• Estimating time for complex projects

    Estimating the time required to complete a task is riddled with pitfalls.Let’s start with two key concepts you must understand — after managing and designing projects for over 20 years, I’ve seen these patterns play out again and again.Hofstadter’s lawHofstadter’s law is a self-referential adage about time that goes like this:“It always takes longer than you expect, even when you take into account Hofstadter’s law.”This law highlights how difficult it is to accurately estimate the time required to complete complex tasks. Its recursive nature reflects the widespread experience that, no matter how complex a task appears, calculating the time needed is hard, even with our best efforts.Why is that?Optimism biasThe main reason stems from the tendency known as optimism bias — the inclination to be overly optimistic and thus overestimate favorable outcomes. In fact, we tend to overestimate our own abilities as well.It’s worth noting that this bias is actually quite necessary for humans: without it, we wouldn’t take risks, start businesses, or grow. However, when it comes to estimation, it can seriously backfire. This phenomenon naturally leads to…Planning fallacyOverly optimistic forecasts about the outcomes of plans are almost everywhere. Daniel Kahneman and Amos Tversky introduced the term planning fallacy to describe how we consistently underestimate the necessary resourceswhen planning complex projects. This phenomenon pushes us toward optimistic planning. Unsurprisingly, we’re much more realistic when reviewing someone else’s plan.In short:We overestimate favorable outcomes and our abilities, and we underestimate the required resources and constraints.What can we do?As I mentioned earlier, I’ll share how I personally handle this. The phenomenon is not new, and there are countless methods available.2x + 15 ruleFor smaller tasks, I use this technique. I look at the task, estimate the number of hours, double it, and add 15 minutes. The extra 15 minutes is to get started and immerse yourself in the task. Most of the time, it works quite well and is incredibly simple.Hofstadter multiplierMy teammates track and record the actual time spent on tasks, which is useful for several reasons. First, it helps everyone gain experience with how long typical tasks take, which they can then compare to their own estimates, improving their estimation skills. Second, you can determine your own — or a particular person’s — so-called Hofstadter multiplier. We’re all different, so this is a more advanced, personalized version of the 2x + 15 rule.Complex projectsThe earlier solutions work well for simpler tasks, but complex projects require additional considerations. But first, it’s important to clarify one question:How much energy can you, or do you want to, invest in the estimate/proposal?From there, more questions arise:Is it a rough indicative proposal or a detailed, itemized one?What inputs, expertise, and professionals are needed for the estimate?Is all necessary information available?How much capacity do you havefor the estimation and/or execution?Do you realistically have a chance of winning the work? :)Your answers to these questions will influence the path you choose.Going back to the planning fallacy for a moment: it can be mitigated by involving a third party or by relying on real data from similar past projects.That’s why it’s crucial to keep precise records of the time spent on every task so that the data is available later.You will log the time for every task. — Obi-Wan KenobiMoving on…In an ideal world, the best approach is for the team that will actually execute the project to estimate it together. But consider how much it costs if a 4–5 person team individually reviews and interprets the materials, discusses them together, collects missing information, breaks down the project into items, and estimates each one using some method. It’s incredibly time-consuming and expensive.Therefore, as a substitute, it’s good to have an experienced person who’s seen many projects and/or to rely on actual hours from similar past projects. In this case, you only need to account for the differences and unknownsat the time of the proposal. Estimation becomes much simpler, faster, and cheaper.For indicative proposals, I almost always use this latter method, with one important addition: always assume a ±20% variation.Whoa, be careful!It may seem like you’ve done something similar before, but hidden behind the scenes are major differences. This can lead to nasty surprises if you rely on data from nearly similar projects. In such cases, it’s wise to consult multiple external teams to benchmark the work. This helps refine the estimate and creates a healthy competitive environment.And when a detailed, itemized proposal is necessary… There’s no shortcut: you’ll need to apply a methodology. I won’t even attempt to cover this topic here, as there are entire books written about the relevant methodologies.FinallyI’ve been in the product design profession for over 20 years, and I often play the game where, after hearing the requirements, I throw out a number almost off the top of my head. It works surprisingly often, but of course, I wouldn’t even call it indicative. Still, it’s fun.Estimating time for complex projects was originally published in UX Collective on Medium, where people are continuing the conversation by highlighting and responding to this story.
    #estimating #time #complex #projects
    Estimating time for complex projects
    Estimating the time required to complete a task is riddled with pitfalls.Let’s start with two key concepts you must understand — after managing and designing projects for over 20 years, I’ve seen these patterns play out again and again.Hofstadter’s lawHofstadter’s law is a self-referential adage about time that goes like this:“It always takes longer than you expect, even when you take into account Hofstadter’s law.”This law highlights how difficult it is to accurately estimate the time required to complete complex tasks. Its recursive nature reflects the widespread experience that, no matter how complex a task appears, calculating the time needed is hard, even with our best efforts.Why is that?Optimism biasThe main reason stems from the tendency known as optimism bias — the inclination to be overly optimistic and thus overestimate favorable outcomes. In fact, we tend to overestimate our own abilities as well.It’s worth noting that this bias is actually quite necessary for humans: without it, we wouldn’t take risks, start businesses, or grow. However, when it comes to estimation, it can seriously backfire. This phenomenon naturally leads to…Planning fallacyOverly optimistic forecasts about the outcomes of plans are almost everywhere. Daniel Kahneman and Amos Tversky introduced the term planning fallacy to describe how we consistently underestimate the necessary resourceswhen planning complex projects. This phenomenon pushes us toward optimistic planning. Unsurprisingly, we’re much more realistic when reviewing someone else’s plan.In short:We overestimate favorable outcomes and our abilities, and we underestimate the required resources and constraints.What can we do?As I mentioned earlier, I’ll share how I personally handle this. The phenomenon is not new, and there are countless methods available.2x + 15 ruleFor smaller tasks, I use this technique. I look at the task, estimate the number of hours, double it, and add 15 minutes. The extra 15 minutes is to get started and immerse yourself in the task. Most of the time, it works quite well and is incredibly simple.Hofstadter multiplierMy teammates track and record the actual time spent on tasks, which is useful for several reasons. First, it helps everyone gain experience with how long typical tasks take, which they can then compare to their own estimates, improving their estimation skills. Second, you can determine your own — or a particular person’s — so-called Hofstadter multiplier. We’re all different, so this is a more advanced, personalized version of the 2x + 15 rule.Complex projectsThe earlier solutions work well for simpler tasks, but complex projects require additional considerations. But first, it’s important to clarify one question:How much energy can you, or do you want to, invest in the estimate/proposal?From there, more questions arise:Is it a rough indicative proposal or a detailed, itemized one?What inputs, expertise, and professionals are needed for the estimate?Is all necessary information available?How much capacity do you havefor the estimation and/or execution?Do you realistically have a chance of winning the work? :)Your answers to these questions will influence the path you choose.Going back to the planning fallacy for a moment: it can be mitigated by involving a third party or by relying on real data from similar past projects.That’s why it’s crucial to keep precise records of the time spent on every task so that the data is available later.You will log the time for every task. — Obi-Wan KenobiMoving on…In an ideal world, the best approach is for the team that will actually execute the project to estimate it together. But consider how much it costs if a 4–5 person team individually reviews and interprets the materials, discusses them together, collects missing information, breaks down the project into items, and estimates each one using some method. It’s incredibly time-consuming and expensive.Therefore, as a substitute, it’s good to have an experienced person who’s seen many projects and/or to rely on actual hours from similar past projects. In this case, you only need to account for the differences and unknownsat the time of the proposal. Estimation becomes much simpler, faster, and cheaper.For indicative proposals, I almost always use this latter method, with one important addition: always assume a ±20% variation.Whoa, be careful!It may seem like you’ve done something similar before, but hidden behind the scenes are major differences. This can lead to nasty surprises if you rely on data from nearly similar projects. In such cases, it’s wise to consult multiple external teams to benchmark the work. This helps refine the estimate and creates a healthy competitive environment.And when a detailed, itemized proposal is necessary… There’s no shortcut: you’ll need to apply a methodology. I won’t even attempt to cover this topic here, as there are entire books written about the relevant methodologies.FinallyI’ve been in the product design profession for over 20 years, and I often play the game where, after hearing the requirements, I throw out a number almost off the top of my head. It works surprisingly often, but of course, I wouldn’t even call it indicative. Still, it’s fun.Estimating time for complex projects was originally published in UX Collective on Medium, where people are continuing the conversation by highlighting and responding to this story. #estimating #time #complex #projects
    UXDESIGN.CC
    Estimating time for complex projects
    Estimating the time required to complete a task is riddled with pitfalls.Let’s start with two key concepts you must understand — after managing and designing projects for over 20 years, I’ve seen these patterns play out again and again.Hofstadter’s lawHofstadter’s law is a self-referential adage about time that goes like this:“It always takes longer than you expect, even when you take into account Hofstadter’s law.”This law highlights how difficult it is to accurately estimate the time required to complete complex tasks. Its recursive nature reflects the widespread experience that, no matter how complex a task appears, calculating the time needed is hard, even with our best efforts. (See the header image.)Why is that?Optimism biasThe main reason stems from the tendency known as optimism bias — the inclination to be overly optimistic and thus overestimate favorable outcomes. In fact, we tend to overestimate our own abilities as well.It’s worth noting that this bias is actually quite necessary for humans: without it, we wouldn’t take risks, start businesses, or grow. However, when it comes to estimation, it can seriously backfire. This phenomenon naturally leads to…Planning fallacyOverly optimistic forecasts about the outcomes of plans are almost everywhere. Daniel Kahneman and Amos Tversky introduced the term planning fallacy to describe how we consistently underestimate the necessary resources (money, time) when planning complex projects. This phenomenon pushes us toward optimistic planning. Unsurprisingly, we’re much more realistic when reviewing someone else’s plan.In short:We overestimate favorable outcomes and our abilities, and we underestimate the required resources and constraints.What can we do?As I mentioned earlier, I’ll share how I personally handle this. The phenomenon is not new, and there are countless methods available.2x + 15 ruleFor smaller tasks (~1–20 hours), I use this technique. I look at the task, estimate the number of hours, double it, and add 15 minutes. The extra 15 minutes is to get started and immerse yourself in the task. Most of the time, it works quite well and is incredibly simple.Hofstadter multiplierMy teammates track and record the actual time spent on tasks, which is useful for several reasons. First, it helps everyone gain experience with how long typical tasks take, which they can then compare to their own estimates, improving their estimation skills. Second, you can determine your own — or a particular person’s — so-called Hofstadter multiplier. We’re all different, so this is a more advanced, personalized version of the 2x + 15 rule.Complex projectsThe earlier solutions work well for simpler tasks, but complex projects require additional considerations. But first, it’s important to clarify one question:How much energy can you, or do you want to, invest in the estimate/proposal?From there, more questions arise:Is it a rough indicative proposal or a detailed, itemized one?What inputs, expertise, and professionals are needed for the estimate?Is all necessary information available?How much capacity do you have (if any) for the estimation and/or execution?Do you realistically have a chance of winning the work? :)Your answers to these questions will influence the path you choose.Going back to the planning fallacy for a moment: it can be mitigated by involving a third party or by relying on real data from similar past projects.That’s why it’s crucial to keep precise records of the time spent on every task so that the data is available later.You will log the time for every task. — Obi-Wan KenobiMoving on…In an ideal world, the best approach is for the team that will actually execute the project to estimate it together. But consider how much it costs if a 4–5 person team individually reviews and interprets the materials, discusses them together, collects missing information, breaks down the project into items, and estimates each one using some method. It’s incredibly time-consuming and expensive.Therefore, as a substitute, it’s good to have an experienced person who’s seen many projects and/or to rely on actual hours from similar past projects. In this case, you only need to account for the differences and unknowns (the risks) at the time of the proposal. Estimation becomes much simpler, faster, and cheaper.For indicative proposals, I almost always use this latter method, with one important addition: always assume a ±20% variation.Whoa, be careful!It may seem like you’ve done something similar before, but hidden behind the scenes are major differences. This can lead to nasty surprises if you rely on data from nearly similar projects. In such cases, it’s wise to consult multiple external teams to benchmark the work. This helps refine the estimate and creates a healthy competitive environment.And when a detailed, itemized proposal is necessary… There’s no shortcut: you’ll need to apply a methodology. I won’t even attempt to cover this topic here, as there are entire books written about the relevant methodologies.FinallyI’ve been in the product design profession for over 20 years, and I often play the game where, after hearing the requirements, I throw out a number almost off the top of my head. It works surprisingly often, but of course, I wouldn’t even call it indicative. Still, it’s fun.Estimating time for complex projects was originally published in UX Collective on Medium, where people are continuing the conversation by highlighting and responding to this story.
    0 Comentários 0 Compartilhamentos
  • Volvo: Gaussian Splatting Is Our Secret Ingredient For Safer Cars

    The new ES90 electric car is the flagship of Volvo's latest digital safety tech.TT News Agency/AFP via Getty Images
    For decades, the Volvo brand has been synonymous with safety. But keeping passengers secure is no longer just about a strong cabin or cleverly designed crumple zones. Increasingly, safety is about semi-autonomous driving technology that can mitigate collisions or even avoid them entirely. Volvo intends to be ahead of the game in this era too. Its secret weapon? Something called “Gaussian Splatting”. I asked Volvo’s Head of Software Engineering Alwin Bakkenes and subsidiary Zenseact’s VP Product Erik Coelingh exactly what this is and why it’s so important.

