Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 14 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Which musical instrument can you play, or which would you like to learn to play?

  • piano or other keyboard
  • guitar
  • violin or fiddle
  • brass or wind instrument
  • drum or other percussion
  • er, yes, I am a professional one-man band
  • I usually play mp3 or OSS equivalents, you insensitive clod
  • Other (please specify in the comments)

[ Results | Polls ]
Comments:48 | Votes:146

posted by janrinok on Tuesday November 19, @07:25PM   Printer-friendly

It's memory-safe, with a few caveats:

Developers looking to continue working in the C and C++ programming languages amid the global push to promote memory-safe programming now have another option that doesn't involve learning Rust.

Filip Pizlo, senior director of language engineering at Epic Games, has created his own memory-safe flavor of C and – because why not? – named it after himself.

Pizlo got in touch after seeing our report on TrapC – a memory-safe C-fork due for release next year.

"I wanted to alert you to the existence of Fil-C, a personal project of mine, which exists today, does just about everything TrapC claims to do (including being totally memory-safe), and is freely available," Pizlo explained. "It aims for 100 percent compatibility with C and C++ – just compile your stuff with my compiler and you get memory safety."

The US government and other interested parties are rather keen to encourage memory safety – something not available out of the box for C and C++ code. C and C++ require manual memory management, which has been shown to be inadequate for preventing memory safety bugs like out of bounds reads and writes.

Since the majority of serious vulnerabilities in large codebases can be attributed to memory safety failings, the common refrain over the past few years has been to develop in a programming language like Rust that (optionally) produces memory-safe code. And more recently there have been efforts to rewrite legacy code in critical libraries and applications using Rust.

There are many other memory-safe languages – such as C#, Java, Python, Swift, Go, and JavaScript. But Rust, for better or worse, has become the most commonly cited option in memory safety evangelism because it's fast, suited for low-level code, and does a lot of things well (safe concurrency and a well-conceived package management system). What's more, the non-profit Rust Foundation has been run well enough to attract funding and support from the tech firms likely to be interested in Rust's qualities.

Also, Rust came out of Mozilla, which isn't seen by the major tech platforms – several of which have their own home-grown programming languages – as a competitor. Consider that Rust debuted in late 2013 and Apple's Swift arrived a year later – during that period, Rust has attracted a broad constituency, while Swift is mainly used by Apple-aligned developers.

But the thing about Rust is that it's not all that easy to learn. So calls to rewrite everything in Rust have elicited pushback from those with significant C or C++ experience – like Linux kernel maintainers, who would prefer to continue working in languages they've mastered.

Like the forthcoming TrapC fork and the Safe C++ project, Fil-C aims to support memory safety without requiring reeducation in another programming language.

[...] Fil-C has some limitations. Presently, it only works on Linux/x86_64. Also, it's slow – about 1.5x-5x slower than legacy C. That's in part because of its implementation of a pointer encoding method for tracking bounds and types called MonoCaps, and also overhead from calling conventions and dynamic linking that differ from standard C.

"The plan to make Fil-C fast is to fix these issues," explains Pizlo. "I believe that fixing these issues can get Fil-C to be only 1.5x slower than C in the worst cases, with lots of programs being only 1.2x slower. But it'll take some focused compiler/runtime/GC hacking to get there."

[...] Pizlo observes in his presentation that while there have been substantially successful attempts to make C code memory-safe – such as CheckedC and -fbounds-safety – many of these fall short in one way or another, particularly for certain edge cases.

His goal, he says, is to support garbage in, and memory safety out.

"Part of the reason why I'm doing this is I want to obviate the need for Rust," declares Pizlo. "I'm not there yet performance-wise, but I will get there."


Original Submission

posted by janrinok on Tuesday November 19, @02:42PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Britain's mobile telcos will get to bid for mmWave spectrum to provide high-speed wireless services next year, according to Ofcom, which just published the final draft of the regulations governing the auction.

The UK telecoms regulator says it plans to release spectrum in the 25.1-27.5 GHz and 40.5-43.5 GHz bands in 2025, and make them available for operators to deliver faster services. These are set to be restricted to urban areas, since these high frequencies can typically only operate over a range of a few kilometers.

