The effort to re-shore chip manufacturing in the US could be in peril as a new presidential administration has signaled a shift in direction, all while a semiconductor industry seems at times to be struggling.
President-elect Donald J. Trump has indicated the CHIPS and Science Act passed under the Biden Administration could be on the chopping block once he takes office on Jan. 20, 2025.
Just last week, the federal government said it plans to cut back by more than $500 million the funding it planned to divvy out to Intel to build new fabrication facilities as the company has undergone layoffs in the face of financial challenges.
Brandon Lucia, a Carnegie Mellon professor of electrical and computer engineering and CEO of chip startup Efficient Computer, believes the success of the CHIPS Act will hinge on three factors: substantial funding, advancements in manufacturing capabilities, and a thriving ecosystem of innovators in the U.S.
Efficient Computer is planning to launch its first commercial chip — an energy-efficient, general-purpose processor — in the first half of 2025. As demand for more powerful chips grows in tandem with the evolution and adoption of artificial intelligence, Lucia predicts chipmakers will prioritize energy efficiency for improved longevity and performance; they’ll also be forced to address sustainable manufacturing in semiconductor fabs to address environmental issues such as water runoff and carbon footprints.
Computerworld spoke with Lucia about the state of the CHIPS Act and the future of chip manufacturing. The following are excerpts from that interview.
Why do you believe President Biden has held off on actually disbursing the CHIPS Act funding? “I wouldn’t want to speculate on anything related to the enactment of government policy. I can tell you relative to the enactment of CHIPS Act…that I think there’s a big opportunity, whether it’s the CHIPS Act or something else. There’s a lot of opportunity for big-time innovation, but you need a lot of money to get this stuff done.
“So, while I’m not a political pundit, I think a big allocation of resources going into the domestic semiconductor industry is a great way to support innovation and to level up across the entire industry — from innovation to manufacturing and everything in between.”
How can the current administration get the funds distributed over the next two months? “I believe he’s on a very tight schedule. I think that you have to get the funding out there. It’s important to support the innovation economy around the semiconductor industry. It would be a real boon for the industry, whether through the CHIPS Act or not; it’s important to have that big allocation of resources into the semiconductor industry…. That means university innovation, basic research and start-up companies.
“It’s also about growing the ecosystem, and this is where I think the resources really begin to pay off — in developing new standards and new processes, supporting things like advanced manufacturing and new technologies like chiplets and advanced packaging.
“When I choose a process node through which I will implement my semiconductor product, I’m compelled by pricing, competitive performance and efficiency, time to market, and the complexity on the business side for manufacturing.”
How do you see chiplet-based processor packaging playing into the future success of the US semiconductor industry? “For different components of my system, I may choose to make one chiplet in one technology node and a second chiplet in another technology node because they offer different advantages from a technology perspective. The opportunity with advanced packaging of chiplet technology is you can integrate multiple heterogeneous chiplets together; they can come from different fabs. It’s very cool.
“Then you put it into a layer called an interposer and that’s something you use to glue the chiplets together and also communicate between them. So it gives them channels and wires to talk back and forth. When you do that, you can produce very sophisticated designs that can take advantage of the best options in the market.
“It’s also supportive of an ecosystem where a company like Efficient, can produce a chiplet — the biggest value in our design — and distribute that broadly. In the old days, even today, the way that typically happens is by selling licenses to the IP inside of your chip. So, that means I talk to a customer developing a chip and I can sell them design code resources and resources to use our architecture.
“Chiplets change the game. They say we can now produce a piece of hardware and sell that as a bare die off the manufacturing line, and you can integrate that into your heterogeneous chiplet-based product. So, it supports this innovation ecosystem where you can have many suppliers of chiplets with different capabilities and you can have a much simpler integration path. That path is emerging and it’s a very important piece of the innovation ecosystem moving forward.”
srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?quality=50&strip=all 7680w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2195879183.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>An example of a chiplet-based semiconductor where multiple smaller processors can work in tandem to address varying applications that are all tied together to serve a single purpose.
