Friday, 28 February 2025

GrapheneOS Review: The Most Private and Secure Android OS

GrapheneOS is commonly billed as the world’s most secure mobile operating system, offering a level of privacy and security that is unmatched, but does it live up to the hype?

Users have grown increasingly wary of Big Tech, thanks to rampant privacy abuses by many companies, as well as the danger of relying on a few companies for privacy and security. This was recently illustrated by the UK trying to force Apple to backdoor its encryption for all users worldwide. As a result, open-source alternatives are growing in popularity, giving users true choice and greater control over their security and privacy.

I have personally used GrapheneOS for years on multiple devices and promoted it to others, both online and offline. In this review, however, we look at GrapheneOS, what it is, the security and privacy it offers, why users should consider it, and a word of caution.

What Is GrapheneOS?

GrapheneOS (or Graphene) is based on the Android Open Source Project (AOSP). It may be a surprise to some that Android is not a single monolithic operating system provided and controlled by Google. Instead, there are several different flavors of Android, all based on AOSP, with Google’s Android being the most common and well-known. Google takes AOSP, adds its proprietary bits, Play Services, and everything Google to collect the data it relies on for its advertising business, and bundles it as the stock Android most people are familiar with.

There are a number of projects that take AOSP and use it to build a de-Googled version of Android that offers more privacy and security than Google’s stock version. GrapheneOS, CalyxOS, LineageOS, IodéOS, and /e/OS are the most common.

What Sets GrapheneOS Apart?

A number of Android flavors inherit the strong security protections provided by AOSP, and some of them take additional measures to boost security and keep data out of the hands of Google and Big Tech. Graphene, however, takes things much further, earning a recommendation from none other than Edward Snowden.

Graphene is designed from the ground up to provide a level of security and hardening that none of the other flavors of Android provide, including against zero-day (previously undisclosed) vulnerabilities, as well as both local and remote code execution vulnerabilities.

The project’s website describes some of the features that provide the added protections:

  • Hardened app runtime
  • Secure application spawning system avoiding sharing address space layout and other secrets across applications
  • Hardened libc providing defenses against the most common classes of vulnerabilities (memory corruption)
  • Our own hardened malloc (memory allocator) leveraging modern hardware capabilities to provide substantial defenses against the most common classes of vulnerabilities (heap memory corruption) along with reducing the lifetime of sensitive data in memory.
  • On ARMv9, Branch Target Identification (BTI) and Pointer Authentication Code (PAC) return address protection are enabled for userspace OS code we build instead of only specific apps
  • Signed integer overflow is made well defined in C and C++ for code where automatic overflow checking is disabled
  • Hardened kernel
  • Android Runtime Just-In-Time (JIT) compilation/profiling is fully disabled and replaced with full ahead-of-time (AOT) compilation. The only JIT compilation in the base OS is the V8 JavaScript JIT which is disabled by default for the Vanadium browser with per-site exception support.
  • Dynamic code loading for both native code or Java/Kotlin classes is blocked for nearly the entire base OS to prevent base OS processes.
  • Dynamic code loading for both native code or Java/Kotlin classes can be disabled for user installed apps via 3 exploit protection toggles
  • Filesystem access hardening

In addition, Graphene secures the USB-C port, locking it down to charging-only mode whenever the screen is locked, minimizing the risks from malicious USB devices. Graphene’s protection goes far beyond what is provided in stock Android.

Our implementation is far more secure than Android’s standard USB HAL toggle available to device admin apps. The standard feature only disables high level USB handling in the OS. It doesn’t block new USB connections or disable the data lines at a hardware level. It also leaves the handling of the USB-C and pogo pins protocols enabled in the OS, and it doesn’t disable the USB-C alternate modes. The standard feature is also either blocking or not blocking USB at a high level, without the ability to block new connections and disable USB only once the existing connections end. Other operating systems trying to implement a similar feature via the standard toggle end up continuing to allow new USB connections in the OS until all connections end instead of the two-phase approach we use for our two Charging-only when locked modes.

Graphene also relies on SELinux—a popular Linux mandatory access control (MAC) system—to provide application sandboxing.

What Phones Does GrapheneOS Support?

Graphene only supports Pixel devices that are still within their support window from Google. It may seem counter-intuitive for a de-Google Android OS to rely on hardware from Google, but there’s a very good reason.

Despite Google being one of the most privacy-invasive companies in existence, Pixel hardware is some of the most secure mobile hardware on the market. Google also makes it easy to unlock and re-lock the bootloader, a necessary step for installing an alternative OS.

Finally, Graphene only supports Pixels still in their support Window, since those devices still receive firmware support for the modem, chipset, and underlying hardware.

Installation Process

Graphene supports two different installation methods. Like most alternative Android operating systems, it is possible to download the adb and fastboot, and go through a relatively tedious process installing the OS.

Where Graphene’s installation process really shines, however, is with the browser-based installer they pioneered. It is much easier, more straight-forward, and can be done via a Chromium-based browser on Linux, macOS, Windows, or another Android device.

Additional Features

In addition to the above security features, Graphene includes a host of other useful features, most aimed at improving privacy and security.

  • Advanced permissions controls, including the ability to toggle network access per application.
  • The ability to use a PIN longer than 16 characters.
  • The option to scramble the PIN layout so someone looking over a shoulder can’t easily decipher the PIN based on the location of screen taps.
  • The option to set a duress PIN that will securely wipe the device if a user is being forced to provide a PIN to unlock it.

What About Android Apps?

Second to the privacy and security, one of Graphene’s greatest strengths is how it handles Android apps and the Google Play Store.

Most alternative Android operating systems do not include support for the Google Play Store and mainstream apps, or they use a service called MicroG. MicroG is an open-source implementation of the Google Play Store, effectively taking APKs from the Play Store and allowing customers to download them without signing into a Google account. MicroG does this by using anonymous emails to sign in so a user doesn’t have to disclose their identity to Google.

Unfortunately, this approach has real issues, including the fact that Google can and does occasionally block the anonymous emails MicroG relies on. A couple of years ago, this created serious issues that prevented users from being able to download new apps from the Play Store until MicroG could address it.

In contrast, GrapheneOS gives users the ability to install the Play Store and and use it to install apps. Unlike stock Android, however, the Play Store on Graphene does not have escalated or system-level privileges, and is sandboxed like any other app. As a result, it is a far more secure and private way to install apps.

As a result of Graphene’s approach, the OS is generally has less issues running problematic Android apps than the MicroG approach, since it does provide the official Play Store and Play Services that many apps require.

The one notable exception is Google Pay. At the time, and likely for the indefinite future, Google Play doesn’t work on Graphene or any alternative Android OS.

Who Should Use GrapheneOS?

Who should use GrapheneOS? In short, anyone who wants the most secure and private mobile operating system available without sacrificing access to the robust ecosystem of Android apps.

Graphene is one of those few security and privacy options that lets users “have their cake and eat it too,” blending industry-leading security and privacy with a level of convenience that rivals stock Android.

A Word of Caution (Warning, This Is Long)

The one word of caution regarding Graphene has nothing to do with the OS itself and has everything to do with project leadership.

Disclaimer: I have had very positive, professional interactions with at least one member of the Graphene leadership, so what is written below does not apply to that individual. Instead, this applies at least to the portion of the project’s leadership responsible for public communication and possibly leadership collectively.

Like many open-source projects, users tend to become invested in the project and want the best for it. This can result in feedback or critiques that are meant in a spirit of being helpful. This is especially true for users like yours truly, who write about and review technology products for a living.

A perfect example of this is YouTube The Linux Cast, who is a major openSUSE Tumbleweed fan. Because he is a fan, The Linux Cast recently created a video where he highlighted some areas where openSUSE could improve, with one of those being the friendliness of the community. The video was meant as a helpful critique, and in no way could be misconstrued as an attack on the openSUSE project.

Similarly, following a series of posts by Graphene leadership calling out a privacy YouTuber, I made the mistake of offering a similar critique. In the posts, Graphene leadership called the YouTuber “a charlatan,” “a serial fabricator and scam artist.”

I posted a polite and respectful reply emphasizing how big a fan of the project I am and saying that, while the Graphene project should absolutely defend itself and combat misinformation, a less combative and more restrained, distinguished, and professional tone would be less off-putting. Such an approach would essentially rise above any negative statements or attacks on the project and ultimately discredit them far more than a combative response that resorted to name-calling.

I thought my post would receive a response somewhere between ‘thank you, we got a little carried away’ and ‘thank you for the feedback, but we’re quite happy with our communication style.’ Any option like that would have been fine, and I would have gone about my day happy I at least tried to help.

Instead, I was banned from the Graphene forums (the ban was later lifted), and I received a hostile email saying that:

  1. I was being “completely false and dishonest” by saying the team’s post included name-calling since their claims about the YouTuber “are complete factual,” with the author of the email apparently unaware that a statement can be true and factual and still constitute name-calling.
  2. I was told I was no longer welcome in the community and warned not to try to rejoin it.

