Error message

  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/cay45lq1/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/cay45lq1/public_html/includes/menu.inc).

Feed aggregator

New forum topics

Louisiana has a long history with French. This immersion school aims to keep it alive

NPR News Headlines - Wed, 03/19/2025 - 12:00

Most Louisianans no longer speak French, but a growing number of schools are now immersing kids in it. At École Pointe-au-Chien, the focus is on teaching local French dialects first.

(Image credit: Aubri Juhasz)

Categories: News

'AI Valley' author worries there's 'so much power in the hands of few people'

NPR News Headlines - Wed, 03/19/2025 - 11:59

Author Gary Rivlin says regulation can help control how AI is used: "AI could be an amazing thing around health, medicine, scientific discoveries, education ... as long as we're deliberate about it."

Categories: News

Prime Video’s hit new historical drama will continue its reign for another season as House of David gets renewed

TechRadar News - Wed, 03/19/2025 - 11:49
  • House of David has been renewed for a second season on Prime Video.
  • The historical drama brought in 22 million viewers in its first 17 days.
  • Season 2 will follow David's rise to the throne after his battle with Goliath.

Prime Video has renewed the historical drama House of David for a second season ahead of its series finale on April 3.

House of David, which launched with three episodes on February 27, attracted 22 million viewers in its first 17 days of streaming and claimed the second spot in Prime Video's top 10 shows list, falling behind Reacher season 3.

With a growing library of historical dramas, Prime Video is becoming one of the best streaming services for religious TV shows. Its sprawling library has the likes of The Chosen, a hugely successful series that dramatizes the life of Jesus Christ. With a 60% Rotten Tomatoes score from the critics, House of David doesn't make it onto our best Prime Video shows list. However, it's clearly been a huge hit among audience given its staggering results.

Show creators Jon Erwin and Jon Gunn said of the renewal: “We are humbled by the extraordinary reaction this show has earned from the faith audience worldwide. Thanks to them and our partners at Prime Video and Amazon MGM Studios, Wonder Project will bring more of the Bible and this epic saga to a global audience. Congratulations to our incredible cast and crew.”

What is House of David season 2 about?

The biblical epic tells the story of David (Michael Iskander), a teenage outcast who is anointed the new king of Israel as the once-mighty King Saul (Ali Suliman) falls victim to his own pride and begins to lose power.

House of David season 2 follows David's rise to the throne in the aftermath of his battle with Goliath (Martyn Ford). As he navigates palace politics, his family's jealousy and a growing romance, David learns what it means to become a great leader.

Vernon Sanders, head of television at Amazon MGM Studios shared: “Jon Erwin and Jon Gunn’s compelling creative vision has solidified our belief in the series and we are excited to deliver more of the story to our customers. We look forward to a continued journey with Wonder Project as we further expand our slate to encompass faith-based series.”

You might also like
Categories: Technology

Israel has launched a new ground invasion into Gaza after breaking ceasefire

NPR News Headlines - Wed, 03/19/2025 - 11:38

Israel's military launched a new ground offensive in Gaza, sending troops into areas they retreated from during a two-month ceasefire. This comes a day after airstrikes killed more than 400 people.

(Image credit: Jack Guez)

Categories: News

ExpressVPN ‘reduces workforce’ for the second time in two years

TechRadar News - Wed, 03/19/2025 - 11:34
  • Kape Technologies, owner of ExpressVPN, has announced a wave of redundancies at the VPN firm
  • The total number of redundancies remains unconfirmed
  • This comes weeks after major updates to its proprietary Lightway WireGuard protocol

ExpressVPN has announced a round of redundancies in an official statement.

This is the second time the Kape Technologies-owned company has taken the axe to its workforce in two years after it shed 12% of its staff in July 2023.

According to Tom’s Guide, ExpressVPN has not specified the number of jobs lost, so far, with the statement only reading that the company has taken the “difficult decision to reduce the size of our workforce".

The statement does not mention any cuts at either Private Internet Access (PIA) or CyberGhost – two VPNs also under the Kape umbrella.

