Chinese mini PC manufacturer Aoostar has launched its latest device, the GEM12 Pro Max.
Building on the Pro variant introduced earlier in 2024, the new device sports a couple of noteworthy improvements including a DC power port, which provides an alternative to USB-C-based power delivery used in previous models. While the Pro featured a single front-facing USB4 port, the upgraded Pro Max adds another at the rear, a welcome addition.
Like its predecessor, the Pro Max is powered by an AMD Ryzen 7 8845HS processor, offering a base clock speed of 3.8GHz, a boost clock of up to 5.1GHz, and 16MB of L3 cache. This is backed by the integrated Radeon 780M GPU. Users can adjust the TDP to a maximum of 75W, tailoring performance to specific needs.
Drives up to four 8K screensThe GEM12 Pro Max supports up to 64GB of DDR5-5600MHz memory in a single slot and features two M.2 2280 NVMe PCIe 4.0 x4 slots for high-speed storage. For users needing more hardcore graphics performance, the GEM12 Pro Max retains the OCuLink port from the Pro model, located on the front panel. This allows connection to an external GPU, like the DEG1 eGpu, for tasks such as video editing and 3D rendering without using the M.2 slots reserved for storage.
As with its predecessor, the GEM12 Pro Max features a built-in screen and fingerprint reader. Connectivity includes WiFi 6, Bluetooth 5.2, and dual 2.5G Ethernet ports located on the back. The rear panel also houses two USB2.0 ports, an HDMI 2.1 port, and a DisplayPort 1.4. On the front, there are two USB3.2 Gen2 ports, an audio jack, and the power button. The system can drive up to four 8K monitors simultaneously.
The compact device measures 13cm x 13cm x 6cm and weighs 0.66kg. It uses the Glacier 3.0 cooling system with a vapor chamber to maintain stable performance during intensive workloads.
The barebones GEM12 Pro Max is priced from CNY 2299 (approximately $317) and is currently available only in China. Given Aoostar’s history, a global release seems unlikely for now, which is a shame.
You might also likeGood morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need clues.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #550) - today's words (Image credit: New York Times)Today's NYT Connections words are…
What are some clues for today's NYT Connections groups?
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #550) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #550) - the answers (Image credit: New York Times)The answers to today's Connections, game #550, are…
Oh come on, NYT! Seriously? This is just too hard to even remotely count as fun. Will anyone solve this today? Am I just stupid? Pictograms are fine as a concept, and yeah it's a welcome change from the normal Connections routine, shaking things up a bit – but if you're going to do this at least make it a little easier!
Or maybe I just got unlucky, because I was on the right path with a couple of today's groups. It's just that there were so many options that might have worked, I was left scrabbling around in the dark.
For instance, I spotted right away that SAW, ZIPPER, GEAR and COMB were all OBJECTS WITH TEETH, but so is a MOUTH, so I included that twice and lost a couple of guesses there. Ditto MILD OATHS; I had GEEZ (Gs), RATS and NUTS, but thought the fourth was D'OH as in Homer Simpson, based on the picture of a musical score with the word DO written on it. Trouble was, the arrow was pointing to a different note, and I don't read music so never realized that was actually a TI and instead went with a different group; the real final answer was FUDGE.
So actually yeah, let's talk about some of these pictures, because how was anyone supposed to know that bit near the top of the ice cream was FUDGE? It could be anything! It could be chocolate or strawberry sauce, it's not like this is a high-resolution photo. And as for DELTA… I mean that's a triangle.
I'm never playing this game again (until tomorrow).
Yesterday's NYT Connections answers (Wednesday, 11 December, game #549)NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #284) - hint #1 - today's theme What is the theme of today's NYT Strands?• Today's NYT Strands theme is… Shape and bake
NYT Strands today (game #284) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
• Kitchen template
NYT Strands today (game #284) - hint #4 - spangram position What are two sides of the board that today's spangram touches?First: left, 5th row
Last: right, 5th row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #284) - the answers (Image credit: New York Times)The answers to today's Strands, game #284, are…
It's a long, long time since I've baked cookies. Actually, no, I have baked cookies in the past couple of years, but they were just splodges of gooey chocolatey goodness, not perfectly shaped BELLs, STARs, DIAMONDs or HEARTs as you would get if you used a COOKIE CUTTER.
Maybe that's a failing on my part, but they all taste the same, right – so why risk losing some mixture by creating shapes? Then again, I'm not five years old, and my kids are older teens, so pretty shapes are not going to be appreciated in the same way as they would be by a pre-schooler.
My unfamiliarity with the form definitely hurt my Strands game today; I needed a couple of hints to get going, and it was only once I spotted the spangram that things got easier. Maybe I'll bake myself a cookie to cheer myself up.
How did you do today? Send me an email and let me know.
Yesterday's NYT Strands answers (Wednesday, 11 December, game #283)Strands is the NYT's new word game, following Wordle and Connections. It's now out of beta so is a fully fledged member of the NYT's games stable and can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,000 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1053) - hint #1 - Vowels How many different vowels are in Quordle today?• The number of different vowels in Quordle today is 3*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1053) - hint #2 - repeated letters Do any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 2.
Quordle today (game #1053) - hint #3 - uncommon letters Do the letters Q, Z, X or J appear in Quordle today?• No. None of Q, Z, X or J appear among today's Quordle answers.