    Volvo: Early Application Of Safety Data
    “We have a long history of innovations based on data,” says Bakkenes. “The accident research team from the 70s started with measuring tapes. Now in the digital world we’re collecting millions of real-life events. That data has helped us over the years to develop a three-point safety belt and the whiplash protection system. Now, we can see from the data we collect from fleets that a very large portion of serious accidents happen in the dark on country roads where vulnerable road users are involved. That’s why, with the ES90 that we just launched, we are also introducing a function called lighter AES where we have enabled the car to steer away from pedestrians walking on the side of the road or cyclists, which in the dark you can’t see even if you have your high beam on. This technology picks that up earlier than a human driver.” The Volvo EX90 SUV will also benefit from this technology.
    Volvo Cars uses AI and virtual worlds with the aim to create safer carsVolvo

    “If you want to lead in collision avoidance and self-driving, you need to have the best possible data from the real world,” adds Bakkenes. “But everyone is looking also at augmenting that with simulated data. The next step is fast automation, so we’re using state-of-the-art end-to-end models to achieve speed in iterations. But sometimes these models hallucinate. To avoid that, we use our 98 years of safety experience and these millions of data points as guardrails to make sure that the car behaves well because we believe that when you start to automate it needs to be trusted. For us every kilometer driven with Pilot Assist or Pilot Assist Plus needs to be safer than when you've driven it yourself. In the world of AI data is king. We use Gaussian Splatting to enhance our data set.”

    What Is Volvo’s Gaussian Splatting?
    “Cars are driven all around the world in different weather and traffic conditions by different people,” says Coelingh. “The variation is huge. We collect millions of data points, but it’s still a limited amount compared to reality. Gaussian Splatting is a new technology that some of our PhD students have been developing the last few years into a system where you can take a single data point from the real world where you have all the sensor, camera, radar and LIDAR sequences and then blow it up into thousands or tens of thousands of different scenarios. In that way, you can get a much better representation of the real world because we can test our software against this huge variation. If you do it in software, you can test much faster, so then you can iterate your software much more quickly and improve our product.”

    “Gaussian Splatting is used in different areas of AI,” continues Coelingh. “It comes from the neural radiance fields.” The original version worked with static images. “The first academic paper was about a drum kit where somebody took still pictures from different angles and then the neural net was trained on those pictures to create a 3D model. It looked perfect from any angle even though there was only a limited set of pictures available. Later that technology was expanded from 3D to 4D space-time, so you could also do it on the video set. We now do this not just with video data, but also with LiDAR and radar data.” A real-world event can be recreated from every angle. “We can start to manipulate other road users in this scenario. We can manipulate real world scenarios and do different simulations around this to make sure that our system is robust to variations.”Gaussian Splatting allows multiple scenario variations to be created from one real event.Volvo

    Volvo uses this system particularly to explore how small adjustments could prevent accidents. “Most of the work that we do is not about the crash itself,” says Coelingh. “It’s much more about what's happening 4-5 seconds before the crash or potential crash. The data we probe is from crashes, but it's also from events where our systems already did an intervention and in many cases those interventions come in time to prevent an accident and in some cases they come late and we only mitigated it. But all these scenarios are relevant because they happen in the real world, and they are types of edge case. These are rare, but through this technology of Gaussian Splatting, we can go from a few edge cases to suddenly many different edge cases and thereby test our system against those in a way that we previously could not.”
    Volvo’s Global Safety Focus
    This is increasingly important for addressing the huge variation in global driving habits and conditions a safety system will be expected to encounter. “Neural Nets are good at learning these types of patterns,” says Coelingh. “Humans can see that because of the behavior of a car the driver is talking into their phone, either slowing down or wiggling in the lane. If you have an end-to-end neural network using representations from camera images, LiDAR and radar, it will anticipate those kinds of things. We are probing data from cars all around the world where Volvo Cars are being driven.”
    The system acts preemptively, so it can perform a safety maneuver for example when a pedestrian appears suddenly in the path of the vehicle. “You have no time to react,” says Coelingh. Volvo’s safety system will be ready, however. “Even before that, the car already detects free space. It can do an auto steer and it’s a very small correction. It doesn't steer you out of lane. It doesn't jerk you around. It slows down a little bit and it does the correction. It's undramatic, but the impact is massive. Oncoming collisions are incredibly severe. Small adjustments can have big benefits.”Volvo's safety tech can detect pedestrians the human driver may not have seen.Volvo
    Volvo has developed one software platform to cover both safety and autonomy. “The software stack that we develop is being used in different ways,” says Coelingh. “We want the driver to drive manually undisturbed unless there’s a critical situation. Then we try to assist in the best possible way to avoid collision, either by warning, steering, auto braking or a combination of those. Then we also do cruising or L2 automation.”
    Volvo demonstrated how it has been using Gaussian Splatting at NVIDIA’s GTC in April. “We went deeply into the safe automation concept,” says Bakkenes. “Neural nets are good at picking up things that you can’t do in a rule-based system. We're developing one stack based on good fleet data which has end-to-end algorithms to achieve massive performance, and it has guard rails to make sure we manage hallucinations. It's not like we have a collision avoidance stack and then we have self-driving stack.”
    “There was a conscious decision that if we improve performance, then we want the benefits of that to be both for collision avoidance in manual driving and for self-driving,” says Coelingh. “We build everything from the same stack, but the stack itself is scalable. It’s one big neural network that we can train. But then there are parts that we can deploy separately to go from our core premium ADAS system all the way to a system that can do unsupervised automation. Volvo’s purpose is to get to zero collisions, saving lives. We use AI and all our energy to get there.”
    #volvo #gaussian #splatting #our #secret
    Volvo: Gaussian Splatting Is Our Secret Ingredient For Safer Cars
    The new ES90 electric car is the flagship of Volvo's latest digital safety tech.TT News Agency/AFP via Getty Images For decades, the Volvo brand has been synonymous with safety. But keeping passengers secure is no longer just about a strong cabin or cleverly designed crumple zones. Increasingly, safety is about semi-autonomous driving technology that can mitigate collisions or even avoid them entirely. Volvo intends to be ahead of the game in this era too. Its secret weapon? Something called “Gaussian Splatting”. I asked Volvo’s Head of Software Engineering Alwin Bakkenes and subsidiary Zenseact’s VP Product Erik Coelingh exactly what this is and why it’s so important. Volvo: Early Application Of Safety Data “We have a long history of innovations based on data,” says Bakkenes. “The accident research team from the 70s started with measuring tapes. Now in the digital world we’re collecting millions of real-life events. That data has helped us over the years to develop a three-point safety belt and the whiplash protection system. Now, we can see from the data we collect from fleets that a very large portion of serious accidents happen in the dark on country roads where vulnerable road users are involved. That’s why, with the ES90 that we just launched, we are also introducing a function called lighter AES where we have enabled the car to steer away from pedestrians walking on the side of the road or cyclists, which in the dark you can’t see even if you have your high beam on. This technology picks that up earlier than a human driver.” The Volvo EX90 SUV will also benefit from this technology. Volvo Cars uses AI and virtual worlds with the aim to create safer carsVolvo “If you want to lead in collision avoidance and self-driving, you need to have the best possible data from the real world,” adds Bakkenes. “But everyone is looking also at augmenting that with simulated data. The next step is fast automation, so we’re using state-of-the-art end-to-end models to achieve speed in iterations. But sometimes these models hallucinate. To avoid that, we use our 98 years of safety experience and these millions of data points as guardrails to make sure that the car behaves well because we believe that when you start to automate it needs to be trusted. For us every kilometer driven with Pilot Assist or Pilot Assist Plus needs to be safer than when you've driven it yourself. In the world of AI data is king. We use Gaussian Splatting to enhance our data set.” What Is Volvo’s Gaussian Splatting? “Cars are driven all around the world in different weather and traffic conditions by different people,” says Coelingh. “The variation is huge. We collect millions of data points, but it’s still a limited amount compared to reality. Gaussian Splatting is a new technology that some of our PhD students have been developing the last few years into a system where you can take a single data point from the real world where you have all the sensor, camera, radar and LIDAR sequences and then blow it up into thousands or tens of thousands of different scenarios. In that way, you can get a much better representation of the real world because we can test our software against this huge variation. If you do it in software, you can test much faster, so then you can iterate your software much more quickly and improve our product.” “Gaussian Splatting is used in different areas of AI,” continues Coelingh. “It comes from the neural radiance fields.” The original version worked with static images. “The first academic paper was about a drum kit where somebody took still pictures from different angles and then the neural net was trained on those pictures to create a 3D model. It looked perfect from any angle even though there was only a limited set of pictures available. Later that technology was expanded from 3D to 4D space-time, so you could also do it on the video set. We now do this not just with video data, but also with LiDAR and radar data.” A real-world event can be recreated from every angle. “We can start to manipulate other road users in this scenario. We can manipulate real world scenarios and do different simulations around this to make sure that our system is robust to variations.”Gaussian Splatting allows multiple scenario variations to be created from one real event.Volvo Volvo uses this system particularly to explore how small adjustments could prevent accidents. “Most of the work that we do is not about the crash itself,” says Coelingh. “It’s much more about what's happening 4-5 seconds before the crash or potential crash. The data we probe is from crashes, but it's also from events where our systems already did an intervention and in many cases those interventions come in time to prevent an accident and in some cases they come late and we only mitigated it. But all these scenarios are relevant because they happen in the real world, and they are types of edge case. These are rare, but through this technology of Gaussian Splatting, we can go from a few edge cases to suddenly many different edge cases and thereby test our system against those in a way that we previously could not.” Volvo’s Global Safety Focus This is increasingly important for addressing the huge variation in global driving habits and conditions a safety system will be expected to encounter. “Neural Nets are good at learning these types of patterns,” says Coelingh. “Humans can see that because of the behavior of a car the driver is talking into their phone, either slowing down or wiggling in the lane. If you have an end-to-end neural network using representations from camera images, LiDAR and radar, it will anticipate those kinds of things. We are probing data from cars all around the world where Volvo Cars are being driven.” The system acts preemptively, so it can perform a safety maneuver for example when a pedestrian appears suddenly in the path of the vehicle. “You have no time to react,” says Coelingh. Volvo’s safety system will be ready, however. “Even before that, the car already detects free space. It can do an auto steer and it’s a very small correction. It doesn't steer you out of lane. It doesn't jerk you around. It slows down a little bit and it does the correction. It's undramatic, but the impact is massive. Oncoming collisions are incredibly severe. Small adjustments can have big benefits.”Volvo's safety tech can detect pedestrians the human driver may not have seen.Volvo Volvo has developed one software platform to cover both safety and autonomy. “The software stack that we develop is being used in different ways,” says Coelingh. “We want the driver to drive manually undisturbed unless there’s a critical situation. Then we try to assist in the best possible way to avoid collision, either by warning, steering, auto braking or a combination of those. Then we also do cruising or L2 automation.” Volvo demonstrated how it has been using Gaussian Splatting at NVIDIA’s GTC in April. “We went deeply into the safe automation concept,” says Bakkenes. “Neural nets are good at picking up things that you can’t do in a rule-based system. We're developing one stack based on good fleet data which has end-to-end algorithms to achieve massive performance, and it has guard rails to make sure we manage hallucinations. It's not like we have a collision avoidance stack and then we have self-driving stack.” “There was a conscious decision that if we improve performance, then we want the benefits of that to be both for collision avoidance in manual driving and for self-driving,” says Coelingh. “We build everything from the same stack, but the stack itself is scalable. It’s one big neural network that we can train. But then there are parts that we can deploy separately to go from our core premium ADAS system all the way to a system that can do unsupervised automation. Volvo’s purpose is to get to zero collisions, saving lives. We use AI and all our energy to get there.” #volvo #gaussian #splatting #our #secret
    WWW.FORBES.COM
    Volvo: Gaussian Splatting Is Our Secret Ingredient For Safer Cars
    The new ES90 electric car is the flagship of Volvo's latest digital safety tech.TT News Agency/AFP via Getty Images For decades, the Volvo brand has been synonymous with safety. But keeping passengers secure is no longer just about a strong cabin or cleverly designed crumple zones. Increasingly, safety is about semi-autonomous driving technology that can mitigate collisions or even avoid them entirely. Volvo intends to be ahead of the game in this era too. Its secret weapon? Something called “Gaussian Splatting”. I asked Volvo’s Head of Software Engineering Alwin Bakkenes and subsidiary Zenseact’s VP Product Erik Coelingh exactly what this is and why it’s so important. Volvo: Early Application Of Safety Data “We have a long history of innovations based on data,” says Bakkenes. “The accident research team from the 70s started with measuring tapes. Now in the digital world we’re collecting millions of real-life events. That data has helped us over the years to develop a three-point safety belt and the whiplash protection system. Now, we can see from the data we collect from fleets that a very large portion of serious accidents happen in the dark on country roads where vulnerable road users are involved. That’s why, with the ES90 that we just launched, we are also introducing a function called lighter AES where we have enabled the car to steer away from pedestrians walking on the side of the road or cyclists, which in the dark you can’t see even if you have your high beam on. This technology picks that up earlier than a human driver.” The Volvo EX90 SUV will also benefit from this technology. Volvo Cars uses AI and virtual worlds with the aim to create safer carsVolvo “If you want to lead in collision avoidance and self-driving, you need to have the best possible data from the real world,” adds Bakkenes. “But everyone is looking also at augmenting that with simulated data. The next step is fast automation, so we’re using state-of-the-art end-to-end models to achieve speed in iterations. But sometimes these models hallucinate. To avoid that, we use our 98 years of safety experience and these millions of data points as guardrails to make sure that the car behaves well because we believe that when you start to automate it needs to be trusted. For us every kilometer driven with Pilot Assist or Pilot Assist Plus needs to be safer than when you've driven it yourself. In the world of AI data is king. We use Gaussian Splatting to enhance our data set.” What Is Volvo’s Gaussian Splatting? “Cars are driven all around the world in different weather and traffic conditions by different people,” says Coelingh. “The variation is huge. We collect millions of data points, but it’s still a limited amount compared to reality. Gaussian Splatting is a new technology that some of our PhD students have been developing the last few years into a system where you can take a single data point from the real world where you have all the sensor, camera, radar and LIDAR sequences and then blow it up into thousands or tens of thousands of different scenarios. In that way, you can get a much better representation of the real world because we can test our software against this huge variation. If you do it in software, you can test much faster, so then you can iterate your software much more quickly and improve our product.” “Gaussian Splatting is used in different areas of AI,” continues Coelingh. “It comes from the neural radiance fields (NeRFs).” The original version worked with static images. “The first academic paper was about a drum kit where somebody took still pictures from different angles and then the neural net was trained on those pictures to create a 3D model. It looked perfect from any angle even though there was only a limited set of pictures available. Later that technology was expanded from 3D to 4D space-time, so you could also do it on the video set. We now do this not just with video data, but also with LiDAR and radar data.” A real-world event can be recreated from every angle. “We can start to manipulate other road users in this scenario. We can manipulate real world scenarios and do different simulations around this to make sure that our system is robust to variations.”Gaussian Splatting allows multiple scenario variations to be created from one real event.Volvo Volvo uses this system particularly to explore how small adjustments could prevent accidents. “Most of the work that we do is not about the crash itself,” says Coelingh. “It’s much more about what's happening 4-5 seconds before the crash or potential crash. The data we probe is from crashes, but it's also from events where our systems already did an intervention and in many cases those interventions come in time to prevent an accident and in some cases they come late and we only mitigated it. But all these scenarios are relevant because they happen in the real world, and they are types of edge case. These are rare, but through this technology of Gaussian Splatting, we can go from a few edge cases to suddenly many different edge cases and thereby test our system against those in a way that we previously could not.” Volvo’s Global Safety Focus This is increasingly important for addressing the huge variation in global driving habits and conditions a safety system will be expected to encounter. “Neural Nets are good at learning these types of patterns,” says Coelingh. “Humans can see that because of the behavior of a car the driver is talking into their phone, either slowing down or wiggling in the lane. If you have an end-to-end neural network using representations from camera images, LiDAR and radar, it will anticipate those kinds of things. We are probing data from cars all around the world where Volvo Cars are being driven.” The system acts preemptively, so it can perform a safety maneuver for example when a pedestrian appears suddenly in the path of the vehicle. “You have no time to react,” says Coelingh. Volvo’s safety system will be ready, however. “Even before that, the car already detects free space. It can do an auto steer and it’s a very small correction. It doesn't steer you out of lane. It doesn't jerk you around. It slows down a little bit and it does the correction. It's undramatic, but the impact is massive. Oncoming collisions are incredibly severe. Small adjustments can have big benefits.”Volvo's safety tech can detect pedestrians the human driver may not have seen.Volvo Volvo has developed one software platform to cover both safety and autonomy. “The software stack that we develop is being used in different ways,” says Coelingh. “We want the driver to drive manually undisturbed unless there’s a critical situation. Then we try to assist in the best possible way to avoid collision, either by warning, steering, auto braking or a combination of those. Then we also do cruising or L2 automation.” Volvo demonstrated how it has been using Gaussian Splatting at NVIDIA’s GTC in April. “We went deeply into the safe automation concept,” says Bakkenes. “Neural nets are good at picking up things that you can’t do in a rule-based system. We're developing one stack based on good fleet data which has end-to-end algorithms to achieve massive performance, and it has guard rails to make sure we manage hallucinations. It's not like we have a collision avoidance stack and then we have self-driving stack.” “There was a conscious decision that if we improve performance, then we want the benefits of that to be both for collision avoidance in manual driving and for self-driving,” says Coelingh. “We build everything from the same stack, but the stack itself is scalable. It’s one big neural network that we can train. But then there are parts that we can deploy separately to go from our core premium ADAS system all the way to a system that can do unsupervised automation. Volvo’s purpose is to get to zero collisions, saving lives. We use AI and all our energy to get there.”
    0 Comentários 0 Compartilhamentos
  • Elon’s DOGE Is Reportedly Using Grok AI With Government Data

