomon Workshop has released Practical Lighting for Production, a guide to VFX and cinematics workflows recorded by former Blizzard lighting lead Graham Cunningham. The intermediate-level workshop provides four hours of training in Maya, Arnold and Nuke. Discover professional workflows for lighting a CG shot to match a movie reference In the workshop, Cunningham sets out the complete process of lighting and compositing a shot to match a movie reference, using industry-standard software. He begins by setting up a basic look development light rig in Maya, importing a 3D character, assigning materials and shading components, and creating a turntable setup. Next, he creates a shot camera and set dresses the environment using kitbash assets. Cunningham also discusses strategies for lighting a character, including how to use dome lights and area lights to provide key, fill and rim lighting, and how to use HDRI maps. From there, he moves to rendering using Arnold, discussing render settings, depth of field, and how to create render passes. Cunningham then assembles the render passes in Nuke, splits out the light AOVs, and sets out how to adjust light colors and intensities. He also reveals how to add atmosphere, how to use cryptomattes to fine tune the results, how to add post effects, and how to apply a final color grade to match a chosen movie reference. As well as the tutorial videos, viewers of the workshop can download one of Cunningham’s Maya files. The workshop uses 3D Scan Store’s commercial Female Explorer Game Character, and KitBash3D’s Wreckage Kit, plus assets from KitBash3D’s Cargo. About the artist Graham Cunningham is a Senior Lighting, Compositing and Lookdev Artist, beginning his career as a generalist working in VFX for film and TV before moving to Blizzard Entertainment. At Blizzard, he contributed to cinematics for Diablo IV, Diablo Immortal, Starcraft II, Heroes of the Storm, World of Warcraft, Overwatch, and Overwatch 2, many of them as a lead lighting artist. Pricing and availability Practical Lighting for Production is available via a subscription to The Gnomon Workshop, which provides access to over 300 tutorials. Subscriptions cost /month or /year. Free trials are available. about Practical Lighting for Production on The Gnomon Workshop’s website Have your say on this story by following CG Channel on Facebook, Instagram and X. As well as being able to comment on stories, followers of our social media accounts can see videos we don’t post on the site itself, including making-ofs for the latest VFX movies, animations, games cinematics and motion graphics projects. Full disclosure: CG Channel is owned by Gnomon. Latest News DreamWorks Animation releases MoonRay 2.15 Check out the new features in the open-source release of DreamWorks Animation's production renderer. used on movies like The Wild Robot. Sunday, June 15th, 2025 Tutorial: Practical Lighting for Production Master professional CG lighting workflows with former Blizzard lighting lead Graham Cunningham's tutorial for The Gnomon Workshop. Saturday, June 14th, 2025 Boris FX releases Mocha Pro 2025.5 Planar tracking tool gets new AI face recognition system for automatically obscuring identities in footage. Check out its other new features. Friday, June 13th, 2025 Leopoly adds voxel sculpting to Shapelab 2025 Summer 2025 update to the VR modeling app expands the new voxel engine for blocking out 3D forms. See the other new features. Friday, June 13th, 2025 iRender: the next-gen render farm for OctaneRenderOnline render farm iRender explains why its powerful, affordable GPU rendering solutions are a must for OctaneRender users. Wednesday, June 11th, 2025 Master Architectural Design for Games using Blender & UE5 Discover how to create game environments grounded in architectural principles with The Gnomon Workshop's new tutorial. Monday, June 9th, 2025 More News Epic Games' free Live Link Face app is now available for Android Adobe launches Photoshop on Android and iPhone Sketchsoft releases Feather 1.3 Autodesk releases 3ds Max 2026.1 Autodesk adds AI animation tool MotionMaker to Maya 2026.1 You can now sell MetaHumans, or use them in Unity or Godot Epic Games to rebrand RealityCapture as RealityScan 2.0 Epic Games releases Unreal Engine 5.6 Pulze releases new network render manager RenderFlow 1.0 Xencelabs launches Pen Tablet Medium v2 Desktop edition of sculpting app Nomad enters free beta Boris FX releases Silhouette 2025 Older Posts #tutorial #practical #lighting #production
    Tutorial: Practical Lighting for Production
    Saturday, June 14th, 2025 Posted by Jim Thacker Tutorial: Practical Lighting for Production html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd" The Gnomon Workshop has released Practical Lighting for Production, a guide to VFX and cinematics workflows recorded by former Blizzard lighting lead Graham Cunningham. The intermediate-level workshop provides four hours of training in Maya, Arnold and Nuke. Discover professional workflows for lighting a CG shot to match a movie reference In the workshop, Cunningham sets out the complete process of lighting and compositing a shot to match a movie reference, using industry-standard software. He begins by setting up a basic look development light rig in Maya, importing a 3D character, assigning materials and shading components, and creating a turntable setup. Next, he creates a shot camera and set dresses the environment using kitbash assets. Cunningham also discusses strategies for lighting a character, including how to use dome lights and area lights to provide key, fill and rim lighting, and how to use HDRI maps. From there, he moves to rendering using Arnold, discussing render settings, depth of field, and how to create render passes. Cunningham then assembles the render passes in Nuke, splits out the light AOVs, and sets out how to adjust light colors and intensities. He also reveals how to add atmosphere, how to use cryptomattes to fine tune the results, how to add post effects, and how to apply a final color grade to match a chosen movie reference. As well as the tutorial videos, viewers of the workshop can download one of Cunningham’s Maya files. The workshop uses 3D Scan Store’s commercial Female Explorer Game Character, and KitBash3D’s Wreckage Kit, plus assets from KitBash3D’s Cargo. About the artist Graham Cunningham is a Senior Lighting, Compositing and Lookdev Artist, beginning his career as a generalist working in VFX for film and TV before moving to Blizzard Entertainment. At Blizzard, he contributed to cinematics for Diablo IV, Diablo Immortal, Starcraft II, Heroes of the Storm, World of Warcraft, Overwatch, and Overwatch 2, many of them as a lead lighting artist. Pricing and availability Practical Lighting for Production is available via a subscription to The Gnomon Workshop, which provides access to over 300 tutorials. Subscriptions cost $57/month or $519/year. Free trials are available. Read more about Practical Lighting for Production on The Gnomon Workshop’s website Have your say on this story by following CG Channel on Facebook, Instagram and X (formerly Twitter). As well as being able to comment on stories, followers of our social media accounts can see videos we don’t post on the site itself, including making-ofs for the latest VFX movies, animations, games cinematics and motion graphics projects. Full disclosure: CG Channel is owned by Gnomon. Latest News DreamWorks Animation releases MoonRay 2.15 Check out the new features in the open-source release of DreamWorks Animation's production renderer. used on movies like The Wild Robot. Sunday, June 15th, 2025 Tutorial: Practical Lighting for Production Master professional CG lighting workflows with former Blizzard lighting lead Graham Cunningham's tutorial for The Gnomon Workshop. Saturday, June 14th, 2025 Boris FX releases Mocha Pro 2025.5 Planar tracking tool gets new AI face recognition system for automatically obscuring identities in footage. Check out its other new features. Friday, June 13th, 2025 Leopoly adds voxel sculpting to Shapelab 2025 Summer 2025 update to the VR modeling app expands the new voxel engine for blocking out 3D forms. See the other new features. Friday, June 13th, 2025 iRender: the next-gen render farm for OctaneRender [Sponsored] Online render farm iRender explains why its powerful, affordable GPU rendering solutions are a must for OctaneRender users. Wednesday, June 11th, 2025 Master Architectural Design for Games using Blender & UE5 Discover how to create game environments grounded in architectural principles with The Gnomon Workshop's new tutorial. Monday, June 9th, 2025 More News Epic Games' free Live Link Face app is now available for Android Adobe launches Photoshop on Android and iPhone Sketchsoft releases Feather 1.3 Autodesk releases 3ds Max 2026.1 Autodesk adds AI animation tool MotionMaker to Maya 2026.1 You can now sell MetaHumans, or use them in Unity or Godot Epic Games to rebrand RealityCapture as RealityScan 2.0 Epic Games releases Unreal Engine 5.6 Pulze releases new network render manager RenderFlow 1.0 Xencelabs launches Pen Tablet Medium v2 Desktop edition of sculpting app Nomad enters free beta Boris FX releases Silhouette 2025 Older Posts
    0 Commentarii 0 Distribuiri
  • Hard-Surface 3D/VR Mech Design

