Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6591 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

TechRadar News

New forum topics

Subscribe to TechRadar News feed
Updated: 7 hours 50 min ago

Garmin's Venu 3 and vivoactive 5 finally have one of the most basic smartwatch features you can ask for

Tue, 02/25/2025 - 04:22
  • Garmin has issued a free software update for its Venu 3 and vivoactive 5
  • Both devices finally support passcodes
  • The update also includes HRM 200 pairing and Body Battery improvements

A new software update for two of the best Garmin watches for everyday use finally brings support for passcode security, as well as other significant improvements.

Garmin's 13.17 software for the Venu 3 and vivoactive 5 has rolled out in the last few days. Now at 100% release, the system update brings four changes, including three significant free upgrades.

Along with support for Garmin's latest Connect IQ apps, watch faces, and data fields, the new update adds support for the Garmin HRM 200, one of the best heart rate monitors on the market.

There's also a Body Battery upgrade that brings improved accuracy for users who have multiple devices, bringing you a total Body Battery score from all your various Garmins should you have a dedicated model for running, diving, golf, etc.

Finally, but arguably most importantly, the Garmin Venu 3 and vivoactive 5 now support passcodes for extra security.

Garmin finally adds passcodes

Apple Watch has had passcodes since day one. (Image credit: Future)

As a long-time user of the best Apple Watches, I was shocked to discover Garmins don't have a passcode feature. Garmin says the "new" feature, imaginatively dubbed 'Passcode', helps "to protect sensitive data if your watch ever gets lost or stolen," making its previous absence all the more baffling. Like the Apple Watch, the feature comes with automatic wrist detection, so if you take your watch off (or if it's forcibly removed) the Passcode kicks in, requiring a PIN number to regain access.

Garmin is also bringing this feature to the Fenix 8 and Fenix 8, the Enduro 3, and the Forerunner range (165, 255, 265, 955, and 965), with the rollout ongoing.

Given that a passcode protects quite important information including personal health data and text conversations, I'm surprised to learn that the feature has been missing from Garmins for so long. But users who have been looking forward to it can now use it on both the Venu 3 and vivoactive 5. If there's no sign of the update on your device, check the Software Update section of your System Settings to manually download it.

You may also like
Categories: Technology

Scooby-Doo is a good movie with a bad Rotten Tomatoes score – here's why you should ignore the critics and watch it before it leaves Netflix

Tue, 02/25/2025 - 03:58

With all the new Netflix movies to watch every month, sometimes all you need is a nostalgic flick to bring back some fond memories. So when I learned that the James Gunn-written live-action adaptation Scooby-Doo was leaving Netflix on February 28, I had to revisit this outrageously fun cult classic.

Prior to his success of the Guardians of the Galaxy trilogy and The Suicide Squad, the CEO of DC Studios penned two iconic movies based on the Hanna-Barbera cartoon Scooby-Doo.

When the movie was released in 2002, it was met with largely negative reviews, the one that shocked me in particular was from The Guardian, which hailed the movie as "incredibly leaden" and "unutterably boring." Honestly, I don't stand for this kind of slander because while it's not one of the best Netflix movies and suffers from a 32% Rotten Tomatoes score, it's still incredibly fun and entertaining.

Scooby snacks, anyone?

The first Scooby-Doo movie thrusts a start-studded cast into a story that feels faithful to the animated series. In it, the Mystery Inc. gang consists of Sarah Michelle Gellar as Daphne Blake, Freddie Prinze Jr. as Fred Jones, Linda Cardellini as Velma Dinkley, Neil Fanning as Scooby, and Matthew Lillard as Shaggy Rogers – a role he was born to play, might I add, and one he still reprises in several animated Scooby-Doo series now.

Scooby-Doo sees the Mystery Inc. gang individually invited to investigate strange happenings at a spooky amusement park, two years after a bitter break-up. The crew must reunite to solve what's possessing the college students staying at Spooky Island.

With its timeless goofy humor and slapstick comedy, the Scooby-Doo movie became a smash hit that's still quoted and remembered to this day by people the right age. So it was only right to produce a sequel two years later with Scooby-Doo 2: Monsters Unleashed, which is also leaving Netflix on the same day.

In Scooby-Doo 2: Monsters Unleashed, Mystery Inc. must save Coolsville when an evil masked figure brings to life all the old monsters they exposed in a bid to ruin their reputation. The second movie was also met with a poor critical reception, and we never got a third Scooby-Doo movie.

While I mourn the loss of a potential trilogy, the Scooby-Doo movie is still a clever take on the franchise's history and remains a hilarious crime solving comedy caper with its perfect casting and clever adult humor references.

One thing that's for certain is that Scooby-Doo proves that not everything has to have modern style or rich substance to be a good movie – sometimes all you need are some genuine laugh-out-loud gags.

So if you're looking for some casual entertainment and a movie that doesn't take itself seriously, then you should definitely watch Scooby-Doo before it leaves the best streaming service.

You might also like
Categories: Technology

Technical debt—much like financial debt—is a cumulative beast

Tue, 02/25/2025 - 03:47

Technical debt—much like financial debt—is a cumulative beast. It represents all the extra hours and resources poured into keeping a solution technically current, often without making real progress toward innovation. It’s like a bucket with a hole in its base: no matter how much water you pour in, the water level barely rises. In this case, that’s because needless upgrades and patching keep draining your efforts.

Where it relates specifically to software systems, technical debt can stem from decisions made in the moment—those “quick fixes” or stopgap measures that seem like the easiest solution at the time. These might involve implementing solutions to plug a gap in your infrastructure or rushing to adopt new ERP software functionality, even when it doesn’t fully align with your strategy or staff expertise. Over time, these little compromises accumulate into big frustrations, leaving you spending all your time involved with patch management over issues – rather than addressing root causes. It’s like spending your entire paycheck on debt repayments without being able to save or invest for your future. It’s incredibly frustrating.

The good news is that paying down this technical debt is possible. It’s not an overnight fix, but with the right strategy, you can gain time and budget to gradually reduce that debt while balancing affordability, innovation, and ROI.

Why We Accumulate Technical Debt

In the ERP world, the dominant players—Oracle, SAP, and others—significantly contribute to the accumulation of technical debt. Their strategies are built around locking you into their ecosystems--pushing you to upgrade on their timelines and, crucially, use their in-house support and maintenance, preventing you from focusing on projects that drive true value for the business.

Let’s be clear: upgrading your software system doesn’t inherently create technical debt. The problem lies in how upgrades are imposed. It’s the pressure to upgrade before you’re ready or to align with vendor roadmaps that don’t match your business priorities.

For example, SAP’s push toward S/4HANA adoption has left many businesses scrambling to meet tight deadlines, fearing the loss of support for older systems. Support for SAP’s widely used ECC software will end in 2027, with an optional extended maintenance period available until 2030 at a significant premium. This impending deadline is pressuring organizations to upgrade to S/4HANA, even if they are unprepared for the transition. Many businesses face challenges in terms of the time, resources, and financial investment required to migrate, leaving them at risk of running unsupported systems and exposing themselves to potential compliance and security vulnerabilities.

Similarly, Oracle’s aggressive move to cloud-based solutions has forced customers into costly transitions under the very legitimate concern that they’ll fail to meet critical compliance and security standards if they don’t. Oracle frequently emphasizes the security and compliance advantages of migrating to its cloud services, leaving customers with limited alternatives. The message is clear: You’ve got to move to the cloud—security implications demand it. How’s that for flexibility, independence, and control? This approach places enterprises in a difficult position, pressuring them to adopt Oracle’s roadmap rather than sticking to their own strategy.

Then there are the maintenance contracts. These multi-million-dollar agreements often apply to aging products with limited ROI, yet they’re non-negotiable. Worse, the costs often escalate annually, leaving enterprises paying more and more… and getting back less and less.