This will be a big shift for the country's telcos, which have until now only had access to frequencies below about 4 GHz to deliver a mobile service. Higher frequencies allow for higher transmission rates and lower latencies, and for this reason are already used in countries such as the US for 5G data services.

The spectrum planned for release amounts to 2.4 GHz of spectrum in the 26 GHz band, and another 3 GHz in the 40 GHz band. Because of the range factor, this will not replace the existing spectrum UK operators already use, but compliment it for higher-bandwidth services in high-density areas.

Ofcom published a notice of its plans back in May and invited views on the proposals. It says in its latest missive that having considered the responses, it decided to enact the regulations largely in the form it consulted on, but with some tweaks.

The proposals were to auction the available spectrum in three categories, with each lot comprising a block of 200 MHz. The categories consist of 26 GHz lower (25.1-26.5 GHz), 26 GHz upper (26.5-27.5 GHz), and 40 GHz (40.5-43.5 GHz).

That split of the 26 GHz band into two categories is because some incumbent users continue to operate in the 25.1-26.5 GHz part of the band, Ofcom says.

Reserve prices are expected to be £2 million ($2.55 million) for each lot of the 26 GHz band, and £1 million ($1.27 million) for each lot in the 40 GHz space.

However, the comms regulator has previously said the auction cannot proceed until the UK's Competition and Markets Authority (CMA) has reached a decision on the proposed merger between Three and Vodafone, which might otherwise complicate matters.

The geographic scope of the licences will see each licensee authorized to use their allocated spectrum in all the major cities and towns across the country, Ofcom points out. In fact, one amendment to the final draft regulations makes it clear that awarded licenses only apply in designated areas – meaning those parts of the UK defined as "high density."

Telecoms industry analyst Paolo Pescatore at PP Foresight told us the merits of mmWave are clear to see, and he has personally experienced the "super lightning speeds" available with networks in some parts of the US.

This makes it great for locations like sports and entertainment venues where there tends to be enormous data demand, he added. The low latency should also make possible some of the oft-cited use cases for 5G networks, such as augmented reality and support for autonomous vehicles.

"However, the telcos need to avoid costly mistakes made with previous generations of network technology. The harsh reality means they will have to fork out more on capex and rolling out networks," Pescatore warned. "This comes at a time when margins are being squeezed, revenue increases are driven by price rises, and all focus is on driving further efficiencies," he added.

Ofcom also published information for those considering participating in the auction, including practical guidance on how to apply, and indicative timings for each stage of the award process. It also includes more detail about the spectrum to be made available and the conditions for its use.

While the auction is set to take place in 2025, Ofcom is not specifying exact dates at this point, saying only that it will provide a further update on timings before the end of this year.


Original Submission

posted by hubie on Tuesday November 19, @09:56AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Many migratory birds use Earth's magnetic field as a compass, but some can also use information from that field to determine more or less where they are on a mental map.

Eurasian reed warblers (Acrocephalus scirpaceus) appear to calculate their geographical position by drawing data from different distances and angles between magnetic fields and the Earth's shape. The findings suggest that the birds use magnetic information as a sort of "GPS" that tells them not only where to go, but where they are initially, says Richard Holland at Bangor University in the UK.

“When we travel, we have a map – which tells us where we are – and we have a compass, which tells us which way to go to reach our destination,” he says. “We don’t think birds have quite this level of accuracy or degree of knowledge of the whole Earth. Even so, they see how magnetic cues change as they move along their normal path – or even if they’re far displaced from that path.”

Scientists have known for decades that migratory birds rely on cues from the sun, the stars and Earth’s magnetic field to determine which direction to head towards. But figuring out direction using a compass is markedly different from knowing where in the world they are, and scientists still debate about whether – and how – birds figure out their current map position.

[...] However, we still don’t fully understand the neurological mechanisms that enable birds to sense these aspects of Earth’s magnetic field.

[...] While the research confirms reed warblers rely on these magnetic fields for positioning, it doesn’t mean that all birds do so, he adds. “Not all birds work the same way.”

Proceedings of the Royal Society B: Biological Sciences DOI: 10.1098/rspb.2024.1363


Original Submission

posted by janrinok on Tuesday November 19, @05:11AM   Printer-friendly
from the developed-so-much-cargo dept.