ExpressVPN is still currently advertising several job openings in both Engineering and Security on the company website, as well as in Marketing and Accounting & Finance. So, how significant this is as signs of trouble ahead for this VPN service is hard to gauge.

(Image credit: ExpressVPN)

Indeed, ExpressVPN recently released significant updates to its VPN protocol, Lightway, alongside major updates to its Linux app earlier this month. The company also entered the eSIM market with the launch of holiday.com back in December.

There also seem to be plenty of funds in the marketing coffers with ExpressVPN announcing a partnership with Tottenham Hotspur Football Club as the official Digital Privacy Partner in November.

ExpressVPN places third in TechRadar's best VPN guide at the time of writing. It topped those charts for several years until the beginning of 2024 when NordVPN was named best VPN.

ExpressVPN slipped further later that year when Surfshark climbed to second.

We look forward to re-testing ExpressVPN in the coming months to see how its Lightway protocol has improved and whether its bid to be the fastest VPN on the block has received a boost from Lightway Turbo.

You may also like
Categories: Technology

Here are all the ways people are disappearing from government websites

NPR News Headlines - Wed, 03/19/2025 - 11:25

Executive orders from President Trump have agencies across the government scrubbing websites of photos and references to transgender people, women and people of color.

(Image credit: Tara Anand for NPR)

Categories: News

Mac gaming could get an intriguing boost – but not in the way you'd expect

TechRadar News - Wed, 03/19/2025 - 11:22
  • Nanoleaf has launched a new lighting strip that syncs with your monitor
  • It could provide an immersive boost to Mac gamers
  • Apple has also patented a Magic Mouse with haptic feedback

Things have been looking up for Mac gamers in recent years, with Apple launching increasingly powerful hardware and AAA games coming to the company’s computers in increasing numbers. Now, there are a few new reasons why Mac gaming could be getting a touch more immersive.

The first is that Nanoleaf has just launched the PC Screen Mirror Lightstrip, which is a lighting strip for Mac and PC desktop monitors that provides rainbow effects for an immersive experience while gaming, listening to music, or watching TV shows and movies.

The strip connects to your computer over USB-C and needs to be paired using Nanoleaf’s desktop app. Once that’s done, its lights can actively match what is happening on your screen, providing a backlighting effect that extends the on-screen colors to your surroundings.

Nanoleaf’s Lightstrip costs $49.99 and can be pre-ordered from the company’s website. It’ll start shipping at the end of March.

Apple patent points to a haptic gaming Magic Mouse

(Image credit: Kaboompics.com / Pexels)

While Nanoleaf’s latest product is available to order now, there’s another idea that could give Mac gamers a boost that’s a little more experimental, and it comes in the form of a freshly uncovered patent (via Patently Apple).

The patent describes how a future Magic Mouse could be embedded with haptic sensors that mimic the effects of on-screen action. For example, it could enable you to feel the texture of moving through sand or sliding on ice, providing a much more immersive gaming experience.

Right now, Apple’s Magic Mouse is poorly suited to gaming due to its slippery top surface, unergonomic shape, and lack of customizable buttons. While the ideas discussed in the patent might help make it more viable for gaming, it will need a more wide-ranging overhaul before it becomes gamers’ pointer of choice. That said, the idea of a mouse embedded with haptic sensors could equally apply to creative and productivity tasks, so there’s a degree of flexibility here.

Being a patent, we don’t know when – or if – this will ever come to fruition. But it’s interesting to imagine how it could benefit Mac gamers and productivity lovers alike.

You might also like
Categories: Technology

Top California sperm bank suffers embarrassing leak

TechRadar News - Wed, 03/19/2025 - 11:05
  • California Cryobank confirmed suffering a data breach in 2024
  • Social Security numbers, driver's license numbers and more were stolen
  • The company is offering credit monitoring services to some customers

One of the largest sperm banks in the United States has suffered a cyberattack in which it lost sensitive customer data.

California Cryobank confirmed the news in a filing with the Maine Office of the Attorney General, as well as in a data breach notification letter being sent out to affected individuals.