Technical debt often starts with compromises--choosing systems based on budget constraints or sleepwalking into vendor lock-in. Over time, these hidden costs—mandatory upgrades, expensive support, and abandoned legacy systems—pile up. While upgrades themselves don’t directly cause technical debt, they can exacerbate it, but not being able to focus on your business goals.

The Cycle of Technical Debt

So, your aging systems are no longer meeting your needs, and your technical debt is at an all-time high. Every effort to keep things running feels like pouring water into that leaky bucket—you’re working harder but making no real progress.

So, what can you do?

While there’s no silver bullet that will allow you to eliminate technical debt instantly, it is possible to pay down this debt sustainably while prioritizing growth and innovation. Start by rethinking how you manage and support your current systems.

Breaking Free

You can’t always get rid of aging systems, but you can support them more effectively. Third-party software support offers a way to regain control over your IT strategy. Think of it as fast-tracking your journey out of technical debt.

Third-party software support shifts the focus away from vendor-imposed roadmaps to your unique business needs. If you need a highly customized setup or prefer a best-of-breed approach, your support partner enables you to maintain stable, familiar systems while selectively modernizing the parts that align with your strategy.

And the cost savings? On average, enterprises save over 60 percent on maintenance and support contracts when they switch to third-party software support. This frees up budget for innovation, employee training, maintaining existing systems, and ensuring they operate as expected— without the unnecessary, vendor-mandated bells and whistles.

Strategic Innovation Over Vendor Roadmaps

Vendors don’t want you to know about these alternatives because it threatens their entire business model, which is built around those lucrative maintenance contracts. They rely on keeping you locked into their cycle of mandatory upgrades and ever escalating fees. But technical debt doesn’t have to be an inevitable cost of doing business.

With third-party software support you can keep your systems supported, compliant, and aligned with your business goals—all while freeing time and budget to reduce technical debt. You’re no longer forced to upgrade for the sake of compliance or to access critical updates and support.

Enterprises that break free from vendor lock-in experience a twofold benefit: reduced technical debt and the freedom to allocate resources toward strategic innovation. By rethinking how you manage your software lifecycle, you’ll finally be able to pay down that debt and plan your future systems on your terms—not your vendor’s.

We've listed the best RPA software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Everything new on Apple TV+ in March 2025: Severance season 2 finale, Dope Thief, The Studio, and more

Tue, 02/25/2025 - 03:00

March 2025 is going to be a big month for Apple TV+. The increasingly popular streaming platform has had some big wins so far this year, with Severance season 2 dominating online TV show-based discussions and new movies like The Gorge earning mostly positive reviews from fans and critics alike. The tech giant, then, will hope the third month of 2025 is as productive for it as the first two were.

It looks like it will be, too. The final three episodes of Severance's sophomore season notwithstanding, there's plenty to look forward to on Apple's streaming service in March, including the debut of some exciting new Apple TV Originals. Here, then, is everything that's coming to one of the best streaming services between March 1 and 31.

March 5

Prime Target's eighth and final episode is out in early March (Image credit: Apple TV Plus)
  • Berlin ER episode 3
  • Love You to Death episode 6
  • Mythic Quest season 4 episode 7
  • Prime Target episode 8
March 7

Surface season 2 continues to pose more questions than it answers (Image credit: Apple TV Plus)
  • Severance season 2 episode 8
  • Surface season 2 episode 3
March 12

Love You to Death's final episode airs in mid-March (Image credit: Apple TV Plus)
  • Berlin ER episode 4
  • Love You to Death episode 7
  • Mythic Quest season 4 episode 8
March 14

Dope Thief's first two episodes will launch on Apple TV Plus in mid-March (Image credit: Apple TV Plus)
  • Dope Thief episodes 1 and 2
  • Severance season 2 episode 9
  • Surface season 2 episode 4
March 19

Berlin ER is a German-language medical drama that began airing in February (Image credit: Apple TV Plus)
  • Berlin ER episode 5
  • Mythic Quest season 4 episode 9
March 21

How will Severance season 2 end in late March? (Image credit: Apple TV Plus)
  • Be@rbrick episodes 1 to 13
  • Dope Thief episode 3
  • Severance season 2 episode 10
  • Surface season 2 episode 5
March 26

Seth Rogen's new TV series The Studio arrives before the end of March (Image credit: Apple TV Plus)
  • Berlin ER episode 6
  • Mythic Quest season 4 episode 10
  • Side Quest episodes 1 to 4
  • The Studio episodes 1 and 2
March 28

Surface season 2 passes its midway point in late March (Image credit: Apple TV Plus)
  • Dope Thief episode 4
  • Surface season 2 episode 6

For more Apple TV Plus coverage, read our guides on the best Apple TV Plus shows, best Apple TV Plus movies, Foundation season 3, and Silo season 3.

Categories: Technology

Is your business primed to respond to downtime?

Tue, 02/25/2025 - 01:41

The modern business is an intricate fabric of IT infrastructure, integrating networks and technologies to support its overall mission.

A single point of failure can bring the entire system to a halt, causing significant downtime. During such outages, networks become inaccessible, preventing users from interacting with the organization’s systems. IT teams must then act swiftly to restore functionality, safeguarding against data loss, revenue loss, and damage to the company’s reputation.

On average, nearly $50 million in annual sales is being missed out because of downtime according to research from Splunk. Just by being more consistent and available than the competition, IT teams can create a competitive advantage through superior resilience and efficiency.

So, why are businesses still finding challenges in ensuring business continuity?

An environment of threats

The causes of downtime are complex, as businesses and their environments sometimes evolve in unexpected ways. Premises and digital infrastructure designed for specific outcomes may become outdated due to new technologies or priorities, leading to the creation of inefficiencies and blind spots.

According to a Databarracks survey, nearly a quarter of businesses (24%) suffered downtime as a result of a cyber incident last year, with a key threat being DDoS attacks.

GTT research revealed DDoS attacks are causing huge problems for organizations. In the first half of 2024, there was a 25% increase in multi-vector DDoS attacks recorded, with these threats continuing to escalate through the second half of the year. Addressing both malicious and non-malicious causes of downtime requires comprehensive, flexible strategies – relying on tactical responses to individual issues is no longer sufficient.

The (not-so) secret ingredients to business continuity

The first step in preventing downtime is assessing the network architecture. After all, you can’t defend what you can’t see. Enterprises should evaluate the importance and requirements of both redundant connectivity and high availability network designs as a strategy to mitigate brownouts and blackouts.

Mapping out an entire network, identifying tools and operations which are critical in delivering products or services, and those areas which are at a higher risk of attack or compromise lays the foundation for an effective downtime prevention strategy.

Once the network has been mapped, and core competencies have been recognized, ensuring that redundancy measures are in place allows business decision makers and IT teams sleep easier. Increasing redundancy for both hardware and traffic pathways mean that no single point of failure will completely shut down the organization, and if one area fails, data still has alternate routes to flow through.

Sites cannot be too overprovisioned when it comes to downtime prevention, but budgets typically limit the art of the possible. Look for solutions and partnerships that offer what is needed today but also offer the ability to make soft changes when needs shift. This ability means when there are shocks to the system, IT teams don’t have to rip and replace but can quickly enhance and solve without investing heavily in new in-house solutions.

What should never be missing from this network assessment is the maintenance of a good security posture. As addressed previously, DDoS attacks are only getting more common and are coming from more vectors than ever. DDoS mitigation technologies, such as the use of data scrubbing centers and traffic filtering, ensures any inbound traffic is analyzed and cleansed of any malicious packages before it reaches the users' network.

DDoS prevention strategies should consider the approach organizations take to attack detection. Either taking the responsibility of detection in-house and reacting to incidents after-the-fact or having an always-on proactive DDoS solution. Robust DDoS solutions don’t just mitigate attacks, but do so automatically, ideally in real-time, to prevent any possible downtime and maintain business continuity when targeted.