Shutterstock/Pete Hansen
How do sustainability efforts factor into the future of semiconductor production? “There are several dimensions to sustainability when it comes to manufacturing and operating semiconductors. The first is carbon emissions [which is] wrapped up in production and distribution of semiconductor parts. In the academic research, we call that the embodied system in production. That’s all the carbon emissions accounted for in the production and distribution.
“Then you have operational carbon emissions. This gets a lot of attention in the media because of the enormous amounts of energy that go into running data centers handling AI functions. So, you have those two categories and any system represents a point in the tradeoff of the space between those. You can produce more specialized chips that increase the amount of embodied carbon. You have special purpose accelerators for every function of AI you may want to do in a data center. Each of them would have potentially higher speed and efficiency, so that decreases their operational carbon.
“But the embodied carbon in a system that has that many chips is higher because we had to design, manufacture and distribute each of those different designs, and so the costs go up.”
Which semiconductor manufacturer has the best chance of re-shoring its manufacturing in the US? “I think there [are] a lot of interesting things going on inside Intel right now. I think they’re at an important moment in their existence. I think they’re pushing innovation in trying to develop what I think is the next generation and the generation after that in retail foundry services and manufacturing tech nodes. The conversation tends to turn toward their 18A node, which is a very advanced tech node. I think that will be a big win when Intel stands up manufacturing in the US. That turns into a roadmap for the future.
“Then you can’t have [that] conversation without talking about TSMC in the southwest with their massive fabrication implantation effort going on there. When that comes online, that will bring some of most advanced tech nodes that exist today to domestic production, and that’s important for a variety of reasons. I think over next few years the onshoring of semiconductor manufacturing for defense and security applications will be very important given the geopolitical state of the world today.”
Brandon Lucia holds one of his company’s prototype chips.
Brandon Lucia
Trump wants the federal government to put tariffs on overseas semiconductor makers who ship their products to the US instead of funding companies to incentivize chips manufacturing here. Do you agree? “I think in order to answer that question, I’d have to be more tied into the function of government and the foundation for the tariffs. What I can say is both are approaches attempt to get at the same end point.
“I think getting the resources in to support the semiconductor manufacturing industry is incredibly important. Those are two ways to do that, but there are many other ways to grow the domestic ecosystem through policy, industry efforts and advanced packaging techniques.
“Regardless of the mechanism, I think the need is there. I think what we need are resources to do basic research and take those ideas and put them into innovative start-up companies, even in support of incumbent [companies] in expanding their efforts in advanced manufacturing and foundries. Again, we’re seeing that with Intel and their 18A chip and TSMC nodes that will be manufactured in the southwest.
What kind of a thriving ecosystem is needed to support a healthy domestic semiconductor industry? “I have a strong belief in fundamental research in academia and industry as a driver of this. You have successful examples in some of the bigger companies with research arms and many examples of big ideas emerging from more basic research that happens in academia settings.
“It’s really driven economically, but also by things like the National Science Foundation directly supporting early-stage research that can be 10 years out from commercialization of a product sometimes. Much of what we’re doing at Efficient…was funded through the National Science Foundation. It goes back almost a decade.
“The other leg here is a thriving ecosystem of start-ups and an environment in which they can grow and produce value. You put all those things together and it’s a very big roadmap to how we could revolutionize the semiconductor industry. We can do fabrication of advanced nodes and packaging. This a la carte idea allows for new markets to emerge around this chiplet packaging technology.
“Then you have the ability for a startup to launch in a straightforward way to bring technology like that to market. Over a five-year window, a company could emerge and tap into all that research and tap into fabrication and manufacturing ecosystem to produce something that’s really new and has a lot of value.
“This is really our origin story. We came from the result of research that went on for nearly a decade. We realized we were doing something new that was untapped in the market today.”