    Substance 3D Modeler, ZBrush & Blender Workflow with Corey GoochThis workshop guides artists through the process of designing and sculpting a conceptual mech in VR using Adobe Substance 3D Modeler. ZBrush is used to fine-tune the model’s details, and the final presentation is taken care of in Blender. Over the course of 7 hours, Corey Gooch, Visual Development Artist and 3D Specialist at Studio ARTILUS, discusses the fundamentals of sculpting in Substance 3D Modeler and walks through a series of videos detailing the creation of a carefully crafted autonomous mech. Beginner and intermediate-level artists will have the opportunity to learn Corey’s professional approach to reference collection and integration into Substance 3D Modeler. They will also explore all of the basics of its VR sculpting tools and discover detailed explanations of tools and techniques for achieving organic and mechanical forms. Corey also offers strategies for placing key design features and balancing functionality with form.Moving into ZBrush, Corey demonstrates how to optimize the deforming components for rigging and texturing, and achieve the finer details that cannotbe achieved in VR alone. Techniques for preparing your mech for animation, posing, and 3D printing considerations are also covered. In the final portion of the workshop, Corey jumps into Blender to provide a cursory and high-level overview of rigging, texturing, animating, and how to prepare models for 3D printing. Throughout the workshop, Corey shares the thought processes behind why he designs the way he does and how his chosen tools work together to achieve his vision. Artists will gain helpful insight into Corey’s decision-making process, which focuses on functionality and effective problem-solving during a creative workflow. By completing this workshop, artists will have a solid grasp of at least 80 percent of the tools in Substance 3D Modeler and have sound insights into how to sculpt, refine, and bring their concepts to life using ZBrush and Blender. Corey has provided his .smod raw sculpt file and ZBrush .cfg file as a downloadable resource with this workshop.WATCH NOW
    #hardsurface #3dvr #mech #design
    Hard-Surface 3D/VR Mech Design
    Substance 3D Modeler, ZBrush & Blender Workflow with Corey GoochThis workshop guides artists through the process of designing and sculpting a conceptual mech in VR using Adobe Substance 3D Modeler. ZBrush is used to fine-tune the model’s details, and the final presentation is taken care of in Blender. Over the course of 7 hours, Corey Gooch, Visual Development Artist and 3D Specialist at Studio ARTILUS, discusses the fundamentals of sculpting in Substance 3D Modeler and walks through a series of videos detailing the creation of a carefully crafted autonomous mech. Beginner and intermediate-level artists will have the opportunity to learn Corey’s professional approach to reference collection and integration into Substance 3D Modeler. They will also explore all of the basics of its VR sculpting tools and discover detailed explanations of tools and techniques for achieving organic and mechanical forms. Corey also offers strategies for placing key design features and balancing functionality with form.Moving into ZBrush, Corey demonstrates how to optimize the deforming components for rigging and texturing, and achieve the finer details that cannotbe achieved in VR alone. Techniques for preparing your mech for animation, posing, and 3D printing considerations are also covered. In the final portion of the workshop, Corey jumps into Blender to provide a cursory and high-level overview of rigging, texturing, animating, and how to prepare models for 3D printing. Throughout the workshop, Corey shares the thought processes behind why he designs the way he does and how his chosen tools work together to achieve his vision. Artists will gain helpful insight into Corey’s decision-making process, which focuses on functionality and effective problem-solving during a creative workflow. By completing this workshop, artists will have a solid grasp of at least 80 percent of the tools in Substance 3D Modeler and have sound insights into how to sculpt, refine, and bring their concepts to life using ZBrush and Blender. Corey has provided his .smod raw sculpt file and ZBrush .cfg file as a downloadable resource with this workshop.WATCH NOW #hardsurface #3dvr #mech #design
    THEGNOMONWORKSHOP.COM
    Hard-Surface 3D/VR Mech Design
    Substance 3D Modeler, ZBrush & Blender Workflow with Corey GoochThis workshop guides artists through the process of designing and sculpting a conceptual mech in VR using Adobe Substance 3D Modeler. ZBrush is used to fine-tune the model’s details, and the final presentation is taken care of in Blender. Over the course of 7 hours, Corey Gooch, Visual Development Artist and 3D Specialist at Studio ARTILUS, discusses the fundamentals of sculpting in Substance 3D Modeler and walks through a series of videos detailing the creation of a carefully crafted autonomous mech. Beginner and intermediate-level artists will have the opportunity to learn Corey’s professional approach to reference collection and integration into Substance 3D Modeler. They will also explore all of the basics of its VR sculpting tools and discover detailed explanations of tools and techniques for achieving organic and mechanical forms. Corey also offers strategies for placing key design features and balancing functionality with form.Moving into ZBrush, Corey demonstrates how to optimize the deforming components for rigging and texturing, and achieve the finer details that cannot (yet) be achieved in VR alone. Techniques for preparing your mech for animation, posing, and 3D printing considerations are also covered. In the final portion of the workshop, Corey jumps into Blender to provide a cursory and high-level overview of rigging, texturing, animating, and how to prepare models for 3D printing. Throughout the workshop, Corey shares the thought processes behind why he designs the way he does and how his chosen tools work together to achieve his vision. Artists will gain helpful insight into Corey’s decision-making process, which focuses on functionality and effective problem-solving during a creative workflow. By completing this workshop, artists will have a solid grasp of at least 80 percent of the tools in Substance 3D Modeler and have sound insights into how to sculpt, refine, and bring their concepts to life using ZBrush and Blender. Corey has provided his .smod raw sculpt file and ZBrush .cfg file as a downloadable resource with this workshop.WATCH NOW
    Like
    Love
    Wow
    Sad
    Angry
    672
    0 Commentarii 0 Distribuiri
  • Camden approves Cartwright Pickard 24-storey tower and Morris + Company student scheme

    Swiss Cottage scheme had previous 2016 consent which was never completed

    Source: RegalCGI of the 100 Avenue Road scheme by Cartwright Pickard
    Camden council has approved two major residential schemes designed by Cartwright Pickard and Morris + Company, both brought forward by developer Regal.
    At 100 Avenue Road in Swiss Cottage, Cartwright Pickard has drawn up revised proposals for a long-stalled 24-storey tower above the tube station. Originally designed by GRID Architects and approved in 2016, the scheme had seen demolition and basement works completed, but above-ground construction halted under the site’s previous owner, Essential Living.
    Regal acquired the site in March last year and submitted updated plans retaining the original height and massing but adding two additional floors, increasing the number of homes from 184 to 237. The scheme now includes 70 affordable homes across social, affordable rent and intermediate tenures. Revisions also include a reworked brick facade and the introduction of a second staircase.
    Regal will act as both developer and contractor on the scheme.

    Source: Morris + Company33–35 Jamestown Road and 211 Arlington Road in Camden Town, which will deliver 178 purpose-built student bedrooms, 27 affordable homes, and over 3,600 sq ft of commercial space
    Elsewhere in the borough, Camden also granted planning permission for a student housing-led development designed by Morris + Company at 33–35 Jamestown Road and 211 Arlington Road in Camden Town. Brought forward by Regal in joint venture with 4C Group, the scheme will deliver 178 student bedrooms, 27 affordable homes and over 3,600 sq ft of commercial space arranged around a retained 19th-century pub.
    Steve Harrington, planning director at Regal, said: “Our work with Camden has proven that it is possible for both public and private sector to work together with the speed and pragmatism that the planning system needs. This is the kind of delivery that makes a difference – not just more homes, but better ones.”
    #camden #approves #cartwright #pickard #24storey
    Camden approves Cartwright Pickard 24-storey tower and Morris + Company student scheme
    Swiss Cottage scheme had previous 2016 consent which was never completed Source: RegalCGI of the 100 Avenue Road scheme by Cartwright Pickard Camden council has approved two major residential schemes designed by Cartwright Pickard and Morris + Company, both brought forward by developer Regal. At 100 Avenue Road in Swiss Cottage, Cartwright Pickard has drawn up revised proposals for a long-stalled 24-storey tower above the tube station. Originally designed by GRID Architects and approved in 2016, the scheme had seen demolition and basement works completed, but above-ground construction halted under the site’s previous owner, Essential Living. Regal acquired the site in March last year and submitted updated plans retaining the original height and massing but adding two additional floors, increasing the number of homes from 184 to 237. The scheme now includes 70 affordable homes across social, affordable rent and intermediate tenures. Revisions also include a reworked brick facade and the introduction of a second staircase. Regal will act as both developer and contractor on the scheme. Source: Morris + Company33–35 Jamestown Road and 211 Arlington Road in Camden Town, which will deliver 178 purpose-built student bedrooms, 27 affordable homes, and over 3,600 sq ft of commercial space Elsewhere in the borough, Camden also granted planning permission for a student housing-led development designed by Morris + Company at 33–35 Jamestown Road and 211 Arlington Road in Camden Town. Brought forward by Regal in joint venture with 4C Group, the scheme will deliver 178 student bedrooms, 27 affordable homes and over 3,600 sq ft of commercial space arranged around a retained 19th-century pub. Steve Harrington, planning director at Regal, said: “Our work with Camden has proven that it is possible for both public and private sector to work together with the speed and pragmatism that the planning system needs. This is the kind of delivery that makes a difference – not just more homes, but better ones.” #camden #approves #cartwright #pickard #24storey
    WWW.BDONLINE.CO.UK
    Camden approves Cartwright Pickard 24-storey tower and Morris + Company student scheme
    Swiss Cottage scheme had previous 2016 consent which was never completed Source: RegalCGI of the 100 Avenue Road scheme by Cartwright Pickard Camden council has approved two major residential schemes designed by Cartwright Pickard and Morris + Company, both brought forward by developer Regal. At 100 Avenue Road in Swiss Cottage, Cartwright Pickard has drawn up revised proposals for a long-stalled 24-storey tower above the tube station. Originally designed by GRID Architects and approved in 2016, the scheme had seen demolition and basement works completed, but above-ground construction halted under the site’s previous owner, Essential Living. Regal acquired the site in March last year and submitted updated plans retaining the original height and massing but adding two additional floors, increasing the number of homes from 184 to 237. The scheme now includes 70 affordable homes across social, affordable rent and intermediate tenures. Revisions also include a reworked brick facade and the introduction of a second staircase. Regal will act as both developer and contractor on the scheme. Source: Morris + Company33–35 Jamestown Road and 211 Arlington Road in Camden Town, which will deliver 178 purpose-built student bedrooms, 27 affordable homes, and over 3,600 sq ft of commercial space Elsewhere in the borough, Camden also granted planning permission for a student housing-led development designed by Morris + Company at 33–35 Jamestown Road and 211 Arlington Road in Camden Town. Brought forward by Regal in joint venture with 4C Group, the scheme will deliver 178 student bedrooms, 27 affordable homes and over 3,600 sq ft of commercial space arranged around a retained 19th-century pub. Steve Harrington, planning director at Regal, said: “Our work with Camden has proven that it is possible for both public and private sector to work together with the speed and pragmatism that the planning system needs. This is the kind of delivery that makes a difference – not just more homes, but better ones.”
    Like
    Love
    Wow
    Sad
    Angry
    448
    0 Commentarii 0 Distribuiri
  • Architectural Design for Games using Blender & UE5

