Transportation

Auto Execs Are Coming Clean: EVs Aren't Working (businessinsider.com) 352

Amiga Trombone shares a report from Insider: With signs of growing inventory and slowing sales, auto industry executives admitted this week that their ambitious electric vehicle plans are in jeopardy, at least in the near term. Several C-Suite leaders at some of the biggest carmakers voiced fresh unease about the electric car market's growth as concerns over the viability of these vehicles put their multi-billion-dollar electrification strategies at risk. Among those hand-wringing is GM's Mary Barra, historically one of the automotive industry's most bullish CEOs on the future of electric vehicles. But this week on GM's third-quarter earnings call, Barra and GM struck a more sober tone. The company announced with its quarterly results that it's abandoning its targets to build 100,000 EVs in the second half of this year and another 400,000 by the first six months of 2024. GM doesn't know when it will hit those targets.

While GM's about-face was somewhat of a surprise to investors, the Detroit car company is not alone in this new view of the EV future. Even Tesla's Elon Musk warned on a recent earnings call that economic concerns would lead to waning vehicle demand, even for the long-time EV market leader. Meanwhile, Mercedes-Benz -- which is having to discount its EVs by several thousand dollars just to get them in customers' hands -- isn't mincing words about the state of the EV market. "This is a pretty brutal space," CFO Harald Wilhelm said on an analyst call. "I can hardly imagine the current status quo is fully sustainable for everybody."
"It's clear that we're dealing with a lot of near-term uncertainty," said Barra. "The transition to EVs, that will have ups and downs."
Toyota Chairman Akio Toyoda said that people are "finally seeing reality" regarding EVs. "I have continued to say what I see as reality," Toyoda, who recently stepped down as Toyota's CEO, said. "There are many ways to climb the mountain that is achieving carbon neutrality," such as hybrids and plug-in hybrids which have long made up a significant share of Toyota's EV sales.

"The reason (hybrids) are so powerful is because they fit the needs of so many customers," Toyota North America's vice president of sales Bob Carter told CNBC last year. "The demand for hybrid has been strong. We expect it to continue to grow as the entire industry transitions over to electrification later this decade."
AI

Boston Dynamics Robot Dog Talks Using OpenAI's ChatGPT (arstechnica.com) 31

Boston Dynamics has infused one of their robotic dog robots with OpenAI's ChatGPT, allowing it to speak in a variety of voices and accents "including a debonair British gentleman, a sarcastic and irreverent American named Josh, and a teenage girl who is so, like, over it," reports the Daily Beast. From the report: The robot was a result of a hackathon in which the Boston Dynamics engineers combined a variety of AI technologies including ChatGPT, voice recognition software, voice creation software, and image processing AI with the company's famous "Spot," the robot dog known for its ability to jump rope and reinforce the police state. The bot also had some upgrades including image recognition software combined with a "head" sensor that the engineers decorated with hats and googly eyes producing incredibly creepy results.

The team created a number of different versions of the robot including a "tour guide" personality that seemed to recognize the layout of the Boston Dynamics warehouse, and was able to provide descriptions and the history behind the various locations in the workplace. "Welcome to Boston Dynamics! I am Spot, your tour guide robot," the android said in the video. "Let's explore the building together!" In the video, the robot can be seen "speaking" and responding to different humans and a variety of prompts. For example, an engineer asked Spot for a haiku, to which it quickly responded with one. After Klingensmith said that he was thirsty, the robot seemed to direct it to the company's snack area. "Here we are at the snack bar and coffee machine," Spot said. "This is where our human companions find their energizing elixirs."

Google

Google Paid a Whopping $26.3 Billion in 2021 To Be Default Search Engine Everywhere (theverge.com) 52

The US v. Google antitrust trial is about many things, but more than anything, it's about the power of defaults. Even if it's easy to switch browsers or platforms or search engines, the one that appears when you turn it on matters a lot. Google obviously agrees and has paid a staggering amount to make sure it is the default: testimony in the trial revealed that Google spent a total of $26.3 billion in 2021 to be the default search engine in multiple browsers, phones, and platforms. From a report: That number, the sum total of all of Google's search distribution deals, came out during the Justice Department's cross-examination of Google's search head, Prabhakar Raghavan. It was made public after a debate earlier in the week between the two sides and Judge Amit Mehta over whether the figure should be redacted. Mehta has begun to push for more openness in the trial in general, and this was one of the most significant new pieces of information to be shared openly.