Is your company’s design based on chiplets? “Right now, ours is not a chiplet-based design. In the future, we see a big opportunity for going into Chiplet integration. Our architecture is called Fabric and it’s a way of mapping computation in space across computing resources implemented in a chip. The basic idea is we have our architecture and it’s scalable to include more computing resources, and without decreasing efficiency, we can increase the performance in a chip.
“With chiplet technology, we can have multiple chiplets on our fabric architected together, which is a big opportunity for us to scale up from where we are today, which is focused on embedded applications and things like infrastructure, and wearables and space and defense applications. We can scale up further toward the edge, maybe even edge-cloud and, some day, data center applications.”
Source:: Computer World
By Nick Godt Volvo’s EX90 electric SUV features an Abbey Road Studios’ mode, providing sound quality engineered straight out of the world’s most famous music recording studios
Source:: Digital Trends
The US Federal Trade Commission (FTC) has launched an antitrust investigation into Microsoft, scrutinizing its cloud computing, software licensing, cybersecurity, and AI businesses.
The inquiry follows over a year of informal interviews with competitors and business partners, Bloomberg reported. FTC antitrust lawyers have sent Microsoft a detailed information demand, spanning hundreds of pages, after receiving approval from FTC Chair Lina Khan, the report said quoting sources familiar with the matter.
In the second week of November, Computer World reported that the FTC was preparing to investigate the business practices of Microsoft. The allegations were on whether Microsoft is abusing its market dominance by deploying restrictive licensing terms, which is not a fair practice.
Focus on market dominance and security practices
The investigation centers on Microsoft’s bundling of office productivity and security software with its cloud services, a practice critics argue disadvantages competitors in the authentication and cybersecurity markets. The FTC is particularly examining Microsoft Entra ID, its user authentication service, amid complaints that licensing terms and integration with its cloud offerings impede rival companies.
Microsoft’s role as a major government contractor and recent cybersecurity incidents involving its products have added urgency to the probe. The company provides billions of dollars in services to US agencies, including the Department of Defense, making its practices critical to national security.
In November 2023, FTC flagged concerns about the concentrated nature of the cloud market, warning that outages or performance issues could ripple through the economy. The authority had then collected feedback from civil society, industry stakeholders, and academia to prepare its report. As per the feedback, the majority of the concerns were related to competition and licensing practices.
In the UK too, Microsoft is facing a similar antitrust investigation by the Competition and Markets Authority. The investigation follows AWS’s complaint to the CMA against Microsoft for unfair trade practices.
Leadership transition and regulatory uncertainty
The investigation is among the final actions of Lina Khan, who has led one of the FTC’s most aggressive campaigns against corporate consolidation in decades. Khan is expected to step down as President-elect Donald Trump prepares to take office though there is no official confirmation yet.
Trump’s regulatory stance remains unclear, but his administration could mark a shift from President Joe Biden’s focus on reining in Big Tech. Under Biden, the FTC pursued cases against Amazon and Meta, while the Department of Justice sued Google and Apple.
This renewed scrutiny comes more than 25 years after the government’s landmark antitrust case against Microsoft over bundling its Windows operating system and browser, which ended without a breakup.
The FTC’s investigation could have far-reaching implications for the tech giant’s market practices and the broader cloud and cybersecurity sectors.
Queries to FTC and Microsoft remain unanswered.
Source:: Computer World
There are important accounts to secure, and then there are important accounts to secure. Your Google account falls into that second category, maybe even with a couple of asterisks and some neon orange highlighting added in for good measure.
I mean, really: When you stop and think about how much stuff is associated with that single sign-in — your email, your documents, your photos, your files, your search history, maybe even your contacts, text messages, and location history, if you use Android — saying it’s a “sensitive account” seems like an understatement. Whether you’re using Google for business, personal purposes, or some combination of the two, you want to do everything you possibly can to keep all of that information locked down and completely under your control.