    Reuters reports that Elon Musk’s annoying chatbot, Grok, is now being used by the U.S. government. While the extent and nature of that usage is unclear, sources interviewed by the news outlet have expressed alarm at the implications of the chatbot’s access to government data. Grok was launched by xAI, an AI company founded by Musk in 2023,  and has since become integrated into Musk’s social media platform, X. The chatbot is known to summarize information in the most cringe-inducing manner possible, and was originally fashioned as an “anti-woke” antidote to ChatGPT and other more politically correct applications. Musk’s Department of Government Efficiency team is now using a customized version of Grok, with the apparent goal of sorting and analyzing tranches of data. The team may also be using the chatbot to prepare reports, sources told the outlet.

    Aside from the very obvious data privacy concerns raised by Grok’s integration with government data, it appears that, once again, Musk is at the center of a conflict-of-interest violation. In fact, Reuters characterizes the promotion of Grok as a potentially criminal transgression of federal regulations. The outlet writes: If Musk was directly involved in decisions to use Grok, it could violate a criminal conflict-of-interest statute which bars officials — including special government employees — from participating in matters that could benefit them financially, said Richard Painter, ethics counsel to former Republican President George W. Bush and a University of Minnesota professor. “This gives the appearance that DOGE is pressuring agencies to use software to enrich Musk and xAI, and not to the benefit of the American people,” said Painter. The statute is rarely prosecuted but can result in fines or jail time. Yes, but how many times have we heard that one before? Elon has conflicts of interest up the wazoo. He is a walking conflict of interest, at this point. To my knowledge, he’s never seen the interior of a courtroom and, unless he gets caught with a dead body or something, it seems doubtful he ever will.

    Ever since Musk helped Trump get re-elected with hundreds of millions from his own piggybank, he’s has been treating the U.S. government like his personal plaything to destroy. Everywhere you look, the billionaire appears to be benefiting from his work with the government, whether it’s the White House bullying tariffed countries to adopt services from the billionaire’s satellite internet company, Starlink, or a new report that shows the billionaire’s companies may have saved nearly billion from federal fines and penalties that were active under Biden but have since been “neutralized” in the Trump era. As far as DOGE’s mandate goes, the organization has been an unmitigated failure. It has barely saved a fraction of the money that Musk initially claimed that it would and, in the long term, the cuts are likely to cost Americans money, since many of them have been to important agencies that dispense key services to Americans.
    #elons #doge #reportedly #using #grok
    Elon’s DOGE Is Reportedly Using Grok AI With Government Data
    Reuters reports that Elon Musk’s annoying chatbot, Grok, is now being used by the U.S. government. While the extent and nature of that usage is unclear, sources interviewed by the news outlet have expressed alarm at the implications of the chatbot’s access to government data. Grok was launched by xAI, an AI company founded by Musk in 2023,  and has since become integrated into Musk’s social media platform, X. The chatbot is known to summarize information in the most cringe-inducing manner possible, and was originally fashioned as an “anti-woke” antidote to ChatGPT and other more politically correct applications. Musk’s Department of Government Efficiency team is now using a customized version of Grok, with the apparent goal of sorting and analyzing tranches of data. The team may also be using the chatbot to prepare reports, sources told the outlet. Aside from the very obvious data privacy concerns raised by Grok’s integration with government data, it appears that, once again, Musk is at the center of a conflict-of-interest violation. In fact, Reuters characterizes the promotion of Grok as a potentially criminal transgression of federal regulations. The outlet writes: If Musk was directly involved in decisions to use Grok, it could violate a criminal conflict-of-interest statute which bars officials — including special government employees — from participating in matters that could benefit them financially, said Richard Painter, ethics counsel to former Republican President George W. Bush and a University of Minnesota professor. “This gives the appearance that DOGE is pressuring agencies to use software to enrich Musk and xAI, and not to the benefit of the American people,” said Painter. The statute is rarely prosecuted but can result in fines or jail time. Yes, but how many times have we heard that one before? Elon has conflicts of interest up the wazoo. He is a walking conflict of interest, at this point. To my knowledge, he’s never seen the interior of a courtroom and, unless he gets caught with a dead body or something, it seems doubtful he ever will. Ever since Musk helped Trump get re-elected with hundreds of millions from his own piggybank, he’s has been treating the U.S. government like his personal plaything to destroy. Everywhere you look, the billionaire appears to be benefiting from his work with the government, whether it’s the White House bullying tariffed countries to adopt services from the billionaire’s satellite internet company, Starlink, or a new report that shows the billionaire’s companies may have saved nearly billion from federal fines and penalties that were active under Biden but have since been “neutralized” in the Trump era. As far as DOGE’s mandate goes, the organization has been an unmitigated failure. It has barely saved a fraction of the money that Musk initially claimed that it would and, in the long term, the cuts are likely to cost Americans money, since many of them have been to important agencies that dispense key services to Americans. #elons #doge #reportedly #using #grok
    GIZMODO.COM
    Elon’s DOGE Is Reportedly Using Grok AI With Government Data
    Reuters reports that Elon Musk’s annoying chatbot, Grok, is now being used by the U.S. government. While the extent and nature of that usage is unclear, sources interviewed by the news outlet have expressed alarm at the implications of the chatbot’s access to government data. Grok was launched by xAI, an AI company founded by Musk in 2023,  and has since become integrated into Musk’s social media platform, X. The chatbot is known to summarize information in the most cringe-inducing manner possible, and was originally fashioned as an “anti-woke” antidote to ChatGPT and other more politically correct applications (though it’s turned out to be too woke for conservatives anyway). Musk’s Department of Government Efficiency team is now using a customized version of Grok, with the apparent goal of sorting and analyzing tranches of data. The team may also be using the chatbot to prepare reports, sources told the outlet. Aside from the very obvious data privacy concerns raised by Grok’s integration with government data, it appears that, once again, Musk is at the center of a conflict-of-interest violation. In fact, Reuters characterizes the promotion of Grok as a potentially criminal transgression of federal regulations. The outlet writes: If Musk was directly involved in decisions to use Grok, it could violate a criminal conflict-of-interest statute which bars officials — including special government employees — from participating in matters that could benefit them financially, said Richard Painter, ethics counsel to former Republican President George W. Bush and a University of Minnesota professor. “This gives the appearance that DOGE is pressuring agencies to use software to enrich Musk and xAI, and not to the benefit of the American people,” said Painter. The statute is rarely prosecuted but can result in fines or jail time. Yes, but how many times have we heard that one before? Elon has conflicts of interest up the wazoo. He is a walking conflict of interest, at this point. To my knowledge, he’s never seen the interior of a courtroom and, unless he gets caught with a dead body or something, it seems doubtful he ever will. Ever since Musk helped Trump get re-elected with hundreds of millions from his own piggybank, he’s has been treating the U.S. government like his personal plaything to destroy. Everywhere you look, the billionaire appears to be benefiting from his work with the government, whether it’s the White House bullying tariffed countries to adopt services from the billionaire’s satellite internet company, Starlink, or a new report that shows the billionaire’s companies may have saved nearly $2.37 billion from federal fines and penalties that were active under Biden but have since been “neutralized” in the Trump era. As far as DOGE’s mandate goes, the organization has been an unmitigated failure. It has barely saved a fraction of the money that Musk initially claimed that it would and, in the long term, the cuts are likely to cost Americans money, since many of them have been to important agencies that dispense key services to Americans.
    0 Comentários 0 Compartilhamentos
  • Securing CI/CD workflows with Wazuh