I politely emailed back and asked why I had received such a hostile response when my only goal was to provide constructive feedback as someone who communicates in a professional role for a living. In the subsequent series of emails, I was accused of being a friend of Graphene’s enemies and of attacking the Graphene project and its developers—all because I dared to say the project’s communication would be more effective and achieve the same goals if it was less combative and adopted a more restrained, professional tone.

In 25 years in the tech and software development community, both as a writer and a software developer, I have never had an interaction such as this one (and yes, I have screenshots of the entire email exchange).

To be fair, the Graphene project has suffered inexcusable harassment by some individuals and online communities, even escalating to swatting attacks on the project’s founder. Unfortunately, this seems to have fostered a ‘we vs. them’ mentality and a tendency to see enemies everywhere, including among friends and fans of the project who dare to offer well-meaning feedback or criticism.

Separating the Project From Its Leadership

Should users avoid GrapheneOS because of leadership’s poor and sometimes hostile communication? In short, no. Graphene remains the single most secure and private mobile operating system on the market and is THE BEST choice, bar none.

As a result, we WHOLEHEARTEDLY recommend GrapheneOS to the following users:

At the same time, we strongly caution users to avoid interaction with the project’s leadership until such time as it adopts a less “prickly” communication style.

This is not like Linux Mint, PopOS, Fedora, openSUSE, Debian, Ubuntu, GIMP, or most other open-source projects, where a free exchange of ideas among fans—especially criticisms designed to help and improve the project—is welcome.

But that doesn’t change the project’s merit, the team’s incredible accomplishments, or the value of GrapheneOS.

Rating

4.5 out of 5 stars

Pros:

  • The most secure mobile OS available, bar none.
  • A truly private OS that allows users to reclaim their privacy from Big Tech.
  • Unparalleled compatibility with the Google Play Store among alternate Android operating systems.
  • Open-source.

Cons:

  • Project leadership can be “prickly” and openly hostile to any negative feedback, including well-meaning criticism from ardent fans.

In the next installment of this series, we’ll cover some best practices for daily GrapheneOS use, including how to overcome common issues.



from WebProNews https://ift.tt/lJotsXw

Thursday, 27 February 2025

Salesforce and Google Expand Partnership With Gemini/Agentforce Integration

Salesforce and Google announced a major expansion of their partnership, one that sees Google’s Gemini integrated into Salesforce’s Agentforce.

Salesforce unveiled Agentforce in September 2024, billing it as “the Third Wave of AI” and “what AI was meant to be.” CEO Marc Benioff has continued to tout Agentforce, saying it blows away competing products, such as Microsoft’s Copilot.

In a surprise move, the two companies are significantly expanding their partnership, with Salesforce now available on Google Cloud and Agentforce tapping into the power of Gemini, giving customers the ability to create Gemini-based Agentforce agents.

“Through our expanded partnership with Google Cloud and deep integrations at the platform, application, and infrastructure layer, we’re giving customers choice in the applications and models they want to use,” said Srini Tallapragada, Salesforce President & Chief Engineering and Customer Success Officer. “Salesforce offers a complete enterprise-grade agentic AI platform that makes it easy to deploy new capabilities easily and realize business value fast. Google Cloud is a pioneer in enterprise agentic AI, offering some of the most powerful, capable models, agents, and AI development tools on the planet. Together we are creating the best place for businesses to scale with digital labor.”

“Salesforce’s selection of Google Cloud as a major infrastructure provider means enterprise customers can now deploy some of their most critical applications on our highly secure, AI-optimized infrastructure — with minimal friction,” said Thomas Kurian, CEO of Google Cloud. “Our mutual customers have asked us to be able to work more seamlessly across Salesforce and Google Cloud, and this expanded partnership will help them accelerate their AI transformations with agentic AI, state-of-the-art AI models, data analytics, and more.”

The two companies went on the describe the benefits of the partnership to customers.

Agentforce will be able to use Grounding with Google Search through Vertex AI, building on the secure data foundation established through the zero copy partnership between Salesforce Data Cloud and Google BigQuery. This integration empowers Agentforce agents with the ability to reference up-to-the-minute data, news, current events, and credible citations, substantially enhancing their contextual awareness and ability to deliver accurate, evidence-backed responses.

For example, in supply chain management and logistics, an agent built with Agentforce could track shipments and monitor inventory levels in Salesforce Commerce Cloud, and proactively identify potential disruptions using real-time data from Google Search, including weather conditions, port congestion, and geopolitical events. Availability is expected in the coming months.

With Gemini and Agentforce, businesses will benefit from:

  • Agents with multi-modal capabilities: Gemini’s native multimodality lets agents “see” and interpret the world, enabling AI to recognize images (like error codes) and detect emotions in voice. Integrating this into Agentforce creates smarter agents that respond to audio, video, and text.
  • Expanded contextual understanding and reasoning: Gemini’s 2 million-token context window lets agents retain and reference massive amounts of information, like entire codebases, years of customer interactions, or product documentation.
  • Increased speed and efficiency: Google’s Tensor processing Units (TPUs), combined with advanced techniques like those used in Google’s NotebookLM, enable Gemini to process and understand information with exceptional speed and efficiency, delivering real-time responses even for complex queries. This translates to faster response times and reduced operational costs.

Salesforce on Google Cloud will also provide customers with the benefits of the third-largest cloud provider, one that has made AI development front and center.

Customers will be able to use Salesforce’s unified platform (Agentforce, Data Cloud, Customer 360) on Google Cloud’s highly secure, AI-optimized infrastructure, benefiting from features like dynamic grounding, zero data retention, and toxicity detection provided by the Einstein Trust Layer.

Once Salesforce products are available on Google Cloud, customers will also have the ability to procure Salesforce offerings through the Google Cloud Marketplace, opening up new possibilities for global businesses to optimize their investments across Salesforce and Google Cloud and benefitting thousands of existing joint customers.

The companies emphasize that the partnership goes beyond the individual capabilities of either platform, providing customers with a value proposition that is greater than the sum of its parts.

This partnership goes beyond core product integrations to deliver a more connected and intelligent data foundation for businesses. This is just the beginning; Salesforce and Google Cloud are committed to ongoing innovation and deeper collaboration to empower businesses with even more powerful solutions. Expected availability throughout 2025.

Deeper integrations across Data Cloud, BigQuery, and Cortex Framework will make it easier than ever for customers to securely ground their AI agents in all of their enterprise data.
New native Tableau, Looker, and BigQuery integration will allow customers to manage and visualize business data across all platforms in one single UI with standardized business logic and data definitions.

Google’s Growing Influence In AI

Despite being taken by surprise when OpenAI’s ChatGPT burst onto the scene, Google has made significant progress in its efforts to close the gap. Not only has the company delivered a competitive AI model in Gemini, but it is striking important deals that will see Gemini gain important mindshare among users.

Recent reports indicate Gemini will soon join ChatGPT as one of the available AI models in Apple Intelligence, potentially giving it important market share among home users and consumers. With the Salesforce integration, Gemini is will gain important market share in the enterprise.

While there’s no doubt Google was caught flatfooted in the AI race, the company has quickly demonstrated its ability to compete with the best the AI industry has to offer. Inking critical partnerships, such as with Apple and Salesforce, will go a long way toward solidifying its position.



from WebProNews https://ift.tt/xgnf0Nw

Steps for Success: Adapting to the Current State of the Auto Industry Trends

The auto industry is changing.  Consumers are approaching vehicle purchases differently, resulting in new trends, challenges and opportunities.  Using data-driven insights, the auto industry can develop a deep understanding of current patterns, allowing it to make smart financial decisions that benefit dealerships and customers alike. 

Many customers are struggling economically, which impacts the auto industry as well.  For example, rising prices and interest rates have led to slower auto sales.  In 2016, the average new vehicle price was $34,450.  In 2024, the average new vehicle price rose to $48,397, which is a 34% increase over just eight years.  Likewise, the average vehicle interest rate was 4.26% in 2016, and rose to 7.57% in 2024.  

Financial Auto Industry Trends

Debt is also on the rise.  In fact, auto is the fastest growing category in non-mortgage consumer debt, and is now higher than student loans, bankcards, personal loans and private label cards.  More specifically, auto loans and leases make up 35.9% of the total non-mortgage consumer debt.  

Another concern is score bands.  The YoY percentage of deep subprime and subprime borrowers with auto loans and leases is growing the most compared to other bands, such as prime and super-prime.  Currently, 13.2% of accounts are deep subprime, which is 4.8% YoY change.  8.1% of accounts are subprime, which is also a 4.8% YoY change.

These financial pressures have led to plummeting auto sales.  In fact, auto loan and lease originations dropped 1.6% YoY in September 2024, which equals a $9.2 billion decrease.  This is a problem on its own, but is further concerning when considered in conjunction with fraud. 

Increased financial stress on consumers can lead to higher fraud rates.  In 2023, synthetic identity (Syn ID) fraud rose by 98%.  Auto loan credit applications with a risk of Syn ID rose from ~5% in 2019 to +8% in 2023, marking a 60% increase in just four years. 