Writer and blogger Alex Ewerlöf has written a discussion of cargo cult programming, including a bit of background on the term itself.

Cargo culting refers to a phenomenon where people imitate the superficial aspects of a practice or process without understanding the underlying logic or reasons behind it.

Although the term originated from historical events, its usage expanded to other areas like software, systems, and organizations.

Here's the story of how cargo cults came to be, with some examples from software and corporate world. In Pro-Tips we discuss actionable insights to prevent, spot, and dismantle cargo culting in your organization.

🤖🚫 Note: No AI is used to generate this content or images.

It's apparently a problem which keeps coming up repeatedly. What examples of cargo cult programming, if any, have soylentils encountered (or caused) over the years?


Original Submission

posted by hubie on Tuesday November 19, @12:23AM   Printer-friendly
from the Where-do-babies-come-from? dept.

From the article. https://thepenngazette.com/demographic-winter-is-coming/

Is the world's population destined to shrink? Penn economics professor JF-V puts it bluntly: "If you're 55 years or younger, you are likely to witness something no human has observed for around 60,000 years, not even during was or pandemics: a systematic decrease in the world population."

His analysis of trends in more than 180 countries suggests that in many places, UN estimates of fertility rates are probably too high. His calculations suggest that a crucial moment has arrived: the global fertility rate, may have already dipped below the replacement rate. He allows that the global population is still growing, but expects it to peak in roughly 30 years, with a steep decline unfolding in its wake. When the transition comes—when the world's population eventually tips into contraction—he believes the impacts will be disruptive and swift.

Dramatic declines in childbirths are evident in every region of the world, across rich, poor, and middle-income countries alike. Shifting social norms are partly responsible, as young people don't view parenthood fitting into their lives. "Raising children is no longer a priority for many young people," he says, "either in the more traditional societies of eastern Asia or the more progressive countries of northern Europe."

[my aside] Fun fact, his findings parallel those made by my own UPenn research group back in 1981. We used a different technique, and could only "narrow" the event window down to the latter half of this century. What kind of economy will it be where there is one worker for every 3 old farts like me?


Original Submission

posted by hubie on Monday November 18, @07:36PM   Printer-friendly
from the I-have-found-it dept.

Eureka moments shared by Chemists.

Interviews were conducted with 18 chemists from several subdisciplines of chemistry and include a diversity of demographics on the topic of creativity as seen through the eyes of Eureka moments. The experiences fell within three categories, i.e., (1) analytical problem-solving which can be reconstructed into a series of logical steps that can be identified; (2) memory retrieval processes of previously acquired knowledge; and (3) insights characterized by a sudden and unexpected understanding. There were variations of detail within each category. Suggestions for enhancing the probability of experiencing Eureka moments are provided.

Derek Lowe shares his thoughts, always worth a read.

I've had 2 in my life. 11 y/o me was struggling with fractions when suddenly all became clear. Then a few years later while teaching myself Z-80 assembly I watched my debugger single step into a text string and suddenly how computers execute code crystallized. What Eureka moments have you had?


Original Submission

posted by hubie on Monday November 18, @02:51PM   Printer-friendly
from the high-risk-high-reward dept.

Arthur T Knackerbracket has processed the following story:

The UK's ambitious efforts to mimic the wild success of US research and security outfit DARPA has just a few months to prove its worth, a parliamentary committee heard yesterday.

The Advanced Research and Invention Agency, or ARIA, was announced in 2021, but was not formally established until January 2023. A product of the Conservative Boris Johnson’s post-Brexit government, the agency is designed to fund transformational research, with a so-called high risk, high reward approach.

However, Lord Drayson, aka Paul Drayson, electric world land speed record holder and member of the Lords Science and Technology Committee pointed out this week that while Aria's initial £800 million ($1 billion) funding would see it through to the end of the 2025/26 financial year, the Labour government is set decide on any future spending next spring, when it announces the multi-year spending review, setting out plans for 2026–27 to at least 2028–29.

Drayson said the Committee was supportive of Aria and wanted it to succeed, but questioned how it would secure its further when the government is set to decide its future well before its Parliamentary review, due in 2033.

[...] But last month, UK finance minister Rachel Reeves was forced to raise taxes and consider spending cuts in her budget as she struggled to balance the government books, boost the economy, and minimize public debt.