And guess what? Having a password that you hastily set seven years ago isn’t enough. With something as priceless as your personal data, that single key is only the start of a smart security setup. And even it might be due for an upgrade.
Take 10 minutes to go through these steps, then rest easy knowing your Google account is as guarded as can be.
Part I: Reinforce your front door
Step 1: Check up on your Google account password
We’ll start with something simple but supremely important — that aforementioned Google account password. Consider the following questions:
Is your Google password based on your name, the name of your partner or child, your birthday, your street address, or anything else someone could easily figure out by Googling you?
Does your Google password revolve around a common word or easily guessable pattern?
Is your Google password short — less than eight characters, at a minimum?
Do you use your Google password (or any variation of it) to sign into any other app, website, or service?
If the answer to any of those questions is yes, first, bop yourself firmly on the nose. Then use this link to go change your password immediately — preferably to something long, complex, and not involving any easily discoverable personal info, any common words or patterns, or anything you use anywhere else.
(And note: This is also where a reliable password manager — whether the basic Google Password Manager or a more fully featured third-party option — can make all the difference in the world.)
Got it? Good. Next:
Step 2: Give your Google account a second layer of protection
No matter how strong your Google account password is, there’s always still the chance someone could crack it — but you can exponentially reduce the risk of anyone actually getting into your virtual property by enabling two-factor authentication on your account.
With two-factor authentication, you’ll be prompted for a second form of security in addition to your password — ideally something that requires a physical object that’d only ever be in your presence. In its simplest effective form, that could be a prompt or a code generated by your phone. If you want to get really fancy, it could be a button pressed on an actual key you carry (which could be a special USB- or Bluetooth-based dongle or even something built into your phone) — sometimes even called a “passkey,” which is basically just a confusing and overcomplicated way to say the same thing. There’s also an option to have codes sent to you via text message, but that method is relatively easy to hijack and thus not generally advisable to use.
Whatever path you choose, having that second layer in place will make it incredibly difficult for anyone to get into your Google account, even if they do somehow know your password.
Two-factor authentication makes it significantly more difficult for anyone to get into your Google account.
JR Raphael / IDG
If you don’t have it set up yet, go to Google’s 2-Step Verification page to get started.
Step 3: Make sure you’re prepared to prove your identity
If Google ever detects some sort of suspicious activity on your account, it might require you to verify your identity before it lets you sign in. And if you haven’t looked at your account verification settings in a while (or ever, for that matter), there’s a decent chance the necessary info might be out of date or missing altogether.
Take a minute now to open up Google’s account security site and look in the section labeled “How you sign in to Google.” There, among other things, you should see two options:
Recovery phone
Recovery email
If the value next to either option is not current and correct, click it and update it immediately.
And with that, we’re ready to move on to our next level of Google account protection.
Part II: Clamp down on connections
Step 4: Review the third-party services with access to your account
When you set up an app that interacts with Google in some way — on your phone, on your computer, or even within a Google service such as Gmail or Docs — that app gets granted a certain level of access to your Google account data.
Depending on the situation, that could mean it’s able to see some of your activity within specific Google services; it could mean it’s able to see everything in your Gmail, Google Calendar, or Google Drive; or it could mean it’s able to see everything across your entire Google account.
It’s all too easy to click through confirmation boxes without giving it careful thought — so look back now and see exactly what apps have access to what types of information. Visit Google’s third-party app access overview and look through the list of connected services. If you see anything there you no longer use or don’t recognize, click its line and then click the button to remove it.
Review your third-party app list and remove any items that no longer need access to your Google account.
JR Raphael / IDG
Allowing apps you know and trust to access your account is perfectly fine, but you want to be sure to revisit the list regularly and keep it as current and concise as possible.