Leaving it to the experts

Once the network has been assessed, measures implemented, and teams briefed on their priorities – then what? All the ingredients for downtime prevention must come together in the right mix and be focused on the right areas to cater for the business’ specific needs.

The process of establishing these frameworks can be drawn out and arduous, which inevitably takes time away from business growth opportunities like R&D, service improvements or identifying efficiencies. Working with a partner can alleviate this stress and create room for growth in a secure environment.

Network monitoring for cyberattacks is a 24x7x365 task, this always-on state of constant vigilance can be a huge drain for IT security teams. By collaborating with seasoned managed service security providers (MSSPs), organizations can benefit from having "more eyes" monitoring their network architecture and corporate IT. MSSPs are able to instantly monitor and address any issues, freeing up internal IT staff to concentrate on making the best choices possible to maintain business continuity.

Downtime prevention is a competitive advantage

As customer expectations continue to rise and expect faster connectivity, the urgency to ensure business continuity has never been greater. Often the best way to illustrate the importance of downtime strategies is to put it into financial terms, securing leadership commitment by equating it with a loss of future income and brand depletion.

A company's business continuity and disaster recovery strategies will be unique to them, and the decision to concentrate their efforts internally or enlisting the help of partners depends on their size and needs. What matters, though, is that downtime prevention stays a priority. Businesses can reduce downtime and assure continuity by combining novel technologies and frameworks, to react quickly should the worst happen.

We've compiled a list of the best Disaster Recovery services.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Top digital loan firm security slip-up puts data of 36 million users at risk

Mon, 02/24/2025 - 22:11
  • Indian loan company Vivifi has reportedly suffered a data breach
  • 36 million files were left exposed
  • These consisted primarily of personally identifiable information (PII)

A leading digital lending app has apparently exposed sensitive customer data after a misconfigured Amazon AWS S3 was bucket left unsecured without authentication.

Cybernews researchers discovered loan provider Vivifi left 36 million files of Know Your Customer (KYC) documents open online. The primary risk after a data breach is that criminals will use your information to apply for credit cards, loans, or bank accounts in identity theft or fraud schemes - so a loan company having customer information compromised would make it almost too easy for cybercriminals.

Included in the leak were passports, ID cards, driving licenses, utility bills, bank statements, and loan agreement letters, among other things - here’s what we know so far.

Ongoing investigation

Researchers discovered the leak on November 28, 2024, and the bucket wasn’t closed until January 16, 2025, meaning criminals had over a month to find and access the data - although there’s no evidence to suggest any did - only an internal forensic audit would determine this.

Know Your Customer (KYC) documents are used by financial institutions to ensure they comply with regulations and laws with regards to proof of identity, address, and income. Unfortunately though, this is all a cybercriminal would need to take out a loan in a victim’s name, or to craft particularly compelling social engineering attacks.

“For instance, attackers could use leaked loan agreement details or bank information to request urgent payments or account verification,” Cybernews researchers said.

“In some cases, these personal details can be aggregated and sold on the dark web, further escalating the danger and complicating efforts for victims to protect their privacy and secure their identities,” the team added.

Data breaches are all too common, and fintech firms aren’t immune. Earlier in 2025, Mexican FinTech firm Miio suffered a similar data breach which exposed millions of files of sensitive data - although significantly fewer than the Vivifi leak.

Serious risk for customers

This data breach is, unfortunately, the perfect opportunity for an attacker. The KYC documents are exactly what cybercriminals need to facilitate identity theft and fraud. With the identifying documents and personally identifiable information (PII), attackers can take out a loan, credit card, or create new bank accounts in your name.

To stay safe from this, the key is staying alert and monitoring your accounts. There are identity theft protection plans for individuals and for families, which essentially do the monitoring for you, and often provide $1 million or more in insurance plans, as well as dark web monitoring and anti-malware software - which can be very tricky to set up on your own.

If you want to do the monitoring yourself, perhaps you haven’t been directly impacted by a breach but want to stay protected - then here are the things to keep an eye out for.

First, is your bank statements, accounts, and transactions - if you see any suspicious activity, alert your bank immediately and freeze or pause your card if you can.

Next, create a strong and secure password for each individual account, or at least for the ones which hold financial, health, or sensitive information - and if a service you use is involved in a breach or cyberattack, make sure you change the password straight away.

Although it’s a pain, enabling multi-factor authentication or MFA is a great added layer of protection against intruders, so for those accounts with sensitive information - it's vital.

When PII is leaked, there’s always an added danger of social engineering attacks like phishing, which will use the data from the breach to determine which services you use regularly, what your interests are, or even your friends and family.

From there, attackers will send an email impersonating one of the above, and will trick you into clicking a malicious link, scanning a QR code, or handing over your details to them.

Be on the lookout for any unexpected communications, and look closely at the sender of emails - if you’re not sure, then don’t press any links, and search up what the legitimate email address would be - or contact the company directly through their website.

Remember, your bank will not ask you for your account details over the phone or through email - and they won’t ask you to transfer your funds to a different account.

You might also like
Categories: Technology

I tried ChatGPT's Dall-E 3 image generator and these 5 tips will help you get the most from your AI creations

Mon, 02/24/2025 - 21:00

If you use ChatGPT much, you've likely experimented with DALL-E 3, OpenAI’s latest iteration of an AI image generator. DALL-E 3 can be shockingly good at bringing your ideas to life but sometimes shockingly bad at understanding certain details or just shocking in what it chooses to emphasize. Still, if you want to see a specific scene move from your head to your screen, DALL-E 3 is usually pretty helpful, it can even make hands write.

But here’s the thing, DALL-E 3 is still an AI model, not a mind reader. If you want images that actually look like what you’re imagining, you need to learn how to speak its language.

After some trial and error (and a few unintentional horrors), I've become fairly adept at speaking its language. So here are five key tips that will help you do the same.

Polish in HD

DALL-E 3 has a quality mode called ‘hd,’ which makes images look sharper and more detailed. Think of it like adding a high-end camera lens to your AI-generated art – textures look richer, lighting is more refined, and things like fabric, fur, and reflections have more depth.

Check out how it looks in this prompt: "A rendering of a close-up shot of a butterfly resting on a sunflower. Quality: hd."

(Image credit: Image created with OpenAI's DALL-E 3) Play with aspect ratio

Not every image has to be a square. DALL-E 3 lets you set the aspect ratios, which may seem minor but can be huge if you want to make something look more cinematic or like a portrait.

Square is fine, but why limit yourself when you can make something epic? This is especially useful for social media graphics and posters, like the one below, which had the prompt: "A vertical poster of a vintage travel advertisement for Paris, size 1024x1792 pixels."

(Image credit: Image created with OpenAI's DALL-E 3) Think like a film director

To get an image capable of evoking emotion, sometimes it helps to think like you're a photographer in the real world. Think about camera angle or composition techniques; look them up if necessary. The result can dramatically change how an image looks.

Instead of a flat, dead-on image, you can request angles like close-up, bird’s-eye view, or over-the-shoulder. The same goes for composition styles and terms like ‘symmetrical composition’ or ‘depth of field.’

That's how you can get the following image from this prompt: "A dramatic over-the-shoulder shot of a lone cowboy standing on a rocky cliff, gazing at the vast desert landscape below. The sun sets in the distance, casting long shadows across the canyon. The cowboy's silhouette is sharp against the golden sky, evoking a cinematic Western feel."

(Image credit: Image created with OpenAI's DALL-E 3) Iterate, iterate, iterate

One of DALL-E 3’s lesser-known but highly effective tricks is telling it what not to include. This helps avoid unwanted elements in your image. That might mean specifying negative elements like colors, objects, or styles you don't want or refining the style and mood by what you don't want it to feel like.