In the notification letter, the company said that it detected suspicious activity on its network on April 21, 2024, and isolated potentially affected devices from the network.

What about Donor IDs?

"Through our investigation, CCB determined that an unauthorized party gained access to our IT environment and may have accessed and/or acquired files maintained on certain computer systems between April 20, 2024 and April 22, 2024," the letter says.

California Cryobank is a sperm and egg bank that provides reproductive services, including sperm donation, egg freezing, and genetic screening. It is among the largest sperm banks in the United States, offering a diverse range of donors and services, and operating in all 50 states and more that two dozen countries around the world.

A more thorough investigation, which lasted almost a year, CCB concluded that different personal data was exposed for customers, such as names, bank accounts and routing numbers, Social Security numbers, driver's license numbers, payment card numbers, and/or health insurance information. It did not say how many people were affected.

It is unclear if donor information, such as donor ID numbers, was stolen in the attack, as well. When a person donates sperm, they are assigned an ID number, and their identity remains hidden until the child turns 18 and decides to learn more about their biological father. Leaking ID numbers could be a major privacy concern.

The company has offered a year’s worth of credit monitoring to people whose Social Security numbers and driver’s license numbers were exposed in the attack.

Via BleepingComputer

You might also like
Categories: Technology

Is the Pixel 9A a Good Choice for You? Here's What to Consider

CNET News - Wed, 03/19/2025 - 11:00
The $499 Pixel 9A shares many features with its pricier counterparts. So what does that lower price include -- and exclude?
Categories: Technology

Hey, Students: Grab This 50% Off Deal for Paramount Plus

CNET News - Wed, 03/19/2025 - 10:58
The deal's good for a year and you can watch March Madness games, School Spirits, Yellowjackets and more on the streaming service.
Categories: Technology

Qualcomm poised to muscle in on AMD's territory with powerful gaming handheld processors

TechRadar News - Wed, 03/19/2025 - 10:55
  • Qualcomm has announced the Snapdragon G Series of gaming processors
  • They're primarily market for mobile and cloud gaming
  • The most powerful of the lineup is capable of ray tracing and 1440p at 144Hz

Qualcomm has announced its new lineup of Snapdragon G series processors for the handheld market.

Announced in an official blog post, the Snapdragon G Series is made up of three different platforms: the Snapdragon G3 Gen 3, Snapdragon G2 Gen 2, and the Snapdragon G1 Gen 2.

The company claims its latest chips are "designed with gamers in mind" to "deliver sustained graphics performance on handheld, dedicated devices". It promises "high-fidelity graphics" with "incredible ergonomics" for those wanting their mobile games at their best.

As the naming conventions may elude to, the Snapdragon G3 Gen 3 is said to be the most powerful of the lineup, made for the "most demanding cross-platform gaming titles" whereas the Snapdragon G2 Gen 2 is instead primarily marketed for "cloud games across major ecosystems".

This is backed up by the technical specifications of the Snapdragon G3 Gen 3, which feature an eight-core Qualcomm Kyro CPU, Adreno A32 graphics (including ray tracing functionality), Wi-Fi 7, Bluetooth 5.3, and support for 1440p at 144Hz.

The Snapdragon G2 Gen 2 is similarly powerful, with the same eight-core Qualcomm Kyro CPU, but it features Adreno 22 graphics instead, with the same connectivity standards and output options.

Things only get more mainstream when analyzing what the Snapdragon G1 Gen 2 can do. Despite having the same eight-core processor as the others, six of its total cores are efficiency, with only two dedicated to performance.

Similarly, it has weaker Adreno A12 graphics, and only support for Full HD (1080p) at 120Hz with Wi-Fi 5 and Bluetooth 5.1. It's safe to say this could be the chip found in cloud gaming devices that do not require the same level of horsepower.

Some of its partners running the new chips include AyaNeo, OneXSugar, and Retroid Pocket, among others, as the hardware is primarily geared towards Android and cloud gaming performance rather than native rendering. However, given the prowess of the leading chip, that could change depending on who adopts the silicon.