Just to put that $26.3 billion in context: Alphabet, Google's parent company, announced in its recent earnings report that Google Search ad business brought in about $44 billion over the last three months and about $165 billion in the last year. Its entire ad business -- which also includes YouTube ads -- made a bit under $90 billion in profit. This is all back-of-the-napkin math, but essentially, Google is giving up about 16 percent of its search revenue and about 29 percent of its profit to those distribution deals.

Privacy

iPhones Have Been Exposing Your Unique MAC Despite Apple's Promises Otherwise (arstechnica.com) 69

Dan Goodin reports via Ars Technica: Three years ago, Apple introduced a privacy-enhancing feature that hid the Wi-Fi address of iPhones and iPads when they joined a network. On Wednesday, the world learned that the feature has never worked as advertised. Despite promises that this never-changing address would be hidden and replaced with a private one that was unique to each SSID, Apple devices have continued to display the real one, which in turn got broadcast to every other connected device on the network. [...]

In 2020, Apple released iOS 14 with a feature that, by default, hid Wi-Fi MACs when devices connected to a network. Instead, the device displayed what Apple called a "private Wi-Fi address" that was different for each SSID. Over time, Apple has enhanced the feature, for instance, by allowing users to assign a new private Wi-Fi address for a given SSID. On Wednesday, Apple released iOS 17.1. Among the various fixes was a patch for a vulnerability, tracked as CVE-2023-42846, which prevented the privacy feature from working. Tommy Mysk, one of the two security researchers Apple credited with discovering and reporting the vulnerability (Talal Haj Bakry was the other), told Ars that he tested all recent iOS releases and found the flaw dates back to version 14, released in September 2020. "From the get-go, this feature was useless because of this bug," he said. "We couldn't stop the devices from sending these discovery requests, even with a VPN. Even in the Lockdown Mode."

When an iPhone or any other device joins a network, it triggers a multicast message that is sent to all other devices on the network. By necessity, this message must include a MAC. Beginning with iOS 14, this value was, by default, different for each SSID. To the casual observer, the feature appeared to work as advertised. The "source" listed in the request was the private Wi-Fi address. Digging in a little further, however, it became clear that the real, permanent MAC was still broadcast to all other connected devices, just in a different field of the request. Mysk published a short video showing a Mac using the Wireshark packet sniffer to monitor traffic on the local network the Mac is connected to. When an iPhone running iOS prior to version 17.1 joins, it shares its real Wi-Fi MAC on port 5353/UDP.

Youtube

Privacy Advocate Challenges YouTube's Ad Blocking Detection Scripts Under EU Law (theregister.com) 85

"Privacy advocate Alexander Hanff has filed a complaint with the Irish Data Protection Commission (DPC) challenging YouTube's use of JavaScript code to detect the presence of ad blocking extensions in the browsers of website visitors," writes long-time Slashdot reader Dotnaught. "He claims that under Europe's ePrivacy Directive, YouTube needs to ask permission to run its detection script because it's not technically necessary. If the DPC agrees, it would be a major win for user privacy." The Register reports: Asked how he hopes the Irish DPC will respond, Hanff replied via email, "I would expect the DPC to investigate and issue an enforcement notice to YouTube requiring them to cease and desist these activities without first obtaining consent (as per [Europe's General Data Protection Regulation (GDPR)] standard) for the deployment of their -spyware- detection scripts; and further to order YouTube to unban any accounts which have been banned as a result of these detections and to delete any personal data processed unlawfully (see Article 5(1) of GDPR) since they first started to deploy their -spyware- detection scripts."

Hanff's use of strikethrough formatting to acknowledges the legal difficulty of using the term "spyware" to refer to YouTube's ad block detection code. The security industry's standard defamation defense terminology for such stuff is PUPs, or potentially unwanted programs. Hanff, who reports having a Masters in Law focused on data and privacy protection, added that the ePrivacy Directive is lex specialis to GPDR. That means where laws overlap, the specific one takes precedence over the more general one. Thus, he argues, personal data collected without consent is unlawful under Article 5(1) of GDPR and cannot be lawfully processed for any purpose.