Quordle today (game #1053) - hint #4 - starting letters (1) Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 0.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1053) - hint #5 - starting letters (2) What letters do today's Quordle answers start with?• M
• C
• S
• D
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1053) - the answers (Image credit: Merriam-Webster)The answers to today's Quordle, game #1053, are…
Still no real strategy for me, but I got lucky with the Quordle gods today, who helpfully provided two words with the same letters except the first one, CRIER and DRIER. Solve one, get one almost free!
They were probably the two toughest words here, but overall it was a pretty easy one today. Makes a change, eh?
How did you do today? Send me an email and let me know.
Daily Sequence today (game #1053) - the answers (Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1053, are…
AMD Virtual Machine (VM) security tools can be bypassed, allowing cybercriminals to infiltrate devices and steal sensitive data, experts have warned.
Security researchers from multiple universities in the EU and the UK outlined how AMD chips come with Secure Encrypted Virtualization (SEV), a security feature designed to encrypt virtual machine (VM) memory to protect it from unauthorized access, including by the hypervisor or other VMs. SEV uses hardware-based encryption keys unique to each VM, ensuring data remains confidential and tamper-proof even in shared environments.
Recently, AMD upgraded SEV with Secure Nested Paging (SNP), an enhancement that should guarantee the integrity of a virtual machine's memory by validating memory page tables and preventing unauthorized modifications by the hypervisor. However, the researchers claim SNP can be bypassed, if the attacker has physical access to the target device. They used a Raspberry Pi Pico to “fake” additional RAM, and exfiltrated secrets from it. They call the attack BadRAM.
Attacks with and without hardwareBy abusing the Serial Presence Detect (SPD) chip on the memory’s module, they created aliases for physical memory, which they could later access.
"In our attacks, we double the apparent size of the Dual Inline Memory Module (DIMM) installed in the system to trick the CPU's memory controller into using additional 'ghost' addressing bits," the researchers said in a research paper titled “BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments”.
"These addressing bits will be unused within the virtually enlarged DIMM, creating an interesting aliasing effect where two different physical addresses now refer to the same DRAM location."
The technique works on DDR4 and DDR5 memory, and there’s even a possibility to use it without hardware, if the SPD chip is left unlocked (which, according to The Register, is sometimes the case).
In response, AMD released a security advisory, and is now tracking the flaw as CVE-2024-21944. It has gotten a severity score of 5.4 (medium). It recommends utilizing memory modules that lock SPD, as well as following physical security best practices. “In addition, the AGESA and SEV FW versions listed below have been released to the Original Equipment Manufacturers (OEM) to mitigate this issue. Please refer to your OEM for the BIOS update specific to your product.”
Further details can be found here.
Via The Register
You might also likeIt might be hard to believe, but we’re just 14 days away from Christmas. The holiday season is here, and I’d bet you’re already spinning your favorite Christmas songs on your preferred music service, like Spotify or Apple Music, but there is a change in the wind with how your next favorite holiday song might be recorded.
Alongside releasing iOS 18.2 for the iPhone, Apple is dropping a major update for Voice Memos, which Michael Bublé thinks is “going to change the way we make music, forever.” Voice Memos has long been used to record tracks, jam sessions, and even ideas for songs by artists, but now the app supports layered Voice Memos recording.
This allows you to layer a vocal recording on top of an existing instrument-based track, all with just your iPhone. However, you will need a new one, specifically an iPhone 16 Pro or iPhone 16 Pro Max with an A18 Pro chip inside. With just that one device, you can play the existing instrumental backing track out of your iPhone’s speakers and use the onboard microphones to record your vocals in real time.
(Image credit: Apple)In fact, that’s how Michael Bublé, Carly Pearce, and producer Greg Wells recorded vocals for their new Christmas song, Maybe This Christmas, on an iPhone 16 Pro within Voice Memos. After recording, and during the process, the A18 Pro chip isolates just the vocals by using AI and ML models – likely similar to what Apple uses within Logic Pro for separating instruments, but the big difference is that this is for everyone, free on the top of the line iPhone.
Apple even released a bit of a behind-the-scenes story with Pearce, Wells, and Bublé alongside announcing that layered Voice Memos were rolling out. You can see a bit of the process, including the recording on the iPhone, but also thoughts on the broader impact. Bublé is bullish on it and says, “If an artist has a moment of inspiration, being unencumbered by the traditional studio experience becomes the advantage, not the limitation.”
After completing a layered recording within Voice Memos, the result is two tracks – one with vocals and one with instruments, that will sync across your Apple devices within the app or that can be exported to another tool like Logic Pro for additional mixing or recordings. And thanks to a fresh update for Apple’s pro-mixing tool for the Mac and iPad, you can also easily send that base instrumental layer to Voice Memos.
So, say inspiration strikes, and you write down lyrics in notes. Ask your band for the base track; they can record it in Logic and send it to you, and you can layer down sweet, soulful vocals on your iPhone. It's pretty nuts.
Of course, if you’d rather listen to the new holiday song, “Maybe This Christmas” is streaming now on Apple Music, mixed with Spatial Audio. Assuming you’ve updated to iOS 18.2, you’ll see this new feature within Voice Memos alongside some major new Apple Intelligence features like Genmoji and Image Playground.
And as far as Christmas tracks, I’m still spinning Bruce Springsteen’s ‘Santa Claus Is Coming To Town’ … who knows, maybe he and E Street will rerecord with Voice Memos and include the historic Clarence Clemons saxophone solo.