    Continuous Integration and Continuous Delivery/Deploymentrefers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code is consistently tested, built, and deployed quickly and efficiently.
    While CI/CD automation accelerates software delivery, it can also introduce security risks. Without proper security measures, CI/CD workflows can be vulnerable to supply chain attacks, insecure dependencies, and insider threats. To mitigate these risks, organizations must integrate measures for continuous monitoring and enforcing security best practices at every pipeline stage. Securing CI/CD workflows preserves the software delivery process's confidentiality, integrity, and availability.
    Security challenges and risks in CI/CD workflows
    While CI/CD workflows offer benefits in terms of automation and speed, they also bring unique security challenges that must be addressed to maintain the integrity of the development process. Some common challenges and risks include:
    Lack of visibility and inadequate security monitoring: CI/CD workflows involve multiple tools and stages, which make it challenging to maintain security visibility into potential threats. Vulnerabilities, especially in third-party libraries or containerized applications, can introduce security risks that go undetected if not correctly managed. Without centralized monitoring, real-time threat detection and response become difficult. Manual, reactive incident response increases the risk of exploitation. Compliance requirements: Meeting regulatory standards such as GDPR or HIPAA while maintaining fast deployment cycles can be challenging. Organizations must balance enforcing security policies, data protection, and compliance requirements without slowing down their CI/CD workflows.Code and dependency vulnerabilities: Unpatched or outdated dependencies in the workflow can introduce significant security risks. Third-party libraries or outdated packages can become attack vectors if not regularly updated and monitored for vulnerabilities. These risks are increased by the fast pace of CI/CD, where vulnerabilities may go untreated.Container vulnerabilities and image security: While containers are mainly used in CI/CD workflows, they are not safe from security risks. Vulnerabilities in container images, such as outdated software versions, misconfigurations, or insecure base images, present a risk in CI/CD workflows and can be exploited by attackers. Without proper scanning and validation, these weaknesses can propagate through the pipeline.Misconfiguration of CI/CD tools: Improper configuration of CI/CD tools can leave the workflow open to unauthorized access or unintentionally expose sensitive code. Misconfigurations in access control settings can increase the likelihood of privilege escalation or code exposure. Additionally, hardcoded credentials or mismanaged environment variables introduce a risk of being extracted by attackers, which could lead to data breaches.Supply chain attacks: Compromised third-party dependencies can introduce malicious packages or vulnerabilities into the workflow. These vulnerabilities can spread throughout the entire pipeline and infect production environments, primarily when third-party tools or libraries are not sufficiently validated.Insider threats: Insider threats in CI/CD workflows involve authorized users such as developers, DevOps engineers, system administrators, or third-party contractors, who may intentionally or unintentionally compromise the pipeline. Weak authentication mechanisms, inadequate access controls, and a lack of monitoring can increase the risk of unauthorized changes, credential theft, or the introduction of malicious code into the workflow.Enhancing CI/CD workflow security with Wazuh
    Wazuh is an open source security platform that offers unified XDR and SIEM capabilities for on-premises, containerized, virtualized, and cloud-based environments. Wazuh provides flexibility in threat detection, compliance, incident handling, and third-party integration. Organizations can implement Wazuh to address the challenges and mitigate the risks associated with CI/CD workflow security. Below are some ways Wazuh helps improve security in CI/CD workflows.
    Log collection and system monitoring
    Wazuh provides log collection and analysis capabilities to ensure the components of your CI/CD environment are continuously monitored for security threats. It collects and analyzes logs from various CI/CD pipeline components, including servers, containerization and orchestration tools such as Docker and Kubernetes, and version control systems like GitHub. This allows security teams to monitor for unusual activities, unauthorized access, or security breaches across the CI/CD environment.
    Additionally, the Wazuh File Integrity Monitoringcapability can detect unauthorized changes in code or configuration files. By monitoring files in real time or on a schedule, Wazuh generates alerts for security teams about file activities like creation, deletion, or modification.
    Figure 1: Wazuh dashboard showing File Integrity Monitoringalerts.
    Custom rules and streamlined security monitoring
    Wazuh allows users to create custom rules and alerts that align with a pipeline's security requirements. Organizations can create custom rules matching their specific security needs, such as monitoring code changes, server configurations, or container images. This flexibility allows organizations to enforce granular security controls tailored to their CI/CD workflow.
    For instance, the Center for Internet SecurityDocker Benchmark provides guidelines for securing Docker environments. Organizations can automate the compliance checks against CIS Docker Benchmark v1.7.0 using the Wazuh Security Configuration Assessmentcapability.
    Figure 2: Wazuh dashboard showing Wazuh Security configuration assessmentresults.
    Integration with third-party security tools
    Wazuh can integrate with various security tools and platforms, including container vulnerability scanners and CI/CD orchestration systems. This is particularly important in CI/CD workflows, where multiple tools may be used to manage the development lifecycle. Wazuh can pull in data from various sources, which helps to provide a centralized view of security across the pipeline.
    For instance, Wazuh integrates with container vulnerability scanning tools Trivy and Grype, which are commonly used to scan container images for vulnerabilities, insecure base images, or outdated software versions. By scanning container images before they are deployed into production, organizations can ensure that only secure, up-to-date images are used in the deployment processes.
    You can configure the Wazuh Command module to run a Trivy scan on an endpoint hosting container images and display any detected vulnerabilities in the Wazuh dashboard. This helps to ensure that insecure images are identified and prevented from being pushed into production.
    Figure 3: Wazuh dashboard displaying vulnerabilities discovered on container images from a Trivy scan.
    Automated incident response
    The speed of CI/CD workflows means that threats must be detected and mitigated quickly to minimize the risk of breaches or downtime. Wazuh provides incident response capabilities that help organizations respond to security incidents as soon as they occur.
    The Wazuh Active Response module can automatically take action when a security threat is detected. For example, suppose a malicious IP address is detected trying to access a system that runs CI/CD processes. In that case, Wazuh can automatically block the IP address and trigger predefined remediation actions. This automation ensures fast response, reduces manual intervention, and prevents potential threats from escalating.
    Conclusion
    Securing CI/CD workflows is important for maintaining a reliable and safe software development process. By using Wazuh, organizations can detect vulnerabilities early, monitor for anomalies, enforce compliance, and automate security responses while maintaining the speed and efficiency of CI/CD workflows. Integrating Wazuh into your CI/CD workflow ensures that security keeps pace with development speed.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    #securing #cicd #workflows #with #wazuh
    Securing CI/CD workflows with Wazuh
    Continuous Integration and Continuous Delivery/Deploymentrefers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code is consistently tested, built, and deployed quickly and efficiently. While CI/CD automation accelerates software delivery, it can also introduce security risks. Without proper security measures, CI/CD workflows can be vulnerable to supply chain attacks, insecure dependencies, and insider threats. To mitigate these risks, organizations must integrate measures for continuous monitoring and enforcing security best practices at every pipeline stage. Securing CI/CD workflows preserves the software delivery process's confidentiality, integrity, and availability. Security challenges and risks in CI/CD workflows While CI/CD workflows offer benefits in terms of automation and speed, they also bring unique security challenges that must be addressed to maintain the integrity of the development process. Some common challenges and risks include: Lack of visibility and inadequate security monitoring: CI/CD workflows involve multiple tools and stages, which make it challenging to maintain security visibility into potential threats. Vulnerabilities, especially in third-party libraries or containerized applications, can introduce security risks that go undetected if not correctly managed. Without centralized monitoring, real-time threat detection and response become difficult. Manual, reactive incident response increases the risk of exploitation. Compliance requirements: Meeting regulatory standards such as GDPR or HIPAA while maintaining fast deployment cycles can be challenging. Organizations must balance enforcing security policies, data protection, and compliance requirements without slowing down their CI/CD workflows.Code and dependency vulnerabilities: Unpatched or outdated dependencies in the workflow can introduce significant security risks. Third-party libraries or outdated packages can become attack vectors if not regularly updated and monitored for vulnerabilities. These risks are increased by the fast pace of CI/CD, where vulnerabilities may go untreated.Container vulnerabilities and image security: While containers are mainly used in CI/CD workflows, they are not safe from security risks. Vulnerabilities in container images, such as outdated software versions, misconfigurations, or insecure base images, present a risk in CI/CD workflows and can be exploited by attackers. Without proper scanning and validation, these weaknesses can propagate through the pipeline.Misconfiguration of CI/CD tools: Improper configuration of CI/CD tools can leave the workflow open to unauthorized access or unintentionally expose sensitive code. Misconfigurations in access control settings can increase the likelihood of privilege escalation or code exposure. Additionally, hardcoded credentials or mismanaged environment variables introduce a risk of being extracted by attackers, which could lead to data breaches.Supply chain attacks: Compromised third-party dependencies can introduce malicious packages or vulnerabilities into the workflow. These vulnerabilities can spread throughout the entire pipeline and infect production environments, primarily when third-party tools or libraries are not sufficiently validated.Insider threats: Insider threats in CI/CD workflows involve authorized users such as developers, DevOps engineers, system administrators, or third-party contractors, who may intentionally or unintentionally compromise the pipeline. Weak authentication mechanisms, inadequate access controls, and a lack of monitoring can increase the risk of unauthorized changes, credential theft, or the introduction of malicious code into the workflow.Enhancing CI/CD workflow security with Wazuh Wazuh is an open source security platform that offers unified XDR and SIEM capabilities for on-premises, containerized, virtualized, and cloud-based environments. Wazuh provides flexibility in threat detection, compliance, incident handling, and third-party integration. Organizations can implement Wazuh to address the challenges and mitigate the risks associated with CI/CD workflow security. Below are some ways Wazuh helps improve security in CI/CD workflows. Log collection and system monitoring Wazuh provides log collection and analysis capabilities to ensure the components of your CI/CD environment are continuously monitored for security threats. It collects and analyzes logs from various CI/CD pipeline components, including servers, containerization and orchestration tools such as Docker and Kubernetes, and version control systems like GitHub. This allows security teams to monitor for unusual activities, unauthorized access, or security breaches across the CI/CD environment. Additionally, the Wazuh File Integrity Monitoringcapability can detect unauthorized changes in code or configuration files. By monitoring files in real time or on a schedule, Wazuh generates alerts for security teams about file activities like creation, deletion, or modification. Figure 1: Wazuh dashboard showing File Integrity Monitoringalerts. Custom rules and streamlined security monitoring Wazuh allows users to create custom rules and alerts that align with a pipeline's security requirements. Organizations can create custom rules matching their specific security needs, such as monitoring code changes, server configurations, or container images. This flexibility allows organizations to enforce granular security controls tailored to their CI/CD workflow. For instance, the Center for Internet SecurityDocker Benchmark provides guidelines for securing Docker environments. Organizations can automate the compliance checks against CIS Docker Benchmark v1.7.0 using the Wazuh Security Configuration Assessmentcapability. Figure 2: Wazuh dashboard showing Wazuh Security configuration assessmentresults. Integration with third-party security tools Wazuh can integrate with various security tools and platforms, including container vulnerability scanners and CI/CD orchestration systems. This is particularly important in CI/CD workflows, where multiple tools may be used to manage the development lifecycle. Wazuh can pull in data from various sources, which helps to provide a centralized view of security across the pipeline. For instance, Wazuh integrates with container vulnerability scanning tools Trivy and Grype, which are commonly used to scan container images for vulnerabilities, insecure base images, or outdated software versions. By scanning container images before they are deployed into production, organizations can ensure that only secure, up-to-date images are used in the deployment processes. You can configure the Wazuh Command module to run a Trivy scan on an endpoint hosting container images and display any detected vulnerabilities in the Wazuh dashboard. This helps to ensure that insecure images are identified and prevented from being pushed into production. Figure 3: Wazuh dashboard displaying vulnerabilities discovered on container images from a Trivy scan. Automated incident response The speed of CI/CD workflows means that threats must be detected and mitigated quickly to minimize the risk of breaches or downtime. Wazuh provides incident response capabilities that help organizations respond to security incidents as soon as they occur. The Wazuh Active Response module can automatically take action when a security threat is detected. For example, suppose a malicious IP address is detected trying to access a system that runs CI/CD processes. In that case, Wazuh can automatically block the IP address and trigger predefined remediation actions. This automation ensures fast response, reduces manual intervention, and prevents potential threats from escalating. Conclusion Securing CI/CD workflows is important for maintaining a reliable and safe software development process. By using Wazuh, organizations can detect vulnerabilities early, monitor for anomalies, enforce compliance, and automate security responses while maintaining the speed and efficiency of CI/CD workflows. Integrating Wazuh into your CI/CD workflow ensures that security keeps pace with development speed. Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post. #securing #cicd #workflows #with #wazuh
    THEHACKERNEWS.COM
    Securing CI/CD workflows with Wazuh
    Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code is consistently tested, built, and deployed quickly and efficiently. While CI/CD automation accelerates software delivery, it can also introduce security risks. Without proper security measures, CI/CD workflows can be vulnerable to supply chain attacks, insecure dependencies, and insider threats. To mitigate these risks, organizations must integrate measures for continuous monitoring and enforcing security best practices at every pipeline stage. Securing CI/CD workflows preserves the software delivery process's confidentiality, integrity, and availability. Security challenges and risks in CI/CD workflows While CI/CD workflows offer benefits in terms of automation and speed, they also bring unique security challenges that must be addressed to maintain the integrity of the development process. Some common challenges and risks include: Lack of visibility and inadequate security monitoring: CI/CD workflows involve multiple tools and stages, which make it challenging to maintain security visibility into potential threats. Vulnerabilities, especially in third-party libraries or containerized applications, can introduce security risks that go undetected if not correctly managed. Without centralized monitoring, real-time threat detection and response become difficult. Manual, reactive incident response increases the risk of exploitation. Compliance requirements: Meeting regulatory standards such as GDPR or HIPAA while maintaining fast deployment cycles can be challenging. Organizations must balance enforcing security policies, data protection, and compliance requirements without slowing down their CI/CD workflows.Code and dependency vulnerabilities: Unpatched or outdated dependencies in the workflow can introduce significant security risks. Third-party libraries or outdated packages can become attack vectors if not regularly updated and monitored for vulnerabilities. These risks are increased by the fast pace of CI/CD, where vulnerabilities may go untreated.Container vulnerabilities and image security: While containers are mainly used in CI/CD workflows, they are not safe from security risks. Vulnerabilities in container images, such as outdated software versions, misconfigurations, or insecure base images, present a risk in CI/CD workflows and can be exploited by attackers. Without proper scanning and validation, these weaknesses can propagate through the pipeline.Misconfiguration of CI/CD tools: Improper configuration of CI/CD tools can leave the workflow open to unauthorized access or unintentionally expose sensitive code. Misconfigurations in access control settings can increase the likelihood of privilege escalation or code exposure. Additionally, hardcoded credentials or mismanaged environment variables introduce a risk of being extracted by attackers, which could lead to data breaches.Supply chain attacks: Compromised third-party dependencies can introduce malicious packages or vulnerabilities into the workflow. These vulnerabilities can spread throughout the entire pipeline and infect production environments, primarily when third-party tools or libraries are not sufficiently validated.Insider threats: Insider threats in CI/CD workflows involve authorized users such as developers, DevOps engineers, system administrators, or third-party contractors, who may intentionally or unintentionally compromise the pipeline. Weak authentication mechanisms, inadequate access controls, and a lack of monitoring can increase the risk of unauthorized changes, credential theft, or the introduction of malicious code into the workflow.Enhancing CI/CD workflow security with Wazuh Wazuh is an open source security platform that offers unified XDR and SIEM capabilities for on-premises, containerized, virtualized, and cloud-based environments. Wazuh provides flexibility in threat detection, compliance, incident handling, and third-party integration. Organizations can implement Wazuh to address the challenges and mitigate the risks associated with CI/CD workflow security. Below are some ways Wazuh helps improve security in CI/CD workflows. Log collection and system monitoring Wazuh provides log collection and analysis capabilities to ensure the components of your CI/CD environment are continuously monitored for security threats. It collects and analyzes logs from various CI/CD pipeline components, including servers, containerization and orchestration tools such as Docker and Kubernetes, and version control systems like GitHub. This allows security teams to monitor for unusual activities, unauthorized access, or security breaches across the CI/CD environment. Additionally, the Wazuh File Integrity Monitoring (FIM) capability can detect unauthorized changes in code or configuration files. By monitoring files in real time or on a schedule, Wazuh generates alerts for security teams about file activities like creation, deletion, or modification. Figure 1: Wazuh dashboard showing File Integrity Monitoring (FIM) alerts. Custom rules and streamlined security monitoring Wazuh allows users to create custom rules and alerts that align with a pipeline's security requirements. Organizations can create custom rules matching their specific security needs, such as monitoring code changes, server configurations, or container images. This flexibility allows organizations to enforce granular security controls tailored to their CI/CD workflow. For instance, the Center for Internet Security (CIS) Docker Benchmark provides guidelines for securing Docker environments. Organizations can automate the compliance checks against CIS Docker Benchmark v1.7.0 using the Wazuh Security Configuration Assessment (SCA) capability. Figure 2: Wazuh dashboard showing Wazuh Security configuration assessment (SCA) results. Integration with third-party security tools Wazuh can integrate with various security tools and platforms, including container vulnerability scanners and CI/CD orchestration systems. This is particularly important in CI/CD workflows, where multiple tools may be used to manage the development lifecycle. Wazuh can pull in data from various sources, which helps to provide a centralized view of security across the pipeline. For instance, Wazuh integrates with container vulnerability scanning tools Trivy and Grype, which are commonly used to scan container images for vulnerabilities, insecure base images, or outdated software versions. By scanning container images before they are deployed into production, organizations can ensure that only secure, up-to-date images are used in the deployment processes. You can configure the Wazuh Command module to run a Trivy scan on an endpoint hosting container images and display any detected vulnerabilities in the Wazuh dashboard. This helps to ensure that insecure images are identified and prevented from being pushed into production. Figure 3: Wazuh dashboard displaying vulnerabilities discovered on container images from a Trivy scan. Automated incident response The speed of CI/CD workflows means that threats must be detected and mitigated quickly to minimize the risk of breaches or downtime. Wazuh provides incident response capabilities that help organizations respond to security incidents as soon as they occur. The Wazuh Active Response module can automatically take action when a security threat is detected. For example, suppose a malicious IP address is detected trying to access a system that runs CI/CD processes. In that case, Wazuh can automatically block the IP address and trigger predefined remediation actions. This automation ensures fast response, reduces manual intervention, and prevents potential threats from escalating. Conclusion Securing CI/CD workflows is important for maintaining a reliable and safe software development process. By using Wazuh, organizations can detect vulnerabilities early, monitor for anomalies, enforce compliance, and automate security responses while maintaining the speed and efficiency of CI/CD workflows. Integrating Wazuh into your CI/CD workflow ensures that security keeps pace with development speed. Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    0 Comentários 0 Compartilhamentos
  • UKAEA Selects Kingsbury and Additure for Fusion Energy Additive Manufacturing Project