That's how I got the image below, using the prompt: "A peaceful park in autumn with a young woman sitting on a wooden bench, reading a book. Golden leaves cover the ground, and a soft breeze rustles the trees. No other people, no litter, just a quiet, serene moment in nature."

(Image credit: Image created with OpenAI's DALL-E 3) Be overly specific

Think of DALL-E 3 as a very literal genie: it gives you exactly what you ask for, no more, no less. So if you type in “a dog,” don’t be surprised when it spits out a random dog of indeterminate breed, vibe, or moral alignment. The more details you include – like breed, color, setting, mood, or even art style – the better the results.

As an example, You might start with: “A wizard casting a spell," but you'd be better off submitting: “An elderly wizard with a long, braided white beard, dressed in emerald-green robes embroidered with gold runes, conjuring a swirling vortex of blue lightning from his fingertips in a stormy mountain landscape.” You can see both below.

(Image credit: Image created with OpenAI's DALL-E 3)

(Image credit: Image created with OpenAI's DALL-E 3) You might also like
Categories: Technology

Gabby Petito murder documentary sparks viewer backlash after it uses fake AI voiceover

Mon, 02/24/2025 - 18:00
  • Netflix’s American Murder: Gabby Petito has upset some people for using an AI-generated voice to narrate Petito’s journal entries.
  • Despite permission from Petito’s family, critics argue the AI voice raises ethical concerns.
  • This isn't the first occurrence of such debate, and it will likely keep happening as the technology improves.

Netflix’s latest true-crime docuseries, American Murder: Gabby Petito, has stirred up a heated debate over how to deploy AI to mimic the voices of people who have passed away. The filmmakers employed AI to recreate Petito's voice and have it narrate excerpts from her personal writings, which has reportedly made many viewers feel uncomfortable and raised ethical concerns about using AI to give voice to the deceased.

The three-part series chronicles the 2021 murder of 22-year-old Petito at the hands of her fiancé, Brian Laundrie. It pieces together her final months through interviews, personal videos, and social media posts, evoking how the tragedy happened in real-time on the internet. True crime aficionados famously dissected every frame of Petito’s travel vlogs before authorities found her remains in Wyoming.

At the start of the series, a disclaimer appears: “Gabby’s journal entries and text messages are brought to life in this series in her own voice, using voice recreation technology.” That means the voice narrating parts of the documentary isn’t actually Petito’s but a synthetic recreation made with an AI model. Netflix has said the filmmakers received permission from Petito’s family to do so. That hasn’t stopped some people from vocalizing how eerie the AI-generated voice feels. Social media content creators have racked up hundreds of thousands of views discussing it.

AI ghosts

This isn't the first controversy over AI-generated voices. Roadrunner: A Film About Anthony Bourdain faced similar criticism when its director revealed that parts of the documentary featured AI-generated narration of Bourdain’s own words. That movie didn't indicate which bits were narrated by the AI or by Bourdain, which led many to feel that the technique was deceptive.

Filmmaker Michael Gasparro defended the decision in an interview with Us Weekly, saying the team wanted to tell the story as much “through Gabby’s voice as possible.” They had access to a wealth of her journals, notes, and online posts and thought AI narration would bring them to life in a more powerful way. “At the end of the day, it’s her story.”

Technology has always shaped the way we tell stories, but AI presents a new challenge, especially when it comes to memorializing people who can no longer speak for themselves. Robert Downey Jr. has vowed that AI will never replicate him on screen, while James Earl Jones secured a deal with Disney before passing away, allowing them to use his voice for Darth Vader under certain circumstances.

Meanwhile, ElevenLabs has inked deals with the estates of James Dean, Burt Reynolds, Judy Garland, and Sir Laurence Olivier to let it add AI versions of their voices to its Reader app. As deepfake technology and voice cloning become more sophisticated, filmmakers and media companies will have to reckon with how (and if) these tools should be used to tell real-life stories.

You might also like
Categories: Technology

China 'sinks' 400 servers equivalent to 30,000 gaming PCs as it powers ahead with massive underwater data center project - but I wonder what GPU they use

Mon, 02/24/2025 - 16:06
  • Hainan’s underwater computing cluster matches the power of 30,000 gaming PCs operating simultaneously
  • Seawater-cooled AI centers reduce energy costs and enhance security
  • Microsoft abandoned underwater data centers after early trials

China has deployed 400 high-performance servers beneath the sea as part of an expanding underwater data center in Lingshui, Hainan.

China Media Group says this infrastructure will complete a year’s worth of computations for an average PC in just one second and can enable DeepSeek’s AI assistant to handle 7,000 conversations per second.

The newly-installed module, measuring 18 meters long and 3.6 meters in diameter, is linked to an existing facility to form a computing cluster designed to support AI-driven applications — providing computing power equivalent to 30,000 high-end gaming PCs operating simultaneously.

Expanding China's AI infrastructure

Xu Tan, vice president of Highlander, a Shenzhen-listed maritime technology firm and a key player in China's underwater data center expansion, highlighted the advantages of submerged data facilities.

"With the advent of the 5G and even 6G era, data will increase exponentially, and the construction of undersea data centers could meet the future demands of this growth," he said.

The Hainan underwater data center, first launched in 2023, was the first commercial project of its kind. According to CGTN, the long-term plan entails deploying up to 100 data cabins in multiple phases.

The project aligns with China’s strategy to enhance its AI capabilities, with 219 intelligent computing centers launched across 81 cities from 2022 to 2024, according to IDC (originally in Chinese).

The firm also projects China's intelligent computing capacity will grow at an annual rate of 33.9% until 2027, playing a crucial role in AI research, data processing, and automation across various industries.

Almost 10 companies have signed agreements to use the computing power of underwater data centers for AI model training, industrial simulations, game development, and marine research.

However, this project will require thousands of submerged servers, and the specific hardware to be used remains unknown. It is likely that high-performance AI accelerators, such as Nvidia’s H100 or Huawei’s Ascend 910, will be considered.

China has been pushing for domestic alternatives, so advanced AI chips from companies like Biren Technology or Loongson are also possibilities.

While China moves forward with plans to deploy up to 40,000 underwater servers in the coming years, American companies have taken a more cautious approach. Microsoft previously experimented with an underwater data center off the coast of the UK in 2018, but after retrieving it in 2020, the company ditched its National Park underwater data center plans.

Via Globaltimes

You may also like
Categories: Technology

Can 18A save Intel from being devoured by its rivals – and Wall Street?

Mon, 02/24/2025 - 16:01

In case you haven't been paying attention, Intel has been getting banged up lately in both the press and on Wall Street. Over the last 12 months, it's lost just under 43% of its share value as well as its CEO, Pat Gelsinger. It's watched Nvidia and AMD make major gains in the data center market at its expense, and its most recent client processors, the Intel Core Ultra 200S series, were rather underwhelming, especially for gaming.

Probably the biggest concern for Intel was its Q3 2024 earnings, which saw the company post a staggering $16.6 billion loss, the largest the company had ever seen. And while this was generated almost entirely by accelerated depreciation charges and the restructuring required after laying off 15,000 workers, rather than products sitting unsold on the store shelves, it still went off like a bomb on Wall Street and in Washington, where talk about how Intel could be "saved" remains rampant.

A lot of this talk has centered on Intel Foundry, the division of the company that actually manufactures semiconductors. Under Gelsinger, Intel invested billions of dollars into developing leading-edge process technology that could compete with Taiwan Semiconductor Manufacturing Company (TSMC), which manufactures chips for AMD, Apple, Nvidia, and even Intel, among many others.

So far, those efforts haven't borne fruit, and there have been many, many calls for Intel to dump its foundry business and focus on designing processors and outsourcing the actual manufacturing to TSMC.