A step forward for mobile gaming hardware

Qualcomm has had great success over the past year since its Snapdragon X Elite line, powering some of the best laptops and best ultrabooks, famed for their snappy performance and long battery lives when compared to traditional x86 alternatives. The company now seems in a position to take on some of the biggest processors from rivals, such as AMD's Z1 and Z2 chips that you'll find in some of the best gaming handhelds.

We may not see a similar level of compatibility and performance with Windows or SteamOS machines, but for what they are, the Snapdragon G Series could still be a viable alternative. Some handhelds hitting the market have already impressed featuring the Snapdragon G3 Gen 3 chip, like the AyaNeo Pocket S2, which is said to elevate Android gaming without the usual trappings of getting warm (via PCMag).

Just as Windows on Arm has evolved since it launched and was iterated upon as the big x86 alternative, the Snapdragon G Series could be the thing to push more handheld gamers into the arms of dedicated cloud-based and Android machines if the battery lives, displays, and ergonomics can outmatch what current-generation handheld PCs can do.

Competition is always a good thing as it pushes companies to continue innovating and improving on tech instead of stagnation, something the portable scene has been in danger of for years now. Will the Snapdragon G Series be enough to frighten AMD and Intel? It's not clear yet, but we've seen Qualcomm muscle in on their territory with its laptops, so why couldn't handhelds be next?

You may also like...
Categories: Technology

Mahmoud Khalil's immigration case moves to New Jersey from New York

NPR News Headlines - Wed, 03/19/2025 - 10:41

The decision offers a venue compromise in the bellwether case, while Khalil's legal team seeks to release him from detention and block his deportation.

(Image credit: Selcuk Acar)

Categories: News

Hundreds of Actors Urge Trump Not to Let AI Train on Their Copyrighted Content

CNET News - Wed, 03/19/2025 - 10:34
Over 400 actors, writers and directors signed an open letter outlining serious concerns about copyrights amid big tech's AI ambitions.
Categories: Technology

How to support vulnerable customers as a technology leader

TechRadar News - Wed, 03/19/2025 - 10:25

With rising utility bills and the increasing cost of living, consumers need more support than ever—especially the most vulnerable. Acknowledging vulnerability isn’t enough; organizations must take action to ensure no one falls through the cracks.

Recent research from Focal Data highlights a growing number of UK adults who are either already in or on the verge of vulnerable situations. However, there is encouraging news: awareness is increasing, particularly among younger generations, and organizations now have clear, actionable guidance on providing meaningful support.

As consumer vulnerability evolves, technology leaders are crucial in driving solutions that ensure no customer is left behind. Their responsibility extends beyond deploying new tools; it involves strategically integrating AI to help customer service teams deliver scalable, empathetic, and effective support.

Additionally, as sectors such as financial services, utilities, and retail face increasing regulatory scrutiny and ethical concerns around data and AI usage, technology leaders must provide guidance to ensure compliance and responsible AI deployment.

35 million UK adults are potentially vulnerable

The Financial Conduct Authority (FCA) identifies four key drivers of vulnerability, a framework that extends beyond financial services and helps organizations understand the complexities behind consumer vulnerability:

1. Health issues (mental and physical illness)

2. Life events (including bereavement and job loss)

3. Low resilience (the inability to withstand financial or emotional shock)

4. Low capability and confidence (in dealing with financial matters)

Based on these criteria, the Focal Data research estimates that 35 million UK adults—approximately two-thirds of the adult population—are potentially vulnerable. Despite this, only 19% of those affected self-identify as vulnerable, and 34% of consumers would be uncomfortable disclosing mental health challenges.

Delivering support at this scale is an immense challenge, made even more difficult by low awareness and reluctance to discuss vulnerability. Many organizations believe they have sufficient processes in place to support vulnerable customers. Yet, when examined closely, the reality is quite different. On average, only around 3% of calls are screened for vulnerable customer support, and even fewer are routed to appropriate processes. This stark gap exposes many organizations to regulatory risks and, more importantly, leaves vulnerable customers without the support they need.