Despite these grim statistics, hope remains.  Using Know Your Customer (KYC) tools, the auto industry can improve the buying experience, which can make a huge difference in sales.  For example, 72% of consumers say that they would visit dealerships more if the buying process was improved.  54% of consumers say that they would purchase from dealerships with a preferred experience, even if that dealership didn’t have the lowest prices. 

KYC tools also help the dealership identify its most interested and qualified customers.  Across the board, using data and KYC tools can streamline the buying process for dealers, lenders and customers alike, and is a key strategy moving forward. 

Another important tool will be proactive fraud prevention.  Working with companies like Equifax, auto dealerships can tackle fraud before it appears through solutions like Digital Identity Trust.  Preventing fraud before it has a chance to impact sales can save money and time, and is vital as the auto industry contends with rising fraud and delinquency levels.

Conclusion

As consumer behavior changes in the world of auto industry trends, new challenges and opportunities crop up.  Being aware of these changes is the first step to better financial solutions.  Using KYC tools to build better consumer experiences is also important, as are preventative measures regarding fraud.  With these tools, the auto industry can adapt to the current state of the industry, thriving with the help of new tactics and data. 

Auto Insights for 2025. State of the Auto Industry

from WebProNews https://ift.tt/wkCtdfY

Title: Common Screen Recording Mistakes (And How to Avoid Them)

While it was once just a cool option, screen recording is now an essential method for creating content for tutorials, presentations, webinars, and more. Although it seems easy, several common mistakes can compromise the quality of your recordings. 

To create quality recordings and ensure your final projects are professional, you’ll want to avoid the following pitfalls.

1. Not editing out small errors

Screen recordings are designed to capture your activity in real-time, and there’s a chance you’re going to make mistakes. For instance, you might brush your lavalier mic with your hand, cough loudly, or take extra time to perform a recorded action. It’s tempting to ignore these small errors, but that will make your final production feel unprofessional.

If you make mistakes that compromise the quality of your end result, edit your recordings. It’s not as hard as it may seem. You don’t need fancy software to make edits. Just get a screen recorder that comes with basic or advanced editing capabilities and you can do all of your editing inside the same application when you’re done recording.

2. Neglecting audio quality

Audio quality is a critical factor that can make or break a screen recording. Poor audio will distract your audience and cause them to view your content as unprofessional. The only way to ensure quality audio is to get a high-quality microphone and test it before each recording.

Avoid using your device’s built-in microphone. Even if it picks up sound perfectly, it’s not going to eliminate background noise or respond the way a professional mic will. Investing in a quality external mic will increase clarity and reduce ambient noise.

3. Recording with noise in the background

Ambient sounds like traffic, air conditioning, dishwashers, kids, television, and barking dogs can ruin a screen recording. If your house is normally a little noisy, schedule your recording sessions for quieter times so you don’t have to deal with unwanted sounds. The last thing you want is to get through 90% of your recording before your dog starts barking at the mailman.

4. Having a cluttered screen

Whether you choose to record your entire screen or just a selected portion, digital clutter will distract your viewers. It’s usually desktop clutter that has a negative impact, so make sure you clean it up before recording. If you need to keep files on your desktop for some reason, stash everything in a folder temporarily and then put them back when you’re done.

5. Too many apps open at once

Having a bunch of applications open while you’re recording can slow down your computer and cause your screen recording to come out jerky. Before recording, close all the applications you don’t need to use.

6. Leaving your browser tabs and bookmarks in sight

It’s best to start recording with a fresh browser window to avoid capturing your private information in your video. For example, you might click on the wrong tab and display some sensitive data for a split second. It’s virtually guaranteed that someone out there will pause your video to get a better look.

It’s equally important to hide your bookmarks bar while screen recording. Your audience doesn’t need to see the websites you’re saving for later. Some of those links could be embarrassing, while others might be revealing, like giving away your banking institution or the fact that you have an account with a certain company.

7. Not preparing fully

Going into a recording session unprepared can produce an undesirable, disorganized video. Retakes are possible, but you probably don’t want to record the same video multiple times.

Always have some kind of script or outline, even if you’re just going to speak naturally with the flow. An outline will keep you on track to ensure you don’t miss important points, and a script will help you make your most important points clearly without fumbling.

8. Reading directly from your slides

If you’re using slides, keep the text to a minimum. Slides with dense text encourage reading, while slides with key points will keep you on track; you can elaborate while keeping your viewers engaged.

9. Speaking in a monotone voice

Monotone delivery is boring and won’t keep viewers engaged for long. The easiest way to avoid this is to not read a full script. Reading a script verbatim can make your delivery flat. Aim to be more conversational to increase relatability and engagement.

Elevate your screen recordings

Screen recording isn’t rocket science, but it takes careful planning to create professional, engaging content. With clear audio, crisp visuals, and a little editing, you can turn your screen recordings into high-impact videos that capture attention and deliver value to your audience.



from WebProNews https://ift.tt/46X5s2k

Wednesday, 26 February 2025

5 SWOT Analysis Examples of Leading Real Companies

In today’s competitive business landscape, self-awareness is crucial for success. Understanding a company’s strengths and weaknesses allows for informed decision-making and effective problem-solving. But how do businesses gain this vital insight?

Several techniques help businesses assess their position in the market. One of the most widely used tools is the SWOT analysis. This article explores how real companies use SWOT analysis for strategic planning and decision-making, so you can leverage these insights in your own company, too. 

What is a SWOT Analysis?

SWOT Analysis is a strategic planning tool that helps businesses evaluate their Strengths, Weaknesses, Opportunities, and Threats. It assesses both internal and external factors impacting an organization. 

SWOT analysis identifies competitive advantages and potential risks to growth. This versatile model applies to products, projects, and reputation, and is widely used in project management. 

Anatomy of a SWOT Analysis

The SWOT analysis template is typically presented as a 2×2 grid or 4-column table. Each section represents strengths, weaknesses, opportunities, and threats.

  • Strengths: Internal positive attributes that give a company an advantage over competitors.
  • Weaknesses: Internal factors that put the company at a disadvantage.
  • Opportunities: External factors that the company could exploit to its advantage.
  • Threats: External elements in the environment that could cause trouble for the business.

SWOT Analysis in Action: Real-World Examples

Let’s examine SWOT analyses of real companies to understand how they apply this tool in various business scenarios.

1. Impossible Foods

Impossible Foods is a food tech company that develops plant-based meat substitutes.

  • Strengths: Impossible Foods boasts innovative plant-based meat technology, strong partnerships with major restaurant chains, and a positive environmental impact.
  • Weaknesses: The company faces higher production costs compared to traditional meat, has a limited product range, and relies heavily on specific ingredients like soy.
  • Opportunities: Expanding into new international markets, developing new plant-based products beyond meat substitutes, and capitalizing on increasing consumer demand for sustainable food options present significant growth potential.
  • Threats: Growing competition in the plant-based meat industry, potential regulatory challenges in some markets, and fluctuating prices of key ingredients pose risks to the company’s growth.

Impossible Foods leverages its strengths in innovation and partnerships to capitalize on opportunities in new markets and product development while addressing threats from competition and regulatory challenges.

2. Duolingo

Duolingo is a language-learning platform that offers free and paid courses through a gamified app.

  • Strengths: Duolingo’s gamified learning approach increases user engagement, its freemium model attracts a large user base, and it has a strong mobile presence with a user-friendly interface.
  • Weaknesses: The platform offers limited advanced language learning options, relies heavily on ad revenue for free users, and lacks formal certification for completed courses.
  • Opportunities: Expanding into corporate language training, developing more advanced language courses, and partnering with educational institutions for accreditation offer potential for growth.
  • Threats: Increasing competition from other language learning apps, potential market saturation in popular languages, and changes in mobile app store policies affecting revenue are significant challenges.

Duolingo uses its strengths in user engagement and mobile presence to explore opportunities in corporate training and advanced courses while addressing threats from competition and market saturation.

3. Oatly

Oatly is a Swedish food company that produces oat-based dairy product alternatives.

  • Strengths: Oatly has a strong brand identity and effective marketing, an environmentally friendly production process, and a first-mover advantage in the oat milk market.
  • Weaknesses: The company has limited product diversification, higher prices compared to traditional dairy products, and faces production capacity constraints.
  • Opportunities: Expanding the product line to include more dairy alternatives, increasing global distribution, and capitalizing on growing plant-based diet trends offer potential for growth.
  • Threats: Increasing competition in the plant-based milk market, potential supply chain disruptions for oat sourcing, and changing consumer preferences in alternative milk options pose risks.

Oatly leverages its strong brand and environmental credentials to exploit opportunities in product diversification and global expansion while addressing threats from competition and supply chain risks.

4. Apple Inc.

  • Strengths: Apple’s brand recognition, innovative products, and loyal customer base are significant strengths. Its integrated ecosystem and premium pricing strategy further contribute to its success.
  • Weaknesses: High product prices limit market reach. Over-reliance on a few key products makes it vulnerable to market shifts.
  • Opportunities: Expanding into emerging markets, developing augmented reality products, and exploring healthcare provide growth opportunities.
  • Threats: Intense competition, changing consumer preferences, and potential supply chain disruptions are significant threats.