    Modeling, Texturing & Rendering Techniques with Joshua HaunLearn how to use Blender and Unreal Engine 5 to craft a Victorian-style architectural game environment design using a professional workflow. Environment Artist Joshua Haun shares how to take design elements from Victorian history and bring them into the digital realm, allowing game players to immerse themselves in the game world. As graphics in games have become more realistic over the years, players are also more likely to notice when any aspects of a world feel “off.” This workshop aims to discuss the fundamentals of architectural design theory while explaining how to create art suitable for a real gaming production environment, implementing key techniques commonly used in architectural design. This workshop is geared toward Intermediate artists seeking to create environments with deeper levels of meaning. Beginners will also enjoy this workshop, provided they have a foundational level of modeling and UV-ing in Blender and basic knowledge of the Unreal Engine 5 interface.Modeling, texturing with trim sheets, and UV-ing architecture are covered in Blender, while a focus on shader creation, garden design with foliage, lighting, camera work, and shading are all topics showcased in UE5. The final result of the environment will be rendered in Unreal 5; therefore, the material shown in this workshop is primarily geared towards a real-time game engine. However, much of the explanation on design theory, history, and architecture will be universally applicable to all levels of art. Other software used in this workshop includes Rhinoceros 3D, Affinity Photo, Substance Painter, and Davinci Resolve.WATCH NOW
    #architectural #design #games #using #blender
    Architectural Design for Games using Blender & UE5
    Modeling, Texturing & Rendering Techniques with Joshua HaunLearn how to use Blender and Unreal Engine 5 to craft a Victorian-style architectural game environment design using a professional workflow. Environment Artist Joshua Haun shares how to take design elements from Victorian history and bring them into the digital realm, allowing game players to immerse themselves in the game world. As graphics in games have become more realistic over the years, players are also more likely to notice when any aspects of a world feel “off.” This workshop aims to discuss the fundamentals of architectural design theory while explaining how to create art suitable for a real gaming production environment, implementing key techniques commonly used in architectural design. This workshop is geared toward Intermediate artists seeking to create environments with deeper levels of meaning. Beginners will also enjoy this workshop, provided they have a foundational level of modeling and UV-ing in Blender and basic knowledge of the Unreal Engine 5 interface.Modeling, texturing with trim sheets, and UV-ing architecture are covered in Blender, while a focus on shader creation, garden design with foliage, lighting, camera work, and shading are all topics showcased in UE5. The final result of the environment will be rendered in Unreal 5; therefore, the material shown in this workshop is primarily geared towards a real-time game engine. However, much of the explanation on design theory, history, and architecture will be universally applicable to all levels of art. Other software used in this workshop includes Rhinoceros 3D, Affinity Photo, Substance Painter, and Davinci Resolve.WATCH NOW #architectural #design #games #using #blender
    THEGNOMONWORKSHOP.COM
    Architectural Design for Games using Blender & UE5
    Modeling, Texturing & Rendering Techniques with Joshua HaunLearn how to use Blender and Unreal Engine 5 to craft a Victorian-style architectural game environment design using a professional workflow. Environment Artist Joshua Haun shares how to take design elements from Victorian history and bring them into the digital realm, allowing game players to immerse themselves in the game world. As graphics in games have become more realistic over the years, players are also more likely to notice when any aspects of a world feel “off.” This workshop aims to discuss the fundamentals of architectural design theory while explaining how to create art suitable for a real gaming production environment, implementing key techniques commonly used in architectural design. This workshop is geared toward Intermediate artists seeking to create environments with deeper levels of meaning. Beginners will also enjoy this workshop, provided they have a foundational level of modeling and UV-ing in Blender and basic knowledge of the Unreal Engine 5 interface.Modeling, texturing with trim sheets, and UV-ing architecture are covered in Blender, while a focus on shader creation, garden design with foliage, lighting, camera work, and shading are all topics showcased in UE5. The final result of the environment will be rendered in Unreal 5; therefore, the material shown in this workshop is primarily geared towards a real-time game engine. However, much of the explanation on design theory, history, and architecture will be universally applicable to all levels of art. Other software used in this workshop includes Rhinoceros 3D, Affinity Photo, Substance Painter, and Davinci Resolve.WATCH NOW
    Like
    Love
    Wow
    Sad
    Angry
    151
    0 Commentarii 0 Distribuiri
  • Mistral AI Introduces Codestral Embed: A High-Performance Code Embedding Model for Scalable Retrieval and Semantic Understanding

    Modern software engineering faces growing challenges in accurately retrieving and understanding code across diverse programming languages and large-scale codebases. Existing embedding models often struggle to capture the deep semantics of code, resulting in poor performance in tasks such as code search, RAG, and semantic analysis. These limitations hinder developers’ ability to efficiently locate relevant code snippets, reuse components, and manage large projects effectively. As software systems grow increasingly complex, there is a pressing need for more effective, language-agnostic representations of code that can power reliable and high-quality retrieval and reasoning across a wide range of development tasks. 
    Mistral AI has introduced Codestral Embed, a specialized embedding model built specifically for code-related tasks. Designed to handle real-world code more effectively than existing solutions, it enables powerful retrieval capabilities across large codebases. What sets it apart is its flexibility—users can adjust embedding dimensions and precision levels to balance performance with storage efficiency. Even at lower dimensions, such as 256 with int8 precision, Codestral Embed reportedly surpasses top models from competitors like OpenAI, Cohere, and Voyage, offering high retrieval quality at a reduced storage cost.
    Beyond basic retrieval, Codestral Embed supports a wide range of developer-focused applications. These include code completion, explanation, editing, semantic search, and duplicate detection. The model can also help organize and analyze repositories by clustering code based on functionality or structure, eliminating the need for manual supervision. This makes it particularly useful for tasks like understanding architectural patterns, categorizing code, or supporting automated documentation, ultimately helping developers work more efficiently with large and complex codebases. 
    Codestral Embed is tailored for understanding and retrieving code efficiently, especially in large-scale development environments. It powers retrieval-augmented generation by quickly fetching relevant context for tasks like code completion, editing, and explanation—ideal for use in coding assistants and agent-based tools. Developers can also perform semantic code searches using natural language or code queries to find relevant snippets. Its ability to detect similar or duplicated code helps with reuse, policy enforcement, and cleaning up redundancy. Additionally, it can cluster code by functionality or structure, making it useful for repository analysis, spotting architectural patterns, and enhancing documentation workflows. 

    Codestral Embed is a specialized embedding model designed to enhance code retrieval and semantic analysis tasks. It surpasses existing models, such as OpenAI’s and Cohere’s, in benchmarks like SWE-Bench Lite and CodeSearchNet. The model offers customizable embedding dimensions and precision levels, allowing users to effectively balance performance and storage needs. Key applications include retrieval-augmented generation, semantic code search, duplicate detection, and code clustering. Available via API at per million tokens, with a 50% discount for batch processing, Codestral Embed supports various output formats and dimensions, catering to diverse development workflows.

    In conclusion, Codestral Embed offers customizable embedding dimensions and precisions, enabling developers to strike a balance between performance and storage efficiency. Benchmark evaluations indicate that Codestral Embed surpasses existing models like OpenAI’s and Cohere’s in various code-related tasks, including retrieval-augmented generation and semantic code search. Its applications span from identifying duplicate code segments to facilitating semantic clustering for code analytics. Available through Mistral’s API, Codestral Embed provides a flexible and efficient solution for developers seeking advanced code understanding capabilities. 
    vides valuable insights for the community.