Step 5: Review the devices with access to your account
In addition to apps, you’ve almost certainly signed into your Google account on a variety of physical devices over the past several months (and beyond). And often, once you’ve signed in at the system level, a device remains connected to your account and able to access it — no matter how long it’s been since you’ve actually used the thing.
You can close that loop and take back control by going to Google’s device activity page. If you see any device there that you no longer use or don’t recognize, click the three-dot menu icon within its box and sign it out of your account right then and there.
Step 6: Look over app permissions on your phone
Another important app-related consideration: If you’re using Android, some system-level permissions — such as those connected to your contacts and calendar — can effectively control access to areas of your Google account data, since services such as Google Contacts and Google Calendar sync that data between your phone and the cloud.
Head into the Security & Privacy section of your phone’s system settings and look for the line labeled “Permission manager.” (Depending on your device, you might have to tap a line labeled “Privacy controls” before you see it.) If you can’t find it, try searching your system settings for the phrase permission manager instead.
Once you get there, you can look through each type of permission and see which apps are authorized to access it — and, with a couple more taps, revoke the permission from any apps where that level of access doesn’t seem necessary.
Android makes it easy to review and adjust an app’s permission, if you know where to look.
JR Raphael / IDG
Step 7: Look over extension permissions in your browser
On the desktop, extensions added into Chrome or any other browser have the potential to expand your browser’s capabilities — but they also have the potential to put your privacy at risk.
Extensions could require access to anything from your complete browsing history to your system clipboard. They can often read and change data on sites you’re actively viewing, too — either any and all sites or only specific pertinent URLs, depending on the specific permissions requested.
None of this is necessarily bad, so long as the extension in question is reputable and requesting only the permissions it genuinely requires for the function it provides. But sometimes, even the most well-intending developers can get lazy and go with a broader permission than what their software actually needs. And in such an instance, an extension that does something as simple as enhancing the Gmail interface or allowing you to save articles for later could have access to everything you do in your browser — and the sort of broad data that’s typically kept under lock and key inside your Google account could be shared with external entities for no good reason.
So let’s do a quick little assessment, shall we? If you’re using Chrome, type chrome:extensions into your browser’s address bar. If you’re using another browser, look in its main menu to find the equivalent option for managing extensions or add-ons, as they’re sometimes also called.
Once you’re looking a list of all your installed extensions, click the “Details” or “Options” button for every extension on the page. Peek at the “Permissions” section within each one and then take a close look at the “Site access” section, in particular. Think carefully about the level of access that’s granted there and whether it’s genuinely needed — or whether it’d make sense to bring it down a notch and make it more limited in nature.
With Chrome and other Chrome-based browsers — like Microsoft Edge and Vivaldi — if the extension seems like it really only needs access to a specific site or domain and it’s requesting access to your activity on all sites, click the dropdown menu in that area and change its setting from “On all sites” to “On specific sites” (which lets you provide a specific, limited list of URLs on which the extension will have full visibility).
Chrome and other Chrome-based browsers make it easy to view and adjust the permissions for any browser extension you’re using.
JR Raphael / IDG
Just remember that many extensions do legitimately need certain levels of access in order to operate — so make these changes cautiously and only after carefully thinking through the potential implications. Worst-case scenario, though, if you bring an extension’s access down and then find it’s no longer working as expected, you can always come back to this same area of your browser’s settings later and change it back.
Firefox, incidentally, doesn’t allow this level of granular permission-granting — so if you find an extension there is accessing more than you’re comfortable with, your only real option is to uninstall it entirely.
Speaking of which…
Step 8: Get rid of any mobile apps and browser extensions you don’t need
While you’re thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better — and if you aren’t even using something, there’s no reason to keep it connected.
And with that, we’re ready for our final two parts of account-protecting possibilities.
Part III: Plan for the worst
Step 9: Set up or confirm your virtual Google will
Thinking about worst-case scenarios is never particularly pleasant — I’d much rather be eating crumpets, myself — but just as it’s important to have a plan in place for your physical and financial possessions, creating a virtual will for your Google account will make matters infinitely easier for your loved ones if and when you ever develop a mild case of death.