You might also likeThe Raspberry Pi is already well-known for pushing the envelope in what makes a tiny and affordable computer. Now the manufacturer is reinventing itself again with the Raspberry Pi 500, an entire PC fitted into a keyboard that’s available now for purchase. Such an exciting and new idea right? It certainly is, though it’s not the first time this concept has been brought to fruition.
In 1984, 40 years ago, the Tandy 1000 was released by Tandy Corporation and based on IBM’s PCjr, which essentially fit most of the computer parts into the keyboard. The Tandy 1000 was successful in the consumer electronics market and spawned countless models until its eventual discontinuation in 1993.
It used the then-popular home-computer-style case with the keyboard, motherboard, and disk drives in one enclosure, which kept the design simple and prices much more affordable for the time. Despite this level of success, there wasn’t a proper follow-up to this particular model of computer, which is a shame since it was clearly ahead of its time.
In comes the Raspberry Pi 500, which is a complete PC wrapped up in a keyboard with a starting price of just $90 (about £70 / AU$141). It seems to take strong inspiration from the Tandy 1000 but upgrades the concept to its most convenient and affordable form.
The Raspberry Pi 500 is bringing retro backIt comes with a Quad-core 64-bit ARM processor, 8GB of RAM, two micro-HDMI ports, and three USB ports. If you don’t have a monitor, there’s a 15.6-inch portable Raspberry monitor for $100 (about £80 / AU$157).
It’s exciting to see the Tandy 1000-style tech make a comeback — as mini-PCs have already been making a huge splash in the industry thanks to their much smaller size footprint and very reasonable pricing. And it feels fitting that it would be under the Raspberry brand as it’s already well known for its compact PCs, like the Raspberry Pi CM5.
And for a price of less than $100, which is far cheaper than even the best Chromebooks and best cheap laptops on the market, it’s absolutely worth the price of entry. It’s compact form factor and approachable price tag is ideal for productivity work, as well as students looking for an affordable machine to get their homework and class projects done.
Hopefully, the Raspberry Pi 500 will inspire other manufacturers to put out their own version of a keyboard computer. My personal hope is seeing a retro-themed machine designed after the original Tandy 1000, as a tribute to the one that started it all is more than fitting.
New research has claimed significant vulnerabilities are plaguing the US energy sector - with a worrying amount stemming from third-party weaknesses.
A recent report by SecurityScorecard and KPMG based on a survey of the 250 largest US energy companies claims third-party risks account for 45% of breaches, with 67% of breaches in this sector linked to software and IT vendors.
The data shows the US energy sector has a critical reliance on third-party services for cybersecurity.
Escalating cybersecurity threatsThe report also highlights a notable disparity between oil and gas companies and their renewable energy counterparts. Oil and gas companies generally score better in cybersecurity, with many earning an “A−” rating, reflecting their relative strength in addressing cyber threats. In contrast, renewable energy firms lag behind, receiving an average score of “B−."
The interconnected nature of renewable energy systems, such as smart grids and solar or wind power installations, makes them particularly vulnerable to cyberattacks, with the report suggesting that addressing these vulnerabilities should be a priority for the sector.
In the energy sector, most cybersecurity vulnerabilities are concentrated in three key areas - application security, network security, and DNS health - with 92% of companies having their lowest scores in these risk categories.
US critical infrastructure has already been subject to a number of attacks from Russia, China, and Iran, highlighting the need for improved resilience against vulnerabilities and better protection for exposed endpoints.
“The energy sector's growing dependence on third-party vendors highlights a critical vulnerability — its security is only as strong as its weakest link," noted Ryan Sherstobitoff, Senior Vice President of Threat Research and Intelligence at SecurityScorecard.
"Our research shows that this rising reliance poses significant risks. It’s time for the industry to take decisive action and strengthen cybersecurity measures before a breach turns into a national emergency."
You might also likeInstagram, Threads, Meta, and WhatsApp, virtually, all of Meta's main services suffered outage on Wednesday afternoon. While none of the platforms appeared to return 500 errors, many stopped updating and refused to accept posts.
Down Detector shows a massive increase in outage reports for all the services starting at about noon ET. Since then, they've slowly and almost completely, recovered. Other unrelated sites and services, according to Down Detector, also appeared to be struggling at the same time, including Amazon's AWS service which backs many of the popular sites and services throughout the Internet, and even Reddit.
On Threads, we couldn't upload images or refresh our feeds. On Instagram, notifications were empty.
We've contacted Meta for comment and will update this live blog with its response.
But the good news is that most of Meta's platforms now appear operational. Here's how it all went down (and came back up).
(Image credit: Future) AWS have a role hereAs we mentioned, AWS, at least according to Down Detector, was also struggling in the early afternoon. Since we've heard whispers of other services outside the Meta's orbit also struggling, this might be a bigger issue than one company's servers. AWS serves countless websites and online services.
(Image credit: Future) How it startedWe first noticed the outage on Threads where the platform began rejecting image uploads. Soon, the feeds started disappearing.
Subsequent checks of Instagram and Facebook showed similar instabilities.
In case you didn't know, Threads is owned by Instagram, which is also owned by Meta. The upstart social media platform has grown quickly over the last 16 months and has been remarkably stable. In recent months, its biggest challenge has come not from infrastructure but from Bluesky, which while slightly older than Threads recently rose to prominence during a mass exodus from X (formerly Twitter). For what it's worth, Bluesky and X appear unaffected by any larger Internet issues.