Younger adults show greater self-awareness, yet pressure remains

There is, however, some hope. Younger adults, particularly those under 34, are leading the way in self-awareness, with 31% identifying as vulnerable. This increased self-awareness is a promising step toward more open communication about financial and personal struggles.

However, organizations cannot rely on self-identification alone. This puts undue pressure on customer service advisors to recognize vulnerability based solely on soft skills and single interactions. Advisors are expected to identify a customer’s vulnerability while simultaneously searching for accurate information, leading to potential bias and missed signs. For example, a customer displaying subtle signs of stress may be perceived as just another frustrated caller rather than someone in genuine distress. Relying solely on human judgment to identify vulnerability is neither scalable nor sufficient.

Energy and utilities remain the top source of financial pressure

Financial pressures, particularly rising energy and utility costs, weigh heavily on UK households. A troubling 35% of potentially vulnerable consumers anticipate reducing or stopping their heating and hot water usage in 2025 due to financial strain.

With financial difficulties impacting consumers across all demographics, organizations—especially energy providers—must adopt solutions that build customer confidence and help consumers easily access critical information.

Vulnerable consumers are choosing digital support

Vulnerable consumers are increasingly turning to digital channels for support. Over a third (37%) prefer organizations to invest in improved digital services, such as AI-powered chatbots, over traditional in-person support, surpassing the general population’s demand (33%).

Digital channels provide an added layer of anonymity, which can be especially empowering for vulnerable individuals hesitant to discuss sensitive issues face-to-face. This presents a significant opportunity for organizations to leverage intelligent solutions that help customers resolve their issues efficiently and accurately.

AI and automation: the key to scalable, compassionate support

With a growing number of consumers at risk, outdated manual processes can’t keep up. Supporting vulnerable consumers at scale requires innovation. AI and automation can transform how organizations detect and respond to vulnerability, ensuring no one is left behind.

AI-driven solutions can analyze every customer interaction across voice and digital channels, detecting vulnerability in real-time based on language cues, sentiment, and behavioral patterns. This allows for timely intervention and ensures that customers receive the right support when they need it the most.

AI-powered chat services must go beyond surface-level interactions. Smart escalation pathways ensure that vulnerable consumers receive appropriate follow-up, whether through specialist advisors or seamless context capture—eliminating the need for customers to repeat distressing details.

However, AI insights are only valuable if they empower frontline advisors. Real-time AI guidance can equip agents with instant, tailored recommendations—whether offering alternative payment plans, government assistance, or mental health support options. This ensures that customers receive compassionate, personalized service without the risk of bias or oversight.

What’s more, by automating workflows, organizations can ensure vulnerable customers are always routed to the correct resources, specialist teams, or dedicated processes—minimizing the risk of anyone falling through the cracks.

The future of vulnerable customer support

Vulnerability is a human challenge, but technology is needed to solve it at scale. AI doesn’t just detect vulnerability—it enables organizations to move beyond recognition, delivering proactive, personalized, and truly supportive experiences.

For technology leaders, the message is clear: AI and automation must be embedded at the core of customer support strategies. By working closely with customer service, technology leaders can ensure that every consumer, especially the most vulnerable, receives the support they need with dignity, efficiency, and care.

We've featured the best help desk software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Worried About the Economy? A CD Can Keep Your Money Safe. Today's CD Rates, March 19, 2025

CNET News - Wed, 03/19/2025 - 10:17
In a shaky economy, CDs are a safe bet.
Categories: Technology

Rethinking vendor risk management in the age of AI and automation

TechRadar News - Wed, 03/19/2025 - 10:14

Today’s organizations rely on an extensive network of third-party vendors, partners, and service providers to enhance operations and fuel innovation. Whether leveraging cloud services, supply chain partners, or outsourced IT solutions, these external dependencies introduce complex cybersecurity risks.

The 2024 Change Healthcare cyberattack exemplified the devastating consequences of a third-party vulnerability, exposing the personal and medical information of nearly 190 million individuals—the largest healthcare data breach on record. This incident underscored how deeply vulnerabilities in a single third-party provider can ripple across entire industries, exponentially expanding attack surfaces and amplifying the consequences of a single security failure.