    Check out the Technical details. All credit for this research goes to the researchers of this project. Also, feel free to follow us on Twitter and don’t forget to join our 95k+ ML SubReddit and Subscribe to our Newsletter.
    Sana HassanSana Hassan, a consulting intern at Marktechpost and dual-degree student at IIT Madras, is passionate about applying technology and AI to address real-world challenges. With a keen interest in solving practical problems, he brings a fresh perspective to the intersection of AI and real-life solutions.Sana Hassanhttps://www.marktechpost.com/author/sana-hassan/Off-Policy Reinforcement Learning RL with KL Divergence Yields Superior Reasoning in Large Language ModelsSana Hassanhttps://www.marktechpost.com/author/sana-hassan/This AI Paper from Microsoft Introduces WINA: A Training-Free Sparse Activation Framework for Efficient Large Language Model InferenceSana Hassanhttps://www.marktechpost.com/author/sana-hassan/Apple and Duke Researchers Present a Reinforcement Learning Approach That Enables LLMs to Provide Intermediate Answers, Enhancing Speed and AccuracySana Hassanhttps://www.marktechpost.com/author/sana-hassan/National University of Singapore Researchers Introduce Dimple: A Discrete Diffusion Multimodal Language Model for Efficient and Controllable Text Generation
    #mistral #introduces #codestral #embed #highperformance
    Mistral AI Introduces Codestral Embed: A High-Performance Code Embedding Model for Scalable Retrieval and Semantic Understanding
    Modern software engineering faces growing challenges in accurately retrieving and understanding code across diverse programming languages and large-scale codebases. Existing embedding models often struggle to capture the deep semantics of code, resulting in poor performance in tasks such as code search, RAG, and semantic analysis. These limitations hinder developers’ ability to efficiently locate relevant code snippets, reuse components, and manage large projects effectively. As software systems grow increasingly complex, there is a pressing need for more effective, language-agnostic representations of code that can power reliable and high-quality retrieval and reasoning across a wide range of development tasks.  Mistral AI has introduced Codestral Embed, a specialized embedding model built specifically for code-related tasks. Designed to handle real-world code more effectively than existing solutions, it enables powerful retrieval capabilities across large codebases. What sets it apart is its flexibility—users can adjust embedding dimensions and precision levels to balance performance with storage efficiency. Even at lower dimensions, such as 256 with int8 precision, Codestral Embed reportedly surpasses top models from competitors like OpenAI, Cohere, and Voyage, offering high retrieval quality at a reduced storage cost. Beyond basic retrieval, Codestral Embed supports a wide range of developer-focused applications. These include code completion, explanation, editing, semantic search, and duplicate detection. The model can also help organize and analyze repositories by clustering code based on functionality or structure, eliminating the need for manual supervision. This makes it particularly useful for tasks like understanding architectural patterns, categorizing code, or supporting automated documentation, ultimately helping developers work more efficiently with large and complex codebases.  Codestral Embed is tailored for understanding and retrieving code efficiently, especially in large-scale development environments. It powers retrieval-augmented generation by quickly fetching relevant context for tasks like code completion, editing, and explanation—ideal for use in coding assistants and agent-based tools. Developers can also perform semantic code searches using natural language or code queries to find relevant snippets. Its ability to detect similar or duplicated code helps with reuse, policy enforcement, and cleaning up redundancy. Additionally, it can cluster code by functionality or structure, making it useful for repository analysis, spotting architectural patterns, and enhancing documentation workflows.  Codestral Embed is a specialized embedding model designed to enhance code retrieval and semantic analysis tasks. It surpasses existing models, such as OpenAI’s and Cohere’s, in benchmarks like SWE-Bench Lite and CodeSearchNet. The model offers customizable embedding dimensions and precision levels, allowing users to effectively balance performance and storage needs. Key applications include retrieval-augmented generation, semantic code search, duplicate detection, and code clustering. Available via API at per million tokens, with a 50% discount for batch processing, Codestral Embed supports various output formats and dimensions, catering to diverse development workflows. In conclusion, Codestral Embed offers customizable embedding dimensions and precisions, enabling developers to strike a balance between performance and storage efficiency. Benchmark evaluations indicate that Codestral Embed surpasses existing models like OpenAI’s and Cohere’s in various code-related tasks, including retrieval-augmented generation and semantic code search. Its applications span from identifying duplicate code segments to facilitating semantic clustering for code analytics. Available through Mistral’s API, Codestral Embed provides a flexible and efficient solution for developers seeking advanced code understanding capabilities.  vides valuable insights for the community. Check out the Technical details. All credit for this research goes to the researchers of this project. Also, feel free to follow us on Twitter and don’t forget to join our 95k+ ML SubReddit and Subscribe to our Newsletter. Sana HassanSana Hassan, a consulting intern at Marktechpost and dual-degree student at IIT Madras, is passionate about applying technology and AI to address real-world challenges. With a keen interest in solving practical problems, he brings a fresh perspective to the intersection of AI and real-life solutions.Sana Hassanhttps://www.marktechpost.com/author/sana-hassan/Off-Policy Reinforcement Learning RL with KL Divergence Yields Superior Reasoning in Large Language ModelsSana Hassanhttps://www.marktechpost.com/author/sana-hassan/This AI Paper from Microsoft Introduces WINA: A Training-Free Sparse Activation Framework for Efficient Large Language Model InferenceSana Hassanhttps://www.marktechpost.com/author/sana-hassan/Apple and Duke Researchers Present a Reinforcement Learning Approach That Enables LLMs to Provide Intermediate Answers, Enhancing Speed and AccuracySana Hassanhttps://www.marktechpost.com/author/sana-hassan/National University of Singapore Researchers Introduce Dimple: A Discrete Diffusion Multimodal Language Model for Efficient and Controllable Text Generation #mistral #introduces #codestral #embed #highperformance
    WWW.MARKTECHPOST.COM
    Mistral AI Introduces Codestral Embed: A High-Performance Code Embedding Model for Scalable Retrieval and Semantic Understanding
    Modern software engineering faces growing challenges in accurately retrieving and understanding code across diverse programming languages and large-scale codebases. Existing embedding models often struggle to capture the deep semantics of code, resulting in poor performance in tasks such as code search, RAG, and semantic analysis. These limitations hinder developers’ ability to efficiently locate relevant code snippets, reuse components, and manage large projects effectively. As software systems grow increasingly complex, there is a pressing need for more effective, language-agnostic representations of code that can power reliable and high-quality retrieval and reasoning across a wide range of development tasks.  Mistral AI has introduced Codestral Embed, a specialized embedding model built specifically for code-related tasks. Designed to handle real-world code more effectively than existing solutions, it enables powerful retrieval capabilities across large codebases. What sets it apart is its flexibility—users can adjust embedding dimensions and precision levels to balance performance with storage efficiency. Even at lower dimensions, such as 256 with int8 precision, Codestral Embed reportedly surpasses top models from competitors like OpenAI, Cohere, and Voyage, offering high retrieval quality at a reduced storage cost. Beyond basic retrieval, Codestral Embed supports a wide range of developer-focused applications. These include code completion, explanation, editing, semantic search, and duplicate detection. The model can also help organize and analyze repositories by clustering code based on functionality or structure, eliminating the need for manual supervision. This makes it particularly useful for tasks like understanding architectural patterns, categorizing code, or supporting automated documentation, ultimately helping developers work more efficiently with large and complex codebases.  Codestral Embed is tailored for understanding and retrieving code efficiently, especially in large-scale development environments. It powers retrieval-augmented generation by quickly fetching relevant context for tasks like code completion, editing, and explanation—ideal for use in coding assistants and agent-based tools. Developers can also perform semantic code searches using natural language or code queries to find relevant snippets. Its ability to detect similar or duplicated code helps with reuse, policy enforcement, and cleaning up redundancy. Additionally, it can cluster code by functionality or structure, making it useful for repository analysis, spotting architectural patterns, and enhancing documentation workflows.  Codestral Embed is a specialized embedding model designed to enhance code retrieval and semantic analysis tasks. It surpasses existing models, such as OpenAI’s and Cohere’s, in benchmarks like SWE-Bench Lite and CodeSearchNet. The model offers customizable embedding dimensions and precision levels, allowing users to effectively balance performance and storage needs. Key applications include retrieval-augmented generation, semantic code search, duplicate detection, and code clustering. Available via API at $0.15 per million tokens, with a 50% discount for batch processing, Codestral Embed supports various output formats and dimensions, catering to diverse development workflows. In conclusion, Codestral Embed offers customizable embedding dimensions and precisions, enabling developers to strike a balance between performance and storage efficiency. Benchmark evaluations indicate that Codestral Embed surpasses existing models like OpenAI’s and Cohere’s in various code-related tasks, including retrieval-augmented generation and semantic code search. Its applications span from identifying duplicate code segments to facilitating semantic clustering for code analytics. Available through Mistral’s API, Codestral Embed provides a flexible and efficient solution for developers seeking advanced code understanding capabilities.  vides valuable insights for the community. Check out the Technical details. All credit for this research goes to the researchers of this project. Also, feel free to follow us on Twitter and don’t forget to join our 95k+ ML SubReddit and Subscribe to our Newsletter. Sana HassanSana Hassan, a consulting intern at Marktechpost and dual-degree student at IIT Madras, is passionate about applying technology and AI to address real-world challenges. With a keen interest in solving practical problems, he brings a fresh perspective to the intersection of AI and real-life solutions.Sana Hassanhttps://www.marktechpost.com/author/sana-hassan/Off-Policy Reinforcement Learning RL with KL Divergence Yields Superior Reasoning in Large Language ModelsSana Hassanhttps://www.marktechpost.com/author/sana-hassan/This AI Paper from Microsoft Introduces WINA: A Training-Free Sparse Activation Framework for Efficient Large Language Model InferenceSana Hassanhttps://www.marktechpost.com/author/sana-hassan/Apple and Duke Researchers Present a Reinforcement Learning Approach That Enables LLMs to Provide Intermediate Answers, Enhancing Speed and AccuracySana Hassanhttps://www.marktechpost.com/author/sana-hassan/National University of Singapore Researchers Introduce Dimple: A Discrete Diffusion Multimodal Language Model for Efficient and Controllable Text Generation
    0 Commentarii 0 Distribuiri
  • I Trained My YouTube Algorithm, and You Should Too