In such a climate, political leaders must weigh up the public's appetite for funding high-risk research with no immediate returns.

Before the Lords' committee, Clifford said: "We recognize that Aria, over the long run, has to provide great value for money, just as any use of public funds needs to, but that that value for money will obviously be measured in a different way, with a different risk appetite, and over a different time frame from the way that many other uses of public funds would. That's why we're so keen to establish core ideas about what failure and success mean for ARIA, what proportion of our programs we expect to succeed, because what we don't want to do is end up in a situation a couple of years where people say, 'When [the] ARIA program failed, does this mean Aria is failing?'"

[...] Aria is often seen as the brainchild of Dominic Cummings, the campaign director of the Conservative "Vote Leave Brexit" campaign and, later, chief advisor to former prime minister Boris Johnson. Reports suggested his WhatsApp handle once said: "Get Brexit Done, then Arpa (Darpa's predecessor)."


Original Submission

posted by hubie on Monday November 18, @10:10AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Japanese Prime Minister Shigeru Ishiba revealed the $65 billion plan this week. Reuters saw an early draft of the proposal, which is scheduled to be submitted during the country's next parliament session, and notes its support of domestic chipmaker Rapidus among others.

The homegrown semiconductor manufacturer was founded in 2022 with support from several major Japanese tech companies including Sony and Kioxia, and entered into a strategic partnership with IBM in December 2022. The outfit expects to start mass production of advanced chips built on a 2nm process by 2027. It is an ambitious goal, but one that could be helped along with a significant infusion of cash.

[...] As Tom's Hardware highlights, it took many years for established players like TSMC to get to where they are today. The publication questions whether or not Japan has enough workers with the skills necessary to achieve their goals. As we have seen both domestically and abroad, finding workers with the smarts to get the job done can be a real challenge. Even China, with its heavy investments and accusations of IP theft, hasn't been able to compete toe to toe with leading chipmakers.

It remains to be seen whether or not Japan's investment will pay off, but it is hard not to think that increased competition will benefit the masses via lower prices and a more robust supply chain.


Original Submission

posted by hubie on Monday November 18, @05:27AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

In a step toward new types of particle physics experiments, scientists cooled and then accelerated a beam of muons. The subatomic particles, heavy cousins of electrons, could be accelerated and slammed together at future particle colliders in hopes of unlocking physics secrets. But first, scientists have to figure out how to give muons a speed boost.

Counterintuitively, that means first slowing muons down. Muons in particle beams initially go every which way. To make a beam suitable for experiments, the particles need to be first slowed and then reaccelerated, all in the same direction. This slowing, or cooling, was first demonstrated in 2020 (SN: 2/5/20). 

[...] The scientists first sent the muons into an aerogel, a lightweight material that slowed the muons and created muonium, an atomlike combination of a positively charged muon and a negatively charged electron. Next, a laser stripped away the electrons, leaving behind cooled muons that electromagnetic fields then accelerated.

Muon colliders could generate higher energy collisions than machines that smash protons, which are themselves made up of smaller particles called quarks. Each proton’s energy is divvied up among its quarks, meaning only part of the energy goes into the collision. Muons have no smaller bits inside. And they’re preferable to electrons, which lose energy as they circle an accelerator. Muons aren’t as affected by that issue thanks to their larger mass.

S. Aritome et alAcceleration of positive muons by a radio-frequency cavity. arXiv:2410.11367. Submitted October 15, 2024.


Original Submission

posted by janrinok on Monday November 18, @12:38AM   Printer-friendly
from the you've-got-it-I-need-it-it's-mine dept.

Our Anonymous, Anonymous Coward has submitted the following story:

Motor Trend reports on shenanigans after Hertz employees at the Syracuse, NY airport left early one afternoon... https://www.motortrend.com/news/hertz-car-rental-new-york-empty-desk/

When travelers arrived after those employees left in order to pick up their reserved rentals, and no one was around to help them, some decided to help themselves. Approximately 20 customers simply grabbed keys for whatever car was available (or seeing which cars had the keys left in them) and went on their way. Note that this Hertz location isn't quite dealing in autonomous rentals yet, so pulling a grab 'n go with the keys was in no way an official option.