With regard to YouTube's assertion that using an ad blocker violates the site's Terms of Service, Hanff argued, "Any terms and conditions which restrict the legal rights and freedoms of an EU citizen (and the point of Article 5(3) of the ePrivacy Directive is specifically to protect the fundamental right to Privacy under Article 7 of the Charter of Fundamental Rights of the European Union) are void under EU law." Therefore, in essence, "Any such terms which restrict the rights of EU persons to limit access to their terminal equipment would, as a result, be void and unenforceable," he added.

Cellphones

Motorola Demos Smartphone That Can Wrap Around Your Wrist (Again) (arstechnica.com) 23

At Lenovo Tech World '23 in Austin, Texas, yesterday, Motorola demoed a bendable, bracelet-like smartphone that can wrap around your wrist. Ars Technica reports: On stage at the event, Lexi Valasek, 312 Labs innovation strategy and product research Lead for Motorola Mobility, proudly held a prototype. The smartphone looked ordinary to start: a slab of OLED with a chassis that's a bold orange on the backside. But Valasek quickly bent the phone into an arch shape, where it stood on her hand before she wrapped it around her wrist like a cuff. The phone seemed to adapt to its new positioning rapidly, quickly showing a large clock, making the device feel like a smartwatch.

Interestingly, Valasek placed the phone around a silver band already wrapped around her wrist. Lenovo hasn't confirmed why, but The Verge suspects this could be critical to the phone being wearable by featuring a magnet for a secure hold. Videos Motorola shared with its press release today also show the user wearing some sort of metal-looking band on their wrist that the smartphone wraps around. And images of the device show a metal-looking strip that might be for connecting to the additional band in question.

According to Motorola's press release, the concept device has "FHD+" resolution across the display, which has a 6.9-inch diagonal size when flat. Also when flat, the device runs the "full Android experience, just like any smartphone," according to Motorola. The concept shown this week differs slightly from the concept demoed at Lenovo Tech World '16 in that it can be arched or bent into an upright position. [...] But beyond that, Motorola doesn't seem any closer to releasing the design.

Security

Hackers Can Force iOS and macOS Browsers To Divulge Passwords (arstechnica.com) 29

Researchers have devised an attack that forces Apple's Safari browser to divulge passwords, Gmail message content, and other secrets by exploiting a side channel vulnerability in the A- and M-series CPUs running modern iOS and macOS devices. From a report: iLeakage, as the academic researchers have named the attack, is practical and requires minimal resources to carry out. It does, however, require extensive reverse-engineering of Apple hardware and significant expertise in exploiting a class of vulnerability known as a side channel, which leaks secrets based on clues left in electromagnetic emanations, data caches, or other manifestations of a targeted system. The side channel in this case is speculative execution, a performance enhancement feature found in modern CPUs that has formed the basis of a wide corpus of attacks in recent years. The nearly endless stream of exploit variants has left chip makers -- primarily Intel and, to a lesser extent, AMD -- scrambling to devise mitigations.

The researchers implement iLeakage as a website. When visited by a vulnerable macOS or iOS device, the website uses JavaScript to surreptitiously open a separate website of the attacker's choice and recover site content rendered in a pop-up window. The researchers have successfully leveraged iLeakage to recover YouTube viewing history, the content of a Gmail inbox -- when a target is logged in -- and a password as it's being autofilled by a credential manager. Once visited, the iLeakage site requires about five minutes to profile the target machine and, on average, roughly another 30 seconds to extract a 512-bit secret, such as a 64-character string.

IT

They Cracked the Code To a Locked USB Drive Worth $235 Million in Bitcoin. Then It Got Weird. (wired.com) 61

Unciphered, a Seattle-based startup, claims to have cracked the seemingly unbreakable encryption of IronKey S200, a decade-old USB thumb drive. By exploiting an undisclosed vulnerability in the device, the company says it can bypass the drive's feature that erases its contents after 10 incorrect password attempts. The breakthrough came within a day of receiving a test device, suggesting that the firm's hacking technique, powered by high-performance computing, could have far-reaching implications.