All of this makes the newest process technology from Intel Foundry, Intel 18A, a make-or-break proposition for Team Blue, and no matter where you stand on the AMD vs Intel vs Nvidia, you should hope that Intel pulls off a miracle here.

What is a process node and what makes Intel 18A so special?

(Image credit: Intel)

Process node technology is very in-the-weeds stuff, and for someone looking to buy the best laptop or best processor for their PC, the question of which process node a chip was fabricated on rarely enters the discussion, even among tech enthusiasts.

A process node is the set of specific manufacturing processes used to fabricate a silicon wafer containing the chips that go into computers, as well as different innovations and features these chips include.

Traditionally, these nodes are referred to by a specific nanometer designation, i.e., a 3nm node, that is used to represent the physical length of the transistor gate. Over the last decade, though, these designations have become more marketing than anything, and the nanometer designation isn't directly tied to the physical size of the transistors.

Rather these designations say that a chip performs as well as a specific nanometer chip would if it were possible to produce transistors at such small scales, which nowadays is largely impossible (welcome to the end of Moore's Law). Now, these designations largely represent generational leaps in technology, and TSMC's process technology is currently the best there is.

But where and by whom the chip that powers your PC or graphics card is made can affect everything from its price to its availability. Right now, the vast majority of advanced computer chips, whether laptop processors or data center chips are manufactured by TSMC, with its most advanced N3 process node being in the most demand.

(Image credit: Alexander_Safonov / Shutterstock)

TSMC's next-gen process node, N2, is slated for volume production sometime in 2025, meaning it will be making production chips for AMD, Apple, Nvidia, and others later this year. The '2' in N2 is meant to represent 2nm, which puts it well beyond anything rival Samsung or Intel foundries have been able to produce.

Intel Foundry's 18A process, meanwhile, is a 1.8nm process, making it even more advanced than TSMC's. If Intel can deliver on the promises it has made about 18A, it would be the most advanced process technology in the world and would immediately upend the chip fabrication industry.

The fact that these chips would be produced in the United States makes the proposition even more enticing for American companies like Apple who have faced longstanding criticism over their offshore manufacturing and supply chain.

The most important result of Intel 18A's success for consumers, though, would be the long-term decrease in advanced chip prices and a more stable supply across several industries dependent on these advanced chips.

The COVID-19-driven supply chain issues in 2020 and 2021 revealed a real weakness in the globalized production model. While globalization has (mostly) led to lower prices for consumers, COVID showed that it only works when everything is running smoothly. Any disruption in one of the links in the supply chain can be felt for years in terms of higher prices and lower stock of the products we want to buy.

Having nearly all our advanced semiconductor supply tied to Taiwan is a recipe for disaster

(Image credit: Sundry Photography / Shutterstock)

Taiwan is a lovely country and it deserves all of the prosperity its semiconductor industry has brought to its people. But it is also a geopolitical crisis point vis-a-vis China, which believes Taiwan belongs under mainland rule.

This potential conflict over Taiwan means the global supply of the most advanced semiconductors could be threatened.

The existing status quo benefits Taiwan, as its semiconductor industry acts as a 'silicon shield' for the island, but for the rest of us, we're pretty much depending on China and the US to not escalate a conflict that, in even the best case scenario, could cripple the flow of advanced chips that the modern global economy depends on.

Reducing this dependence on TSMC is reason enough to want Intel 18A to succeed. If Intel can provide a genuine alternative for the most in-demand chip technology with the stability that comes from US production, it'll provide valuable insulation for the global economy and inject much-needed competition into the chip fabrication industry, bringing prices down for everyone.

What would 18A mean for Intel?

(Image credit: Intel)

Beyond the geopolitical issues, a successful rollout and adoption of 18A among industry customers like AMD, Nvidia, and possibly even Apple, would be a massive source of revenue for Intel separate from its own processor business, as well as providing an 'in-house' manufacturer of its processors, lowering their cost and giving it a competitive advantage over rival AMD.

Understandably, Intel is very bullish on 18A. It has to be since the future success of the company relies on 18A delivering the kind of performance that industry customers need, especially as AI is placing extraordinary demands on existing hardware.

If Intel 18A fails to establish Intel Foundry as a serious competitor to TSMC, it will likely be spun off as Wall Street is demanding. Without the support of the Intel Client side of the business to help it ramp up, it'll likely never reach the kind of advanced node technology that TSMC has, leaving us all dependent on a single supplier for cutting-edge chips and all the vulnerabilities and added cost that entails.

You might also like...
Categories: Technology

The rise of the TV monitor: MSI joins the likes of Samsung and LG with a smart monitor that offers Google TV and even a remote control

Mon, 02/24/2025 - 14:53
  • MSI’s Multi-Platform Streamer Prime app - no extra software needed
  • Integrates Google TV with thousands of movies and shows
  • The wireless display feature supports Google Cast and Miracast

MSI has entered the smart monitor market with the launch of the Modern MD272UPSW, a UHD 4K display.

The 27-inch IPS panel features a 3840 × 2160 resolution and a 60Hz refresh rate, with 94% Adobe RGB, 98% DCI-P3, and 127% sRGB coverage. It also offers a 300-nit brightness level, an anti-glare surface, a 178° viewing angle, and a 4ms (GtG) response time, ensuring sharp visuals and vibrant colors.

MSI, known for gaming laptops, now joins the likes of Samsung and LG, who, with products like the LG 32-inch UltraGear OLED and Samsung ViewFinity S9, are embracing the smart business monitor trend — blending business and entertainment features into a single display.

Google TV integration for all-in-one entertainment

Unlike traditional business monitors, the MD272UPSW includes Google TV, for access to over 400,000 movies and TV episodes. Users can also browse through more than 10,000 apps and 800 free live TV channels.

It also integrates the Multi-Platform Streamer Prime app, allowing users to stream live content across multiple platforms like YouTube, Twitch, and Facebook without additional software.

With Google Assistant integration, voice commands can be used to search for shows, open apps, and control the monitor, while the included remote makes navigation effortless.

The MD272UPSW is still definitely designed for professionals, featuring a wireless display function with Google Cast and Miracast, plus Multi Control and KVM (Keyboard, Video, Mouse) functionality for allowing users to operate two devices with a single keyboard and mouse.

For seamless connectivity, it supports Wi-Fi 5, Bluetooth 5.0, HDMI 2.0b, DisplayPort 1.4a, LAN (RJ45), and USB Type-C with 65 W power delivery. The monitor also includes a headphone jack, two USB 2.0 Type-A ports, and two 3W Dolby Audio speakers.

Via TechPowerUp

You may also like
Categories: Technology

This robot video is weirdly depressing, and I've never been so happy to be human

Mon, 02/24/2025 - 14:30

It's rare that a robot video fills me with sadness, but this new one from 1X featuring the company's new Neo Gama humanoid robot left me in a state of ennui.

Neo Gamma is an update to the Neo Beta 1X introduced six months ago. At the time, the company claimed its black and gray humanoid robot was undergoing home trials. In the video, it showed the bot briefly interacting with (even hugging) a human companion. It left me and other roboticists I talked to skeptical. Home humanoid robots are generally thought to be a decade out, but 1X appeared to be trying to close that gap significantly.

Recently, the company unveiled Neo Gamma, a robot with numerous aesthetic and technical improvements. There are new "emotive" LED ear rings that the company thinks will help improve communication. I assume this is because the rings light up when you're talking to the robot, which features microphones and speakers.

They've redone the body cover and almost made it a more attractive beige, making it softer and safer for the home.

Movement's gotten an upgrade, too. Neo Gamma's arms can now swing, and its walk is smoother than that of the Beta model. Additionally, the robot can now sit down in a chair.

As with Neo Beta, Neo Gamma integrates AI. For instance, the updated visual manipulation model will make it possible for Gamma to handle objects it's never seen before. Overall, 1X claims on its website, "NEO Gamma’s design opens the door to start internal home testing—a first step in creating fully autonomous humanoids."