[...] When the airport realized what was going on, officials tried to contact Hertz but couldn't reach anyone that was on-duty.

[...] It's not clear if everyone who took a vehicle had to later swap it out or faced some sort of penalty.


Original Submission

posted by janrinok on Sunday November 17, @07:51PM   Printer-friendly

China's Volt Typhoon Breached Singtel, Reports Say

Arthur T Knackerbracket has processed the following story:

The digital break-in was discovered in June, according to Bloomberg, citing "two people familiar with the matter" who told the news outlet that the Singtel breach was "a test run by China for further hacks against US telecommunications companies."

In February, the feds and other nations' governments warned that the Beijing-backed crew had compromised "multiple" critical infrastructure orgs' IT networks in America and globally, and were "disruptive or destructive cyberattacks" against those targets.

Volt Typhoon's targets include communications, energy, transportation systems, and water and wastewater systems. 

"Volt Typhoon's choice of targets and pattern of behavior is not consistent with traditional cyber espionage or intelligence gathering operations, and the US authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions," the US, Canada, UK, Australia, and New Zealand said at the time.

More recently, another Chinese-government-backed group Salt Typhoon was accused of breaking into US telecom companies' infrastructure. These intrusions came to light in October with the spies reportedly breaching Verizon, AT&T, and Lumen Technologies, although all three have thus far declined to comment to The Register about the hacks.

Salt Typhoon also reportedly targeted phones belonging to people affiliated with US Democratic presidential candidate Kamala Harris, along with Republican candidate Donald Trump and his running mate, JD Vance.

Volt Typhoon And Its Botnet Surge Back With A Vengeance

Arthur T Knackerbracket has processed the following story:

China's Volt Typhoon crew and its botnet are back, compromising old Cisco routers once again to break into critical infrastructure networks and kick off cyberattacks, according to security researchers.

The alert comes nearly ten months after the Feds claimed a victory against the Chinese government-linked miscreants, when the FBI infiltrated the operation and then remotely wiped the botnet.

At the time, the US Justice Department warned that Volt Typhoon had infected "hundreds" of outdated Cisco and Netgear boxes with malware so that the devices could be used to break into US energy, water, and other vital facilities. Plus, the crew had been targeting American critical organizations as far back as 2021.

Just last week, news reports emerged that the same cyber espionage crew had breached Singapore Telecommunications over the summer as a "test run by China for further hacks against US telecommunications companies."

"Once thought dismantled, Volt Typhoon has returned, more sophisticated and determined than ever," declared Ryan Sherstobitoff, SVP of threat research and intelligence at SecurityScorecard. 

In a Tuesday report, Sherstobitoff revealed that the security shop's Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team had spotted Volt Typhoon exploiting outdated Cisco RV320/325 routers and Netgear ProSafe routers. 

"These end-of-life devices become perfect entry points, and in just 37 days, Volt Typhoon compromised 30 percent of visible Cisco RV320/325 routers," Sherstobitoff wrote.

When asked about specific vulnerabilities being abused, Sherstobitoff told The Register: "There are no clear CVEs that Volt is exploiting in current Cisco devices."

But, he added, because the routers are end-of-life, the vendor no longer issues security updates. "This leads to increased exploitation of existing ones," Sherstobitoff warned.

Since the disruption and subsequent rebuilding of the botnet, the threat hunters have seen "a few dozen" compromised devices, he told us. However, he noted, "we have observed changes in command and control servers being deployed into other network providers."

The FBI declined to comment on Volt Typhoon's reported resurgence, and the US government's Cybersecurity and Infrastructure Agency did not immediately response toThe Register's inquiries.

The Chinese crew's botnet first came to light in 2023, after Microsoft and intelligence agencies from the Five Eyes nations disclosed that Volt Typhoon had accessed networks belonging to US critical infrastructure organizations.

The spy gang, we're told, had built a botnet from Cisco and Netgear routers identified by a self-signed SSL certificate named JDYFJ. This botnet, according to SecurityScorecard, used command-and-control (C2) infrastructure in the Netherlands, Latvia, and Germany to disguise its malicious traffic.

By October 2023, Volt Typhoon had taken up occupancy, rent-free, on a compromised VPN device in New Caledonia. This created "a covert bridge between Asia-Pacific and the Americas" that kept "their network alive, hidden from standard detection," Sherstobitoff wrote. 