    If Nielsen stats are to be believed, we collectively spend more time in front of YouTube than any other streaming service—including Disney+ and Netflix. That's a lot of watch hours, especially for an app that demands a great deal of trust when it comes to its algorithmic recommendations, which can easily steer you into strange, inflammatory, or downright dark directions. If you'd like a little more control over what you see, allow me to share with you the steps I took to finally tame my own YouTube algorithm.Despite how much time we devote to watching YouTube, the app doesn't behave quite like most other streamers. Rather than loading up the hub page for a show or movie you want to watch, you often have to hope that if there's a new episode of a thing you like, YouTube will show it to you.And since the content on YouTube is so varied, it's easy to get your algorithm off track. Maybe you're in the habit habit of watching long-form content on YouTube, only to see that disrupted by one errant cat video—suddenly, YouTube seems to think you want to see only cat videos, and nothing more. As YouTube has yet to answer my pleas for context-specific browsing profiles, I've had to make do with learning every trick I can to direct the algorithm myself. The basics: Likes, Dislikes, Subscriptions, and the BellYou can't spend 20 minutes on the app without a YouTuber preaching the gospel of like, share, and subscribe. You know by now how those actions help your favorite creators, but how do they help you? Unfortunately, there's no way to know exactly what effect your engagement has on the algorithm, but there are a few useful things to keep in mind:Use Likes and Dislikes to nudge your recommendations, not to express approval or disapproval. The thumbs up/down buttons are the most direct way to express your interestto YouTube. They're also one of the most widely misunderstood tools. Don't think of them as a way to communicate with the creator about the substance of their content. In general, it's best to think of them as nudges for your personal recommendations. Likes are pretty strong indicators that you want to see more similar content, but Dislikes won't necessarily block a particular creator or topic from appearing in your feeds. Subscribing is good, but not a guarantee. You can think of subscribing to a channel as sort of a super-like for the channel as a whole. This tells YouTube you want to see what they make next. The downside is, subscribing doesn't guarantee you'll see anything. YouTube tends to favor more recent subs in your recommendations. If you want to see everything all the people you subscribe to make, you actually need to seek out your Subscriptions tab.Clicking the bell really is the best thing you can do. Creators often like to remind you to "click the bell," and they do it for a reason: This will send you a push notificationwhenever one of your subs uploads a new video. Not only does that increase the likelihood you'll see new videos you care about, but it gives those creators important metrics they can use to understand their audience.These are all extremely basic tools for refining your suggestions, but it's also important to understand them in context. YouTube doesn't just look at what you say you want, it watches how you actually behave on the app. If you like a video, subscribe to the channel, and hit the bell, but then you never watch a video from that creator again, YouTube will eventually stop recommending them.That's neither a good nor bad thing on its own, and contrary to some paranoia among creators, it's not even bad for the channels themselves. The YouTube algorithm's goal is to put something in front of you that you're likely to spend time watching. If the videos it suggests aren't meeting that goal—no matter how much you've told the algorithm to show those videos to you—it will move on to something else. Understanding that gives us some context for moving on to some next-level algorithm taming.Intermediate algorithm training: Refine your history and reject videos you don't want to see

    Credit: Eric Ravenscraft

    If likes, subscriptions, and the bell are all small nudges to the algorithm, are there big nudges you can use? I'm so glad you asked. Watch time is the most obvious, but that's just using YouTube. And no, there's not much benefit in trying to manipulate this. Just keep watching things you like and stop watching things you dislike, and YouTube will try to follow your patterns."Try to" being the operative word. Anyone who's ever fixed a door knows that YouTube can be a bit over-eager to show you hours of content about something you spent five minutes watching. One quick way to fix this is to head to your History, find the video in question, and click "Remove from watch history." In addition to not showing up in your previously-watched videos list, YouTube also won't consider it something you spent time on when recommending new videos.This trick only works for individual videos you've previously watched, though. If you're getting recommendations based on broad topics you don't like, you can ask not to see those recommendations before you even click on the video. Tap the menu button on a video's thumbnail to find options labeled "Not interested"and "Don't recommend channel," which is the closest thing YouTube has to completely blocking a channel.Frustratingly, if you allow YouTube to autoplay videos from the thumbnail before you ever click on a video—a feature you can and arguably should turn off—then that can count as a "view" in your watch history. I've lost track of how often I've set my phone down and accidentally "watched" a video for a few minutes. Even if you select "not interested" before clicking on a video, if it has autoplayed, you might need to remove it from your history as well.Advanced algorithm mastery: Use playlists and multiple accounts to get recommendations silos