Apple leverages its strengths in innovation and brand loyalty to capitalize on opportunities in new markets and technologies while addressing threats from competition and market changes.

5. Coca-Cola

  • Strengths: Coca-Cola has a strong brand reputation, extensive distribution network, and global presence. Its marketing capabilities and diverse product portfolio are also strengths.
  • Weaknesses: Declining soda consumption and health concerns pose challenges. Over-reliance on sugary drinks is a weakness.
  • Opportunities: Diversifying into healthier beverages, expanding into emerging markets, and strategic acquisitions offer growth.
  • Threats: Changing consumer preferences, increasing health awareness, and intense competition are threats.

Coca-Cola is leveraging its brand and distribution network to diversify into healthier beverages and enter new markets, while mitigating threats from changing consumer preferences and health concerns.

Conclusion

These examples demonstrate how companies across various industries use SWOT analysis to understand their internal and external environments. By identifying strengths, weaknesses, opportunities, and threats, businesses can make informed decisions and develop effective strategies to achieve their goals.

SWOT analysis provides a framework for strategic thinking, helping organizations navigate the complexities of the modern business world. Whether it’s a food tech startup like Impossible Foods or an alternative dairy producer like Oatly, SWOT analysis proves to be a versatile tool for businesses of all types and sizes.

By regularly conducting SWOT analyses, companies can stay ahead of market trends, capitalize on their strengths, address their weaknesses, seize opportunities, and mitigate threats. This proactive approach to strategic planning is essential for long-term success in today’s dynamic business environment.



from WebProNews https://ift.tt/6vMWABV

Dutch Tech Firm Leaving EU Over Regulations

Dutch tech firm Bird has announced plans to leave the EU, blaming the bloc’s strict AI regulation, saying “it lacks the environment we need to innovate.”

The EU has faced growing criticism over its strict regulation, especially in regard to AI development, with some companies saying they will not bring their AI features to the bloc because of an uncertain regulatory outlook. Bird appears to be one of the first that is planning to leave the bloc over those regulations, however.

CEO Robert Vis announced the company’s plans in a LinkedIn post.

Bird is leaving Netherlands, opens global hubs and moves from remote to back to office. Launches new operating model to adopt to the AI era.

After 14 years of proud Dutch heritage and operations in the Netherlands, we’re embarking on an exciting new chapter. Bird is strategically consolidating our operations to six key global destinations while moving to office presence in these locations.

In a year of unprecedented growth, our Bird Box product has seen exponential adoption across global markets, while our core infrastructure continues to power over 5 trillion customer interactions annually across Email and SMS.

As AI transforms the global economy, our “Business in a Box” solution is revolutionizing how companies operate, bringing unprecedented efficiency and scale to business communications worldwide.

In communications with Reuters, Vis clarified that the EU’s regulation was the underlying cause.

“We are mostly leaving Europe as it lacks the environment we need to innovate in an AI-first era of technology,” CEO Robert Vis told the outlet.

“We foresee that regulations in Europe will block true innovation in a global economy moving extremely fast to AI,” he said in response to Reuters queries.

In a separate LinkedIn post that linked to Reuters’ article, Vis warned that Bird wouldn’t be the last to leave the EU over regulation.

Stop regulating Europe! We might be the first, but we won’t be the last.



from WebProNews https://ift.tt/c6n1iLT

Tuesday, 25 February 2025

Gemini Code Assist Is Now Free

Google is making its Gemini Code Assist for free to individuals, giving freelancers, students, hobbyists, researchers, and startups access to the tool.

According to Google’s research, “more than 75% of developers are relying on AI in their daily responsibilities.” Unfortunately, AI plans can be an expensive option for some. As a result, Google is making its Gemini Code Assist free for individuals.

While well-resourced organizations are empowering their engineering teams with the latest AI capabilities, that level of tooling hasn’t always been accessible to students, hobbyists, freelancers and startups. And with a worldwide population of developers forecasted to grow to 57.8 million by 2028, we think AI should be available to them whether they can pay for it or not, so they can start building with what are quickly becoming the standard digital tools of the future.

To bridge that gap, today we’re announcing the public preview of Gemini Code Assist for individuals, a free version of our AI-coding assistant.

Google goes on to tout Gemini Code Assist’s powerful features, including its support for every language currently in the public domain.

Gemini Code Assist for individuals is globally available and powered by Gemini 2.0. It supports all programming languages in the public domain, and importantly, it’s optimized for coding. We fine-tuned the Gemini 2.0 model for developers by analyzing and validating a large number of real-world coding use cases. As a result, the quality of AI-generated recommendations in Gemini Code Assist is better than ever before and ready to address the myriad of daily challenges developers face, whether they’re hobbyists or startup developers.

While other popular free coding assistants have restrictive usage limits, with usually only 2,000 code completions per month, we wanted to offer something more generous. We’re offering practically unlimited capacity with up to 180,000 code completions per month using Gemini Code Assist – a ceiling so high that even today’s most dedicated professional developers would be hard-pressed to exceed it.

Gemini Code Assist supports some of the most popular IDEs, while also providing far more usage than competing platforms.

With the new, free version of Gemini Code Assist in Visual Studio Code and JetBrains IDEs, individual developers now have the same code completion, generation and chat capabilities that we’ve offered businesses for over a year, and that are already available for free in Firebase and Android Studio. Now anyone can more conveniently learn, create code snippets, debug and modify their existing applications — all without needing to toggle between different windows for help or to copy and paste information from disconnected sources.

And with the most generous usage limit of 90 times1 more code completions per month than other popular free coding assistants, coders of all types can reap the rewards. If you’re a student working on a time-sensitive project, you won’t find your coding project suddenly stalled because you’ve hit a cap, or have to worry about chat limits stopping your pair-programming sessions.

Google’s is sure to be a big help to individual developers, especially those just starting out or launching their own startup.



from WebProNews https://ift.tt/6RFUkdZ

Senator Wyden Pushes FTC for Rules Governing Digital Ownership

Senator Ron Wyden, one of the most technologically adept and privacy-oriented U.S. senators, is pushing the FTC for rules that would ensure people own their digital purchases.

In today’s world of streaming services and digital distribution platforms, it has become all too common for companies to suddenly inform customers that the movies, TV shows, music, video games, and other digital content they previous purchased would no longer be available.

Senator Wyden addresses those issues in a letter shared with The Verge, citing an earlier FTC finding that many companies are using the word “purchase” loosely.

Over the last several years, the market for creative works—such as books, music, movies, and games—has undergone a major shift from physical to digital, raising questions about how traditional consumer protections and legal paradigms translate into the digital environment. A consumer who buys a book, for example, owns that copy and can sell, transfer, and continue toaccess it in perpetuity. But a consumer who “purchases” the same title as an e-book is usually obtaining a license, subject to certain limitations by the seller. As the FTC noted in a “Consumer Alert” from last year, “what [a consumer] really got when [he or she] clicked ‘buy’ is often merely a license to access the content. This fact is often explained only in fine print in the termsof service — terms that the seller can usually change at will.”1 The lack of transparency works against consumers, who are paying more but getting less than they expect, as well as missing achance to comparison shop and seek “another site or service with different terms, or even something [they] can hold in [their] hands.”

The letter then goes on to specifically call out Sony, Amazon, and Apple for this kind of behavior.

There is no shortage of instances in which this ambiguity has jeopardized consumers’ access tothe digital goods they have purchased. In December 2023, for example, Sony announced to users that “you will no longer be able to watch any of your previously purchased Discovery content,”including popular shows like “MythBusters,” “Cake Boss,” and “Deadliest Catch.” Consumers’access was preserved only after Sony and Discovery reached a last-minute licensing deal.Similarly, when Sony merged its two anime-focused streaming services, Funimation and Crunchyroll, Funimation users who were moved to the Crunchyroll platform lost access to titles in their library because “Crunchyroll does not currently support Funimation Digital copies.”3 In addition to losing access altogether, consumers have also had their digital content changed without their knowledge. Earlier in 2023, e-books, including titles from popular authors like Roald Dahl, R.L. Stine, and Agatha Christie, that had been published and sold in one form were retroactively edited without notice.4 Amazon has also recently announced that as of February 26,2025, Kindle owners will no longer be allowed to download or back up their purchased e-books to their computers—making it difficult for consumers to access their e-books offline and maintain access to the book edition they purchased.

Consumers’ ownership rights in digital products are currently being considered by multiplecourts, including suits against Amazon and Apple.6 Plaintiffs in these cases say they clicked“buy” to download digital goods that they believed they would own—and that they would nothave paid the full purchase price if they knew it was effectively a rental with terms subject tochange by the seller. And as courts weigh these issues, the California legislature has weighed inas well: the state recently passed a law requiring that online storefronts inform customers, inplain language, when the digital good they are about to purchase is a licensed product subject tolegal limitations.