In January 2024, the FBI-led effort disrupted some of Volt Typhoon's infrastructure. However, in the Tuesday report, Sherstobitoff explains the Chinese spies rapidly set up new C2 servers on Digital Ocean, Quadranet, and Vultr and also registered fresh SSL certificates to avoid the prying eyes of law enforcement.

As of September, "the botnet persists," he wrote. It uses the JDYFJ cluster to route traffic globally. "Connections from New Caledonia and router nodes remain active for over a month, reinforcing Volt Typhoon's infrastructure."

This report comes as government officials and private security firms alike have noted an uptick in Chinese cyber spy activity on US and global networks.

Last week, Bloomberg said Volt Typhoon had broken into Singtel's networks before being spotted in June, and had used a web shell in that security breach.


Original Submission #1Original Submission #2

posted by janrinok on Sunday November 17, @03:03PM   Printer-friendly

https://discuss.privacyguides.net/t/manjaro-is-experimenting-with-opt-out-telemetry/22305

Manjaro (a Linux distro) has requested feedback regarding their proposal to collect what they claim is 'anonymized' data.

We're currently testing a new open-source tool for Manjaro, that will help us with the development of Manjaro. It's called MDD 26 and it collects some anonymous and impersonal statistics about Manjaro systems.

One user has commented:

"This is a bit problematic, as they include a lot of info in those reports : all your machine hardware, timezeone, country, etc."

Another has also made his views clear:

... you have to get a individual permission and have to ask every single user independent, which is ending in a "license-agreement" similar to ms-windows. otherwise this application is a dead-horse that is violating all and especially the european-data-security-laws. this is something that you have to figure out with @philm and all the other responsible persons at manjaro.

Manjaro dismisses this claim without actually considering EU laws which do cover this very topic. Opt-Out is not permitted.

MDD - Opt-in vs Opt-out

- Testers needed: Manjaro Data Donor
https://forum.manjaro.org/t/testers-needed-manjaro-data-donor/170163/48

So, Soylentils, what is your view on this subject? Do you think system metrics are required for anyone producing a distro, even it the information is as anonymized as they claim it is? Or is this overstepping the mark?


Original Submission

posted by janrinok on Sunday November 17, @10:15AM   Printer-friendly

Apple accused of trapping and ripping off 40m iCloud customers:

Apple accused of trapping and ripping off 40m iCloud customers

Consumer group Which? says the legal action - which it has launched - could result in a £3bn payout if it is successful, with the average customer getting around £70.

Apple has rejected the suggestion its practices are anti-competitive, saying users are not required to use iCloud. It said many customers rely on third-party alternatives, and insists it "works hard to make data transfer as easy as possible".

It is another example of the "growing tide of large class actions against big tech" which has "operated without sufficient constraint", Toby Starr from legal firm Humphries Kerstetter told the BBC.

Facebook, Google, gaming giant Steam and the UK's leading mobile providers are among the others facing legal claims at the same court, the Competition Appeal Tribunal.

"Although most of these claims are in their infancy and take a long time to resolve, there will be more decisions coming out over the next couple of years and there will be settlements - these will start to affect the tech giants' businesses," said Mr Starr.

Users of Apple products get a small amount of digital storage for free – and after that are encouraged to pay to use its iCloud service to back up photos, videos, messages, contacts and all the other content which lives on their device.

Prices for this storage range from £0.99 a month for 50GB of space to £54.99 a month for 12TB.

Apple does not allow rival storage services full access to its products.

It says that is for security reasons - but it also contributes to the company's enormous revenues.

Which? says over a period of nine years dating back to 2015 Apple has been effectively locking people into its services - and then overcharging them.

"By bringing this claim, Which? is showing big corporations like Apple that they cannot rip off UK consumers without facing repercussions," the body's chief executive Anabel Hoult said.

"Taking this legal action means we can help consumers to get the redress that they are owed, deter similar behaviour in the future and create a better, more competitive market."

Apple has strongly denied Which's accusations.

"We reject any suggestion that our iCloud practices are anti-competitive and will vigorously defend against any legal claim otherwise," it said in a statement.