The startup's focus is not just technological; it's after a specific IronKey that holds 7,002 bitcoins, valued at roughly $235 million, stored in a Swiss bank vault. The device belongs to Stefan Thomas, a Swiss crypto entrepreneur, who has forgotten the password and has only two password attempts left before losing access to his fortune. Unciphered believes its hacking capabilities could unlock Thomas' crypto vault and is preparing to reach out to him to offer its services. The only problem: Thomas doesn't seem to want their help. Wired: Earlier this month, not long after performing their USB-decrypting demonstration for me, Unciphered reached out to Thomas through a mutual associate who could vouch for the company's new IronKey-unlocking abilities and offer assistance. The call didn't even get as far as discussing Unciphered's commission or fee before Thomas politely declined. Thomas had already made a "handshake deal" with two other cracking teams a year earlier, he explained. In an effort to prevent the two teams from competing, he had offered each a portion of the proceeds if either one could unlock the drive. And he remains committed, even a year later, to giving those teams more time to work on the problem before he brings in anyone else -- even though neither of the teams has shown any sign of pulling off the decryption trick that Unciphered has already accomplished.

That has left Unciphered in a strange situation: It holds what is potentially one of the most valuable lockpicking tools in the cryptocurrency world, but with no lock to pick. "We cracked the IronKey," says Nick Fedoroff, Unciphered's director of operations. "Now we have to crack Stefan. This is turning out to be the hardest part." In an email to WIRED, Thomas confirmed that he had turned down Unciphered's offer to unlock his encrypted fortune. "I have already been working with a different set of experts on the recovery so I'm no longer free to negotiate with someone new," Thomas wrote. "It's possible that the current team could decide to subcontract Unciphered if they feel that's the best option. We'll have to wait and see." In past interviews, Thomas has said that his 7,002 bitcoins were left over from a payment he received for making a video titled "What is Bitcoin?" that published on YouTube in early 2011, when a bitcoin was worth less than a dollar. Later that year, he told WIRED that he'd inadvertently erased two backup copies of the wallet that held those thousands of coins, and then lost the piece of paper with the password to decrypt the third copy, stored on the IronKey. By then, his lost coins were worth close to $140,000.

Social Networks

Online 'Information War' in Africa Rages on Social Media (yahoo.com) 46

The Washington Post tells the story of a veteran political operative and a former army intelligence officer hired to help keep in power the president of the west African nation Burkina Faso: Their company, Percepto International, was a pioneer in what's known as the disinformation-for-hire business. They were skilled in deceptive tricks of social media, reeling people into an online world comprised of fake journalists, news outlets and everyday citizens whose posts were intended to bolster support for [president Roch Marc] Kaboré's government and undercut its critics. But as Percepto began to survey the online landscape across Burkina Faso and the surrounding French-speaking Sahel region of Africa in 2021, they quickly saw that the local political adversaries and Islamic extremists they had been hired to combat were not Kaboré's biggest adversary. The real threat, they concluded, came from Russia, which was running what appeared to be a wide-ranging disinformation campaign aimed at destabilizing Burkina Faso and other democratically-elected governments on its borders.

Pro-Russian fake news sites populated YouTube and pro-Russian groups abounded on Facebook. Local influencers used WhatsApp and Telegram groups to organize pro-Russian demonstrations and praise Russian President Vladimir Putin. Facebook fan pages even hailed the Wagner Group, the Russian paramilitary network run by Yevgeniy Prigozhin, the late one-time Putin ally whose Internet Research Agency launched a disinformation campaign in the United States to influence the 2016 presidential election... Percepto didn't know the full scope of the operation it had uncovered but it warned Kaboré's government that it needed to move fast: Launch a counteroffensive online — or risk getting pushed out in a coup.

Three years later, the governments of five former French colonies, including Burkina Faso, have been toppled. The new leaders of two of those countries, Mali and Burkina Faso, are overtly pro-Russian; in a third, Niger, the prime minister installed after a July coup has met recently with the Russian ambassador. In Mali and the Central African Republic, French troops have been replaced with Wagner mercenaries...

Percepto's experience in French-speaking Africa offers a rare window into the round-the-clock information warfare that is shaping international politics — and the booming business of disinformation-for-hire. Meta, the social media company that operates Facebook, Instagram and WhatsApp, says that since 2017 it has detected more than 200 clandestine influence operations, many of them mercenary campaigns, in 68 countries.