    UK-based engineering equipment supplier Kingsbury and metal additive manufacturing company Additure have been appointed by the UK Atomic Energy Authorityto supply additive manufacturing technology and expertise as part of the UK’s ongoing efforts to advance fusion energy research. The partnership will support the development of components designed to endure the extreme conditions within fusion reactors, with a focus on innovative materials and design approaches.
    A key area of focus involves the use of tungsten—layered with materials such as copper—to achieve the necessary durability. To support this work, Kingsbury and Additure will deliver and install a Nikon SLM Solutions SLM 280 2.0 Laser Powder Bed Fusionsystem at UKAEA’s facilities.
    “We are excited to support the team at the UKAEA as they scale, not just with the SLM 280’s LPBF capability, but with all the key elements of the AM ecosystem to make this a robust manufacturing solution for UKAEA and the UK’s fusion programme,” said Will Priest, Business Development Manager at Additure.
    The SLM 280 Production Series system. Image via Nikon SLM Solutions.
    About UKAEA
    The UK Atomic Energy Authorityis the United Kingdom’s national fusion energy research organisation. It operates as an executive non-departmental public body, sponsored by the Department for Energy Security and Net Zero. A key part of its mission involves fostering industrial fusion capability by working with manufacturers and supply chains to introduce and scale the technologies required for commercial fusion energy deployment.
    “The UKAEA aims to develop the commercialisation of additive manufacturing and support UK industry in the transition into the fusion energy sector. We conduct the complex areas of research and development to the point where it becomes commercially viable, the advice and support of our supply chain is hugely valuable in expediting this process,” said Roy Marshall, Head of Operations for Fabrication, Installation, and Maintenance at UKAEA.
    JET interior with super imposed plasma. Image via UK Atomic Energy Authority.
    Additure’s Role and Technology Contribution
    At the center of this initiative is the SLM 280 2.0, an LPBF system designed for high-performance applications, including the development of refractory metals. The system offers build speeds up to 80% faster than single-laser alternatives and includes integrated safety features such as a powder sieve module and system cooling enhancements.
    Beyond equipment delivery, Additure is also providing comprehensive technical training to UKAEA’s research, materials, and design teams. This includes detailed guidance on machine setup, build optimization, and specialized functions—such as a heated reduced build volume.
    “The applications training from Additure will provide our engineers with new ways to design some of the complex structures required by fusion and allow them to do this using some of the most challenging materials to work with. For additive manufacture to contribute to fusion energy, more designers need to think, ‘What process is most suitable for the desired thermal or structural performance?’ And ‘how do I create a design that is best optimised for additive manufacture?’”, said Mr. Marshall.
    Advancing Laser Beam Shaping 3D Printing 
    Given its notable advantages for industrial metal 3D printing, beam shaping capabilities are being developed and commercialized by several players in the research and LPBF 3D printing spheres. In 2024, German research organization Fraunhofer Institute for Laser Technology ILT showcased its new 3D printing beam shaping technology. Working with the Chair of Technology of Optical Systemsat RWTH Aachen University, the new platform, the Fraunhofer team is developing a test system for investigating complex laser beam profiles. 
    This platform can create customized beam profiles for laser powder bed fusion3D printing, enhancing part quality, process stability and productivity, while minimizing material waste. 
    In 2022, Equispheres and Aconity3D used laser beam-shaping 3D printing to achieve build rates nearly nine times higher than industry norms. Equispheres’ NExP-1 aluminum powder was used with Aconity3D’s AconityMIDI+ LPBF 3D printer to unlock speeds exceeding 430 cm3/hr for a single laser. 
    The system was modified to employ a PG YLR 3000/1000-AM laser with beam-shaping capabilities. By using a shaped beam over a zoomed Gaussian profile, the team reduced overheating and mitigated spatter formation during high-speed 3D printing. 
    Take the 3DPIReader Survey — shape the future of AM reporting in under 5 minutes.
    Who won the 2024 3D Printing Industry Awards?
    Subscribe to the3D Printing Industry newsletter to keep up with the latest 3D printing news.
    You can also follow us on LinkedIn, and subscribe to the 3D Printing Industry Youtube channel to access more exclusive content.
    Featured image shows JET interior with super imposed plasma. Image via UK Atomic Energy Authority.
    #ukaea #selects #kingsbury #additure #fusion
    UKAEA Selects Kingsbury and Additure for Fusion Energy Additive Manufacturing Project
    UK-based engineering equipment supplier Kingsbury and metal additive manufacturing company Additure have been appointed by the UK Atomic Energy Authorityto supply additive manufacturing technology and expertise as part of the UK’s ongoing efforts to advance fusion energy research. The partnership will support the development of components designed to endure the extreme conditions within fusion reactors, with a focus on innovative materials and design approaches. A key area of focus involves the use of tungsten—layered with materials such as copper—to achieve the necessary durability. To support this work, Kingsbury and Additure will deliver and install a Nikon SLM Solutions SLM 280 2.0 Laser Powder Bed Fusionsystem at UKAEA’s facilities. “We are excited to support the team at the UKAEA as they scale, not just with the SLM 280’s LPBF capability, but with all the key elements of the AM ecosystem to make this a robust manufacturing solution for UKAEA and the UK’s fusion programme,” said Will Priest, Business Development Manager at Additure. The SLM 280 Production Series system. Image via Nikon SLM Solutions. About UKAEA The UK Atomic Energy Authorityis the United Kingdom’s national fusion energy research organisation. It operates as an executive non-departmental public body, sponsored by the Department for Energy Security and Net Zero. A key part of its mission involves fostering industrial fusion capability by working with manufacturers and supply chains to introduce and scale the technologies required for commercial fusion energy deployment. “The UKAEA aims to develop the commercialisation of additive manufacturing and support UK industry in the transition into the fusion energy sector. We conduct the complex areas of research and development to the point where it becomes commercially viable, the advice and support of our supply chain is hugely valuable in expediting this process,” said Roy Marshall, Head of Operations for Fabrication, Installation, and Maintenance at UKAEA. JET interior with super imposed plasma. Image via UK Atomic Energy Authority. Additure’s Role and Technology Contribution At the center of this initiative is the SLM 280 2.0, an LPBF system designed for high-performance applications, including the development of refractory metals. The system offers build speeds up to 80% faster than single-laser alternatives and includes integrated safety features such as a powder sieve module and system cooling enhancements. Beyond equipment delivery, Additure is also providing comprehensive technical training to UKAEA’s research, materials, and design teams. This includes detailed guidance on machine setup, build optimization, and specialized functions—such as a heated reduced build volume. “The applications training from Additure will provide our engineers with new ways to design some of the complex structures required by fusion and allow them to do this using some of the most challenging materials to work with. For additive manufacture to contribute to fusion energy, more designers need to think, ‘What process is most suitable for the desired thermal or structural performance?’ And ‘how do I create a design that is best optimised for additive manufacture?’”, said Mr. Marshall. Advancing Laser Beam Shaping 3D Printing  Given its notable advantages for industrial metal 3D printing, beam shaping capabilities are being developed and commercialized by several players in the research and LPBF 3D printing spheres. In 2024, German research organization Fraunhofer Institute for Laser Technology ILT showcased its new 3D printing beam shaping technology. Working with the Chair of Technology of Optical Systemsat RWTH Aachen University, the new platform, the Fraunhofer team is developing a test system for investigating complex laser beam profiles.  This platform can create customized beam profiles for laser powder bed fusion3D printing, enhancing part quality, process stability and productivity, while minimizing material waste.  In 2022, Equispheres and Aconity3D used laser beam-shaping 3D printing to achieve build rates nearly nine times higher than industry norms. Equispheres’ NExP-1 aluminum powder was used with Aconity3D’s AconityMIDI+ LPBF 3D printer to unlock speeds exceeding 430 cm3/hr for a single laser.  The system was modified to employ a PG YLR 3000/1000-AM laser with beam-shaping capabilities. By using a shaped beam over a zoomed Gaussian profile, the team reduced overheating and mitigated spatter formation during high-speed 3D printing.  Take the 3DPIReader Survey — shape the future of AM reporting in under 5 minutes. Who won the 2024 3D Printing Industry Awards? Subscribe to the3D Printing Industry newsletter to keep up with the latest 3D printing news. You can also follow us on LinkedIn, and subscribe to the 3D Printing Industry Youtube channel to access more exclusive content. Featured image shows JET interior with super imposed plasma. Image via UK Atomic Energy Authority. #ukaea #selects #kingsbury #additure #fusion
    3DPRINTINGINDUSTRY.COM
    UKAEA Selects Kingsbury and Additure for Fusion Energy Additive Manufacturing Project
    UK-based engineering equipment supplier Kingsbury and metal additive manufacturing company Additure have been appointed by the UK Atomic Energy Authority (UKAEA) to supply additive manufacturing technology and expertise as part of the UK’s ongoing efforts to advance fusion energy research. The partnership will support the development of components designed to endure the extreme conditions within fusion reactors, with a focus on innovative materials and design approaches. A key area of focus involves the use of tungsten—layered with materials such as copper—to achieve the necessary durability. To support this work, Kingsbury and Additure will deliver and install a Nikon SLM Solutions SLM 280 2.0 Laser Powder Bed Fusion (LPBF) system at UKAEA’s facilities. “We are excited to support the team at the UKAEA as they scale, not just with the SLM 280’s LPBF capability, but with all the key elements of the AM ecosystem to make this a robust manufacturing solution for UKAEA and the UK’s fusion programme,” said Will Priest, Business Development Manager at Additure. The SLM 280 Production Series system. Image via Nikon SLM Solutions. About UKAEA The UK Atomic Energy Authority (UKAEA) is the United Kingdom’s national fusion energy research organisation. It operates as an executive non-departmental public body, sponsored by the Department for Energy Security and Net Zero. A key part of its mission involves fostering industrial fusion capability by working with manufacturers and supply chains to introduce and scale the technologies required for commercial fusion energy deployment. “The UKAEA aims to develop the commercialisation of additive manufacturing and support UK industry in the transition into the fusion energy sector. We conduct the complex areas of research and development to the point where it becomes commercially viable, the advice and support of our supply chain is hugely valuable in expediting this process,” said Roy Marshall, Head of Operations for Fabrication, Installation, and Maintenance at UKAEA. JET interior with super imposed plasma. Image via UK Atomic Energy Authority. Additure’s Role and Technology Contribution At the center of this initiative is the SLM 280 2.0, an LPBF system designed for high-performance applications, including the development of refractory metals. The system offers build speeds up to 80% faster than single-laser alternatives and includes integrated safety features such as a powder sieve module and system cooling enhancements. Beyond equipment delivery, Additure is also providing comprehensive technical training to UKAEA’s research, materials, and design teams. This includes detailed guidance on machine setup, build optimization, and specialized functions—such as a heated reduced build volume. “The applications training from Additure will provide our engineers with new ways to design some of the complex structures required by fusion and allow them to do this using some of the most challenging materials to work with. For additive manufacture to contribute to fusion energy, more designers need to think, ‘What process is most suitable for the desired thermal or structural performance?’ And ‘how do I create a design that is best optimised for additive manufacture?’”, said Mr. Marshall. Advancing Laser Beam Shaping 3D Printing  Given its notable advantages for industrial metal 3D printing, beam shaping capabilities are being developed and commercialized by several players in the research and LPBF 3D printing spheres. In 2024, German research organization Fraunhofer Institute for Laser Technology ILT showcased its new 3D printing beam shaping technology. Working with the Chair of Technology of Optical Systems (TOS) at RWTH Aachen University, the new platform, the Fraunhofer team is developing a test system for investigating complex laser beam profiles.  This platform can create customized beam profiles for laser powder bed fusion (LPBF) 3D printing, enhancing part quality, process stability and productivity, while minimizing material waste.  In 2022, Equispheres and Aconity3D used laser beam-shaping 3D printing to achieve build rates nearly nine times higher than industry norms. Equispheres’ NExP-1 aluminum powder was used with Aconity3D’s AconityMIDI+ LPBF 3D printer to unlock speeds exceeding 430 cm3/hr for a single laser.  The system was modified to employ a PG YLR 3000/1000-AM laser with beam-shaping capabilities. By using a shaped beam over a zoomed Gaussian profile, the team reduced overheating and mitigated spatter formation during high-speed 3D printing.  Take the 3DPIReader Survey — shape the future of AM reporting in under 5 minutes. Who won the 2024 3D Printing Industry Awards? Subscribe to the3D Printing Industry newsletter to keep up with the latest 3D printing news. You can also follow us on LinkedIn, and subscribe to the 3D Printing Industry Youtube channel to access more exclusive content. Featured image shows JET interior with super imposed plasma. Image via UK Atomic Energy Authority.
    0 Comentários 0 Compartilhamentos
  • How To Take Down The Powerful Mizutsune In Monster Hunter Wilds