To illustrate this point, 1X released this launch video, which shows Neo Gamma operating in a typical home. It cleans, makes and serves coffee, pours wine, and collects the groceries from its owner. Neo Gamma even cleans windows.

But it's a lonely existence. Most of the time, the couple in the video ignores Neo Gamma, even as it's serving and working around them. When it serves coffee, they barely look up. As it vacuums the rug, it doesn't even get a glance. There is one touching moment where Neo Gamma helps hang a picture and even gets a thumbs up, but that is the extent of real human engagement. At the end of the video, the couple is enjoying a meal in the dining room, one that I bet Neo Gamma prepared and served, and the robot is in the other room alone. It takes a seat on the couch and stares into space.

Is this the "life" we anticipate for our humanoid companions – with us, but separate? Even though I assume these robots will have no feelings, I'm sure others and I will anthropomorphize them and start to thank them, chat, and engage in a more human way. I guess I wonder if 1X could have shown me a bit more natural human-to-robot interaction.

1X hasn't set a price or delivery date for Neo Gamma, but you can join the wait list to become the robot's mas...er...beloved owner.

In the meantime, I think I need to cheer up and go watch a fun cat video.

You might also like
Categories: Technology

Fraudsters seem to target Seagate hard drives in order to pass old, used HDDs as new ones using intricate techniques

Mon, 02/24/2025 - 13:26
  • Seagate Exos and IronWolf Pro HDDs are prime targets for scammers
  • Scammers alter QR codes and even drive serial numbers
  • Toshiba and Western Digital are not as targeted as Seagate — why?

The controversy of fraudsters modifying used Seagate hard drives to appear unused despite having been powered on for thousands of hours rages on.

Exos HDDs were initially targeted, but new evidence from Heise (via ComputerBase — both originally in German) suggests IronWolf and IronWolf Pro NAS drives with capacities between 8 TB and 16 TB are now also being drawn into the scam.

Preowned units of the fastest hard drives can appear new if key data such as SMART (Self-Monitoring, Analysis, and Reporting Technology) parameters are tampered with.

How scammers manipulate hard drive data

Some of these drives have been found to have logged over 27,000 operating hours. However, users can verify a drive’s true condition using tools like smartmontools to retrieve hidden operational data.

Scammers also alter product labels and QR codes to bypass Seagate’s warranty verification system. Instead of directing users to a page displaying accurate product details, these modified QR codes redirect to Seagate’s warranty check but do not provide the serial number or storage capacity.

Another method used is serial number manipulation, wherein fraudsters take serial numbers from newer drives and attach them to old units, tricking Seagate’s system into displaying an extended warranty period.

However, this system often calculates exactly five years of warranty from their supposed production date, which is a potential red flag that worried customers can investigate.

Experts suggest that potential buyers can check certain logs - such as Self Test Logs or SATA Phy Event Counters - to determine if a drive has been previously used.

Seagate has acknowledged the issue, confirming that fraudulent practices are affecting IronWolf and Exos HDDs. The company is currently investigating the matter to address these concerns.

In the meantime, buyers are advised to be cautious when purchasing Seagate hard drives from unofficial sellers and to verify product details using multiple sources before making a purchase.

So far, there have been no confirmed reports of similar scams involving Toshiba or Western Digital (WD) hard drives. This raises the question: why is Seagate the primary target?

One possible reason is that Seagate’s verification system relies on data that fraudsters find easier to manipulate; unlike Seagate, WD and Toshiba do not use the same FARM value system.

You may also like
Categories: Technology

Hackers steal over $1bn in one of the biggest crypto thefts ever

Mon, 02/24/2025 - 12:56
  • Bybit confirms suffering a large cyberattack
  • Hackers stole approximately $1.5bn worth of Ethereum
  • Their identities are not confirmed, but researchers speculate it was Lazarus

One of the biggest cryptocurrency exchanges in the world has suffered a devastating cyberattack in which it lost approximately $1.5 billion worth of Ethereum.

The attack against Bybit was confirmed by the company’s CEO, Ben Zhou, who said the threat actors siphoned the exchange’s reserves, and not customer funds.

Despite this being the biggest heist in crypto’s history, Zhou noted the company remains solvent and is under no existential threat, and commended the industry’s big players, which rallied behind the victims and offered help.

Lazarus

The attack itself was quite sophisticated. Bybit kept ETH in a multi-signature cold wallet, a method that’s considered the safest possible. It also means that to move any funds, multiple people would need to sign the transaction.

Apparently, the attackers somehow managed to compromise all of the employees involved in fund transfer, and when the company wanted to pull funds from cold storage into a “hot wallet” to support its everyday activities, the attackers were able to redirect the funds.

All of the involved people never knew what happened, because on their monitors, all of the information checked out.

The news sent shockwaves throughout the cryptosphere. Hundreds of thousands of people initiated withdrawals of their money from Bybit, in fears that the company would not be able to serve everyone (as was the case with Celsius back in 2021). Ethereum dropped roughly 4% on the news.

For the first time, in face of extremely bad news, the crypto industry showed incredible resilience. Usually, news such as this one would send not just Ethereum, but Bitcoin as well, and with them most other currencies tumbling, wiping out a significant portion of their value in a matter of hours. However, Ethereum lost “just” 4% (which is almost negligible in the crypto world) and rebounded relatively quickly. Bybit served all of its customers during the “bank run”, and continues operating normally.

The identity of the attackers is not yet confirmed, although some researchers believe this to be the work of Lazarus, an infamous North Korean state-sponsored threat actor. Indeed, Lazarus is known for targeting crypto businesses and, being on North Korea’s payroll, definitely has the means to pull off a heist such as this one.

Via The Guardian

You might also like
Categories: Technology

Microsoft set to rival Google, IBM with first-of-its-kind quantum chip with topological core architecture

Mon, 02/24/2025 - 12:32
  • Microsoft unveils a quantum chip with a Topological Core for stable and scalable qubits
  • Majorana 1 features eight topological qubits, aiming for a million-qubit scale
  • Breakthrough is comparable to how semiconductors revolutionized modern computing

Microsoft has unveiled Majorana 1, a quantum chip built on a Topological Core architecture, marking a huge step forward in its quantum computing efforts.

The company says this new chip, which positions the tech giant alongside rivals Google and IBM in the race for large-scale quantum computing, will lead to devices capable of solving industrial-scale problems in years rather than decades.

The chip is based on a topoconductor, a newly-engineered material that can observe and control Majorana particles - a discovery Microsoft represents no less than a new state of matter, which it has used to create a more stable and scalable qubit in a breakthroughit compares to how semiconductors transformed modern computing.

A clear path for scaling

“We took a step back and said ‘OK, let’s invent the transistor for the quantum age. What properties does it need to have?’” said Chetan Nayak, Microsoft technical fellow. “And that’s really how we got here – it’s the particular combination, the quality and the important details in our new materials stack that have enabled a new kind of qubit and ultimately our entire architecture.”

Microsoft adds Majorana 1 offers a clear path to scaling quantum systems. For now, it has eight topological qubits on a single chip, marking the first step toward its goal of reaching one million qubits. Achieving this scale will be essential if quantum computing is to drive advancements in industries such as healthcare, environmental science, and manufacturing.

“Whatever you’re doing in the quantum space needs to have a path to a million qubits. If it doesn’t, you’re going to hit a wall before you get to the scale at which you can solve the really important problems that motivate us,” Nayak said. “We have actually worked out a path to a million.”

The chip is built using a materials stack made from indium arsenide and aluminum, designed and fabricated atom by atom. The Topological Core architecture resists errors at the hardware level, making it more stable than current approaches.