Senator Wyden acknowledges the issues involved are complex and will not be easy to address, but urges the FTC to provide some kind of rules that will protect U.S. consumers.

Transparency is crucial to ensure that consumers know what they are buying and are not confused about the nature of the transaction. As the FTC has noted, “Companies are always obliged to ensure that customers understand what they’re getting for their money.”8 I therefore request that the FTC issue guidance for sellers of digital goods to ensure they are providing clear information about what they are selling and what ownership interests a purchaser will have. This should include, for example, how long a license lasts and under what circumstances it may expire or be revoked, as well as whether consumers have the right to transfer or re-sell the content. This information should be presented before and at the point of sale in a way that is clear and understandable for consumers, so that they can use all the information at hand to determine if they want to purchase or rent the product at the offered price. To put it simply, prior to agreeing to any transaction, consumers should understand what they are paying for and what is guaranteed after the sale.

The shift from physical to digital goods presents some complex legal questions. One thing is clear, however: consumers deserve transparency about their ownership rights in digital goods.Guidance from the FTC on this issue will help ensure that digital goods sellers are aware of best practices and that American consumers can make informed buying decisions

The issue Senator Wyden is addressing is a growing issue, with court actions and various petitions all trying to put pressure on companies to honor digital purchases. A clear ruling from the FTC could go a long way toward addressing the problem.



from WebProNews https://ift.tt/8YvmEbl

No, AI Is Not Going to Replace Programmers As AI Is ‘Unable To Solve the Majority’ of Problems

Fears that AI is going to replace programmers wholesale appear to be unfounded, as a new study by OpenAI finds even the most advanced models are “unable to solve the majority of tasks.”

AI is revolutionizing countless industries, while simultaneously causing many to fear for their jobs. Programming, in particular, is one field that is being heavily influenced by AI, with none other than Google’s Sergey Brin saying he relies on AI to write code.

“I think that AI touches so many different elements of day-to-day life, and sure, search is one of them,” Brin said in an interview in late 2024. “But it kind of covers everything. For example, programming itself, the way that I think about it is very different now.

“Writing code from scratch feels really hard, compared to just asking the AI to do it,” Brin added. “I’ve written a little bit of code myself, just for kicks, just for fun. And then sometimes I’ve had the AI write the code for me, which was fun.”

OpenAI’s Cautionary New Study

Despite many companies, executives, and programmers looking to AI to handle much of the coding that is currently done by humans, OpenAI’s study should give everyone reason to pause. The company evaluated “frontier models,” the term for the industry’s leading-edge, most advanced models. The company also used a benchmark that pulled from “over 1,400 freelance software engineering tasks from Upwork, valued at $1 million USD total in real-world payouts.” The tasks ranged from small bug fixes to feature implement ions worth $32,000.

We evaluate model performance and find that frontier models are still unable to solve the majority of tasks. To facilitate future research, we open-source a unified Docker image and a public evaluation split, SWELancer Diamond (https://github.com/ openai/SWELancer-Benchmark). By mapping model performance to monetary value, we hope SWE-Lancer enables greater research into the economic impact of AI model development.

OpenAI Warns Against the Risks of Improvement

While many people’s reaction may be to try to improve AI so that it can program more effectively, OpenAI points out that such a path is not without risks. Those risks include the very kind of impacts to the job market that many fear. Even more than than, AI models that excel at programming could pose an autonomy risk, such as self-improvement, data exfiltration data, and more.

AI models with strong real-world software engineering capabilities could enhance productivity, expand access to highquality engineering capabilities, and reduce barriers to technological progress. However, they could also shift labor demand—especially in the short term for entry-level and freelance software engineers—and have broader long-term implications for the software industry. Improving AI software engineering is not without risk. Advanced systems could carry model autonomy risk in self-improvement and potential exfiltration, while automatically generated code may contain security flaws, disrupt existing features, or stray from industry best practices, a consideration that is important if the world increasingly relies on model-generated code. SWE-Lancer provides a concrete framework to start tying model capabilities to potential real-world software automation potential, therefore helping better measure its economic and social implications. By quantifying AI progress in software engineering, we aim to help inform the world about the potential economic impacts of AI model development, while underscoring the need for careful and responsible deployment. To further support responsible AI progress, we open-source a public eval set and report results on frontier AI models to help level-set the implications of AI progress. Future work should explore the societal and economic implications of AI-driven development, ensuring these systems are integrated safely and effectively.

Conclusion

OpenAI’s study underscores the danger of jumping too quickly to replace human employees with AI. While AI is a valuable tool, it does its best work when used in conjunction with human employees, not in place of them.

When AI is used to augment the work of human programmers, those workers can oversee AI’s work, ensuring it is accurate. Just as important, human programmers can also serve in the all-important role of architect, designing the applications and systems, and then using AI to code specific aspects of those projects.

Ultimately, OpenAI’s research provides a dose of reality about just what AI can do and what it cannot—or should not—do.



from WebProNews https://ift.tt/7GyseVX

Monday, 24 February 2025

California Sues Florida Data Broker

California has sued Florida data broker Jerico Pictures, Inc., “for failing to register and pay an annual fee as required by the Delete Act.”

California currently has some of the strongest privacy legislation in the U.S., a country that is noticeably lacking in federal privacy regulation. As part of its Delete Act, data brokers that operate within the state must register and pay an annual fee that helps fund the state’s Data Broker Registry. Failure to do so results in a $200 fine per day.

In the case of Jerico Pictures, which does business as National Public Data, the company registered on September 18, 2024, 230 days after the January 31, 2024 cutoff date.

“We will pursue data brokers who violate the law, plain and simple,” said Michael Macko, the California Privacy Protection Agency’s (CPPA) head of enforcement. “I applaud our Enforcement team for its dogged pursuit of these violations. The Enforcement Division will use all available tools, including litigation, to make sure that data brokers aren’t operating in the dark.”

It’s encouraging to see data brokers being held accountable, even if it is only on a state level.



from WebProNews https://ift.tt/swpzufh

Federal Workers Are Losing Access to EV Charging Stations

Federal workers are on the verge of losing access to EV charging stations at their jobs, with the General Services Administration (GSA) shutting down 8,000 chargers.

The GSA is the government agency responsible for managing federal buildings across the country. The agency currently runs hundreds of EV charging stations at those federal buildings, stations that have roughly 8,000 individual charging plugs.

According to The Verge, the GSA is in the process of shutting down the network, sending an email to federal workers announcing the change.

“As GSA has worked to align with the current administration, we have received direction that all GSA owned charging stations are not mission critical,” the email reads.

“Neither Government Owned Vehicles nor Privately Owned Vehicles will be able to charge at these charging stations once they’re out of service,” it concludes.

Once the network is shut down, federal employees will have to rely on other means to top off their vehicles.



from WebProNews https://ift.tt/DQ9hcXP

Russia-Aligned Threat Actors Trying to Compromise Signal

Google has issued a warning about new threats to the Signal messaging platform, with “multiple Russia-aligned threat actors actively targeting Signal Messenger.”

Signal is currently one of the most security messaging platforms on the planet, in use by the EU Commission, U.S. Senate, U.S. military units, journalists, activists, and other surveillance targets. The platform ensures communications are end-to-end encrypted, and offers text, voice, and video chats.

As a result of its popularity, and the security it provides, Google says Signal is increasingly coming under attack by Russia-aligned threat actors seeking to compromise the service. The company says the action is likely the result of Russia’s invasion of Ukraine, as Signal is used within Ukraine for secure communications.

Google Threat Intelligence Group (GTIG) has observed increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russia’s intelligence services. While this emerging operational interest has likely been sparked by wartime demands to gain access to sensitive government and military communications in the context of Russia’s re-invasion of Ukraine, we anticipate the tactics and methods used to target Signal will grow in prevalence in the near-term and proliferate to additional threat actors and regions outside the Ukrainian theater of war.

First Attack Vector

Google goes on to outline several attacks currently in use to compromise Signal messages, with the first being abuse of Signal’s “Linked Devices” feature.

The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app’s legitimate “linked devices” feature that enables Signal to be used on multiple devices concurrently. Because linking an additional device typically requires scanning a quick-response (QR) code, threat actors have resorted to crafting malicious QR codes that, when scanned, will link a victim’s account to an actor-controlled Signal instance. If successful, future messages will be delivered synchronously to both the victim and the threat actor in real-time, providing a persistent means to eavesdrop on the victim’s secure conversations without the need for full-device compromise.

Notably, this device-linking concept of operations has proven to be a low-signature form of initial access due to the lack of centralized, technology-driven detections and defenses that can be used to monitor for account compromise via newly linked devices; when successful, there is a high risk that a compromise can go unnoticed for extended periods of time.

Second Attack Vector

The second attack vector involves modifying Signal group invites to send people to a malicious URL.

To compromise Signal accounts using the device-linking feature, one suspected Russian espionage cluster tracked as UNC5792 (which partially overlaps with CERT-UA’s UAC-0195) has altered legitimate “group invite” pages for delivery in phishing campaigns, replacing the expected redirection to a Signal group with a redirection to a malicious URL crafted to link an actor-controlled device to the victim’s Signal account.