The article also makes an interesting point. "The burden of battling disinformation has fallen entirely on Silicon Valley companies."
Google

Google To Manufacture Pixel Smartphones in India (techcrunch.com) 17

Google plans to begin assembling its Pixel smartphone lineup in India, a company executive said, becoming the latest tech giant to bet on the South Asian market for devices manufacturing. From a report: The company intends to start the local manufacturing with the current lineup -- both the Pixel 8 and Pixel 8 Pro -- in India and expects to ship the India-made batch starting next year, Rick Osterloh, Senior VP of Devices and Services at Google, shared at the company's annual India event Thursday. India is a key overseas market for Google, which identifies the world's most populous nation as its largest for many of its services including Android, Google Search, YouTube by user count. Thursday's announcement follows Google, which has committed to invest over $10 billion in country over the the next few years, recently partnering with HP to manufacture Chromebook laptops in India.
XBox (Games)

Xbox Boss Is Open To Breaking the Seal On Some Forgotten Games (pcgamer.com) 43

An anonymous reader quotes a report from PC Gamer: Whether you think Microsoft's recent acquisition of Activision Blizzard is a move toward a dry gaming monopoly or a financial windfall for Activision and Blizzard games both, it's definitely happened. The UK's CMA has given the thumbs up, Kotick's on his way out -- the deal's closed, and now we get to see the impact ripples spread. It looks like there's already some great news for fans of Activision Blizzard's older catalogue, as confirmed by Xbox boss Phil Spencer himself in an official interview on the Xbox channel. "I do think with Game Pass that we have the ability to pick a couple franchises every year and almost do like a 'revisited' [version] -- I just made up that term ... when you look across the franchises that are part of our teams, there's an opportunity to go back."

"I wanna make sure that when we go back and visit something that we do it with our complete ability not just create something for financial gain (or a PR announcement), and not deliver." Ultimately, while he's got his own wishlist (the return of FPS classic Hexen is a running gag), Spencer says it's important for these fresh coats of paint to be a result of developer passion: "If teams wanna go back and revisit some of the things we have, and do a full focus on it, I'm gonna be all in. I think there's an amazing trove of [games] we can go and touch on again. I think about things like the Quake 2 remaster that just came out from [id Software], I thought that was awesome. They did a real good job revisiting a game, making it current, but not leaving its history behind. I'd love to see more things like that."

Displays

Adobe Unveils Dress That Can Change Its Pattern On the Fly (futurism.com) 68

An anonymous reader writes: Adobe has unveiled a sparkling, interactive dress -- and got the research scientist who created it to model the high-tech couture. Video of the dress debut shows researcher Christine Dierk wearing the slinky strapless number that, upon first glance, looks like the average sequined cocktail dress. With the click of a handheld remote, however, the dress began to shift patterns like something out of a fashion-forward science fiction film. Created under Adobe's "Project Primrose" initiative, this "digital dress," as Dierk described it for the audience at Adobe's MAX conference last week, "brings fabric to life."

"Unlike traditional clothing, which is static, Primrose allows me to refresh my look in a moment," the Adobe scientist said, demonstrating the clothing's capabilities by having its colors go from light to dark in an instant. The digital dress patterns can also, as Dierks demonstrated, be animated, and will even respond to movement -- though that last feature appeared glitchy and didn't work at first. The researcher-turned-model also told the hosts of her portion of the convention that she not only designed the dress with the help of her team at Adobe, but also stitched it herself.

While the specs of this particular smart garment haven't been published, the high-tech sequins used for smaller Project Primrose offerings, a handbag and a canvas, were described by Dierks and her co-researchers last year in an article presented at a tech conference. As the article explains, those "sequins" are actually "reflective light-diffuser modules" that use reflective-backed polymer-dispersed liquid crystals (PDLC), which are most often used in smart lighting. Technically, all those sequins are tiny screens.

Google

Google Asks Congress To Not Ban Teens From Social Media (theverge.com) 118

An anonymous reader quotes a report from The Verge: Google responded to congressional child online safety proposals with its own counteroffer for the first time Monday, urging lawmakers to drop problematic protections like age-verification tech. In a blog post, Google released its "Legislative Framework to Protect Children and Teens Online" (PDF). The framework comes as more lawmakers, like Sen. Elizabeth Warren (D-MA), are lining up behind the Kids Online Safety Act, a controversial bill intended to protect kids from dangerous content online.