    BySamuel MorenoPublished5 minutes agoWe may earn a commission from links on this page.Screenshot: Capcom / Samuel Moreno / KotakuJump ToMonster Hunter Wilds’ first title update introduced a lot of new content, but a standout addition is Mizutsune. This serpentine behemoth is a one-of-a-kind threat packed with unique mechanics and an aggressive attitude. The Tempered version takes it to another level and is considered by many to be stronger than anything encountered in the campaign or after. No matter which variant you’re having trouble with, we can help you beat this frothy threat.Suggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom

    Share SubtitlesOffEnglishview videoSuggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom

    Share SubtitlesOffEnglishYou’ll first take on a Mizutsune in the “Spirit in the Moonlight” side mission. The only requirements are being at Hunter Rank 21 and having already completed the “Fishing: Life, In Microcosm” side mission for Kanya. Once you’ve hunted the monster down one time, it will start spawning in both the Scarlet Forest and Ruins of Wyveria.Tempered Mizutsune can spawn in these same areas, albeit only once you’ve leveled up more and at least reached chapter six of the main quest line. I can say from personal experience that the Tempered version spawned more often during a Fallow season or an Inclemency. Feel free to use the Rest function a couple of times to make it show up.Screenshot: Capcom / Samuel Moreno / KotakuMizutsune’s most distinctive aspect are its bubbles, which are dispersed during many of its attacks. Getting hit by most of these will inflict you with the unique Bubbleblight ailment. This ailment is split into a minor and a major stage. Minor Bubbleblight isn’t too bad, as it’s a buff that enhances your evasion. Getting hit with another bubble will change it to the more frustrating Major Bubbleblight, which causes you to slip while running and be sent farther away by large attacks or explosions.A Nulberry is unfortunately not able to cure this status ailment, although they’re still worth bringing since Mizutsune can additionally inflict both Waterblight and Fireblight. The quickest way to cure Bubbleblight is to use a Cleanser. Alternatively, if you have fought this monster before and are just farming, equipping Mizutsune-forged armor is a big help. Its Bubbly Dance skill will prevent Major Bubbleblight so that you can focus more on dealing damage. If you don’t have the armor or run out of Cleanser, your next best bet is waiting 30 seconds for it to disappear.Some bubbles apply different effects, which makes things more complicated. Thankfully, they’re color-coded; however, you’ll still need to be quick on your feet when they’re coming right at you. Here are the different-colored bubbles and what they do:Clear: Deals damage and inflicts BubbleblightGreen: Provides healing and inflicts BubbleblightRed: Provides a temporary attack boost and inflicts BubbleblightFiery Blue: Deals damage and inflicts FireblightTrying to dodge these bubbles isn’t always the best use of your time. Both Slinger ammo and attacks from your weapon can pop them, although slower melee weapons can require precise timing. Using ranged weapons like Heavy or Light Bowguns is a lot more convenient.Screenshot: Capcom / Samuel Moreno / KotakuMizutsune is a highly mobile monster that can hit hard and use its water-based attacks to trigger a variety of status ailments. Start your hunts with the following weaknesses in mind because you’ll want to take advantage of them:Elemental Weaknesses: Thunder, DragonWeapon Type Weaknesses: Cut, BluntBreakable Parts: Head x2, Claws x2, Tail, Dorsal FinWeak Point: MouthSusceptible Status Ailments: Blastblight, Exhaust, Paralysis, Poison, Sleep, StunScreenshot: Capcom / Samuel Moreno / KotakuEven though you can tackle this thing as early as Hunter Rank 21, I suggest holding off for a bit. Mizutsune dishes out massive damage that can be mitigated with better armor and weapons. Wait until you’ve finished chapter five and can farm Gore Magala hunts. Weapons crafted from Gore Magala parts dish out Dragon element damage, while its armor offers great Water resistance. These are huge advantages to have when fighting this creature.Any weapon type can work, but slower ones will feel extra cumbersome against Mizutsune. Between the erratic movements and seemingly endless bubbles, it’s convenient to have quicker weapons like Dual Blades or Sword and Shield. Their multi-hitting nature will help with applying elemental damage as well. I advise pinning it down using traps and different ailments if you’re still having trouble landing hits.You should also watch out for its Waterblight-inflicting jet stream attacks. Mizutsune has a handful of moves that involve vertical or horizontal sweeping water beams. Thankfully, they’re easily telegraphed and have small hitboxes. Make sure to exploit Mizutsune’s long recovery periods after using these attacks.Mizutsune’s long-reaching tail attacks are another notable characteristic. The most deadly of these are the tail slams, which come out fast and can take out all of your health if your defense is low. There is a backflip variant to hit anyone behind and another where it twists its body in the air to slam those in front. I’ve seen the latter countered with an Offset Attack, but dodging it is the less risky solution.All of the above is amplified when the monster enters its unique enraged state. Breaking its head will enable it to transition into a powered-up mode akin to Soulseer Mizutsune from prior entries, complete with blue fire flaring from its left eye. Mizutsune will start shooting fire-covered bubbles in addition to using attacks more rapidly and aggressively when this state is triggered. While you can try to avoid this by not breaking the head, the trade-off is that you’ll be inflicting less damage. The one positive to this enraged state is that it will tire quicker and eventually become exhausted. That’s your cue to start dealing as much damage as possible.Don’t feel bad if these hunts leave you frustrated. There is a lot to keep track of with little time for reaction. Tempered Mizutsune is even more challenging and might just be the toughest fight in Monster Hunter Wilds yet. Still, everything we’ve mentioned will apply all the same. Memorizing which animations initiate which attacks will go a long way. Otherwise, bring your best gear, outfit them with appropriate decorations, and carry the Armorcharm and Powercharm items for good measure.Screenshot: Capcom / Samuel Moreno / KotakuNothing makes a tough fight feel worth it more than some good loot. Flipping through the monster’s Detailed Info tabs will break down all the various drop rates for the end of a hunt, destroyed wounds, and body part carvings. It’s a lot to take in, but worth perusing to narrow down what parts you need. I’ve provided a simple list of the attainable Mizutsune materials below that’s sorted by the overall drop frequency, with the most common parts at the top.Mizutsune Fin+Mizutsune Claw+Mizutsune Purplefur+Mizutsune TailMizutsune Scale+Bubblefoam+Mizutsune Certificate SMizutsune Water Orb The community’s pleas for harder hunts certainly seem to have been heard. With the addition of Arch-Tempered monsters on the horizon, I can imagine these are only going to get tougher..
    #how #take #down #powerful #mizutsune
    How To Take Down The Powerful Mizutsune In Monster Hunter Wilds
    BySamuel MorenoPublished5 minutes agoWe may earn a commission from links on this page.Screenshot: Capcom / Samuel Moreno / KotakuJump ToMonster Hunter Wilds’ first title update introduced a lot of new content, but a standout addition is Mizutsune. This serpentine behemoth is a one-of-a-kind threat packed with unique mechanics and an aggressive attitude. The Tempered version takes it to another level and is considered by many to be stronger than anything encountered in the campaign or after. No matter which variant you’re having trouble with, we can help you beat this frothy threat.Suggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom Share SubtitlesOffEnglishview videoSuggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom Share SubtitlesOffEnglishYou’ll first take on a Mizutsune in the “Spirit in the Moonlight” side mission. The only requirements are being at Hunter Rank 21 and having already completed the “Fishing: Life, In Microcosm” side mission for Kanya. Once you’ve hunted the monster down one time, it will start spawning in both the Scarlet Forest and Ruins of Wyveria.Tempered Mizutsune can spawn in these same areas, albeit only once you’ve leveled up more and at least reached chapter six of the main quest line. I can say from personal experience that the Tempered version spawned more often during a Fallow season or an Inclemency. Feel free to use the Rest function a couple of times to make it show up.Screenshot: Capcom / Samuel Moreno / KotakuMizutsune’s most distinctive aspect are its bubbles, which are dispersed during many of its attacks. Getting hit by most of these will inflict you with the unique Bubbleblight ailment. This ailment is split into a minor and a major stage. Minor Bubbleblight isn’t too bad, as it’s a buff that enhances your evasion. Getting hit with another bubble will change it to the more frustrating Major Bubbleblight, which causes you to slip while running and be sent farther away by large attacks or explosions.A Nulberry is unfortunately not able to cure this status ailment, although they’re still worth bringing since Mizutsune can additionally inflict both Waterblight and Fireblight. The quickest way to cure Bubbleblight is to use a Cleanser. Alternatively, if you have fought this monster before and are just farming, equipping Mizutsune-forged armor is a big help. Its Bubbly Dance skill will prevent Major Bubbleblight so that you can focus more on dealing damage. If you don’t have the armor or run out of Cleanser, your next best bet is waiting 30 seconds for it to disappear.Some bubbles apply different effects, which makes things more complicated. Thankfully, they’re color-coded; however, you’ll still need to be quick on your feet when they’re coming right at you. Here are the different-colored bubbles and what they do:Clear: Deals damage and inflicts BubbleblightGreen: Provides healing and inflicts BubbleblightRed: Provides a temporary attack boost and inflicts BubbleblightFiery Blue: Deals damage and inflicts FireblightTrying to dodge these bubbles isn’t always the best use of your time. Both Slinger ammo and attacks from your weapon can pop them, although slower melee weapons can require precise timing. Using ranged weapons like Heavy or Light Bowguns is a lot more convenient.Screenshot: Capcom / Samuel Moreno / KotakuMizutsune is a highly mobile monster that can hit hard and use its water-based attacks to trigger a variety of status ailments. Start your hunts with the following weaknesses in mind because you’ll want to take advantage of them:Elemental Weaknesses: Thunder, DragonWeapon Type Weaknesses: Cut, BluntBreakable Parts: Head x2, Claws x2, Tail, Dorsal FinWeak Point: MouthSusceptible Status Ailments: Blastblight, Exhaust, Paralysis, Poison, Sleep, StunScreenshot: Capcom / Samuel Moreno / KotakuEven though you can tackle this thing as early as Hunter Rank 21, I suggest holding off for a bit. Mizutsune dishes out massive damage that can be mitigated with better armor and weapons. Wait until you’ve finished chapter five and can farm Gore Magala hunts. Weapons crafted from Gore Magala parts dish out Dragon element damage, while its armor offers great Water resistance. These are huge advantages to have when fighting this creature.Any weapon type can work, but slower ones will feel extra cumbersome against Mizutsune. Between the erratic movements and seemingly endless bubbles, it’s convenient to have quicker weapons like Dual Blades or Sword and Shield. Their multi-hitting nature will help with applying elemental damage as well. I advise pinning it down using traps and different ailments if you’re still having trouble landing hits.You should also watch out for its Waterblight-inflicting jet stream attacks. Mizutsune has a handful of moves that involve vertical or horizontal sweeping water beams. Thankfully, they’re easily telegraphed and have small hitboxes. Make sure to exploit Mizutsune’s long recovery periods after using these attacks.Mizutsune’s long-reaching tail attacks are another notable characteristic. The most deadly of these are the tail slams, which come out fast and can take out all of your health if your defense is low. There is a backflip variant to hit anyone behind and another where it twists its body in the air to slam those in front. I’ve seen the latter countered with an Offset Attack, but dodging it is the less risky solution.All of the above is amplified when the monster enters its unique enraged state. Breaking its head will enable it to transition into a powered-up mode akin to Soulseer Mizutsune from prior entries, complete with blue fire flaring from its left eye. Mizutsune will start shooting fire-covered bubbles in addition to using attacks more rapidly and aggressively when this state is triggered. While you can try to avoid this by not breaking the head, the trade-off is that you’ll be inflicting less damage. The one positive to this enraged state is that it will tire quicker and eventually become exhausted. That’s your cue to start dealing as much damage as possible.Don’t feel bad if these hunts leave you frustrated. There is a lot to keep track of with little time for reaction. Tempered Mizutsune is even more challenging and might just be the toughest fight in Monster Hunter Wilds yet. Still, everything we’ve mentioned will apply all the same. Memorizing which animations initiate which attacks will go a long way. Otherwise, bring your best gear, outfit them with appropriate decorations, and carry the Armorcharm and Powercharm items for good measure.Screenshot: Capcom / Samuel Moreno / KotakuNothing makes a tough fight feel worth it more than some good loot. Flipping through the monster’s Detailed Info tabs will break down all the various drop rates for the end of a hunt, destroyed wounds, and body part carvings. It’s a lot to take in, but worth perusing to narrow down what parts you need. I’ve provided a simple list of the attainable Mizutsune materials below that’s sorted by the overall drop frequency, with the most common parts at the top.Mizutsune Fin+Mizutsune Claw+Mizutsune Purplefur+Mizutsune TailMizutsune Scale+Bubblefoam+Mizutsune Certificate SMizutsune Water Orb The community’s pleas for harder hunts certainly seem to have been heard. With the addition of Arch-Tempered monsters on the horizon, I can imagine these are only going to get tougher.. #how #take #down #powerful #mizutsune
    KOTAKU.COM
    How To Take Down The Powerful Mizutsune In Monster Hunter Wilds
    BySamuel MorenoPublished5 minutes agoWe may earn a commission from links on this page.Screenshot: Capcom / Samuel Moreno / KotakuJump ToMonster Hunter Wilds’ first title update introduced a lot of new content, but a standout addition is Mizutsune. This serpentine behemoth is a one-of-a-kind threat packed with unique mechanics and an aggressive attitude. The Tempered version takes it to another level and is considered by many to be stronger than anything encountered in the campaign or after. No matter which variant you’re having trouble with, we can help you beat this frothy threat.Suggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom Share SubtitlesOffEnglishview videoSuggested ReadingThe 3 Best And 3 Worst Korok Challenges In Tears Of The Kingdom Share SubtitlesOffEnglishYou’ll first take on a Mizutsune in the “Spirit in the Moonlight” side mission. The only requirements are being at Hunter Rank 21 and having already completed the “Fishing: Life, In Microcosm” side mission for Kanya. Once you’ve hunted the monster down one time, it will start spawning in both the Scarlet Forest and Ruins of Wyveria.Tempered Mizutsune can spawn in these same areas, albeit only once you’ve leveled up more and at least reached chapter six of the main quest line. I can say from personal experience that the Tempered version spawned more often during a Fallow season or an Inclemency. Feel free to use the Rest function a couple of times to make it show up.Screenshot: Capcom / Samuel Moreno / KotakuMizutsune’s most distinctive aspect are its bubbles, which are dispersed during many of its attacks. Getting hit by most of these will inflict you with the unique Bubbleblight ailment. This ailment is split into a minor and a major stage. Minor Bubbleblight isn’t too bad, as it’s a buff that enhances your evasion. Getting hit with another bubble will change it to the more frustrating Major Bubbleblight, which causes you to slip while running and be sent farther away by large attacks or explosions.A Nulberry is unfortunately not able to cure this status ailment, although they’re still worth bringing since Mizutsune can additionally inflict both Waterblight and Fireblight. The quickest way to cure Bubbleblight is to use a Cleanser. Alternatively, if you have fought this monster before and are just farming, equipping Mizutsune-forged armor is a big help. Its Bubbly Dance skill will prevent Major Bubbleblight so that you can focus more on dealing damage. If you don’t have the armor or run out of Cleanser, your next best bet is waiting 30 seconds for it to disappear.Some bubbles apply different effects, which makes things more complicated. Thankfully, they’re color-coded; however, you’ll still need to be quick on your feet when they’re coming right at you. Here are the different-colored bubbles and what they do:Clear: Deals damage and inflicts BubbleblightGreen: Provides healing and inflicts BubbleblightRed: Provides a temporary attack boost and inflicts BubbleblightFiery Blue: Deals damage and inflicts FireblightTrying to dodge these bubbles isn’t always the best use of your time. Both Slinger ammo and attacks from your weapon can pop them, although slower melee weapons can require precise timing. Using ranged weapons like Heavy or Light Bowguns is a lot more convenient.Screenshot: Capcom / Samuel Moreno / KotakuMizutsune is a highly mobile monster that can hit hard and use its water-based attacks to trigger a variety of status ailments. Start your hunts with the following weaknesses in mind because you’ll want to take advantage of them:Elemental Weaknesses: Thunder, DragonWeapon Type Weaknesses: Cut, BluntBreakable Parts: Head x2, Claws x2, Tail (can also be severed), Dorsal FinWeak Point: MouthSusceptible Status Ailments: Blastblight, Exhaust, Paralysis, Poison, Sleep, StunScreenshot: Capcom / Samuel Moreno / KotakuEven though you can tackle this thing as early as Hunter Rank 21, I suggest holding off for a bit. Mizutsune dishes out massive damage that can be mitigated with better armor and weapons. Wait until you’ve finished chapter five and can farm Gore Magala hunts. Weapons crafted from Gore Magala parts dish out Dragon element damage, while its armor offers great Water resistance. These are huge advantages to have when fighting this creature.Any weapon type can work, but slower ones will feel extra cumbersome against Mizutsune. Between the erratic movements and seemingly endless bubbles, it’s convenient to have quicker weapons like Dual Blades or Sword and Shield. Their multi-hitting nature will help with applying elemental damage as well. I advise pinning it down using traps and different ailments if you’re still having trouble landing hits.You should also watch out for its Waterblight-inflicting jet stream attacks. Mizutsune has a handful of moves that involve vertical or horizontal sweeping water beams. Thankfully, they’re easily telegraphed and have small hitboxes. Make sure to exploit Mizutsune’s long recovery periods after using these attacks.Mizutsune’s long-reaching tail attacks are another notable characteristic. The most deadly of these are the tail slams, which come out fast and can take out all of your health if your defense is low. There is a backflip variant to hit anyone behind and another where it twists its body in the air to slam those in front. I’ve seen the latter countered with an Offset Attack, but dodging it is the less risky solution.All of the above is amplified when the monster enters its unique enraged state. Breaking its head will enable it to transition into a powered-up mode akin to Soulseer Mizutsune from prior entries, complete with blue fire flaring from its left eye. Mizutsune will start shooting fire-covered bubbles in addition to using attacks more rapidly and aggressively when this state is triggered. While you can try to avoid this by not breaking the head, the trade-off is that you’ll be inflicting less damage. The one positive to this enraged state is that it will tire quicker and eventually become exhausted. That’s your cue to start dealing as much damage as possible.Don’t feel bad if these hunts leave you frustrated. There is a lot to keep track of with little time for reaction. Tempered Mizutsune is even more challenging and might just be the toughest fight in Monster Hunter Wilds yet. Still, everything we’ve mentioned will apply all the same. Memorizing which animations initiate which attacks will go a long way. Otherwise, bring your best gear, outfit them with appropriate decorations, and carry the Armorcharm and Powercharm items for good measure.Screenshot: Capcom / Samuel Moreno / KotakuNothing makes a tough fight feel worth it more than some good loot. Flipping through the monster’s Detailed Info tabs will break down all the various drop rates for the end of a hunt, destroyed wounds, and body part carvings. It’s a lot to take in, but worth perusing to narrow down what parts you need. I’ve provided a simple list of the attainable Mizutsune materials below that’s sorted by the overall drop frequency, with the most common parts at the top.Mizutsune Fin+ (100% chance for breaking the Head or Dorsal Fin)Mizutsune Claw+ (100% chance for breaking either Claw)Mizutsune Purplefur+ (100% chance for breaking the Tail)Mizutsune TailMizutsune Scale+Bubblefoam+Mizutsune Certificate SMizutsune Water Orb The community’s pleas for harder hunts certainly seem to have been heard. With the addition of Arch-Tempered monsters on the horizon, I can imagine these are only going to get tougher..
    0 Comentários 0 Compartilhamentos
  • VPNSecure faces backlash after axing lifetime subscriptions