You might also like
Categories: Technology

Apple’s latest iOS update improves CarPlay, but not everyone will be able to access it

Mon, 02/24/2025 - 11:41
  • iOS 18.4 beta update adds a third row of apps in Apple CarPlay
  • Not every infotainment system is compatible
  • The update is welcome, but we still await news on CarPlay 2.0

Some Apple iPhone users are already experiencing some of the admittedly minor updates that the latest iOS 18.4 beta update brings with it, including smarter priority notifications using Apple Intelligence.

However, there has been a more subtle change to the Apple CarPlay experience, which has previously gone announced and has been only been discovered by some users by chance.

Upon plugging into a vehicle’s infotainment system, either wirelessly or via a cable, a Threads user (below) found that the Apple CarPlay app display now shows a third row of applications on the main screen, with three rows of four increasing the number of apps that can be displayed without having to swipe to reveal more.

Post by @jacecraftmiller View on Threads

Despite Apple CarPlay being introduced in March 2014, it has only really enjoyed numerous minor updates to how it looks, feels and performs, seemingly ignoring the fact that many modern vehicles now come with enormous infotainment displays.

The most recent update appears to address this issue, scaling up in a proportion to the screen size it is being displayed on.

That said, there is currently no news on the parameters required to enjoy the extra row of applications, only that it seems to work on those larger infotainment displays, particularly those with a portrait orientation.

CarPlay 2 can’t come soon enough

(Image credit: Apple)

Apple initially said that we would see an all-new version of its CarPlay system in 2024, but that suggested timeline has already elapsed and we are still waiting to see what comes next.

Far from simply being a way to mirror a handful of apps from your iPhone, Apple CarPlay 2 promises greater integration with all of the screens found in a modern vehicle, effectively taking over everything from the digital instrument cluster to the infotainment system.

Apple revealed that it was working with Porsche and Aston Martin on a brand-specific system that would stay true to the marques’ heritage and distinct design, but would effectively form the operating system upon which everything runs.

This would mean that applications and Apple’s user interface would be available from all of the digital touch points, including the digital instrument binnacles and passenger-facing touchscreens in the front and rear seats.

Porsche is arguably the only automotive manufacturer to harness the power of Apple’s Automaker toolkit and expand the Apple CarPlay offering within its vehicles so far.

Introducing more Apple functionality into its My Porsche app negates the need to exit Apple CarPlay to do things like change the radio station, heat for cool the cabin and check on vehicle state of charge and other settings.

But this is still some way off the levels of integration that Apple CarPlay 2 have previously promised, and this could be part of the problem.

In order to take over an entire dashboard, Apple has had to work with notoriously slow automotive manufacturing giants, effectively asking permission to access both vehicle and user data, which is likely something legacy automakers haven’t been particularly comfortable with.

You might also like
Categories: Technology

The iPhone 17 might miss out on Apple’s latest new feature – but it’s not one you’d expect

Mon, 02/24/2025 - 11:39
  • A new report suggests the iPhone 17 will not get Apple's new C1 modem
  • The iPhone 17 Air is, however, tipped to get the new chip
  • Apple may opt for a MediaTek modem for the four main iPhone 17 models

With each new generation of iPhone, we expect to see Apple fit its high-end flagship phones with its latest and greatest features – for example, we’re expecting the iPhone 17 Pro and iPhone 17 Pro Max to come equipped with updated video capabilities, a refreshed design, and a faster processor, as well as the most cutting-edge components within the phone itself.

However, a new rumor suggests that Apple will be skipping its latest self-designed internal component when it comes to the iPhone 17 family – if this rumor holds true, Apple’s next handsets won’t be getting its new C1 cellular modem.

This comes from a report from publication The Information (via PhoneArena) that suggests the iPhone 17, iPhone 17 Plus, iPhone 17 Pro, and iPhone 17 Pro Max will use a MediaTek 5G chip for Wi-Fi, cellular connectivity, and Bluetooth, rather than the Qualcomm modem found in the iPhone 16 lineup.

The C1 modem was only recently revealed when Apple debuted the iPhone 16e, the first Apple device to sport Apple's new modem.

Apple debuted the new C1 modem in the recently-released iPhone 16e (Image credit: Future)

Interestingly, the report also suggests that the iPhone 17 Air will get the C1 chip, and that this inclusion will play a substantial role in allowing the iPhone 17 Air to be so much thinner than its full-sized siblings.

Apple has been seeking ways to reduce its reliance on external component manufacturers for the past few years, most prominently by developing its own chips and chipsets.

If Apple has a rival in the mobile chip space, it would surely be Qualcomm, which equips many of the best Android phones with its Snapdragon series chipsets. Its current flagship processor, the Snapdragon 8 Elite, beat Apple’s own A18 Pro chipset in benchmarks when we first got to grips with it last year.

From this perspective, it makes sense that Apple would want to stop giving Qualcomm its business – though Apple is no stranger to buying components from rival firms, equipping the iPhone lineup with panels and numerous parts made by Samsung.

In any case, most users won’t notice much of a difference between one modem or the other – but limiting a major new hardware feature to a mid-range phone and an ultra-thin spinoff would be strange behavior from Apple. Plus, As 9to5Mac notes, the C1 chipset might not stick around for long – we’ve heard that Apple eventually plans to merge the function of the C1 with its main A series chipsets to create an integrated platform.

In any case, we don’t expect to hear official information about the iPhone 17 family until much later this year. Until then, the above is mostly based on rumors – be sure to check out our list of the best iPhones for a refresher on the top Apple handsets that are currently available.

You might also like
Categories: Technology

I'm tired of waiting for AMD's entry-level Ryzen 9000 series chips

Mon, 02/24/2025 - 11:39

Come on, AMD, where the hell are your budget X3D chips? Actually, scrap that - where are the Ryzen 3 series, or even the 5 series? I know those aren't exactly super-exciting top-tier product lines, brimming with insane Cinebench numbers or slightly higher frame rates than the competition in whatever the most popular game of the month is, but they're products that we seriously need as a community - if for no reason but the health of this beautiful PC-building hobby of ours.

What's worse is, by all accounts, (certainly for the 3 series) it's a segment that's been missing in the custom PC space since the rather excellent Ryzen 3 3300X way back in 2020. And with that, I'm talking about a full-fat design, complete with all of its PCIe lanes, and more. No G-series chips standing in pretending to be something it's not, aimed at eSports gamers.

Cheap as chips, as the British say. (Image credit: Future)

Without champions at the budget end of the spectrum - the Core i3s, the Ryzen 3s - the average cost of a good rig is only going to steadily increase. Not only does this effectively gatekeep our hobby, one that was once readily accessible to anyone looking to save a bit of cash, but it also encourages companies to push prices higher. Motherboards, RAM, SSDs, PSUs, cases, you name it. It introduces this weird, almost pseudo-elitism to it all. Sorry, you and your family don't have the financial clout to be PC gamers anymore. Perhaps you should try looking at becoming more socially mobile instead.

I get it; PCs are expensive things. As our transistor size shrinks, processors become increasingly difficult and more expensive to fabricate. But I got into this space because my house got struck by lightning when I was young. It fried a rig, and my dad decided to replace the damaged parts rather than buy a whole new system. It wasn't exactly easy, but it was cheaper, and soon enough he discovered he could build his own PCs and get better value for a pittance, and it was fun. I soon followed in his footsteps, and 25 years later here I am. Trying to do that today with the latest hardware, though? Not a chance. You'd have to buy, at minimum, a new motherboard and CPU combo for at least $500.

Stagflation Disaster

Inflation and stagnation haven't helped this whole situation either. Late last year, I wrote an article about this and the rising cost of PC gaming, and the numbers still hold true in 2025. In the last decade, we've seen general inflation climb by around 40%. Wherever you are in the Western world, on average, household income has increased by less than half that. That puts a major strain on budgets and further pushes building custom PCs outside of the reach of many many people. And that's before the US's general purpose and directed tariffs come into play later this year.