Original Submission

posted by janrinok on Sunday November 17, @05:32AM   Printer-friendly

From the horse's own mouth:

The Guardian has announced it will no longer post content on Elon Musk's social media platform, X, from its official accounts.

In an announcement to readers, the news organisation said it considered the benefits of being on the platform formerly called Twitter were now outweighed by the negatives, citing the "often disturbing content" found on it.

"We wanted to let readers know that we will no longer post on any official Guardian editorial accounts on the social media site X," the Guardian said.
...
Responding to the announcement, Musk posted on X that the Guardian was "irrelevant" and a "laboriously vile propaganda machine".

Last year National Public Radio (NPR), the non-profit US media organisation, stopped posting on X after the social media platform labelled it as "state-affiliated media". PBS, a US public TV broadcaster, suspended its posts for the same reason.

This month the Berlin film festival said it was quitting X, without citing an official reason, and last month the North Wales police force said it had stopped using X because it was "no longer consistent with our values".

In August the Royal National orthopaedic hospital said it was leaving X, citing an "increased volume of hate speech and abusive commentary" on the platform.


Original Submission

posted by janrinok on Sunday November 17, @12:55AM   Printer-friendly

New Elliptic Curve Breaks 18-Year-Old Record:

In August, a pair of mathematicians discovered an exotic, record-breaking curve. In doing so, they tapped into a major open question about one of the oldest and most fundamental kinds of equations in mathematics.

Elliptic curves, which date back to at least ancient Greece, are central to many areas of study. They have a rich underlying structure that mathematicians have used to develop powerful techniques and theories. They were instrumental in Andrew Wiles' famous proof of Fermat's Last Theorem in 1994, at the time one of the most important unsolved problems in number theory. And they play a key role in modern cryptography.

Yet mathematicians still can't answer some of the most basic questions about them. For example, they often try to characterize elliptic curves by studying the special "rational points" that live on them. On a given curve, these points form clear and meaningful patterns. But it's not yet known whether there's a limit to how varied and complicated these patterns can get.

Answering this question would allow mathematicians to make sense of the vast and diverse world of elliptic curves, much of which remains uncharted. So they've set out to explore the outer fringes of that world, hunting down outlier curves with stranger and stranger patterns. It's a painstaking process, requiring both creativity and sophisticated computer programs.

Now, two mathematicians — Noam Elkies of Harvard University and Zev Klagsbrun of the Center for Communications Research in La Jolla, California — have found an elliptic curve with the most complicated pattern of rational points to date, breaking an 18-year-old record. "It was a big question whether this barrier could be broken," said Andrej Dujella of the University of Zagreb in Croatia. "It's a very exciting result for all of us working and interested in elliptic curves."

The discovery lays bare an ongoing debate over what mathematicians think they know about elliptic curves.

Elliptic curves don't appear particularly exotic. They're just equations of the form y2 = x3 + Ax + B, where A and B are rational numbers (any number that can be written as a fraction). When you graph the solutions to these equations, they look like this:

Mathematicians are particularly interested in a given elliptic curve's rational solutions — points on the curve whose x– and y-values are both rational numbers. "It's literally one of the oldest math problems in the history of humanity," said Jennifer Park of Ohio State University.

While it's relatively straightforward to find rational solutions to simpler types of equations, elliptic curves are "the first class of equations where there are really a lot of open questions," said Joseph Silverman of Brown University. "It's just two variables in a cubic equation, and that's already complicated enough."

To get a handle on the rational solutions of an elliptic curve, mathematicians often turn to the curve's rank, a number that measures how closely packed the rational points are along the curve. A rank 0 elliptic curve has only a finite number of rational points. A rank 1 elliptic curve has infinitely many rational points, but all of them line up in a simple pattern, so that if you know one, you can follow a well-known procedure to find the rest.

Higher-rank elliptic curves also have infinitely many rational points, but these points have more complicated relationships to each other. For example, if you know one rational solution of a rank 2 elliptic curve, you can use the same procedure you used in the rank 1 case to find a whole family of rational points. But the curve also has a second family of rational points.

The rank of an elliptic curve tells mathematicians how many "independent" points — points from different families — they need in order to define its set of rational solutions. The higher the rank, the richer in rational points the curve will be. A rank 2 and a rank 3 curve both have infinitely many rational solutions, but the rank 3 curve packs in rational points from an additional family, meaning that on average, a given stretch of it will contain more of them.