In the framework, Google rejects state and federal attempts at requiring platforms to verify the age of users, like forcing users to upload copies of their government IDs to access an online service. Some states have recently gone as far as passing laws requiring platforms to obtain parental consent before anyone under 18 is allowed to use their services. Google dismisses these consent laws, arguing that they bar vulnerable teens from accessing helpful information.
"Good legislative models -- like those based on age-appropriate design principles -- can help hold companies responsible for promoting safety and privacy, while enabling access to richer experiences for children and teens," Kent Walker, Google's president of global affairs, said in the blog post.
AMD

T2 Linux Discovers (Now Patched) AMD Zen 4 Invalid Opcode Speculation Bug (youtube.com) 13

T2 SDE is not just a Linux distribution, but "a flexible Open Source System Development Environment or Distribution Build Kit," according to a 2022 announcement of its support for 25 CPU architectures, variants, and C libraries. ("Others might even name it Meta Distribution. T2 allows the creation of custom distributions with state of the art technology, up-to-date packages and integrated support for cross compilation.")

And while working on it, Berlin-based T2 Linux developer René Rebe (long-time Slashdot reader ReneR) discovered random illegal instruction speculation on AMD Ryzen 7000-Series and Epyc Zen 4 CPU.

ReneR writes: Merged to Linux 6.6 Git is a fix for the bug now known at AMD as Erratum 1485.

The discovery was possible through continued high CPU load cross-compiling the T2 Linux distribution with support for all CPU architectures from ARM, MIPS, PowerPC, RISC-V to x86 (and more) for 33 build variants. With sustained high CPU load and various instruction sequences being compiled, pseudo random illegal instruction errors were observed and subsequently analyzed.

ExactCODE Research GmbH CTO René Rebe is thrilled that working with AMD engineers lead to a timely mitigation to increase system stability of the still new and highest performance Zen4 platform.

"I found real-world code that might be similar or actually trigger the same bugs in the CPU that are also used for all the Spectre Meltdown and other side-channel security vulnerability mitigations," Rebe says in a video announcement on YouTube.

It took Rebe a tremendous amount of research, and he says now that "all the excessive work changed my mind. Mitigations equals considered harmful... If you want stable, reliable computational results — no, you can't do this. Because as Spectre Meltdown and all the other security issues have proven, the CPUs are nowadays as complex as complex software systems..."
Data Storage

Is Glass the Future of Storage? (microsoft.com) 170

"If we carry on the way we're going, we're going to have to concrete the whole planet just to store the data that we're generating," explains a deputy lab director at Microsoft Research Cambridge in a new video.

Fortunately, "A small sheet of glass can now hold several terabytes of data, enough to store approximately 1.75 million songs or 13 years' worth of music," explains a Microsoft Research web page about "Project Silica". (Data is retrieved by a high-speed, computer-controlled microscope from a library of glass disks storing data in three-dimensional pixels called voxels): Magnetic storage, although prevalent, is problematic. Its limited lifespan necessitates frequent re-copying, increasing energy consumption and operational costs over time. "Magnetic technology has a finite lifetime," says Ant Rowstron, Distinguished Engineer, Project Silica. "You must keep copying it over to new generations of media. A hard disk drive might last five years. A tape, well, if you're brave, it might last ten years. But once that lifetime is up, you've got to copy it over. And that, frankly, is both difficult and tremendously unsustainable if you think of all that energy and resource we're using."

Project Silica aims to break this cycle. Developed under the aegis of Microsoft Research, it can store massive amounts of data in glass plates roughly the size of a drink coaster and preserve the data for thousands of years. Richard Black, Research Director, Project Silica, adds, "This technology allows us to write data knowing it will remain unchanged and secure, which is a significant step forward in sustainable data storage." Project Silica's goal is to write data in a piece of glass and store it on a shelf until it is needed. Once written, the data inside the glass is impossible to change.