    New owners of VPNSecure have been taking major flak recently after unexpectedly cancelling all lifetime subscriptions for users of the VPN service. The owners claimed that they didn’t know about the lifetime subscriptions when they first bought VPNSecure and are now unable to continue honoring them.
    Per Ars Technica, the first complaints from users losing their lifetime access began in March of this year. In April, users with lifetime subscriptions received an email stating, “To continue providing a secure and high-quality experience for all users, Lifetime Deal accounts have now been deactivated as of April 28th, 2025.”
    In response to a sudden wave—24 pages in total—of negative 1-star customer reviews on TrustPilot, a representative for the provider clarified, “In 2023, we acquired only the infrastructure and brand in a distressed asset sale after that company shut down. No contracts, payment data, or customer obligations were transferred.”
    VPNSecure has apologized to customers who were caught off guard by the sudden cancellations but reinforced its new position by saying it “never will” sell lifetime subscriptions.

    The whole ordeal seems to have been bungled from the start, but the company drew further ire with the way in which it so abruptly cut subscriptions. While it may have mitigated some of these issues by giving more advanced notice of the cancellations, it was never going to be an easy pill to swallow for previous lifetime plan holders.
    Adding insult to injury, there is no evidence that VPNSecure is offering refunds to those who purchased lifetime subscriptions. Instead, it’s offering affected users “an exclusive deal starting at just /month to continue using the service.” Insert eyeroll here.
    The whole ordeal is a great reminder that lifetime subscriptions are rarely as trustworthy as advertisements lead you to believe. Should the company ever go out of business or be sold, these previous ‘guarantees’ can be nothing but hot air.
    If you happen to be someone affected by these cancellations or are just looking for a VPN service that you can trust, refer to our list of the best VPNs.
    #vpnsecure #faces #backlash #after #axing
    VPNSecure faces backlash after axing lifetime subscriptions
    New owners of VPNSecure have been taking major flak recently after unexpectedly cancelling all lifetime subscriptions for users of the VPN service. The owners claimed that they didn’t know about the lifetime subscriptions when they first bought VPNSecure and are now unable to continue honoring them. Per Ars Technica, the first complaints from users losing their lifetime access began in March of this year. In April, users with lifetime subscriptions received an email stating, “To continue providing a secure and high-quality experience for all users, Lifetime Deal accounts have now been deactivated as of April 28th, 2025.” In response to a sudden wave—24 pages in total—of negative 1-star customer reviews on TrustPilot, a representative for the provider clarified, “In 2023, we acquired only the infrastructure and brand in a distressed asset sale after that company shut down. No contracts, payment data, or customer obligations were transferred.” VPNSecure has apologized to customers who were caught off guard by the sudden cancellations but reinforced its new position by saying it “never will” sell lifetime subscriptions. The whole ordeal seems to have been bungled from the start, but the company drew further ire with the way in which it so abruptly cut subscriptions. While it may have mitigated some of these issues by giving more advanced notice of the cancellations, it was never going to be an easy pill to swallow for previous lifetime plan holders. Adding insult to injury, there is no evidence that VPNSecure is offering refunds to those who purchased lifetime subscriptions. Instead, it’s offering affected users “an exclusive deal starting at just /month to continue using the service.” Insert eyeroll here. The whole ordeal is a great reminder that lifetime subscriptions are rarely as trustworthy as advertisements lead you to believe. Should the company ever go out of business or be sold, these previous ‘guarantees’ can be nothing but hot air. If you happen to be someone affected by these cancellations or are just looking for a VPN service that you can trust, refer to our list of the best VPNs. #vpnsecure #faces #backlash #after #axing
    WWW.PCWORLD.COM
    VPNSecure faces backlash after axing lifetime subscriptions
    New owners of VPNSecure have been taking major flak recently after unexpectedly cancelling all lifetime subscriptions for users of the VPN service. The owners claimed that they didn’t know about the lifetime subscriptions when they first bought VPNSecure and are now unable to continue honoring them. Per Ars Technica, the first complaints from users losing their lifetime access began in March of this year. In April, users with lifetime subscriptions received an email stating, “To continue providing a secure and high-quality experience for all users, Lifetime Deal accounts have now been deactivated as of April 28th, 2025.” In response to a sudden wave—24 pages in total—of negative 1-star customer reviews on TrustPilot, a representative for the provider clarified, “In 2023, we acquired only the infrastructure and brand in a distressed asset sale after that company shut down. No contracts, payment data, or customer obligations were transferred.” VPNSecure has apologized to customers who were caught off guard by the sudden cancellations but reinforced its new position by saying it “never will” sell lifetime subscriptions. The whole ordeal seems to have been bungled from the start, but the company drew further ire with the way in which it so abruptly cut subscriptions. While it may have mitigated some of these issues by giving more advanced notice of the cancellations, it was never going to be an easy pill to swallow for previous lifetime plan holders. Adding insult to injury, there is no evidence that VPNSecure is offering refunds to those who purchased lifetime subscriptions. Instead, it’s offering affected users “an exclusive deal starting at just $1.87/month to continue using the service.” Insert eyeroll here. The whole ordeal is a great reminder that lifetime subscriptions are rarely as trustworthy as advertisements lead you to believe. Should the company ever go out of business or be sold, these previous ‘guarantees’ can be nothing but hot air. If you happen to be someone affected by these cancellations or are just looking for a VPN service that you can trust, refer to our list of the best VPNs.
    0 Comentários 0 Compartilhamentos
  • Spaceframe: procedurally generating terrain on a planetary scale

    Author

    Hello devs. Apologies in advance if this is not the correct forum for this. I've recently been spending a lot of my free time working on an old project of mine. It originated in 2013, and after several years-long hiatuses and complete rewrites, it's now in a state that I think is worth sharing.The goal is to simulate spheroids with real-time, procedurally generated terrain on a planetary scale and beyond. My inspiration for this project are old voxel games like Comanche. I wanted to do something like that, but instead of the finite play area being enforced through artificial boundaries, have it be a natural consequence of the world's geometry.Here's a short demo I recorded: planet in this demo has a radius of 2^23 meters which makes it about 2.28x the size of Earth by volume. The surface can be traversed freely without loading areas as it's all sampled in real time. Admittedly, the detail in this video is not that great. I've only recently begun working on the terrain sampler, so this is in a very early stage of development.To speak briefly on the geometry; the world is an icosahedron formed by 20 recursively subdivided tetrahedra. The tetrahedra subdivide into an oct-tet truss: a lattice of octahedra and tetrahedra. This structure is also called a spaceframe, and it's the cause for the shape of the terrain.If this sort of thing intrigues you, please let me know.

    I have been working on generating realistic planet-scale terrain for the last 2.5 years. You can read about it on my blog.I decided against the icosahedron subdivision for my planet engine because it makes lots of things more difficult. I use the cube-sphere subdivision instead, because it leads to a quadtree subdivision of each cube face. This makes it much easier to do things like determine what terrain tiles are near to a given location, or to implement erosion. Everything exists on a rectilinear grid, which makes hydraulic erosion much easier.It seems like you should increase the distance at which you subdivide the terrain, to reduce the LOD popping. As it is, terrain features materialize to near to the camera. You ideally should implement a system so that the terrain is subdivided until a certain screen-space resolution is achieved.

    Advertisement

    Author

    Your project looks very nice, but we have chosen very different paths in our implementations of planetary terrain. There is no grid or mesh spaceframe. The surface map is a direct result of sampling. The space is recursively sampled with a binary function and vertices are emitted based on the boundary resolved between filled and empty space. The detail popping is a consequence of the size difference between shapes in finer and coarser LODs. In theory this could be mitigated with higher LODs, but that is not a practical option given how CPU intensive real time, full planet binary space partitioning and boundary resolution is. Maybe one day I'll write a GPU implementation, though.