    Credit: Eric Ravenscraft

    I will die on the hill of my belief that YouTube should have a mode switcher. I want to be able to have a profile for watching in-depth video essays on niche topics and another profile for dumb cat videos. YouTube has come sort of close with the introduction of category tags. In some places, like YouTube on the web or certain views in apps, you'll see a list of tags for things like "Gaming" or "News" that will filter suggestions. In my opinion these are useful, but inadequate.I'd rather have something that lets me train my personal recommendations in different buckets directly. And over the years I've developed two main strategies for accomplishing this: playlists and account switching.PlaylistsFor the playlists approach, I save videos that I liked on a particular topic to a specific list. Then, if I want to see more videos on that topic, I'll open up the playlist and look through the sidebar. This usually gives me more specific video recommendations to that topic, as well as more specific genre filters for me to drill deeper. The only downside to this approach is that it all happens in the sidebar of another video. It's a little nicer on mobile, but it can feel a little hacky at times.Account switchingThe account switching workaround feels more natural while browsing, but it's a bit more cumbersome to change modes. YouTube has gotten much better at account switching, with a simple "Switch accounts" dropdown in most of its apps. Of course, each one requires an entire Google account, but there's a decent chance you already have at least five of these by now, anyway.There's nothing special about filtering videos this way, but it gives you a few different blank slates to work from, instead of one giant one. For example, I have a Gmail account that I only use as a throwaway for junk where I don't want to give my real email address. On YouTube, if I decide I want to indulge in junk video compilations, I'll switch accounts first. That way, any garbage I watch won't affect my primary account's recommendations.The only downside? If you use YouTube Premium to avoid ads, then that won't carry over to all your other accounts.All of this tinkering will result in a streaming experience that is still less ideal than how apps like Netflix and Disney+ work. On those services, you can set up multiple profiles within your a single account, and pretend it's actually your aunt that's watching all that garbage TV when she comes to visit. Until YouTube makes that an official feature, the tricks outlined above will hopefully help you get better suggestions.
    #trained #youtube #algorithm #you #should
    I Trained My YouTube Algorithm, and You Should Too
    If Nielsen stats are to be believed, we collectively spend more time in front of YouTube than any other streaming service—including Disney+ and Netflix. That's a lot of watch hours, especially for an app that demands a great deal of trust when it comes to its algorithmic recommendations, which can easily steer you into strange, inflammatory, or downright dark directions. If you'd like a little more control over what you see, allow me to share with you the steps I took to finally tame my own YouTube algorithm.Despite how much time we devote to watching YouTube, the app doesn't behave quite like most other streamers. Rather than loading up the hub page for a show or movie you want to watch, you often have to hope that if there's a new episode of a thing you like, YouTube will show it to you.And since the content on YouTube is so varied, it's easy to get your algorithm off track. Maybe you're in the habit habit of watching long-form content on YouTube, only to see that disrupted by one errant cat video—suddenly, YouTube seems to think you want to see only cat videos, and nothing more. As YouTube has yet to answer my pleas for context-specific browsing profiles, I've had to make do with learning every trick I can to direct the algorithm myself. The basics: Likes, Dislikes, Subscriptions, and the BellYou can't spend 20 minutes on the app without a YouTuber preaching the gospel of like, share, and subscribe. You know by now how those actions help your favorite creators, but how do they help you? Unfortunately, there's no way to know exactly what effect your engagement has on the algorithm, but there are a few useful things to keep in mind:Use Likes and Dislikes to nudge your recommendations, not to express approval or disapproval. The thumbs up/down buttons are the most direct way to express your interestto YouTube. They're also one of the most widely misunderstood tools. Don't think of them as a way to communicate with the creator about the substance of their content. In general, it's best to think of them as nudges for your personal recommendations. Likes are pretty strong indicators that you want to see more similar content, but Dislikes won't necessarily block a particular creator or topic from appearing in your feeds. Subscribing is good, but not a guarantee. You can think of subscribing to a channel as sort of a super-like for the channel as a whole. This tells YouTube you want to see what they make next. The downside is, subscribing doesn't guarantee you'll see anything. YouTube tends to favor more recent subs in your recommendations. If you want to see everything all the people you subscribe to make, you actually need to seek out your Subscriptions tab.Clicking the bell really is the best thing you can do. Creators often like to remind you to "click the bell," and they do it for a reason: This will send you a push notificationwhenever one of your subs uploads a new video. Not only does that increase the likelihood you'll see new videos you care about, but it gives those creators important metrics they can use to understand their audience.These are all extremely basic tools for refining your suggestions, but it's also important to understand them in context. YouTube doesn't just look at what you say you want, it watches how you actually behave on the app. If you like a video, subscribe to the channel, and hit the bell, but then you never watch a video from that creator again, YouTube will eventually stop recommending them.That's neither a good nor bad thing on its own, and contrary to some paranoia among creators, it's not even bad for the channels themselves. The YouTube algorithm's goal is to put something in front of you that you're likely to spend time watching. If the videos it suggests aren't meeting that goal—no matter how much you've told the algorithm to show those videos to you—it will move on to something else. Understanding that gives us some context for moving on to some next-level algorithm taming.Intermediate algorithm training: Refine your history and reject videos you don't want to see Credit: Eric Ravenscraft If likes, subscriptions, and the bell are all small nudges to the algorithm, are there big nudges you can use? I'm so glad you asked. Watch time is the most obvious, but that's just using YouTube. And no, there's not much benefit in trying to manipulate this. Just keep watching things you like and stop watching things you dislike, and YouTube will try to follow your patterns."Try to" being the operative word. Anyone who's ever fixed a door knows that YouTube can be a bit over-eager to show you hours of content about something you spent five minutes watching. One quick way to fix this is to head to your History, find the video in question, and click "Remove from watch history." In addition to not showing up in your previously-watched videos list, YouTube also won't consider it something you spent time on when recommending new videos.This trick only works for individual videos you've previously watched, though. If you're getting recommendations based on broad topics you don't like, you can ask not to see those recommendations before you even click on the video. Tap the menu button on a video's thumbnail to find options labeled "Not interested"and "Don't recommend channel," which is the closest thing YouTube has to completely blocking a channel.Frustratingly, if you allow YouTube to autoplay videos from the thumbnail before you ever click on a video—a feature you can and arguably should turn off—then that can count as a "view" in your watch history. I've lost track of how often I've set my phone down and accidentally "watched" a video for a few minutes. Even if you select "not interested" before clicking on a video, if it has autoplayed, you might need to remove it from your history as well.Advanced algorithm mastery: Use playlists and multiple accounts to get recommendations silos Credit: Eric Ravenscraft I will die on the hill of my belief that YouTube should have a mode switcher. I want to be able to have a profile for watching in-depth video essays on niche topics and another profile for dumb cat videos. YouTube has come sort of close with the introduction of category tags. In some places, like YouTube on the web or certain views in apps, you'll see a list of tags for things like "Gaming" or "News" that will filter suggestions. In my opinion these are useful, but inadequate.I'd rather have something that lets me train my personal recommendations in different buckets directly. And over the years I've developed two main strategies for accomplishing this: playlists and account switching.PlaylistsFor the playlists approach, I save videos that I liked on a particular topic to a specific list. Then, if I want to see more videos on that topic, I'll open up the playlist and look through the sidebar. This usually gives me more specific video recommendations to that topic, as well as more specific genre filters for me to drill deeper. The only downside to this approach is that it all happens in the sidebar of another video. It's a little nicer on mobile, but it can feel a little hacky at times.Account switchingThe account switching workaround feels more natural while browsing, but it's a bit more cumbersome to change modes. YouTube has gotten much better at account switching, with a simple "Switch accounts" dropdown in most of its apps. Of course, each one requires an entire Google account, but there's a decent chance you already have at least five of these by now, anyway.There's nothing special about filtering videos this way, but it gives you a few different blank slates to work from, instead of one giant one. For example, I have a Gmail account that I only use as a throwaway for junk where I don't want to give my real email address. On YouTube, if I decide I want to indulge in junk video compilations, I'll switch accounts first. That way, any garbage I watch won't affect my primary account's recommendations.The only downside? If you use YouTube Premium to avoid ads, then that won't carry over to all your other accounts.All of this tinkering will result in a streaming experience that is still less ideal than how apps like Netflix and Disney+ work. On those services, you can set up multiple profiles within your a single account, and pretend it's actually your aunt that's watching all that garbage TV when she comes to visit. Until YouTube makes that an official feature, the tricks outlined above will hopefully help you get better suggestions. #trained #youtube #algorithm #you #should
    LIFEHACKER.COM
    I Trained My YouTube Algorithm, and You Should Too
    If Nielsen stats are to be believed, we collectively spend more time in front of YouTube than any other streaming service—including Disney+ and Netflix. That's a lot of watch hours, especially for an app that demands a great deal of trust when it comes to its algorithmic recommendations, which can easily steer you into strange, inflammatory, or downright dark directions. If you'd like a little more control over what you see, allow me to share with you the steps I took to finally tame my own YouTube algorithm.Despite how much time we devote to watching YouTube, the app doesn't behave quite like most other streamers. Rather than loading up the hub page for a show or movie you want to watch, you often have to hope that if there's a new episode of a thing you like, YouTube will show it to you. (As someone who dabbles as a YouTube creator myself, I would love if the app offered show-specific landing pages, instead of a collection of playlists.)And since the content on YouTube is so varied, it's easy to get your algorithm off track. Maybe you're in the habit habit of watching long-form content on YouTube, only to see that disrupted by one errant cat video—suddenly, YouTube seems to think you want to see only cat videos, and nothing more. As YouTube has yet to answer my pleas for context-specific browsing profiles, I've had to make do with learning every trick I can to direct the algorithm myself. The basics: Likes, Dislikes, Subscriptions, and the BellYou can't spend 20 minutes on the app without a YouTuber preaching the gospel of like, share, and subscribe. You know by now how those actions help your favorite creators, but how do they help you? Unfortunately, there's no way to know exactly what effect your engagement has on the algorithm (even YouTube can't know for sure), but there are a few useful things to keep in mind:Use Likes and Dislikes to nudge your recommendations, not to express approval or disapproval. The thumbs up/down buttons are the most direct way to express your interest (or lack thereof) to YouTube. They're also one of the most widely misunderstood tools. Don't think of them as a way to communicate with the creator about the substance of their content. In general, it's best to think of them as nudges for your personal recommendations. Likes are pretty strong indicators that you want to see more similar content, but Dislikes won't necessarily block a particular creator or topic from appearing in your feeds. Subscribing is good, but not a guarantee. You can think of subscribing to a channel as sort of a super-like for the channel as a whole. This tells YouTube you want to see what they make next (or see more of their backlog). The downside is, subscribing doesn't guarantee you'll see anything. YouTube tends to favor more recent subs in your recommendations. If you want to see everything all the people you subscribe to make, you actually need to seek out your Subscriptions tab.Clicking the bell really is the best thing you can do. Creators often like to remind you to "click the bell," and they do it for a reason: This will send you a push notification (assuming you allow notifications from your YouTube app) whenever one of your subs uploads a new video. Not only does that increase the likelihood you'll see new videos you care about, but it gives those creators important metrics they can use to understand their audience.These are all extremely basic tools for refining your suggestions, but it's also important to understand them in context. YouTube doesn't just look at what you say you want, it watches how you actually behave on the app. If you like a video, subscribe to the channel, and hit the bell, but then you never watch a video from that creator again, YouTube will eventually stop recommending them.That's neither a good nor bad thing on its own, and contrary to some paranoia among creators, it's not even bad for the channels themselves. The YouTube algorithm's goal is to put something in front of you that you're likely to spend time watching. If the videos it suggests aren't meeting that goal—no matter how much you've told the algorithm to show those videos to you—it will move on to something else. Understanding that gives us some context for moving on to some next-level algorithm taming.Intermediate algorithm training: Refine your history and reject videos you don't want to see Credit: Eric Ravenscraft If likes, subscriptions, and the bell are all small nudges to the algorithm, are there big nudges you can use? I'm so glad you asked. Watch time is the most obvious, but that's just using YouTube. And no, there's not much benefit in trying to manipulate this. Just keep watching things you like and stop watching things you dislike, and YouTube will try to follow your patterns."Try to" being the operative word. Anyone who's ever fixed a door knows that YouTube can be a bit over-eager to show you hours of content about something you spent five minutes watching. One quick way to fix this is to head to your History, find the video in question, and click "Remove from watch history." In addition to not showing up in your previously-watched videos list, YouTube also won't consider it something you spent time on when recommending new videos.This trick only works for individual videos you've previously watched, though. If you're getting recommendations based on broad topics you don't like, you can ask not to see those recommendations before you even click on the video. Tap the menu button on a video's thumbnail to find options labeled "Not interested" (good for indicating you don't like this particular video suggestion) and "Don't recommend channel," which is the closest thing YouTube has to completely blocking a channel.Frustratingly, if you allow YouTube to autoplay videos from the thumbnail before you ever click on a video—a feature you can and arguably should turn off—then that can count as a "view" in your watch history. I've lost track of how often I've set my phone down and accidentally "watched" a video for a few minutes. Even if you select "not interested" before clicking on a video, if it has autoplayed, you might need to remove it from your history as well.Advanced algorithm mastery: Use playlists and multiple accounts to get recommendations silos Credit: Eric Ravenscraft I will die on the hill of my belief that YouTube should have a mode switcher. I want to be able to have a profile for watching in-depth video essays on niche topics and another profile for dumb cat videos. YouTube has come sort of close with the introduction of category tags. In some places, like YouTube on the web or certain views in apps, you'll see a list of tags for things like "Gaming" or "News" that will filter suggestions. In my opinion these are useful, but inadequate.I'd rather have something that lets me train my personal recommendations in different buckets directly. And over the years I've developed two main strategies for accomplishing this: playlists and account switching.PlaylistsFor the playlists approach, I save videos that I liked on a particular topic to a specific list. Then, if I want to see more videos on that topic, I'll open up the playlist and look through the sidebar. This usually gives me more specific video recommendations to that topic (interspersed with the usual recommendation buckshot), as well as more specific genre filters for me to drill deeper. The only downside to this approach is that it all happens in the sidebar of another video. It's a little nicer on mobile, but it can feel a little hacky at times.Account switchingThe account switching workaround feels more natural while browsing, but it's a bit more cumbersome to change modes. YouTube has gotten much better at account switching, with a simple "Switch accounts" dropdown in most of its apps. Of course, each one requires an entire Google account, but there's a decent chance you already have at least five of these by now, anyway.There's nothing special about filtering videos this way, but it gives you a few different blank slates to work from, instead of one giant one. For example, I have a Gmail account that I only use as a throwaway for junk where I don't want to give my real email address. On YouTube, if I decide I want to indulge in junk video compilations, I'll switch accounts first. That way, any garbage I watch won't affect my primary account's recommendations. (This is also helpful if you want to have guests over but don't want them to poison your well with videos they pull up.) The only downside? If you use YouTube Premium to avoid ads, then that won't carry over to all your other accounts.All of this tinkering will result in a streaming experience that is still less ideal than how apps like Netflix and Disney+ work. On those services, you can set up multiple profiles within your a single account, and pretend it's actually your aunt that's watching all that garbage TV when she comes to visit. Until YouTube makes that an official feature, the tricks outlined above will hopefully help you get better suggestions.
    0 Commentarii 0 Distribuiri
  • New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data