Project Silica is focused on pioneering data storage in quartz glass in partnership with the Microsoft Azure team, seeking more sustainable ways to archive data. This relationship is symbiotic, as Project Silica uses Azure AI to decode data stored in glass, making reading and writing faster and allowing more data storage... The library is passive, with no electricity in any of the storage units. The complexity is within the robots that charge as they idle inside the lab, awakening when data is needed... Initially, the laser writing process was inefficient, but after years of refinement, the team can now store several TB in a single glass plate that could last 10,000 years. For a sense of scale, each plate could store around 3,500 movies. Or enough non-stop movies to play for over half a year without repeating. A glass plate could hold the entire text of War and Peace — one of the longest novels ever written — about 875,000 times.

And most importantly, it can store data in a fraction of the space of a datacenter...

Thanks to long-time Slashdot reader Kirschey for sharing the article.
Social Networks

New York Seeks To Limit Social Media's Grip On Children's Attention (nytimes.com) 23

An anonymous reader quotes a report from the New York Times: New York State officials on Wednesday unveiled a bill to protect young people from potential mental health risks by prohibiting minors from accessing algorithm-based social media feeds unless they have permission from their parents. Gov. Kathy Hochul and Letitia James, the state attorney general, announced their support of new legislation to crack down on the often inscrutable algorithms, which they argue are used to keep young users on social media platforms for extended periods of time -- sometimes to their detriment. If the bill is passed and signed into law, anyone under 18 in New York would need parental consent to access those feeds on TikTok, Instagram, Facebook, YouTube, X and other social media platforms that use algorithms to display personalized content. While other states have sought far-reaching bans and measures on social media apps, New York is among a few seeking to target the algorithms more narrowly.

The legislation, for example, would target TikTok's central feature, its ubiquitous "For You" feed, which displays boundless reams of short-form videos based on user interests or past interactions. But it would not affect a minor's access to the chronological feeds that show posts published by the accounts that a user has decided to follow. The bill would also allow parents to limit the number of hours their children can spend on a platform and block their child's access to social media apps overnight, from midnight until 6 a.m., as well as pause notifications during that time.

The bill in New York, which could be considered as soon as January when the 2024 legislative session begins, is likely to confront resistance from tech industry groups. The bill's sponsors, State Senator Andrew Gounardes and Assemblywoman Nily Rozic, said they were readying for a fight. But Ms. Hochul's enthusiastic support of the bill -- she rarely joins lawmakers to introduce bills -- is a sign that it could succeed in the State Capitol, which Democrats control. A second bill unveiled on Wednesday is meant to protect children's privacy by prohibiting websites from "collecting, using, sharing, or selling personal data" from anyone under 18 for the purpose of advertising, unless they receive consent, according to a news release. Both bills would empower the state attorney general to go after platforms found in violation.

Google

YouTube TV, Which Costs $73 a Month, Agrees To End '$600 Less Than Cable' Ads (arstechnica.com) 19

Google has agreed to stop advertising YouTube TV as "$600 less than cable" after losing an appeal of a previous ruling that went against the company. Google said it will "modify or cease the disputed advertising claim." From a report: The case was handled in the advertising industry's self-regulatory system, not in a court of law. The National Advertising Review Board (NARB) announced today that it rejected Google's appeal and recommended that the company discontinue the YouTube TV claim. YouTube TV launched in 2017 for $35 a month, but the base package is $72.99 after the latest price hike in March 2023. Google's "$600 less than cable" claim was challenged by Charter, which uses the brand name Spectrum and is the second-biggest cable company after Comcast. The National Advertising Division (NAD) previously ruled in Charter's favor but Google appealed the decision to the NARB in August.

"Charter contended the $600 figure was inaccurate, arguing that its Spectrum TV Select service in Los Angeles only cost around $219 a year more than Google's YouTube TV service," according to a MediaPost article in August. A Google ad claimed that YouTube TV provided $600 in "annual average savings" compared to cable as of January 2023. A disclosure on the ad said the price was for "new users only" and that the $600 annual savings was "based on a study by SmithGeiger of the published cost of comparable standalone cable in the top 50 Nielsen DMAs, including all fees, taxes, promotion pricing, DVR box rental and service fees, and a 2nd cable box."