Third Attack Vector

The third attack vector is highly specific to Ukrainian military units and targets a very specific application.

UNC4221 (tracked by CERT-UA as UAC-0185) is an additional Russia-linked threat actor who has actively targeted Signal accounts used by Ukrainian military personnel. The group operates a tailored Signal phishing kit designed to mimic components of the Kropyva application used by the Armed Forces of Ukraine for artillery guidance. Similar to the social engineering approach used by UNC5792, UNC4221 has also attempted to mask its device-linking functionality as an invite to a Signal group from a trusted contact.

While this attack is highly targeted, Google says this attack could be a template for future ones.

Notably, as a core component of its Signal targeting, UNC4221 has also used a lightweight JavaScript payload tracked as PINPOINT to collect basic user information and geolocation data using the browser’s GeoLocation API. In general, we expect to see secure messages and location data to frequently feature as joint targets in future operations of this nature, particularly in the context of targeted surveillance operations or support to conventional military operations.

Additional Attack Vectors

Google says there are multiple other types of attacks aimed at stealing Signal database files from both Android and Windows clients.

Beyond targeted efforts to link additional actor-controlled devices to victim Signal accounts, multiple known and established regional threat actors have also been observed operating capabilities designed to steal Signal database files from Android and Windows devices.

Conclusion

Google makes clear that these efforts to compromise Signal underscores both the importance of security communication, as well as the threats such communications continue to suffer.

The operational emphasis on Signal from multiple threat actors in recent months serves as an important warning for the growing threat to secure messaging applications that is certain to intensify in the near-term. When placed in a wider context with other trends in the threat landscape, such as the growing commercial spyware industry and the surge of mobile malware variants being leveraged in active conflict zones, there appears to be a clear and growing demand for offensive cyber capabilities that can be used to monitor the sensitive communications of individuals who rely on secure messaging applications to safeguard their online activity.



from WebProNews https://ift.tt/zbILYXg

Saturday, 22 February 2025

The Secret Weapon Behind TED-Worthy Presentations

We’ve all been there—watching a TED Talk, utterly mesmerized, wondering how this speaker is so effortlessly captivating. They’re standing on that red circle, exuding confidence, wisdom, and just the right amount of charm. Meanwhile, the last time you had to give a presentation, you spent half the time sweating through your shirt and the other half praying the PowerPoint would distract from your awkward hand gestures.

So, what’s their secret? Are TED speakers genetically engineered to be dazzling orators? Do they have a secret pact with the gods of public speaking? Well, sort of. But mostly, they have a secret weapon—one that’s not actually so secret but is vastly underrated.

Storytelling: The Unofficial Superpower of Great Speakers

If you’ve ever tried to sit through a dry, data-heavy PowerPoint, you know how excruciating it is when a presentation lacks soul. Facts alone don’t move people—stories do. In fact, research shows that stories are remembered up to 22 times more than plain facts. 

The best TED speakers weave their message into a compelling narrative, making you feel something rather than just dumping information on you like a textbook.

Think about Brené Brown’s famous talk on vulnerability. She didn’t just throw out statistics; she told a story about her own struggle with vulnerability, making the message deeply relatable. Or Sir Ken Robinson’s talk on creativity in schools—he used humor and personal anecdotes that kept the audience engaged from start to finish.

So if you want to make your next presentation TED-worthy, start with this: What’s the story behind what you’re saying? Why does it matter? How can you make people feel it?

The Power of the Pause

Ever notice how TED speakers don’t just rush through their words? They pause. Deliberately. Sometimes for dramatic effect, sometimes to let a thought sink in, sometimes just to breathe (which is important, by the way).

A well-placed pause builds anticipation and gives your audience time to process what you just said. It also makes you look confident—even if, inside, you’re a chaotic ball of nerves.

So next time you’re up there, fighting the urge to speed through your slides, remember: Silence is not your enemy. It’s your co-star.

Body Language That Speaks Louder Than Words

Ever notice how TED speakers don’t cling to the podium for dear life? That’s because they use movement intentionally. They walk the stage, use expressive hand gestures, and own their space without looking like they’re pacing nervously.

Your body language tells your audience whether they should trust you. Slouching? Crossed arms? Stiff movements? Those all scream discomfort. Instead, plant your feet, stand tall, and use natural gestures that complement your words. (And if you need a confidence boost, Amy Cuddy’s TED Talk on power poses might be worth a watch.)

Audience Connection Over Perfection

Great speakers don’t just talk at their audience; they make them feel like part of the conversation. They ask questions, crack jokes, make eye contact, and, most importantly, they’re real.

Perfection isn’t what makes a TED Talk compelling—authenticity does. That’s why the best speakers sound more like they’re having a coffee chat with a friend rather than reciting a perfectly rehearsed monologue.

So if you’re stressing about sounding polished, let that go. Your quirks? Your personality? That’s what makes your talk memorable.

Design Matters More Than You Think

Even the best TED speakers don’t rely on words alone—they use visually engaging slides to enhance their message, not distract from it. A cluttered, text-heavy PowerPoint can sabotage even the most compelling talk, while a well-designed presentation helps reinforce key points, add clarity, and keep audiences engaged.

That’s why many professionals turn to an industry-leading PowerPoint designer like Stinson Design to create slides that are polished, professional, and impactful. The right visuals don’t just complement a presentation—they elevate it.

The Final Secret: Rehearse Like You Mean It

Here’s a plot twist: Most TED speakers don’t just wake up and deliver mind-blowing speeches effortlessly. They rehearse. A lot. Like, borderline obsessive levels of practice.

Chris Anderson, the mastermind behind TED Talks, says that top-tier speakers practice at least a dozen times before stepping on stage. Some go all in, rehearsing up to 200 times to perfect their delivery. And TED itself? They lay it all out with their rehearsal guidelines right here: TED’s official rehearsal process

Ready to Own the Stage?

You don’t need a viral TED Talk invite to be a compelling speaker. You just need to harness the tools that make those speakers so impactful: storytelling, pausing with purpose, commanding body language, audience connection, and yes—a whole lot of practice.

So the next time you’re stepping up to speak, take a deep breath, trust yourself, and remember: You’ve got a story to tell. And it’s worth hearing.



from WebProNews https://ift.tt/xYef1t8

Meta Admits Torrenting Pirated Books, Says It Did Not ‘Seed’ Them

Meta has filed a court document admitting it pirated terabytes worth of books, but defending itself on the premise that it did not “seed” the books.

“Seeding” is a term that refers to making making files available for download via torrent, a decentralized method of downloading and sharing files. In its filing, via Ars Technica, Meta freely admits it download a gargantuan quantify of books, but says the fact that it took measures to avoid seeding them means it does not hold any legal liability.

Meta’s Motion established that Plaintiffs lack standing and cannot state a claim for violation of Section 1202(b)(1) of the DMCA or the CDAFA. Focused on “torrenting,” which is a widely used protocol to download large files, Plaintiffs push a narrative that ignores evidence in their possession, including a detailed expert report, showing that Meta took precautions not to “seed” any downloaded files. Plaintiffs, thus, plead no facts to show that Meta seeded Plaintiffs’ books – a claim that Meta will address at summary judgment. For now, the Court should dismiss Plaintiffs’ unprecedented and untenable application of both Section 1202(b)(1) and the CDAFA to the allegations in the TAC.

Meta goes on to say that removal of information, such as copyright management information, doesn’t constitute a violation of the DMCA.

Mere removal of redundant information from training data, including copyright management information (“CMI”) in the form of boilerplate legal disclaimers or the copyright symbol, is not a violation of Section 1202(b)(1) of the DMCA. To survive dismissal, Plaintiffs were required to plausibly plead facts showing that Meta removed CMI with knowledge or reason to know that it would “induce, enable, facilitate, or conceal” infringement of Plaintiffs’ copyrighted works. They still cannot so – despite exhaustive discovery – because their allegations don’t add up. They cannot show that CMI removal enabled or concealed infringement by third parties (no such infringement is even alleged). They also do not allege any facts showing that CMI removal enabled or concealed any infringement by Meta, whose public disclosure of Llama’s training data prompted this copyright infringement suit. Separately, their Opposition confirms that Plaintiffs cannot allege a concrete or particularized injury caused by the supposed violation of Section 1202(b)(1), warranting dismissal with prejudice for lack of standing.

Meta also challenges the plaintiffs’ claims that they suffered “concrete” injury as a result of the company pirating their books has no merit. The entire document is a fascinating read, one in which Meta carefully avoids any variation of the words “pirate” or “pirating.”

Ultimately, Meta’s case will likely have a profound impact on the AI market. The company’s AI models are already open-source and freely available for others to use. At the same time, there’s no denying that Meta pirated millions of books to train its AI models.