Almost all elliptic curves are known to be either rank 0 or rank 1. But there are still infinitely many oddballs with higher rank — and they're exceedingly difficult to find.

As a result, mathematicians aren't sure if there's a limit to how high the rank can get. For a while, most experts thought it was theoretically possible to construct a curve of any rank. Recent evidence suggests otherwise. Without a proof either way, mathematicians are left to debate the true nature of elliptic curves, illustrating just how much they have yet to understand about these equations.

Elkies, a prominent number theorist, didn't intend to break rank records. In the mid-2000s, he was studying seemingly unrelated objects called K3 surfaces. To understand them, he sliced them up and looked at the pieces.

Imagine starting with a simple surface, a flat plane. You can slice it into infinitely many straight lines, laid side by side. Depending on how you make your slices, the lines you end up with will be defined by different equations.

Similarly, there are more complicated, curvy surfaces that, when sliced up, yield infinitely many elliptic curves. Mathematicians have been using these surfaces to find higher-rank elliptic curves since the 1950s.

Elkies realized that his K3 surfaces were strange enough to give him access to even more exotic curves. In 2006, he sliced a particular K3 surface in just the right way and found among the slices an elliptic curve that he could show had a rank of at least 28 — beating the previous record of 24. It was an exciting moment for elliptic curve experts, who believed an explosion of record breakers might follow.

Instead, nothing happened. Elkies' record stood for nearly two decades — a noticeable departure from the relatively steady record-setting rate that mathematicians had enjoyed since the 1970s.

Was it perhaps a sign that rank could be limited after all — that the hunters were beginning to close in on their last few prey? Or was it just a reflection of the difficulty of the task?

When Elkies announced his discovery in 2006, Zev Klagsbrun was an undergraduate student at Queens College in New York. One of his professors, who had competed against Elkies in a high school math competition in the 1980s — Elkies won — told him about the new record-breaking curve during office hours.

Klagsbrun was intrigued. Years later, he returned to the result, proving that so long as a widely believed conjecture is true, Elkies' curve has a rank of precisely 28. So when he ran into Elkies at a conference in 2019, he saw an opportunity to push the result even further. Though a bit intimidated — "It's difficult to keep up with him," Klagsbrun said — he convinced Elkies to return to the search for new curves.

"I was like, 'Hey, I've got access to some computing power. I'm willing to write fast code. Search with me! Show me your secrets!'" Klagsbrun said.

They went back to Elkies' K3 surface. Eighteen years earlier, he had sliced it up in a way that gave him a pile of infinitely many curves. These curves were already quite exotic, but he could only guarantee that they had a rank of at least 17. He still needed an outlier to break the record of 24. Since he couldn't just calculate the rank of every curve in his pile, he used a well-known computational method to determine which among millions of them seemed most likely to have an anomalously high rank. He then calculated those ranks by hand, one by one, until he found his rank 28 winner.

Klagsbrun could now offer a faster computational method for sifting through the contenders. While Elkies had only been able to look through millions of curves, Klagsbrun could handle tens of trillions.

This wider search unearthed many curves in Elkies' old pile that exhibited some unusual properties, but none of them broke his 2006 record. The pair decided to move on.

Four years passed. Then, a few months ago, Elkies and Klagsbrun crossed paths once more at a conference and got to talking.

They set out to slice the K3 surface in a different way, getting a new pile of curves to work with. But there were hundreds of ways they could slice it, and most of those slicing methods seemed unlikely to produce the curve they sought.

Then, entirely by accident, they found a slicing method that, like Elkies' previous one, gave them a pile of curves, all guaranteed to have a rank of at least 17. It seemed more likely than the other approaches to contain a hidden gem. Sure enough, using Klagsbrun's more powerful computational technique, they found within that pile an elliptic curve with a rank of at least 29. This elliptic curve has the most complicated set of rational solutions ever seen: Mathematicians need at least 29 independent points to characterize them.

The curve's equation, when written as y2 = x3 + Ax + B, has values of A and B that are each over 60 digits long. The 29 independent rational solutions that Elkies and Klagsbrun pinpointed involve numbers that are similarly huge.


Original Submission