The escalating threat of third-party cyber risks

One year after the Change Healthcare cyberattack, third-party breaches continue to dominate headlines, with new incidents emerging almost monthly. In January, government IT contractor Conduent suffered a cyberattack due to a third-party system compromise on an operating system. The following month, Grubhub disclosed a data breach after detecting unusual network activity linked to a compromised third-party service provider. These incidents are not isolated; they reflect a growing trend where cybercriminals exploit a single point of entry to infiltrate one or more organizations' entire digital supply chain.

The repercussions of a third-party cyberattack extend far beyond immediate operational disruptions. They erode customer trust, trigger scrutiny from officials, and result in significant financial losses. The evolving threat landscape coupled with businesses expanding their reliance on external vendors increases the potential for third-party security failures, making it imperative for organizations to rethink their approach to vendor risk management. Third-party risk management (TPRM) is no longer a compliance exercise, it is a business-critical function requiring continuous oversight and modernization.

The shortcomings of traditional TPRM approaches

Historically, organizations have relied on manual assessments to evaluate third-party risks, often involving lengthy security questionnaires, periodic audits, and contractual agreements outlining cybersecurity expectations. While these measures establish a baseline for vendor security, they are largely static and offer little real-time insight into evolving threats. As cybercriminals become more sophisticated and exploit new vulnerabilities within days of being discovered, a point-in-time assessment is no longer sufficient.

The increasing volume of vendor relationships further complicates manual risk management. Security teams are often overwhelmed by the sheer number of third parties they must monitor, leading to inefficiencies, delays, and gaps in visibility. Traditional approaches rely on periodic assessments that provide only a snapshot, leaving organizations blind to threats that can emerge between evaluations.

Without continuous oversight, security gaps can go undetected until it’s too late. Addressing these shortcomings requires a shift from manual, reactive processes to automation-powered security operations, where real-time monitoring and AI-driven analytics provide the agility needed to stay ahead of evolving threats.

How AI and automation-driven security is transforming TPRM

AI and automation should not replace human decision-making; but rather augment it, empowering security teams with the tools and information needed to make better, faster, and more informed choices. A well-implemented AI and automation-powered strategy reduces operational fatigue, optimizes resource allocation, and ensures organizations stay ahead of evolving cyber threats rather than constantly playing catch-up. By automating TPRM, organizations can shift from passive risk management to proactive threat prevention.

Unlike traditional risk assessments that provide a static view of a vendor’s security posture, automation and AI can continuously monitor third-party networks, applications, and behaviors to identify anomalies and provide real-time visibility of external threat environments. AI-based third-party risk detection can also help organizations progress beyond known, rule-based security risk detection to a more heuristic detection capability.

While the risk of AI hallucinations and associated false positives can still be an issue, this is an emerging field for detecting software and network vulnerabilities that should not be overlooked. This proactive approach helps organizations move away from reactive security models, allowing them to address risks before they become crises.

Automation further strengthens incident response. When a security event occurs within a third-party environment, automation platforms accelerate containment by instantly analyzing the breach, assessing its impact, and triggering efficient notification of the appropriate practitioners which can be used to engage response protocols quickly and accurately. This rapid intervention significantly reduces dwell time, limiting the potential damage caused by an attack.

An automation platform with robust case management capabilities and highly customizable playbooks provides a centralized location for storing valuable information about TPRM-associated tasks, detections, software in use in the organization, asset criticality, and more. This helps not only in the defense of an environment but also can be leveraged for compliance audit readiness or demonstrating to insurers and stakeholders what measures have been taken to manage third-party risk.

The time for action Is now

Third-party data breaches, such as the recent GrubHub cyberattack, act as a wake-up call for organizations to prioritize proactive security measures. Cybercriminals will continue targeting external providers as a backdoor into organizations, reinforcing the need for a proactive, AI-enhanced approach to TPRM.