For company-managed Google Workspace accounts, someone at your organization would be able to take control of your account in the event that you were no longer able to access it. But with an individual Google account, no such system for passing along access exists.
Google has a simple system in place to manage this: Open up the Inactive Account Manager, and you’ll find tools for determining exactly what should happen if your account ever becomes inactive for a certain period of time. You can specify the number of months that must go by without any sign of your presence, along with the email addresses and phone numbers Google should use to contact you for confirmation. And then, you can give Google the email addresses of any people you want to be notified once it’s clear that you’re no longer available.
From there, you can specify exactly what types of information your chosen contacts will be able to access. You’ll even be able to leave a message for those people, if you want, and optionally create a broad autoreply that’ll be sent to anyone who emails you once your inactive period has begun (creepy!).
Google’s Inactive Account Manager is like a virtual estate planning tool for all of your account-associated data.
JR Raphael / IDG
Even if you’ve gone through this process before, it’s worth going back in and revisiting your preferences occasionally to confirm the info is all still complete and accurate — not only in the specific contacts you have set to be notified but also in what specific areas of your account those people will be able to access, if this situation ever actually arises.
For that latter piece of the puzzle, be sure to click the pencil-shaped icon next to the email address of each person you have listed. After you confirm their address, that’ll show you a list of account-related areas — everything from Contacts and Calendar to Google Chat, Google Photos, and even your location history (if you’re using a device that contributes to such a collection).
Virtually every time I’ve ever looked at that, I’ve found a handful of newer account-related areas weren’t selected to be shared — presumably because they didn’t exist when I had last reviewed the options. I had to manually check them all to be sure they’d be included in any post-consciousness account sharing.
Part IV: Turn your protection up to the max
Step 10: Think about Google’s Advanced Protection Program
Last but not least is a step that won’t be right for everyone but could be hugely consequential for certain types of Google users. For anyone at a higher risk of a targeted attack, Google offers an elevated form of account security called the Advanced Protection Program.
The program is described as being appropriate for business leaders, IT admins, activists, journalists, and anyone else who’s in the public eye and likely to be sought out by someone looking to do damage. It puts a series of heavy-duty restrictions on your Google account to make it especially difficult for anyone else to gain access — but as a result, it also makes things a bit more difficult for you.
The core part of the Advanced Protection Program is a requirement to have a physical security key the first time you sign into your account on any new device. That means in addition to your password, you’ll need that specific form of two-factor authentication — either an approved key built into your phone or a standalone dongle — in order to access your email, documents, or any other area of your Google account.
As part of the added security, you also won’t be able to connect most third-party apps to your Google account — including those that require access to your Gmail or Google Drive in order to operate. That could create some challenges (such as signing into an Android TV device, curiously enough) and require some compromises (such as no longer being able to use most third-party email clients with Gmail). And if you ever can’t get into your account for any reason, you’ll have to go through an extra-involved, multiday recovery process in order to restore access. You can read more about what the Advanced Protection Program is like to live with in this thoughtful overview.
Ultimately, only you can decide if the added inconveniences are worth the extra assurance. If you want the utmost in security for your Google account, though — and particularly if you’re someone who’s at a higher-than-average risk of being targeted — it’s something well worth considering.
If you do want to make the leap and add this extra layer of intense security onto your Google account, head over to Google’s Advanced Protection Program website to get started. With a personal account, you’ll be able to get yourself up and running in a matter of minutes. With an account that’s part of a paid company Workspace plan, your plan administrator will have to enable Advanced Protection for the organization before you’re able to do it. Once you start the enrollment process, you’ll see pretty quickly if it’s already available for your account or not — and if not, you can contact your company admin to ask about the possibility of allowing it.