Over the years I've watched as builds have become more expensive. Yes, this is in part because the wider industry has introduced ridiculous RGB lighting, and cooling, and gaming chairs, and mechanical keyboards, and more advanced cases, but there's been a slow creep upward in terms of those core products too. Prices have continued upwards at a tedious but consistent rate, $20 here, $40 there, particularly for CPUs and motherboards, generation after generation.

In fact, it's such an accepted thing in our industry that we praise manufacturers when they keep the recommended retail pricing the same as last year's model. Or at least when they announce a product launching like that, only for it to increase by $200 at retail due to stock demand. The problem is, we don't go: "Hang on a minute, how do you have the ROI to manage that to begin with?" Instead, we go: "Awh, how kind? They understand the current inflationary pressures and are giving us a deal".

PC building is fun, but not every custom computer has to be a powerhouse machine. (Image credit: Maingear)

But I digress. We don't have a full-fat Ryzen 3 chip in the 9000 series, and it's not looking likely that we'll get one either. The cheapest Team Red CPU you can currently buy is $245, and that's the 9600X, with the 9600 nowhere in sight after six months. That's not helpful. We need processors that are cheaper, more accessible, and that don't trim back features to encourage you to buy upwards into a chip that you don't actually need.

I always thought it was graphics cards that were the major problem in this field, that the RTX 4060 cost way more than its GTX 660 counterpart back in the day - but ironically those prices have dropped with inflation, and Nvidia continues to support the low-end. Combine that with Intel, now aggressively pursuing that market as well with its Arc GPUs, and it almost feels like that graphics sector is sincerely masking a lot of those price hikes from other categories.

Just imagine it, though. A Ryzen 3 9300X. Four cores, eight threads, 3.5 GHz base clock, 5.0 GHz boost, 32MB of cache, and a 65W TDP, all for $150. Full compliment of 28 PCIe 5.0 lanes, compatibility with all the chipsets, heck, you could lop off the iGPU to save manufacturing costs if you really wanted. What a dream that would be - but one that sadly, remains just that: a dream.

You might also like...
Categories: Technology

Andor season 2 trailer teases Orson Krennic and K-2SO's return, the Death Star's creation, an absurd amount of action and... a Star Wars dance number?

Mon, 02/24/2025 - 11:30
  • Disney and Lucasfilm have finally released the first trailer for Andor season 2
  • The critically-acclaimed series will return for its second and final season on April 22
  • Its confident first teaser is packed with action, drama, humor, and even an apparent dance number

The first trailer for Andor season 2 has finally been released online – and it's an incredibly confident teaser that suggests we're in for a wild ride with the Star Wars show's second and final season.

Released today (February 24) on Star Wars' YouTube channel and social channels, the 90-second long teaser is absolutely packed with enthralling footage. Before I wax lyrical about everything it shows, though, just wrap your eyeballs around it below. Major spoilers follow for Andor's first season from this point on, so proceed at your own risk!

Aside from the self-congratulatory snippets from a variety of season 1 reviews (I'm not bitter that my Andor season 1 review isn't quoted in it, honest!), the trailer is stuffed with crowd-pleasing character reveals, and lots of explosive action and melodrama.

Indeed, we already knew that Ben Mendelsohn's Orson Krennic would be part of Andor season 2's cast – Mendelsohn previously playing the character in the Disney+ show's movie sequel – one that actually preceded the series' release – Star Wars: Rogue One. It wasn't a secret that Cassian Andor's (played by Diego Luna) android bestie K-2SO (voiced by Alan Tudyk) would feature, either, but it's nonetheless pleasing to see both characters appear as part of season 2's first-look footage.

Cassian's journey continues. The second season of #Andor streams April 22, only on @DisneyPlus. pic.twitter.com/lrUJDwlCG3February 24, 2025

There's plenty more to unpack from the teaser. There are a few shots of the Death Star being built, the titular individual carrying out numerous covert missions for the nascent Rebel Alliance, and more returning characters from season 1 including Adria Arjona's Bix Caleen, Forrest Whittaker's Saw Gerrera, Denise Gough's Dedra Meero, Kyle Soller's Syril Karn, Stellan Skarsgard's Luthen Rael, and Genevieve O'Reilly's Mon Mothma. The latter's appearance is particularly interesting, too, as she seems to be enjoying and/or throwing a lavish party. Are we about to see the first musical or dance number in Lucasfilm's iconic galaxy far, far away? It would be a brave move on Disney and Lucasfilm's part but, hey, I wouldn't be against it!

There'll be plenty more information dropping about Andor season 2 in the weeks leading up to its confirmed April 22 debut. For now, here's its plot synopsis: "Season 2 carries [on] the story of Cassian Andor and the emerging rebel alliance over the climactic four years that lead to the discovery of The Death Star and the events of Rogue One... season two will see relationships intensify as the horizon of galactic war draws near. Everyone will be tested and, as the stakes rise, the betrayals, sacrifices and conflicting agendas will become profound."

Want even more details on the hit show's return? My dedicated Andor season 2 guide is full of other intel (I definitely didn't enlist the aid of some Bothan spies to acquire it), including its confirmed cast, other story specifics, and why one of the best Disney+ shows won't be getting a third season.

You might also like
Categories: Technology

A new era for VPN testing? ATMSO publishes the first-ever testing standards in an "important milestone"

Mon, 02/24/2025 - 11:09

Leading cybersecurity company AMTSO has just unveiled its "first-ever" standards for VPN testing.

AMTSO, short for Anti-Malware Testing Standards Organization, is an NGO established in 2008 to improve the quality of anti-malware testing methods. On February 19, 2025, the experts published the VPN Performance Testing Guidelines to help enhance fair privacy and security for VPN assessments.

Regular security and privacy audits carried out by independent experts have become a common practice among the best VPN providers. Third-party audits are users' guarantee their VPN service does what it claims to be.

New VPN testing guidelines

The recent publication, developed by AMTSO's VPN working group, which includes VPN vendors and testers, is only the first in a series of VPN standard guidelines.

"This first release is an important milestone in our mission to provide testing guidance in the world of privacy and security," said John Hawes, COO of AMTSO. "By setting clear benchmarks, we enable fair comparisons and help users make informed choices when selecting a VPN provider."

AMTSO's VPN testing guidelines include key aspects that testers must check when assessing the software's performance.

These include launch on-boot and auto-connection testing to ensure VPNs activate automatically for maximum protection, kill switch tests to verify that no data leaks occur when the VPN connection drops, check whether VPNs effectively block DNS, IP, and WebRTC leaks, and split tunneling testing.

Did you know?

TechRadar's top pick NordVPN has recently proved its no-logs claims with a successful independent audit. It's then official – NordVPN never stored users' data. This was the fifth third-party audit of its privacy policy since 2018.

According to AMTSO's guidelines, testers should also evaluate how VPN services perform under different network conditions while measuring how well VPNs maintain access to websites.

Virtual private network (VPN) apps have become crucial tools for many people worldwide who want to regain control over their online privacy. A VPN encrypts all users' connections to avoid third-party access and spoofs their IP address to keep their online activities anonymous.

IP spoofing is also why increasingly more people are using streaming VPN services to keep up with their favorite shows while traveling.

Even more notably, VPN usage is soaring for the same reason among citizens living under a restricted internet environment as a censorship-resistant tool. As per ProtonVPN's latest data, 119 countries saw VPN usage spiking throughout 2024.

All this interest in VPN solutions makes it even more crucial to follow a standardized process when assessing these services.

AMTSO is now inviting independent testers and VPN vendors to adopt these guidelines. "Moving forward, the AMTSO VPN Working Group will expand its focus to include malware testing within VPN environments and additional security feature evaluations."

Categories: Technology

Pages