    May 30, 2025Ravie LakshmananBrowser Security / Malware

    A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages.
    "This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as credentials, browser information, and cryptocurrency wallet details," Elastic Security Labs researcher Jia Yu Chan said in an analysis.
    The attack chains begin with threat actors compromising legitimate websites with malicious JavaScript payloads that serve bogus CAPTCHA check pages, which prompt site visitors to "prove you are notrobot" by following a three-step process, a prevalent tactic called ClickFix.
    This involves instructing the potential victim to open the Windows Run dialog prompt, paste an already copied command into the "verification window", and press enter. This effectively causes the obfuscated PowerShell command to be executed, resulting in the retrieval of a next-stage payload from an external server.
    The JavaScript payloadis subsequently saved to the victim's Downloads folder and executed using cscript in a hidden window. The main goal of the intermediate script is to fetch the EDDIESTEALER binary from the same remote server and store it in the Downloads folder with a pseudorandom 12-character file name.
    Written in Rust, EDDIESTEALER is a commodity stealer malware that can gather system metadata, receive tasks from a command-and-controlserver, and siphon data of interest from the infected host. The exfiltration targets include cryptocurrency wallets, web browsers, password managers, FTP clients, and messaging apps.
    "These targets are subject to change as they are configurable by the C2 operator," Elastic explained. "EDDIESTEALER then reads the targeted files using standard kernel32.dll functions like CreateFileW, GetFileSizeEx, ReadFile, and CloseHandle."

    The collected host information is encrypted and transmitted to the C2 server in a separate HTTP POST request after the completion of each task.
    Besides incorporating string encryption, the malware employs a custom WinAPI lookup mechanism for resolving API calls and creates a mutex to ensure that only one version is running at any given time. It also incorporates checks to determine if it's being executed in a sandboxed environment, and if so, deletes itself from disk.
    "Based on a similar self-deletion technique observed in Latrodectus, EDDIESTEALER is capable of deleting itself through NTFS Alternate Data Streams renaming, to bypass file locks," Elastic noted.
    Another noteworthy feature built into the stealer is its ability to bypass Chromium's app-bound encryption to gain access to unencrypted sensitive data, such as cookies. This is accomplished by including a Rust implementation of ChromeKatz, an open-source tool that can dump cookies and credentials from the memory of Chromium-based browsers.
    The Rust version of ChromeKatz also incorporates changes to handle scenarios where the targeted Chromium browser is not running. In such cases, it spawns a new browser instance using the command-line arguments "--window-position=-3000,-3000 ; effectively positioning the new window far off-screen and making its invisible to the user.

    In opening the browser, the objective is to enable the malware to read the memory associated with the network service child process of Chrome that's identified by the "-utility-sub-type=network.mojom.NetworkService" flag and ultimately extract the credentials.
    Elastic said it also identified updated versions of the malware with features to harvest running processes, GPU information, number of CPU cores, CPU name, and CPU vendor. In addition, the new variants tweak the C2 communication pattern by preemptively sending the host information to the server before receiving the task configuration.
    That's not all. The encryption key used for client-to-server communication is hard-coded into the binary, as opposed to retrieving it dynamically from the server. Furthermore, the stealer has been found to launch a new Chrome process with the --remote-debugging-port=<port_num> flag to enable DevTools Protocol over a local WebSocket interface so as to interact with the browser in a headless manner, without requiring any user interaction.
    "This adoption of Rust in malware development reflects a growing trend among threat actors seeking to leverage modern language features for enhanced stealth, stability, and resilience against traditional analysis workflows and threat detection engines," the company said.
    The disclosure comes as c/side revealed details of a ClickFix campaign that targets multiple platforms, such as Apple macOS, Android, and iOS, using techniques like browser-based redirections, fake UI prompts, and drive-by download techniques.
    The attack chain starts with an obfuscated JavaScript hosted on a website, that when visited from macOS, initiates a series of redirections to a page that guides victims to launch Terminal and run a shell script, which leads to the download of a stealer malware that has been flagged on VirusTotal as the Atomic macOS Stealer.
    However, the same campaign has been configured to initiate a drive-by download scheme when visiting the web page from an Android, iOS, or Windows device, leading to the deployment of another trojan malware.

    The disclosures coincide with the emergence of new stealer malware families like Katz Stealer and AppleProcessHub Stealer targeting Windows and macOS respectively, and are capable of harvesting a wide range of information from infected hosts, according to Nextron and Kandji.
    Katz Stealer, like EDDIESTEALER, is engineered to circumvent Chrome's app-bound encryption, but in a different way by employing DLL injection to obtain the encryption key without administrator privileges and use it to decrypt encrypted cookies and passwords from Chromium-based browsers.