Youtube

YouTube Passes Netflix As Top Video Source For Teens (cnbc.com) 97

A new survey from investment bank Piper Sandler found that teens in the U.S. consume more videos on YouTube than Netflix. CNBC reports: Teens polled by the bank said they spent 29.1% of their daily video consumption time on Google-owned YouTube, beating out Netflix for the first time at 28.7%. Time on YouTube rose since the spring, adding nearly a percentage point, while Netflix fell more than two percentage points. The data point shows that the streaming business is getting more competitive, and highlights YouTube's strong position as a free provider of online video, especially among young people. "We wonder if this is a push or a pull in regards to the changing consumption habits, as content on YouTube appears to be improving over time and the streaming industry becomes more and more competitive," Piper Sandler analysts wrote.
Space

How Edwin Hubble Expanded the Universe 100 Years Ago (wikipedia.org) 26

Black Parrot (Slashdot reader #19,622) pointed out a historic anniversary this week: On October 6, 1923, Edwin Hubble got a photo of Andromeda that showed that it contained a variable star, and therefore was an actual galaxy, ending the Great Debate over whether the universe consisted of anything beyond our own galaxy.

Unless you're more than 100 years old you grew up with a completely different understanding of the universe than anyone who lived before. Even Einstein did not know about it when he proposed the theory of general relativity.

It was later in the decade before Hubble discovered that the universe is expanding.

A century later, the European Space Agency was announcing... A very rare, strange burst of extraordinarily bright light in the universe just got even stranger â" thanks to the eagle-eye of the NASA/ESA Hubble Space Telescope. The phenomenon, called a Luminous Fast Blue Optical Transient (LFBOT), flashed onto the scene where it wasnâ(TM)t expected to be found, far away from any host galaxy. Only Hubble could pinpoint its location. The Hubble results suggest astronomers know even less about these objects than previously thought by ruling out some possible theories.
Bill Kendrick (Slashdot reader #19,287) writes: Edwin Hubble's discovery — thanks to a Cepheid Variable star — that the "Andromeda Nebula" was actually an entire galaxy 2.5 million light years away... NASA's Astronomy Photo of the Day for today celebrates this with an image of the original photo plate from October 6, 1923. Notice the "N" (for nova) crossed off, and "VAR!" (for variable) next to the star!

The discovery of Cepheids, and the important fact that their brightening and dimming was regular, and could be used to determine a star's intrinsic brightness, was thanks to Henrietta Swan Leavitt about a decade earlier.

David Butler's "How Far Away Is It?" series has an excellent episode on Andromeda on YouTube.

Intel

Pentium 5 - a Rare Look Into the CPU That Could Have Been But Never Was (wccftech.com) 31

Long-time Slashdot reader alaskana writes: In late 2022 it was revealed that early samples of what was to be the "Pentium 5" processor, codenamed Tejas and Jayhawk were in development and made it as far as being released to board partners for evaluation. A few of these samples made it (of course) onto Ebay and then — not surprisingly — into the hands of a YouTuber. To be fair, tech site Anandtech arguably got the first scoop on this P4 successor way back in 2004, but that story seemingly never gained much traction at that time.

They wrote that Intel Prescott CPUs "could hit 5GHz+ but had huge power and temperature numbers, but Tejas was expected to clock higher than Prescott — with Intel chasing the huge 10GHz CPU clocks within 10 years between 2000 and 2011 — but it ended up not happening at all."

In what was supposed to be a continuation of the "GHz is king" days of the early aughts, the Pentium 5 was in spirit a continuation of the "faster-is-better" philosophy of the P4 architecture, efficiency be damned. Speeds in excess of 7 GHz(!), and a pipeline upwards of 50 stages were rumored to be targeted by Intel, but reality (and physics) reared their ugly heads as always. WCCF Tech transcribed the remarks of Intel engineer Steve Fischer, who was involved with the project. "The thing had a pipeline depth of around 50 stages and an expected clock target at one point north of 7 GHz. I call the thing "the Death Star of processors" and half-jokingly reasoned that consumer acceptance of liquid-cooled chassis would not be a big deal."

Intel kicked off Project Tejas in 2003, expected in 2004 and later pushed into 2005 after issues forced Intel to redesign the chip. Before the company could do that, the Tejas Project was shelved on May 7, 2004. In the end efficiency and parallelization was to be the rule of future CPU development, but the fact that Intel had (at least briefly) had planned on taking the P4 paradigm just a wee bit further with a true Pentium 5 is a fascinating look into the past of a future that never was to be for the venerable Pentium line.

Slashdot Top Deals