(Image credit: Future) A recoveryBy 3:58 PM ET, most of Meta's major services appeared to be recovering. Down Detector showed a significant downturn in outage reports
Instagram Notifications reappeared and Threads was, for the most part, accepting image uploads.
(Image credit: Future) The uncertainty of it allThis is the kind of platform outage that leaves you guessing. Systems work, but inconsistently. I was posting – I thought – but was pretty sure no one was seeing it. I finally posted a poll on Threads to see if the system was still out or if social engagement would continue.
With exactly two votes (at this writing) it's clear that not everything is working as it should.
Post by @lanceulanoff View on Threads A rough rideWhatsApp may have had the roughest ride with two massive outage report spikes, as per Down Detector. It being a private messaging app, it's hard to know what people were experiencing or what they were saying (and not able to say) about the outage.
Based on the current chart WhatsApp also appears to be recovering.
(Image credit: Future) The dust settlesOne of the more interesting aspects of an outage like this, especially when it touches multiple services is how it can have a knock-on effect for seemingly unrelated platforms. When people can't get onto their favorite social media and encrypted communication platforms, they sometimes look for other places to blame.
Services like T-Mobile, AT&T, and Spectrum also got their share of outage reports in the same timeframe but it's unlikely they were either responsible or even impacted. It's just that when you can't reach Facebook, you start to wonder if your cellular or internet service is down. It's usually not.
(Image credit: Future)WhatsApp, Signal and Facebook Messenger all offer end-to-end encryption. If you're on iOS and chatting to people on Apple devices, Messages and FaceTime are safe, but aren't encrypted when talking to non-Apple devices. Regular SMS messages aren't encrypted, and RCS encryption is dependent on who you're talking to.
In the wake of a massive cyberattack against US telecoms operators, the FBI has urged Americans to use encrypted messaging apps to keep their mobile communications secure. But why does that matter?
The warning comes after one of the largest intelligence breaches in US history. Salt Typhoon, a group linked to China, used a new backdoor malware to hack network operators including AT&T and Verizon, spying on the activity of their customers.
Operational from as early as 2022, Salt Typhoon targets government agencies, political figures and key industries in the US. What’s concerning about this latest attack is its scale and severity.
It targeted flaws in cybersecurity products, such as firewalls and VPNs, as well as backdoors used by law enforcement agencies to monitor foreign targets and enforce telephone wiretaps. According to the FBI, once the hackers had compromised these networks, they were able to deploy further malware and gather information, including the contents of phone calls and text messages.
It’s because of this that the FBI has recommended that Americans switch to the best encrypted apps to protect their communications. But what does that actually mean and will encrypted messaging really keep you safe from cybercriminals? Here’s what the experts suggest.
What do the experts say? (Image credit: Shutterstock / AdemAY)In a briefing to reporters, Jeff Greene, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), compelled US citizens to use encryption.
“Encryption is your friend, whether it’s on text messaging or if you have the capacity to use encrypted voice communication,” said Greene. “Even if the adversary is able to intercept the data, if it is encrypted, it will make it impossible.”
The advice was welcomed by privacy experts, who have long advocated for wider use of encrypted communication systems.
Greg Nojeim, a Senior Counsel and Director of the Security and Surveillance Project at the Center for Democracy & Technology, commented: “If anti-encryption advocates had their way, the United States would now be defenseless to this type of mass snooping from a foreign power.”
What the FBI advice doesn’t address is that the Salt Typhoon hack exploited backdoors put in place to allow law enforcement agencies to obtain communication data from suspected criminals.
Cybersecurity experts have long warned that any backdoor access, even if put in place with good intentions, is at risk of being used for nefarious purposes.
Writing in The Conversation, Richard Forno, Assistant Director at the UMBC Center for Cybersecurity, said: “It’s somewhat ironic that one of the countermeasures recommended by the government to guard against Salt Typhoon spying is to use strongly encrypted services for phone calls and text messages – encryption capabilities that it has spent decades trying to undermine so that only “the good guys” can use it.”
What should you do? (Image credit: Shutterstock / Tero Vesalainen)According to Forno: “If you want to increase your security and privacy a bit, consider using end-to-end encrypted messaging services like Signal, FaceTime or Messages.”
End-to-end encryption adds an important layer of security to your digital conversations. In simple terms, it scrambles your messaging data into a form that’s unreadable if accessed by a third-party. The contents can only be unscrambled with the key – and only the sender and receiver have that key.
There’s a good chance you’re already using a messaging service which features end-to-end encryption. Apps such WhatsApp, Signal and Telegram are all end-to-end encrypted, as are Google Messages and Apple iMessage.
These options are much more secure than SMS and RCS: because these are unencrypted messaging protocols, they can be easily read if intercepted by cybercriminals.
While end-to-end encryption is important, it isn’t the quite the total solution that the FBI seems to suggest. Because the key to your encrypted messages is held on your device, anyone who can access that device will be able to decrypt and read your messages.
That’s why it’s also important to follow a few fundamental steps to secure your smartphone and other devices. These include keeping your devices updated with the latest software versions. You should also use a strong password as another line of defence against data breaches. To help you, you can use one of the best password generators.
“Make sure you’re not using default or easily guessed passwords on your devices,” advises Forno. “And consider using two-factor authentication to further strengthen the security of any critical internet accounts.”
Two-factor authentication means that anyone trying to access your account will have to fulfil a second layer of security, such as providing a code sent by email.