    What I'm saying is that your approach, while interesting, cannot use various optimizations which can be applied to rectilinear coordinates, which may explain why it is slow and can't increase the detail as much. My approach, running entirely on a 12-year old 4-core CPU can in real time generate triangles down to 5mm resolution at an angular LOD of 4 pixels per triangle, covering an earth-sized planet, using around 4GB RAM. Furthermore, I'm not just generating terrain by fractal noise, I'm also applying various erosion processes which use the majority of the compute. This is only possible by a careful choice of spatial representation of the terrain, asynchronous multithreaded generation, and by highly optimized code. Since the terrain is on a 2D rectangular grid, all operations aside from final mesh generation are essentially image processing, and make good use of CPU SIMD capabilities, which provides up to 8x speedup with AVX. Unless your data is laid out in a similar compact way you will have a hard time making it fast on modern CPUs. I don't think the “space frame” is a good fit for modern CPU architectures.
    #spaceframe #procedurally #generating #terrain #planetary
    Spaceframe: procedurally generating terrain on a planetary scale
    Author Hello devs. Apologies in advance if this is not the correct forum for this. I've recently been spending a lot of my free time working on an old project of mine. It originated in 2013, and after several years-long hiatuses and complete rewrites, it's now in a state that I think is worth sharing.The goal is to simulate spheroids with real-time, procedurally generated terrain on a planetary scale and beyond. My inspiration for this project are old voxel games like Comanche. I wanted to do something like that, but instead of the finite play area being enforced through artificial boundaries, have it be a natural consequence of the world's geometry.Here's a short demo I recorded: planet in this demo has a radius of 2^23 meters which makes it about 2.28x the size of Earth by volume. The surface can be traversed freely without loading areas as it's all sampled in real time. Admittedly, the detail in this video is not that great. I've only recently begun working on the terrain sampler, so this is in a very early stage of development.To speak briefly on the geometry; the world is an icosahedron formed by 20 recursively subdivided tetrahedra. The tetrahedra subdivide into an oct-tet truss: a lattice of octahedra and tetrahedra. This structure is also called a spaceframe, and it's the cause for the shape of the terrain.If this sort of thing intrigues you, please let me know. I have been working on generating realistic planet-scale terrain for the last 2.5 years. You can read about it on my blog.I decided against the icosahedron subdivision for my planet engine because it makes lots of things more difficult. I use the cube-sphere subdivision instead, because it leads to a quadtree subdivision of each cube face. This makes it much easier to do things like determine what terrain tiles are near to a given location, or to implement erosion. Everything exists on a rectilinear grid, which makes hydraulic erosion much easier.It seems like you should increase the distance at which you subdivide the terrain, to reduce the LOD popping. As it is, terrain features materialize to near to the camera. You ideally should implement a system so that the terrain is subdivided until a certain screen-space resolution is achieved. Advertisement Author Your project looks very nice, but we have chosen very different paths in our implementations of planetary terrain. There is no grid or mesh spaceframe. The surface map is a direct result of sampling. The space is recursively sampled with a binary function and vertices are emitted based on the boundary resolved between filled and empty space. The detail popping is a consequence of the size difference between shapes in finer and coarser LODs. In theory this could be mitigated with higher LODs, but that is not a practical option given how CPU intensive real time, full planet binary space partitioning and boundary resolution is. Maybe one day I'll write a GPU implementation, though. What I'm saying is that your approach, while interesting, cannot use various optimizations which can be applied to rectilinear coordinates, which may explain why it is slow and can't increase the detail as much. My approach, running entirely on a 12-year old 4-core CPU can in real time generate triangles down to 5mm resolution at an angular LOD of 4 pixels per triangle, covering an earth-sized planet, using around 4GB RAM. Furthermore, I'm not just generating terrain by fractal noise, I'm also applying various erosion processes which use the majority of the compute. This is only possible by a careful choice of spatial representation of the terrain, asynchronous multithreaded generation, and by highly optimized code. Since the terrain is on a 2D rectangular grid, all operations aside from final mesh generation are essentially image processing, and make good use of CPU SIMD capabilities, which provides up to 8x speedup with AVX. Unless your data is laid out in a similar compact way you will have a hard time making it fast on modern CPUs. I don't think the “space frame” is a good fit for modern CPU architectures. #spaceframe #procedurally #generating #terrain #planetary
    Spaceframe: procedurally generating terrain on a planetary scale
    Author Hello devs. Apologies in advance if this is not the correct forum for this. I've recently been spending a lot of my free time working on an old project of mine. It originated in 2013, and after several years-long hiatuses and complete rewrites, it's now in a state that I think is worth sharing.The goal is to simulate spheroids with real-time, procedurally generated terrain on a planetary scale and beyond. My inspiration for this project are old voxel games like Comanche. I wanted to do something like that, but instead of the finite play area being enforced through artificial boundaries, have it be a natural consequence of the world's geometry.Here's a short demo I recorded: https://www.youtube.com/watch?v=8S3MPTzymX8The planet in this demo has a radius of 2^23 meters which makes it about 2.28x the size of Earth by volume. The surface can be traversed freely without loading areas as it's all sampled in real time. Admittedly, the detail in this video is not that great. I've only recently begun working on the terrain sampler, so this is in a very early stage of development.To speak briefly on the geometry; the world is an icosahedron formed by 20 recursively subdivided tetrahedra. The tetrahedra subdivide into an oct-tet truss: a lattice of octahedra and tetrahedra. This structure is also called a spaceframe, and it's the cause for the shape of the terrain.If this sort of thing intrigues you, please let me know. I have been working on generating realistic planet-scale terrain for the last 2.5 years. You can read about it on my blog (start at the bottom).I decided against the icosahedron subdivision for my planet engine because it makes lots of things more difficult. I use the cube-sphere subdivision instead, because it leads to a quadtree subdivision of each cube face. This makes it much easier to do things like determine what terrain tiles are near to a given location, or to implement erosion. Everything exists on a rectilinear grid, which makes hydraulic erosion much easier.It seems like you should increase the distance at which you subdivide the terrain, to reduce the LOD popping. As it is, terrain features materialize to near to the camera. You ideally should implement a system so that the terrain is subdivided until a certain screen-space resolution is achieved (e.g. size of a triangle in pixels). Advertisement Author Your project looks very nice, but we have chosen very different paths in our implementations of planetary terrain. There is no grid or mesh spaceframe. The surface map is a direct result of sampling. The space is recursively sampled with a binary function and vertices are emitted based on the boundary resolved between filled and empty space. The detail popping is a consequence of the size difference between shapes in finer and coarser LODs. In theory this could be mitigated with higher LODs, but that is not a practical option given how CPU intensive real time, full planet binary space partitioning and boundary resolution is. Maybe one day I'll write a GPU implementation, though. What I'm saying is that your approach, while interesting, cannot use various optimizations which can be applied to rectilinear coordinates, which may explain why it is slow and can't increase the detail as much. My approach, running entirely on a 12-year old 4-core CPU can in real time generate triangles down to 5mm resolution at an angular LOD of 4 pixels per triangle, covering an earth-sized planet (and much bigger is not a problem), using around 4GB RAM. Furthermore, I'm not just generating terrain by fractal noise, I'm also applying various erosion processes which use the majority of the compute. This is only possible by a careful choice of spatial representation of the terrain, asynchronous multithreaded generation, and by highly optimized code (nearly all uses SIMD). Since the terrain is on a 2D rectangular grid, all operations aside from final mesh generation are essentially image processing, and make good use of CPU SIMD capabilities, which provides up to 8x speedup with AVX. Unless your data is laid out in a similar compact way you will have a hard time making it fast on modern CPUs. I don't think the “space frame” is a good fit for modern CPU architectures.
    0 Comentários 0 Compartilhamentos
  • The Kids Online Safety Act is back, with the potential to change the internet

    The Kids Online Safety Acthas been reintroduced into Congress. If passed into law, this bill could impose some of the most significant legislative changes that the internet has seen in the U.S. since the Children’s Online Privacy Protection Actof 1998.
    As it currently stands, KOSA would be able to hold social media platforms legally accountable if it’s proven that these companies aren’t doing enough to protect minors from harm. The bill includes a long list of possible harms, such as eating disorders, sexual exploitation, substance abuse, and suicide. Though it overwhelmingly passed through the Senate last year, the bill was stifled in the House.
    KOSA has faced much backlash since its introduction in 2022.
    Human rights groups like the ACLU raised concerns that the bill could be weaponized as a tool for censorship and surveillance. While amendments to KOSA have mitigated some of these concerns, groups like the Electronic Frontier Foundation and Fight for the Future have remained against the bill.
    “The bill’s authors have claimed over and over that this bill doesn’t impact speech. But the Duty of Care is about speech: it’s about blocking speech that the government believes is bad for kids,” Fight for the Future wrote in a statement. “And the people who will be determining what speech is harmful? They are the same ones using every tool to silence marginalized communities and attack those they perceive as enemies.”
    However, KOSA has garnered support from companies like Microsoft, Snap, and X; X CEO Linda Yaccarino even worked with Senators Marsha Blackburnand Richard Blumenthalon the most recent draft of the bill. Google and Meta have remained opposed to the bill, but Apple announced today that it will support the legislation.
    “Apple is pleased to offer our support for the Kids Online Safety Act. Everyone has a part to play in keeping kids safe online, and we believelegislation will have a meaningful impact on children’s online safety,” Timothy Powderly, Apple’s Senior Director of Government Affairs, said in a statement.

    Techcrunch event

    Join us at TechCrunch Sessions: AI
    Secure your spot for our leading AI industry event with speakers from OpenAI, Anthropic, and Cohere. For a limited time, tickets are just for an entire day of expert talks, workshops, and potent networking.

    Exhibit at TechCrunch Sessions: AI
    Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last.

    Berkeley, CA
    |
    June 5

    REGISTER NOW
    #kids #online #safety #act #back
    The Kids Online Safety Act is back, with the potential to change the internet
    The Kids Online Safety Acthas been reintroduced into Congress. If passed into law, this bill could impose some of the most significant legislative changes that the internet has seen in the U.S. since the Children’s Online Privacy Protection Actof 1998. As it currently stands, KOSA would be able to hold social media platforms legally accountable if it’s proven that these companies aren’t doing enough to protect minors from harm. The bill includes a long list of possible harms, such as eating disorders, sexual exploitation, substance abuse, and suicide. Though it overwhelmingly passed through the Senate last year, the bill was stifled in the House. KOSA has faced much backlash since its introduction in 2022. Human rights groups like the ACLU raised concerns that the bill could be weaponized as a tool for censorship and surveillance. While amendments to KOSA have mitigated some of these concerns, groups like the Electronic Frontier Foundation and Fight for the Future have remained against the bill. “The bill’s authors have claimed over and over that this bill doesn’t impact speech. But the Duty of Care is about speech: it’s about blocking speech that the government believes is bad for kids,” Fight for the Future wrote in a statement. “And the people who will be determining what speech is harmful? They are the same ones using every tool to silence marginalized communities and attack those they perceive as enemies.” However, KOSA has garnered support from companies like Microsoft, Snap, and X; X CEO Linda Yaccarino even worked with Senators Marsha Blackburnand Richard Blumenthalon the most recent draft of the bill. Google and Meta have remained opposed to the bill, but Apple announced today that it will support the legislation. “Apple is pleased to offer our support for the Kids Online Safety Act. Everyone has a part to play in keeping kids safe online, and we believelegislation will have a meaningful impact on children’s online safety,” Timothy Powderly, Apple’s Senior Director of Government Affairs, said in a statement. Techcrunch event Join us at TechCrunch Sessions: AI Secure your spot for our leading AI industry event with speakers from OpenAI, Anthropic, and Cohere. For a limited time, tickets are just for an entire day of expert talks, workshops, and potent networking. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW #kids #online #safety #act #back
    TECHCRUNCH.COM
    The Kids Online Safety Act is back, with the potential to change the internet
    The Kids Online Safety Act (KOSA) has been reintroduced into Congress. If passed into law, this bill could impose some of the most significant legislative changes that the internet has seen in the U.S. since the Children’s Online Privacy Protection Act (COPPA) of 1998. As it currently stands, KOSA would be able to hold social media platforms legally accountable if it’s proven that these companies aren’t doing enough to protect minors from harm. The bill includes a long list of possible harms, such as eating disorders, sexual exploitation, substance abuse, and suicide. Though it overwhelmingly passed through the Senate last year, the bill was stifled in the House. KOSA has faced much backlash since its introduction in 2022. Human rights groups like the ACLU raised concerns that the bill could be weaponized as a tool for censorship and surveillance. While amendments to KOSA have mitigated some of these concerns, groups like the Electronic Frontier Foundation and Fight for the Future have remained against the bill. “The bill’s authors have claimed over and over that this bill doesn’t impact speech. But the Duty of Care is about speech: it’s about blocking speech that the government believes is bad for kids,” Fight for the Future wrote in a statement. “And the people who will be determining what speech is harmful? They are the same ones using every tool to silence marginalized communities and attack those they perceive as enemies.” However, KOSA has garnered support from companies like Microsoft, Snap, and X; X CEO Linda Yaccarino even worked with Senators Marsha Blackburn (R-TN) and Richard Blumenthal (D-CT) on the most recent draft of the bill. Google and Meta have remained opposed to the bill, but Apple announced today that it will support the legislation. “Apple is pleased to offer our support for the Kids Online Safety Act (KOSA). Everyone has a part to play in keeping kids safe online, and we believe [this] legislation will have a meaningful impact on children’s online safety,” Timothy Powderly, Apple’s Senior Director of Government Affairs, said in a statement. Techcrunch event Join us at TechCrunch Sessions: AI Secure your spot for our leading AI industry event with speakers from OpenAI, Anthropic, and Cohere. For a limited time, tickets are just $292 for an entire day of expert talks, workshops, and potent networking. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW
    0 Comentários 0 Compartilhamentos