If the court rules in favor of the plaintiffs, it will be a devastating blow to the entire AI industry, especially those companies that charge for their AI models, since—at least on the surface—unjust enrichment could become a much bigger factor.



from WebProNews https://ift.tt/QKi3VAO

Friday, 21 February 2025

Apple Disables Cloud Encryption in the UK

Apple has taken the nuclear option in response to the UK surveillance demands, disabling Advanced Data Protection (ADP) and the cloud encryption it provides.

News broke in early February that the UK government had issued Apple a legal order demanding that it provide access to users’ cloud backups in a manner that would bypass end-to-end encryption (E2EE). To make matters worse, the UK government wanted this access for ALL iPhone users worldwide, not just those within the UK, prompting U.S. lawmakers to express their concern about the UK’s actions.

To be clear, the order primarily applies to iCloud data backups, including photos and documents, while iMessage and FaceTime communication remains secured via E2EE—at least for now.

In response, Apple has disabled ADP for users within the UK, a move that renders the surveillance order moot at the expense of all UK customers’ privacy and security.

In a statement via The Guardian, Apple expressed its disappointment at the UK government’s actions.

“We are gravely disappointed that the protections provided by ADP will not be available to our customers in the UK given the continuing rise of data breaches and other threats to customer privacy. Enhancing the security of cloud storage with end-to-end encryption is more urgent than ever before.

“Apple remains committed to offering our users the highest level of security for their personal data and are hopeful that we will be able to do so in the future in the UK. As we have said many times before, we have never built a backdoor or master key to any of our products or services and we never will.”

The Bigger Issue

While some may be quick to point out that Apple’s choice leaves UK users without important cybersecurity and privacy protections, Apple made the only choice it could.

Cybersecurity experts, computer scientists, mathematicians, privacy advocates, and industry experts have all warned that E2EE is a binary choice: Either users are protected by strong encryption or they are not. There is simply no way to build a system that utilizes strong encryption and protects users while simultaneously providing a backdoor for law enforcement and government agencies. If a backdoor is provided for one, it can be exploited for all, something the U.S. and its telecom industry discovered with the Salt Typhoon attack.

Does that mean that it will be harder for law enforcement to gain access to the contents of phones belonging to criminals? Yes it does.

As a point of comparison:

  • Do law enforcement agencies require home owners to provide a key to their dwelling to make it easier for police to access the home if they suspect something illegal is occurring?
  • Do government agencies and law enforcement require safe owners to provide a copy of their keys and codes to make access easier if those agencies suspect illegal content is stored in the safe?

The answer to both questions is a resounding “NO.” If law enforcement or government agencies suspect illegal activity within a home, they break the door down. If they suspect illegal content is stored in a safe, they crack the lock or brute force the safe open.

Why should electronic protection be any different? Why should users be forced to suffer a backdoor vulnerability in their phones, tablets, and computers, all on the off-chance they might be doing something illegal? Why should users suffer the risk of that backdoor being compromised by bad actors, something that is a matter of when, not if.

In case it is still unclear, there is simply NO WAY to protect users’ privacy and cybersecurity from being exploited by the “bad guys,” while simultaneously giving the “good guys” a backdoor into that security.

It should be noted: Disabling iCloud’s ADP also doesn’t mean users can’t encrypt their data and protect it using any number of third-party tools or services. In fact, Apple’s decision puts the responsibility on the user to do just that, rather than customers wrongly assuming their data is secured when Apple is bound by a secret surveillance order.

Apple Is Caught Between a Rock and a Hard Place

In this context, Apple made an incredibly difficult decision that proved to be the only one it truly could make.

Apple opted to disable E2EE for cloud backups altogether rather than capitulate to an order that would undermine the safety and security of its users worldwide. The decision also may have the effect of sparking outrage against the UK government, forcing it to backtrack on a truly terrible and irresponsible idea, especially since Apple’s actions also impact the cloud accounts of government officials.

Ultimately, the only way users will truly be safe and secure online is if all parties recognize the important role encryption plays and if more companies and organizations are willing to take the same steps Apple did when official orders violate that safety and security.



from WebProNews https://ift.tt/9yPYOQ3

FTC Chair Andrew Ferguson Targets Big Tech Censorship in Bold Inquiry

In a dramatic escalation of the battle between regulators and Silicon Valley, Federal Trade Commission (FTC) Chairman Andrew Ferguson unveiled a sweeping inquiry on Thursday into what he deems “un-American and potentially illegal” censorship practices by Big Tech. Announced just weeks into his tenure under President Donald Trump’s administration, the probe aims to unearth the mechanics behind content moderation policies—bans, shadow bans, demonetization, and more—that Ferguson argues may stifle competition and consumer rights. With a public comment period open until May 21, the initiative invites users, employees, and whistleblowers to weigh in, setting the stage for a showdown that could redefine the digital landscape.

Ferguson’s move, first hinted at in his posts on X, arrives as a clarion call to an industry already grappling with shifting political winds and economic pressures. From Meta’s sprawling social networks to Uber’s ride-sharing platform, the inquiry’s broad scope promises to scrutinize how tech giants wield their power over speech and markets. Here’s a comprehensive look at what’s at stake, weaving together the latest company announcements, X chatter, and recent reporting into the most authoritative analysis yet.


A New Era of Oversight

Ferguson, elevated to FTC chair last month after serving as a commissioner since April 2024, succeeds Lina Khan with a markedly different agenda. Where Khan wielded the agency’s antitrust hammer against Big Tech’s market dominance, Ferguson is zeroing in on what he and Trump have long framed as Silicon Valley’s assault on free expression. “Tech firms should not be bullying their users,” Ferguson declared in a statement tied to the inquiry’s launch. “This effort will help the FTC understand how these firms may have violated the law by silencing and intimidating Americans for speaking their minds.”

The inquiry casts a wide net, targeting not just social media titans but any platform offering “social media, video sharing, photo sharing, ride-sharing, event planning, internal or external communications, or other internet services.” Posts on X from users like @MarioNawfal amplified the news with gusto: “The days of Silicon Valley silencing voices without consequences may be coming to an end.” While the rhetoric borders on theatrical, it captures the intensity of a debate that’s simmered since Trump’s post-January 6, 2021, deplatforming.


Decoding the Censorship Charge

Ferguson’s inquiry hinges on a provocative thesis: that Big Tech’s content moderation—often shrouded in secrecy—may breach consumer protection laws or antitrust statutes like the Sherman Act. The FTC’s Request for Information (RFI) zeroes in on practices like “shadow banning,” which dims users’ visibility without warning, and “demonetization,” which slashes creators’ income for crossing vague lines. These tactics, Ferguson contends, “may harm consumers, affect competition, may have resulted from a lack of competition, or may have been the product of anti-competitive conduct.”

The accusation echoes a years-long grievance from conservatives, who point to the 2021 suspensions of Trump’s accounts across platforms as evidence of bias. Ferguson has suggested these moves might reflect collusion, musing in a December 2024 statement that “if the platforms colluded amongst each other to set shared censorship policies, such an agreement would be tantamount to an agreement not to compete on contract terms or product quality.” No hard proof of such a conspiracy has surfaced, but the theory fuels his push.

Skeptics abound. Ars Technica reported on February 20 that data contradicts claims of systemic conservative suppression, noting “conservative publishers and commentators receive broader engagement than liberal voices” on many platforms. The Supreme Court’s 2024 ruling against a Texas law banning viewpoint-based moderation bolsters Big Tech’s defense, affirming their First Amendment right to curate content. The Chamber of Progress, a tech advocacy group, panned the inquiry as a “MAGA ‘tech censorship’ hobby horse,” warning it could paradoxically weaken competition by targeting moderation itself.


Big Tech’s Response and Maneuvering

Silicon Valley isn’t waiting to react. Meta, for instance, axed a third-party fact-checking program in January that had irked conservatives, a nod to the incoming administration’s priorities. Mark Zuckerberg’s $1 million donation to Trump’s inaugural fund and his appearance at the January 20 event—alongside Alphabet’s Sundar Pichai and Apple’s Tim Cook—signal a strategic thaw after years of friction. Google, meanwhile, braces for an April remedies trial following its antitrust loss, a case Ferguson might soften given his focus elsewhere.

On X, @therealmindman cheered Ferguson’s inquiry as a strike against “Big Tech tyranny,” tapping into a populist vein that could nudge companies toward alignment with Trump’s agenda. But not all view this as progress. The New York Post noted on February 20 that Ferguson’s censorship focus might sideline Khan’s lawsuits against Meta and Amazon, plus a November probe into Microsoft’s cloud and AI dominance. A pivot away from these cases could ease merger restrictions, reshaping market dynamics in tech’s favor—or to its detriment, if competition wanes.


An Opening Gambit

Ferguson’s inquiry is an opening gambit, constrained for now by the FTC’s 2-2 partisan split until Mark Meador’s confirmation restores a Republican edge. Once that happens, expect bolder moves—perhaps a reinterpretation of Section 5 of the FTC Act to frame moderation as unfair or deceptive. Ferguson’s vow to “end Big Tech’s vendetta against competition and free speech” hints at a regulatory reckoning.