You might also like...The world’s leading online shopping marketplace announced that it was teaming up with Hyundai to start selling its vehicles at the tail end of last year, with Amazon users able to browse models and register interest, but not physically purchase them.
Now, Amazon has announced that Amazon Autos (Beta) is now open for business in 48 US cities. The service allows buyers to browse vehicles at leisure, pay with a customized finance option (or pay cash, if you’re a baller), or select optional protection products. You can either head to a local dealership for collection or arrange to have the shiny new car delivered.
The general idea is to beat Tesla at its own Direct-to-Consumer (DTC) game by offering a convenient sales channel that circumvents the need to sit in a stuffy dealership and haggle with a salesperson over the sometimes inflated price.
According to numerous Cox Automotive studies, which ask customers about their car-buying experience, overall satisfaction with the traditional dealer model is on the wane in the USA. However, Fan Jin, global head of Amazon Autos, says the new online platform is making shopping for a new car more transparent, convenient, and customer-friendly.
Arguably merging a number of online car-buying tools into a single online destination, Amazon Autos allows customers to get an “instant valuation” on their existing used vehicle, with the ability to trade it in toward the price of the new car.
Although the final valuation of said used vehicle will be decided by an independent third-party.
Currently, Amazon Autos only lists select Hyundai vehicles, chiefly the Ioniq 5, although the brand says it plans to roll out new models and feature additional automotive brands next year, while potentially expanding its business model to territories outside the US.
Analysis: Just another shop window (Image credit: Hyundai)Steven Suh, general sales manager of South Bay Hyundai, said in a statement that Amazon Autos "allows us to showcase our vehicles to millions of daily shoppers," revealing that customers "come in excited to pick up their new car".
So however novel it may seem, Amazon Autos is just another online shop window that will eventually see a customer set foot in a local dealership, either to collect their vehicle or when they eventually have to return for servicing, repairs and routine maintenance.
Sure, it avoids the awkward haggling with a salesperson in the first instance, but it still doesn’t completely eschew a ‘legacy’ dealership model.
Secondly, Amazon doesn’t make it clear how a test drive arrangement would work, with interested parties likely contacting a local dealer through the online marketplace to arrange some time with the vehicle. Free returns and Prime delivery don’t really work with something as large and expensive as a car.
Alas, Tesla has been successful with its mobile technician offering and the automation of its servicing schedules and routine maintenance. Remote diagnostics allow its mechanics to work out issues from anywhere in the world and if a vehicle absolutely has to visit a shop, Tesla will recommend and book in via one its trusted local repairers.
Because electric vehicles require less frequent servicing due to a reduction in mechanical parts, an increasing number of manufacturers are looking for more convenient ways for customers to interact with their products.
Tesla has proven that you don't necessarily need a network of dealers to be successful, while Hyundai is clearly testing the waters to see if it too can future-proof its brand with an increasingly digital offering.
You might also likeAsustor, a subsidiary of Asus, has launched its second generation Flashstor NAS series, offering high-performance, SSD-focused storage.
The line is made up of the Flashstor 6 Gen 2 (AS6806X) and Flashstor 12 Pro Gen 2 (FS6812X), which support up to six and twelve M.2 NVMe SSDs, respectively, with compatibility for PCIe 4.0 x4 to deliver ultra-fast data transfer speeds.
Both models are powered by an AMD Quad-Core 6nm Ryzen Embedded V3C14 processor, an upgrade from the previous generation’s Intel Celeron N5105 CPUs (check out our review of the Flashstor 12 Pro FS6712X from 2023 here).
Not cheapThe Flashstor 12 Pro Gen 2 comes with 16GB of DDR5-4800 ECC memory, expandable up to 64GB, while the Flashstor 6 Gen 2 includes 8GB of memory, also expandable. The devices are well-suited for resource-intensive tasks such as 4K video editing and content creation.
The Flashstor 12 Pro Gen 2 offers dual 10-Gigabit Ethernet ports, whereas the Flashstor 6 Gen 2 is equipped with a single 10-Gigabit Ethernet port. Both models support SMB Multichannel, allowing for faster-than-standard 10GbE data transfers. The devices feature two USB 4.0 (Type-C) ports and three USB 3.2 Gen 2 (Type-A) ports, providing high-speed external connections and compatibility with Thunderbolt 3/4 devices.
Equipped with advanced cooling systems, both models use silent fans to maintain optimal performance under heavy workloads while keeping noise levels low.
The NAS supports a range of applications, including VPN servers, media servers, mail servers, and cloud backups. It also accommodates up to 4,096 users across 512 groups, so it’s a good choice for teams needing simultaneous file access.
The Flashstor Gen 2 series features a compact design reminiscent of a PlayStation 4, but it doesn’t sharing its pricing with the beloved console. On Amazon, the Flashstor 6 Gen 2 is listed at $999, while the 12-bay Flashstor 12 Pro Gen 2 is priced at $1,399.
Getting the most from the 12-bay model and outfitting it with a dozen 8TB SSDs will ramp up the cost significantly, potentially exceeding $8,000. This high-end setup is clearly aimed at professionals and enthusiasts who require cutting-edge storage capabilities and are willing to pay for it.
You might also likeThere’s an early Christmas present for iOS and Mac gamers in the form of the Resident Evil 2 remake, which has arrived on Apple’s platforms weeks ahead of schedule. Originally due to launch on New Year’s Eve, the game has instead been released a full three weeks early.