    "Attackers conceal malicious JavaScript in gzip files, which, when opened, trigger the download of a PowerShell script," Nextron said. "This script retrieves a .NET-based loader payload, which injects the stealer into a legitimate process. Once active, it exfiltrates stolen data to the command and control server."
    AppleProcessHub Stealer, on the other hand, is designed to exfiltrate user files including bash history, zsh history, GitHub configurations, SSH information, and iCloud Keychain.
    Attack sequences distributing the malware entail the use of a Mach-O binary that downloads a second-stage bash stealer script from the server "appleprocesshubcom" and runs it, the results of which are then exfiltrated back to the C2 server. Details of the malware were first shared by the MalwareHunterTeam on May 15, 2025, and by MacPaw's Moonlock Lab last week.
    "This is an example of a Mach-O written in Objective-C which communicates with a command and control server to execute scripts," Kandji researcher Christopher Lopez said.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #new #eddiestealer #malware #bypasses #chrome039s
    New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data
    May 30, 2025Ravie LakshmananBrowser Security / Malware A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. "This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as credentials, browser information, and cryptocurrency wallet details," Elastic Security Labs researcher Jia Yu Chan said in an analysis. The attack chains begin with threat actors compromising legitimate websites with malicious JavaScript payloads that serve bogus CAPTCHA check pages, which prompt site visitors to "prove you are notrobot" by following a three-step process, a prevalent tactic called ClickFix. This involves instructing the potential victim to open the Windows Run dialog prompt, paste an already copied command into the "verification window", and press enter. This effectively causes the obfuscated PowerShell command to be executed, resulting in the retrieval of a next-stage payload from an external server. The JavaScript payloadis subsequently saved to the victim's Downloads folder and executed using cscript in a hidden window. The main goal of the intermediate script is to fetch the EDDIESTEALER binary from the same remote server and store it in the Downloads folder with a pseudorandom 12-character file name. Written in Rust, EDDIESTEALER is a commodity stealer malware that can gather system metadata, receive tasks from a command-and-controlserver, and siphon data of interest from the infected host. The exfiltration targets include cryptocurrency wallets, web browsers, password managers, FTP clients, and messaging apps. "These targets are subject to change as they are configurable by the C2 operator," Elastic explained. "EDDIESTEALER then reads the targeted files using standard kernel32.dll functions like CreateFileW, GetFileSizeEx, ReadFile, and CloseHandle." The collected host information is encrypted and transmitted to the C2 server in a separate HTTP POST request after the completion of each task. Besides incorporating string encryption, the malware employs a custom WinAPI lookup mechanism for resolving API calls and creates a mutex to ensure that only one version is running at any given time. It also incorporates checks to determine if it's being executed in a sandboxed environment, and if so, deletes itself from disk. "Based on a similar self-deletion technique observed in Latrodectus, EDDIESTEALER is capable of deleting itself through NTFS Alternate Data Streams renaming, to bypass file locks," Elastic noted. Another noteworthy feature built into the stealer is its ability to bypass Chromium's app-bound encryption to gain access to unencrypted sensitive data, such as cookies. This is accomplished by including a Rust implementation of ChromeKatz, an open-source tool that can dump cookies and credentials from the memory of Chromium-based browsers. The Rust version of ChromeKatz also incorporates changes to handle scenarios where the targeted Chromium browser is not running. In such cases, it spawns a new browser instance using the command-line arguments "--window-position=-3000,-3000 ; effectively positioning the new window far off-screen and making its invisible to the user. In opening the browser, the objective is to enable the malware to read the memory associated with the network service child process of Chrome that's identified by the "-utility-sub-type=network.mojom.NetworkService" flag and ultimately extract the credentials. Elastic said it also identified updated versions of the malware with features to harvest running processes, GPU information, number of CPU cores, CPU name, and CPU vendor. In addition, the new variants tweak the C2 communication pattern by preemptively sending the host information to the server before receiving the task configuration. That's not all. The encryption key used for client-to-server communication is hard-coded into the binary, as opposed to retrieving it dynamically from the server. Furthermore, the stealer has been found to launch a new Chrome process with the --remote-debugging-port=<port_num> flag to enable DevTools Protocol over a local WebSocket interface so as to interact with the browser in a headless manner, without requiring any user interaction. "This adoption of Rust in malware development reflects a growing trend among threat actors seeking to leverage modern language features for enhanced stealth, stability, and resilience against traditional analysis workflows and threat detection engines," the company said. The disclosure comes as c/side revealed details of a ClickFix campaign that targets multiple platforms, such as Apple macOS, Android, and iOS, using techniques like browser-based redirections, fake UI prompts, and drive-by download techniques. The attack chain starts with an obfuscated JavaScript hosted on a website, that when visited from macOS, initiates a series of redirections to a page that guides victims to launch Terminal and run a shell script, which leads to the download of a stealer malware that has been flagged on VirusTotal as the Atomic macOS Stealer. However, the same campaign has been configured to initiate a drive-by download scheme when visiting the web page from an Android, iOS, or Windows device, leading to the deployment of another trojan malware. The disclosures coincide with the emergence of new stealer malware families like Katz Stealer and AppleProcessHub Stealer targeting Windows and macOS respectively, and are capable of harvesting a wide range of information from infected hosts, according to Nextron and Kandji. Katz Stealer, like EDDIESTEALER, is engineered to circumvent Chrome's app-bound encryption, but in a different way by employing DLL injection to obtain the encryption key without administrator privileges and use it to decrypt encrypted cookies and passwords from Chromium-based browsers. "Attackers conceal malicious JavaScript in gzip files, which, when opened, trigger the download of a PowerShell script," Nextron said. "This script retrieves a .NET-based loader payload, which injects the stealer into a legitimate process. Once active, it exfiltrates stolen data to the command and control server." AppleProcessHub Stealer, on the other hand, is designed to exfiltrate user files including bash history, zsh history, GitHub configurations, SSH information, and iCloud Keychain. Attack sequences distributing the malware entail the use of a Mach-O binary that downloads a second-stage bash stealer script from the server "appleprocesshubcom" and runs it, the results of which are then exfiltrated back to the C2 server. Details of the malware were first shared by the MalwareHunterTeam on May 15, 2025, and by MacPaw's Moonlock Lab last week. "This is an example of a Mach-O written in Objective-C which communicates with a command and control server to execute scripts," Kandji researcher Christopher Lopez said. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #new #eddiestealer #malware #bypasses #chrome039s
    THEHACKERNEWS.COM
    New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data
    May 30, 2025Ravie LakshmananBrowser Security / Malware A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. "This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as credentials, browser information, and cryptocurrency wallet details," Elastic Security Labs researcher Jia Yu Chan said in an analysis. The attack chains begin with threat actors compromising legitimate websites with malicious JavaScript payloads that serve bogus CAPTCHA check pages, which prompt site visitors to "prove you are not [a] robot" by following a three-step process, a prevalent tactic called ClickFix. This involves instructing the potential victim to open the Windows Run dialog prompt, paste an already copied command into the "verification window" (i.e., the Run dialog), and press enter. This effectively causes the obfuscated PowerShell command to be executed, resulting in the retrieval of a next-stage payload from an external server ("llll[.]fit"). The JavaScript payload ("gverify.js") is subsequently saved to the victim's Downloads folder and executed using cscript in a hidden window. The main goal of the intermediate script is to fetch the EDDIESTEALER binary from the same remote server and store it in the Downloads folder with a pseudorandom 12-character file name. Written in Rust, EDDIESTEALER is a commodity stealer malware that can gather system metadata, receive tasks from a command-and-control (C2) server, and siphon data of interest from the infected host. The exfiltration targets include cryptocurrency wallets, web browsers, password managers, FTP clients, and messaging apps. "These targets are subject to change as they are configurable by the C2 operator," Elastic explained. "EDDIESTEALER then reads the targeted files using standard kernel32.dll functions like CreateFileW, GetFileSizeEx, ReadFile, and CloseHandle." The collected host information is encrypted and transmitted to the C2 server in a separate HTTP POST request after the completion of each task. Besides incorporating string encryption, the malware employs a custom WinAPI lookup mechanism for resolving API calls and creates a mutex to ensure that only one version is running at any given time. It also incorporates checks to determine if it's being executed in a sandboxed environment, and if so, deletes itself from disk. "Based on a similar self-deletion technique observed in Latrodectus, EDDIESTEALER is capable of deleting itself through NTFS Alternate Data Streams renaming, to bypass file locks," Elastic noted. Another noteworthy feature built into the stealer is its ability to bypass Chromium's app-bound encryption to gain access to unencrypted sensitive data, such as cookies. This is accomplished by including a Rust implementation of ChromeKatz, an open-source tool that can dump cookies and credentials from the memory of Chromium-based browsers. The Rust version of ChromeKatz also incorporates changes to handle scenarios where the targeted Chromium browser is not running. In such cases, it spawns a new browser instance using the command-line arguments "--window-position=-3000,-3000 https://google.com," effectively positioning the new window far off-screen and making its invisible to the user. In opening the browser, the objective is to enable the malware to read the memory associated with the network service child process of Chrome that's identified by the "-utility-sub-type=network.mojom.NetworkService" flag and ultimately extract the credentials. Elastic said it also identified updated versions of the malware with features to harvest running processes, GPU information, number of CPU cores, CPU name, and CPU vendor. In addition, the new variants tweak the C2 communication pattern by preemptively sending the host information to the server before receiving the task configuration. That's not all. The encryption key used for client-to-server communication is hard-coded into the binary, as opposed to retrieving it dynamically from the server. Furthermore, the stealer has been found to launch a new Chrome process with the --remote-debugging-port=<port_num> flag to enable DevTools Protocol over a local WebSocket interface so as to interact with the browser in a headless manner, without requiring any user interaction. "This adoption of Rust in malware development reflects a growing trend among threat actors seeking to leverage modern language features for enhanced stealth, stability, and resilience against traditional analysis workflows and threat detection engines," the company said. The disclosure comes as c/side revealed details of a ClickFix campaign that targets multiple platforms, such as Apple macOS, Android, and iOS, using techniques like browser-based redirections, fake UI prompts, and drive-by download techniques. The attack chain starts with an obfuscated JavaScript hosted on a website, that when visited from macOS, initiates a series of redirections to a page that guides victims to launch Terminal and run a shell script, which leads to the download of a stealer malware that has been flagged on VirusTotal as the Atomic macOS Stealer (AMOS). However, the same campaign has been configured to initiate a drive-by download scheme when visiting the web page from an Android, iOS, or Windows device, leading to the deployment of another trojan malware. The disclosures coincide with the emergence of new stealer malware families like Katz Stealer and AppleProcessHub Stealer targeting Windows and macOS respectively, and are capable of harvesting a wide range of information from infected hosts, according to Nextron and Kandji. Katz Stealer, like EDDIESTEALER, is engineered to circumvent Chrome's app-bound encryption, but in a different way by employing DLL injection to obtain the encryption key without administrator privileges and use it to decrypt encrypted cookies and passwords from Chromium-based browsers. "Attackers conceal malicious JavaScript in gzip files, which, when opened, trigger the download of a PowerShell script," Nextron said. "This script retrieves a .NET-based loader payload, which injects the stealer into a legitimate process. Once active, it exfiltrates stolen data to the command and control server." AppleProcessHub Stealer, on the other hand, is designed to exfiltrate user files including bash history, zsh history, GitHub configurations, SSH information, and iCloud Keychain. Attack sequences distributing the malware entail the use of a Mach-O binary that downloads a second-stage bash stealer script from the server "appleprocesshub[.]com" and runs it, the results of which are then exfiltrated back to the C2 server. Details of the malware were first shared by the MalwareHunterTeam on May 15, 2025, and by MacPaw's Moonlock Lab last week. "This is an example of a Mach-O written in Objective-C which communicates with a command and control server to execute scripts," Kandji researcher Christopher Lopez said. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    12 Commentarii 0 Distribuiri
Sponsorizeaza Paginile