As the FTC digs into censorship, platforms must steel themselves for intensified oversight, recalibrating strategies to weather a regulator buoyed by political momentum. Whether this probe delivers a victory for free expression or devolves into a partisan sideshow, the coming months will probe the limits of government’s reach into the digital realm—and the resilience of the companies that dominate it.

Ferguson’s crusade may not upend Big Tech overnight, but it’s a shot across the bow: Silicon Valley’s era of unchecked influence is under fire, and the echoes will resound from algorithms to app stores.



from WebProNews https://ift.tt/Ct15GmA

ChatGPT Tops 400 Million Weekly Active Users

OpenAI crossed a significant threshold, with its ChatGPT AI model used by 400 million weekly active users (WAU), or roughly 5% of the global population.

ChatGPT remains the most popular AI model and has the distinction of being the breakthrough product that sparked the AI revolution. In a post on X, COO Brad Lightcap highlighted the company’s latest milestone.

OpenAI has been trying to continue building on its momentum, not an easy task given how many competitors the company is facing. Anthropic, Google, DeepSeek, and more have increasingly caught up with OpenAI’s models, offering similar performance as ChatGPT, or even surpassing it.

Nonetheless, as Lightcap’s post shows, OpenAI has one major advantage on its side: brand recognition. Because it was the first to make AI widely available, OpenAI enjoys brand recognition that other companies are still trying to achieve. In turn, that brand recognition puts the company in a position to monetize its AI models more than newcomers to the field.

It remains to be seen if OpenAI will remain the leading AI firm, but it certainly has a lot going for it—despite recent challenges.



from WebProNews https://ift.tt/3DBhQzy

Amazon Passes Walmart’s Quarterly Revenue

Amazon has crossed a major milestone, besting Walmart’s quarterly revenue for the first time, despite Walmart’s concerted effort to fend the e-commerce giant.

In early February, amazon posted $187.8 billion in quarterly revenue, up from the $170.0 billion in the year-ago quarter.

“The holiday shopping season was the most successful yet for Amazon and we appreciate the support of our customers, selling partners, and employees who helped make it so,” said Andy Jassy, President and CEO, Amazon. “When we look back on this quarter several years from now, I suspect what we’ll most remember is the remarkable innovation delivered across all of our businesses, none more so than in AWS where we introduced our new Trainium2 AI chip, our own foundation models in Amazon Nova, a plethora of new models and features in Amazon Bedrock that give customers flexibility and cost savings, liberating transformations in Amazon Q to migrate from old platforms, and the next edition of Amazon SageMaker to pull data, analytics, and AI together more concertedly. These benefits are often realized by customers (and the business) several months down the road, but these are substantial enablers in this emerging technology environment and we’re excited to see what customers build.”

Interestingly, Walmart earned $180.6 billion in revenue during its latest quarter, more than $7 billion less than Amazon.

“Our team finished the year with another quarter of strong results. We have momentum driven by our low prices, a growing assortment, and an eCommerce business driven by faster delivery times,” said Doug McMillon, President and CEO. “We’re gaining market share, our top line is healthy, and we’re in great shape with inventory. We’ll stay focused on growth, improving operating margins, and strengthening ROI as we invest to serve our customers and members even better.”

As CNBC points out, while Amazon beat Walmart in is their most recent quarterly results, Walmart still holds the crown for the most revenue per year. Amazon is clearly making significant headway, however, and may soon overtake Walmart in yearly revenue.

It should also be noted that Amazon’s revenue is driven by the entire company, including its highly profitable cloud division. In contrast, the vast majority of Walmart’s revenue comes from its retail business, meaning the comparison is not exactly apples to apples.

Nonetheless, the quarterly results are a major turn of events for the two companies.



from WebProNews https://ift.tt/AUFYvQB

Thursday, 20 February 2025

Tech’s Revolving Door of Layoffs Shatters Worker Trust

Once a beacon of stability and lavish perks, the tech industry is now a minefield of layoffs, leaving workers disillusioned and employers scrambling to retain talent. In the past week, Meta Platforms Inc., Workday Inc., and OpenText Corp. joined a parade of firms cutting thousands of jobs—over 6,500 since February 13—adding to a 2025 toll exceeding 10,800. Repeated downsizings, often paired with soaring profits, have “severed trust” between tech workers and their bosses, as employees question the loyalty once taken for granted in Silicon Valley.

A Relentless Cycle of Cuts

The latest salvo began February 10, when Meta axed 3,600 jobs—5% of its workforce—targeting “low performers,” according to CEO Mark Zuckerberg’s memo, reported by Bloomberg. Workday followed on February 12, slashing 1,750 roles to fund AI initiatives, while OpenText cut 1,200 on February 13 to trim costs. Alphabet Inc.’s Google offered voluntary exits in its Platforms & Devices unit, and Microsoft Corp., Salesforce Inc., and Amazon.com Inc. pruned staff across divisions, from underperformers to sustainability teams. Salesforce’s over-1,000 cuts came even as it hires for AI roles, per company statements.

This isn’t a one-off. Meta’s latest purge follows a December 2024 cut of 5%, part of a 24,000-job reduction since 2022. Amazon aims to shed 14,000 managerial roles by spring, and Intel Corp.’s 15,000 layoffs last year remain a stark benchmark. On X, @JimJeffery11 dubbed it “private-sector ruthlessness,” a sentiment echoing through posts as workers lament the shift from tech’s cushy past.

Why Trust Is Fracturing

The erosion stems from a toxic mix of broken promises and cold pragmatism. Tech workers, lured by free meals and stock options, once saw their employers as partners in a grand mission. Now, they’re expendable. “I don’t trust employers anymore,” Eliot Lee, a 52-year-old project manager laid off multiple times, told The Washington Post last week. His story resonates: despite glowing reviews, workers at Meta and elsewhere find themselves blindsided, venting on X about “sudden betrayals.”

Profits only deepen the rift. Meta’s stock rose 3% post-layoffs, and Microsoft boasts a $3 trillion valuation, yet cuts persist. X user @CPA_jjones on February 19 framed it as “remixing staff for efficiency,” not necessity—a view bolstered by a World Economic Forum survey predicting 41% of firms will shrink workforces due to AI within five years. Companies tout AI and cost-cutting, but employees see greed. “They’re thriving, yet we’re disposable,” tweeted @gamefrenza on February 15.

Transparency—or its absence—fuels the fire. Google’s voluntary exits and Meta’s performance purges lack the decorum of past “restructurings,” as @gkcs_ noted on X. Workers feel like cogs in a machine, a far cry from the “family” rhetoric of the 2010s.

The Human Toll

The fallout is palpable. A Washington Post report on February 10 cited studies showing repeated layoffs erode morale, stifle innovation, and push survivors to disengage. Meta staffers, some axed despite high ratings, flooded social media with disbelief, per posts tracked this week. “Trust is gone,” one anonymous employee wrote on X, echoing a broader sentiment: 60% of laid-off techies distrust future employers, per a 2023 Tech.co survey still relevant today.

The job market offers little solace. While IT and finance hiring ticks up, per @CPA_jjones, competition is fierce—over 1,000 applicants vie for single roles, Lee noted. Daelynn Moyer, 55, laid off from Indeed last year, has applied to 140 jobs without success, contemplating a farming pivot, per the Post. Visa holders like Chicago-based engineer Mittal face deportation if unhired within 60 days, adding urgency to the chaos, per CNBC.

Employers Feel the Heat

Companies aren’t immune. Distrust breeds turnover—remaining staff quietly quit or jump ship, as Patrick McAdams of recruiting firm Andiamo told the Post. Innovation suffers when fear replaces boldness, a risk for an industry banking on AI breakthroughs. On X,

@NewstalkZB speculated Meta’s cuts “make way for AI,” but at what cost? Firms like SAP SE and PayPal Holdings Inc., launching AI-driven platforms this week, may outpace rivals slow to adapt, yet talent wars loom if workers balk at instability.

Tech’s cultural shift compounds the problem. Gone are the Lizzo concerts Google once hosted, per a 2022 WSJ piece; now, desk-sharing and austerity rule. “Efficiency over ethics,” @gamefrenza quipped in Spanish and English, capturing a global view of tech’s new ethos.

A Path Forward?

The bleeding may continue—45% of U.S. managers foresee AI-driven cuts this year, per a recent business study. Yet glimmers of resilience emerge. Pulsant’s UK data-center expansion and Bharti Airtel’s subsea cable, announced this week, signal infrastructure bets. Hiring persists in AI niches, and startups like Monomi Park are scooping up Big Tech castoffs, per a 2022 WIRED note still relevant.

For workers, upskilling is survival. Amber Adamson, laid off from Covetrus, is honing coding skills, per a 2023 Washington Post story echoing today’s reality. Employers must rebuild trust—transparency, not platitudes, is key. As Samaraweera, ex-Jellysmack, told NBC last year, “Tech doesn’t seem safe anymore.” In 2025, that’s the industry’s stark truth—and its urgent challenge.



from WebProNews https://ift.tt/O7mWHsX