Resident Evil 2 is set in 1998 and tasks players with surviving a zombie infestation that’s ravaging Racoon City. It’s a classic of the horror genre, with the new version featuring improved combat, high-resolution graphics, better voice acting, and more. It’s also a cross-play title for Apple users, so you can play it on macOS, iOS and iPadOS and your progress will carry over to whichever device you use.
The game’s developer Capcom is currently offering a launch sale on the game, with the main game in-app purchase price cut by 75%. The game’s App Store page lists two in-app purchases: the base game for $9.99 / £8 and “all in-game rewards unlocked” for $1.99 / £1.69.
Resident Evil 2 is free to download and try out, with “a limited part of the base game” available without charge. The $9.99 / £8 purchase is then required to complete the game.
Another classic game for Apple fans (Image credit: TechRadar)This year has been a good one for Apple gamers, especially those who play on a Mac. Apple’s latest M4-series chips are its most capable yet when it comes to gaming, enabling Apple fans to play popular titles at smoother frame rates than ever before.
Speaking of popular titles, some of the best Mac games have all landed in the last couple of years. Games like Baldur’s Gate 3 and Cyberpunk 2077 are now available on the Mac, with other popular names – including Death Stranding, Resident Evil 4, and Lies of P – all working seamlessly on Apple’s computers.
To run Resident Evil 2 on Apple hardware, you’ll need a Mac that’s running macOS Ventura or later and is powered by an M1 chip or later. On iPhone, you’ll need an A17 Pro chip or newer alongside iOS 17.0 or later.
As for iPad users, the requirements are iPadOS 17.0 or later and a device containing an A17 Pro chip or an Apple M-series chip.
You might also likeGoogle has unveiled the next iteration of the Gemini AI model family, starting with the smallest version, Gemini 2.0 Flash. Gemini 2.0 promises faster performance, sharper reasoning, and enhanced multimodal capabilities, among other upgrades, as it is integrated into Google's various AI and AI-adjacent services.
The timing for the news may have something to do with wanting to step on OpenAI and Apple's toes with their respective 12 Days of OpenAI and new Apple Intelligence news this week, especially since Gemini 2.0 is mostly built around experiments for developers. Still, there are some immediate opportunities for those on the non-enterprise side of things. Specifically, Gemini Assistant users and those who see AI Overviews when using Google Search will be able to engage with Gemini 2.0 Flash.
If you interact with the Gemini AI through the website on a desktop or mobile browser, you can now play with Gemini 2.0 Flash. You can pick it from the list of models in the drop-down menu. The new model is also on its way to the mobile app at some point. It may not be life-changing, but Gemini 2.0 Flash’s speed at processing and generating content is notable. It's far faster than Gemini 1.5 Flash; Google claims the new model will react at twice the speed while still outperforming even the more powerful Gemini 1.5 Pro model.
Overviews and future newsGoogle is infusing Gemini 2.0 into its AI Overviews feature as well. AI Overviews already write summaries to answer search queries on Google without requiring clicking on websites. The company boasted that there are more than a billion people who have seen at least one AI Overview since the feature debuted and that it has led to engagement with a wider array of sources than usual.
Incorporating Gemini 2.0 Flash has made AI Overviews even better at tackling complicated, multi-step questions, Google claims. For example, say you’re stuck on a calculus problem. You can upload a photo of the equation, and AI Overviews will not only understand it but walk you through the solution step-by-step. The same goes for debugging code. If you describe the issue in a search submission, the AI Overview might produce an explanation for the issue or even write a corrected version for you. It essentially bakes Gemini's assistant abilities into Google Search.
Most of the Gemini 2.0 news centers around developers, who can access Gemini 2.0 Flash through the Gemini API in Google AI Studio and Vertex AI; there’s also a new Multimodal Live API for those who want to create interactive, real-time experiences, like virtual tutors or AI-driven customer service bots.
Ongoing experiments for developers that may lead to changes for consumers are also getting a boost from Gemini 2.0, including universal AI assistant Project Astra, browser AI task aide Project Mariner, and partnerships with game developers to improve how in-game characters interact with players.
It's all part of Google's ongoing effort to put Gemini in everything. But, for now, that just means a faster, better AI assistant that can keep up, if not outright, beat ChatGPT and other rivals.
You might also likeFirefox is one of the best web browsers you can get, yet it will remove support for its Do Not Track feature in the upcoming version 135 of the app. This is used to ask websites not to follow users around the internet using cookies and other trackers. On the surface, this move sounds like a blow to your privacy, but it could actually end up being a positive change in the long run.
Previously, if the Do Not Track setting was enabled, Firefox would send a request to websites stating that you didn’t want to be tracked. Created in 2009, Do Not Track was meant to be a simple way to keep your private data safe, and Firefox was the first web browser to adopt this feature.
Yet over the years, concerns have been raised that Do Not Track simply doesn’t work. Since it’s only a request, websites are free to completely ignore it – which many do. After all, when trackers can be used to increase a website’s advertising profits, what website owner is going to pass up an opportunity to make more money from your private data?
As well as that, in a support article announcing that Do Not Track would be phased out, Firefox developer Mozilla stated that the feature can actually reduce your privacy. This might perhaps be because some users enable it and assume that it protects them, thereby neglecting other privacy-enhancing features that actually do work.
What you can do instead (Image credit: Rubaitul Azad / Unsplash)While these concerns have been ongoing, Firefox has been adding more robust privacy features of its own, as have some other browsers. Mozilla recommends you use the Global Privacy Control setting in Firefox instead, as this is respected by more websites and is even enforced with legislation in some places.