By integrating AI and automation-driven security operations, organizations can achieve real-time monitoring, automated threat detection, and rapid incident response, detecting anomalies before they escalate into full-scale breaches. In an era where cyberattacks are inevitable, resilience is built on preparedness. The time for action is now before your organization becomes the next headline.

We've featured the best business VPN.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Categories: Technology

Google Missed a Huge Opportunity With the Pixel 9A

CNET News - Wed, 03/19/2025 - 10:00
Commentary: With Apple not refreshing its iPhone SE line, I feel Google had an opportunity that it squandered.
Categories: Technology

Can the Steam Deck Run Assassin's Creed Shadows?

CNET News - Wed, 03/19/2025 - 10:00
This is going to be a tough one for Valve's portable.
Categories: Technology

Razer Wants to Be Your Copilot. New Developer Tools May Bring More AI to Games

CNET News - Wed, 03/19/2025 - 10:00
The new software developer kit aims to help developers catch more bugs and give better in-game advice.
Categories: Technology

NYT Connections hints and answers for Thursday, March 20 (game #648)

TechRadar News - Wed, 03/19/2025 - 10:00
Looking for a different day?

A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Wednesday's puzzle instead then click here: NYT Connections hints and answers for Wedneday, March 19 (game #647).

Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.

What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.

SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.

NYT Connections today (game #648) - today's words

(Image credit: New York Times)

Today's NYT Connections words are…

  • GENIE
  • BUNGEE
  • STRAIT
  • VOCAL
  • SHIP
  • EXTENSION
  • DIRECT
  • MESSAGE
  • LOUD
  • SOUND
  • SPINAL
  • CHANNEL
  • UMBILICAL
  • BAY
  • LIGHTNING
  • FRANK
NYT Connections today (game #648) - hint #1 - group hints

What are some clues for today's NYT Connections groups?

  • YELLOW: Confident speaker 
  • GREEN: Ocean geography 
  • BLUE: Common thread rhymes with “lord”
  • PURPLE: Found inside

Need more clues?

We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…

NYT Connections today (game #648) - hint #2 - group answers

What are the answers for today's NYT Connections groups?

  • YELLOW: OUTSPOKEN 
  • GREEN: BODIES OF WATER 
  • BLUE: KINDS OF CORDS 
  • PURPLE: THINGS IN BOTTLES 

Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.

NYT Connections today (game #648) - the answers

(Image credit: New York Times)

The answers to today's Connections, game #648, are…

  • YELLOW: OUTSPOKEN DIRECT, FRANK, LOUD, VOCAL
  • GREEN: BODIES OF WATER BAY, CHANNEL, SOUND, STRAIT
  • BLUE: KINDS OF CORDS BUNGEE, EXTENSION, SPINAL, UMBILICAL
  • PURPLE: THINGS IN BOTTLES GENIE, LIGHTNING, MESSAGE, SHIP
  • My rating: Difficult
  • My score: 3 mistakes

I used up three Mistakes today by convincing myself that VOCAL belonged in KINDS OF CORDS, trying every combination and getting “one away” each time before giving up and dropping it.

All part of the fun of Connections and hopefully I wasn’t the only person who fell for this trap.

This little niggle out of the way, the rest of the groups fell together easily. I might have even have gotten THINGS IN BOTTLES if I hadn’t completed OUTSPOKEN ahead of it.

How did you do today? Let me know in the comments below.

Yesterday's NYT Connections answers (Wednesday, 19 March, game #647)
  • YELLOW: SIGNIFY CONVEY, EXPRESS, MEAN, SPELL
  • GREEN: WEB BROWSER BUTTONS BACK, EXTENSIONS, FORWARD, REFRESH
  • BLUE: PARTS OF A ROAD DIVIDER, LANE, MEDIAN, SHOULDER
  • PURPLE: À/ A LA __ CARTE, KING, MODE, PLANCHA
What is NYT Connections?

NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.

On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.

It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.

It's playable for free via the NYT Games site on desktop or mobile.

Categories: Technology

Pages

Subscribe to The Vortex aggregator