As well as that, Firefox has many other built-in features designed to combat trackers. That includes Enhanced Tracking Protection, which blocks known trackers, and a Facebook container that stops Meta-owned websites – notorious for their privacy violations – from following you around the web.
So, while Firefox ending support for Do Not Track seems like a blow to your privacy at first glance, in reality the browser is simply discontinuing a feature that never really worked properly in the first place.
Instead, there are other settings – plus a host of excellent extensions – that can be used to keep your private data securely out of the hands of trackers and advertisers.
You might also likeWould you wear a smartwatch to a wedding? That's the question engulfing a certain section of the internet this week. In a viral post on X, embedded below, telling the internet about a couple the account holder knew who allegedly requested nobody wear a smartwatch to their wedding.
It's received almost 10 million views, tons of reactions, and a flurry of responses on both sides of the aisle. Some accounts seem to believe that wearing even the best Apple Watch (like those on our list) is considered tacky at best and disrespectful at worst and they're right to initiate the ban, while others criticized the couple, calling it controlling.
Received a wedding invite that specifically said on the dress code line “No Apple Watches please”December 10, 2024
Regardless of how you feel about specific dress codes to fit with a theme (fair game for the bride and groom, or unfair for the guests?) all the disagreements relate to the usefulness of Apple Watches to monitor health problems, act as wallets, or just a general opposition to the concept of the ban. One trend I noticed when scrolling through the reams of replies is that hardly anyone had an issue with it from a style point of view.
It seems that Apple Watches aren't considered particularly stylish, even in the expensive stainless steel colorways adorned with even-more-expensive Hermes bands. Sure, you can dress them up with all manner of watch faces, but they remain a homogenous black screen, often paired with simple silicone straps.
I test smartwatches for a living, and although I may disagree with the blanket "no Apple Watches" statement on logistical grounds, even I can see the lack of appeal from a style perspective. Traditional analog watches offer so much variety in style, from slim classic numbers to rotary dive watches, and offer a desirable and (ironically) timeless quality to wedding photos. Apple Watches tend to date photographs, and perhaps will do for the foreseeable future.
(Image credit: Future)Other users replied with smartwatches other than Apple Watches, such as the best Garmin watches, Google Pixel Watches and others, but they share similar concerns. Notably, distractions from the day with pinging notifications, and frankly unstylish, boxy black screens.
I've long bemoaned the lack of a stylish design ethos to smartwatches. Attempts to "sexy up" the smartwatch category, such as the Garmin Marq range, are either ludicrously expensive or don't marry form and function well enough. If you're going to a formal event, I can't think of many smartwatches I'd like to wear with a three-piece suit.
One solution is to wear one of the best smart rings, if you must continue to monitor your health with a snappier-looking analog number. Another option is to invest in one of the best hybrid smartwatches, analog-looking models with hidden optical heart rate sensors and smaller screens, which act as a bridge between two worlds.
Unlike smart rings, hybrid smartwatches aren't particularly well-known in the category, but to me, they are the perfect compromise: timeless analog aesthetics combined with up-to-date health and fitness tracking. Perhaps Apple should follow Garmin and Withings and look into a hybrid, or at least a more stylish Apple Watch model. After all, you'd get so many steps in on a wedding dance floor, that it'd be a shame to waste the opportunity to close your rings.
You might also like...The Academy Awards, aka the Oscars, will be streamed live for the very first time next year. The lucky streamer is Hulu, which will be streaming the awards ceremony while ABC handles the usual live TV broadcasting.
The news comes via the Academy of Motion Pictures Arts and Sciences, which has also confirmed the date and time of the host: the 97th Academy Awards will begin at 4pm PT on Sunday, March 2, 2025 with Conan O'Brien hosting. The red carpet will begin slightly earlier at 3.30pm PT.
In addition to the live stream, which will be available to all subscribers of the best streaming service for TV, Hulu's stream will also be available to rewatch the following day.
Can't beat the streamingThis may be the first Oscars to be streamed live, but it won't be the first glossy Hollywood event to do so or even the first in 2025: the Golden Globes are also going to be live streamed, this time by Paramount Plus.
The Golden Globes are widely seen as Oscar predictors, and the 2025 ceremony will take place on Sunday, January 5 at 5pm PT/8pm ET. It too will be broadcast more traditionally, on CBS, and the host will be Nikki Glaser.
So who are this year's winners likely to be? The smart money is on Emilia Pérez, which grabbed ten Golden Globe nominations – a record for a musical comedy. And The Substance has been nominated for multiple awards: best director, best musical/comedy picture, best actress, best supporting actress and best screenplay.
We don't yet know who's been shortlisted for the Academy Awards but we don't have long to wait: those lists will be announced on Tuesday, December 17, next week.
You might also likeA US Senator has presented a new bill to secure the networks of the country's telecommunication companies targeted by the China-linked Salt Typhoon hacking group.
What's considered to be the largest intelligence compromise in US history sparked a call to all US citizens to switch to encrypted communications last week. At least eight of the country's largest telecoms were hacked to spy on their customers' activities, including AT&T, Verizon, and Lumen Technologies.
The Secure American Communications Act would require the Federal Communications Commission (FCC) to "fix its own failure" and fully implement the cybersecurity rules under the 1994 legislation. US telecoms are also required to submit annual security tests and audits to the FCC.
A turning point?"It was inevitable that foreign hackers would burrow deep into the American communications system the moment the FCC decided to let phone companies write their own cybersecurity rules," said Ron Wyden, US Senator of Oregon who announced the bill.
Under the 1994 Communications Assistance for Law Enforcement Act (CALEA), the FCC was already expected to ensure telecom operators secure their systems against unauthorized access – something that, apparently, the watchdog never did fully.
"Telecom companies and federal regulators were asleep on the job and as a result, Americans’ calls, messages, and phone records have been accessed by foreign spies intent on undermining our national security," said again Wyden.
"Congress needs to step up and pass mandatory security rules to finally secure our telecom system against an infestation of hackers and spies."
The Secure American Communications Act is the third proposal Wyden presented so far in a bid to beef up the security of US communications networks.
While Salt Typhoon hackers reportedly targeted at least 8 American telecommunication networks, the Chinese cyber-espionage campaign seems to be a lot bigger as 'dozens' of countries may be affected. (Image credit: Medium)As per Wyden's latest proposal, US telecoms will need to implement specific cybersecurity requirements to prevent external interceptions, while conducting both internal and independent evaluations on their systems every year.
In the meantime, new cybersecurity practices come into force, and the FBI and Cybersecurity and Infrastructure Security Agency (CISA) have shared security recommendations for both customers and enterprises.
According to experts, US citizens should secure all their communications with encryption. This technology is used by the likes of WhatsApp, Signal, or secure email like Proton Mail, to scramble data into an unreadable form to prevent third-party access – ensuring communications remain private.
FBI officials also suggest keeping your smartphone up-to-date and enabling two-factor authentication whenever possible to protect your accounts against phishing attacks.
If you're looking to secure your enterprise network, CISA's security tips to stay protected are then a must-read.
How's this for a partnership: Pokémon and Aardman Animation, creators of Wallace & Gromit, Chicken Run and Shaun The Sheep. The much-loved animation studio has announced that it's working with The Pokémon Company International on a new "special project" that'll come out in 2027.
The announcement is as fiendish as anything Feathers McGraw might come up with, though: posting on X/Twitter, all the announcement said was "Pokémon × @aardman Coming in 2027!"
Pokémon × @aardmanComing in 2027! pic.twitter.com/DQPbtekKXoDecember 11, 2024
The good news is that there is a little more information out there, and you don't need to go somewhere where there's cheese to find it.
What's Aardman up to?There's an official press release that adds a little bit more to the story: "The collaboration will see Aardman bringing their unique style of storytelling to the Pokémon universe in brand-new adventures," the announcement says.
Taito Okiura, VP of marketing and media at The Pokémon Company, added: "This is a dream partnership for Pokémon. Aardman are masters of their craft, and we have been blown away by their talent and creativity. What we have been working on together ensures our global Pokémon fans are in for a treat!”
This is the kind of news that puts a big smile on your face, and Aardman seems to be pretty chuffed too. Sean Clarke, Aardman MD, says he's looking forward to bringing "our love of craft, character and comedic storytelling" to the world's biggest entertainment brand. He and the team are "very excited".
"Aardman and TPCi share an emphasis on heritage and attention to detail as well as putting our fans and audiences at the heart of what we do," Clarke says. That will "steer us right as we together create charming, original and new stories for audiences around the world”.
I can't imagine this being anything other than utterly Charmander-ing. Sorry. More details will be revealed "in the future", Aardman says.
In the meantime, you can get your Pokémon fix on YouTube: the official Pokémon TV YouTube channel is now streaming full episodes of the anime series. The channel is "where you can explore the world of Pokémon with Ash & Pikachu! Experience some of the most iconic moments from their adventure with our full episodes, live streams, compilations and so much more!"
This feels like a good time to make my Pokémon joke. How do you get a cute animated creature onto a bus? Pokemon!
You might also likeWPForms, a popular WordPress plugin used for contact, feedback, and payment forms, was carrying a vulnerability that could have resulted in businesses having their services disrupted, customer trust eroded, and even losing money, experts have revealed.
Security researcher “vullu164” recently told Wordfence they found a vulnerability in WPForms versions 1.8.4 - 1.9.2, both free and paid versions. The bug allows users with low-level accounts to issue arbitrary Stripe refunds, or cancel different subscriptions.
It is now tracked as CVE-2024-11205, and was assigned a severity score of 8.5 (high). The score may even have been higher if not for the prerequisite of being a registered member on the site. However, since most sites these days allow account registration, exploiting the flaw could be quite easy, and available on numerous sites across the internet.
Releasing the patchWordfence then analyzed the flaw on its own, and after confirming the findings, reached out to WPForms’ developer Awesome Motive, who came back with a patch on November 18.
The earliest fixed version of WPForms is 1.9.2.2, and users are highly advised to patch up without delay, or disable the plugin until they do.
WPForms is installed on more than six million websites across the internet, with roughly half currently running an old and vulnerable version. Researchers have not yet found evidence of abuse in the wild, but given the popularity of the plugin, it’s only a matter of time before they do.
WordPress is the world’s most popular website builder platform. It powers roughly half of the world’s internet sites, and as such is a major target for cybercriminals. The platform itself, however, is considered safe, and threat actors are mostly focused on plugins and other addons (such as themes) for vulnerabilities and access points.
Paid plugins are usually considered safer, since they have a dedicated team that maintains the code. Free plugins, especially those run by a single enthusiast, or those with fewer users, are usually more susceptible to attacks.
Via BleepingComputer
You might also like