And with that, give yourself a pat on the back: Now that these 10 steps are behind you, your Google account security is officially in tiptop shape — and you shouldn’t have to devote an ounce of thought to this area again anytime soon.
Just set yourself a reminder to revisit this page and review the steps within it once a year for good measure. (I’ll continue to update and expand the specific instructions as needed over time.) Do the same with security smarts in other areas — like your Android security settings, if you’re using an Android device of any sort — and then rest easy knowing your most important digital info is as secure as it can possibly be.
This article was originally published in February 2020 and updated in November 2024.
Source:: Computer World
By Hisan Kidwai We test many flagship smartphones here at FossBytes, but most will never buy one. In developing…
The post Redmi A4 Review: Bringing 5G to Everyone appeared first on Fossbytes.
Source:: Fossbytes
By Partner Content Turning a single spark of inspiration into a full-fledged product is an intricate journey that blends…
The post From Idea to Execution: Navigating the Essential Stages of Software Development appeared first on Fossbytes.
Source:: Fossbytes
By Nick Godt Kia is aiming to double the electric range of its PHEVs in a couple of years.
Source:: Digital Trends
For the past two or three weeks, upstart social network Bluesky has been attracting large numbers of new users every day, a crowd that quite evidently includes many Apple device users — the app has at times topped Apple’s App Store charts in the run-up to Thanksgiving in the US. I’ve been using it for a little while and have collected a handful of hints and services that can optimize the experience for anyone migrating to the increasingly busy social network.
What’s interesting about Bluesky is that while it lacks some of the features you can find on other social sites, the conversation seems subjectively better and the lack of ads and sponsored posts — along with the absence of algorithmic recommendations from people you don’t want to hear from — make for a pleasant social media experience.
A place for friends?
One thing about the service is that it is a good internet citizen, which means it does not throttle outbound links and does not punish posters by reducing visibility of their posts simply for sharing them.
Among other things, this means traffic from the service to The Boston Globe is already three times what that publication achieves from Threads. It also means the Globe is seeing significantly more of those readers converting to a subscription account.
In other words, while at roughly 22 million users, Bluesky remains a relatively small service. But the people using it appear to be actively doing so, which means it can generate decent traffic. That openness also means that data you share via the service is in the clear and can and will be picked up to train AI models and so on. There is no privacy there, and this should be clearly understood — everything you post is out in the open, so don’t share what you don’t want everyone to know. At the same time, by virtue of the service being so open, it can deliver an even better experience with the help from third-party tools and services like these.
Thread summaries
One thing we all used to use in X, thread summaries aren’t natively available on Bluesky, but you can use Skyview to quickly and easily create summaries. Just mention @skyview.social with “unroll” anywhere in a thread and receive a link to view/share the entire conversation. The downside might be that all the unroll requests end up being visible on Skyview’s account (though to be fair, everything you do is already stored somewhere on every social media service — it’s just that Skyview lets you see it, too).
Publish threads
Back in the olden days it was possible to publish entire conversations using a link from what was then Twitter. These turned up across numerous websites and within innumerable stories. Then it got switched off. The good news is that to some extent the good times are back. To turn a thread into a shareable web page use Skywriter.blue, which turns a Bluesky post URL into a shareable webpage. While this doesn’t yet work as an embed, it is at least now a page.
Mute a thread
You might need to know this in case you get involved in a conversation that blows up and you don’t want to receive additional alerts concerning it. To mute a thread, just tap the three dots on the right of any post in that thread and then choose “Mute Thread” from the options there. Additional tools you’ll find when you tap those three dots include:
Translate
Copy post text
Send via direct message
Share
Mute words & tags
Hide reply for me.
What lists are you on?
If you are interested in finding out what lists you are on, who you have blocked, and who has blocked you, visit clearsky.app, enter the relevant handle, and take a look.
Find more Starter Packs
You’ll find a directory of all Starter Packs — collections of recommended people to follow usually chosen to represent specific topics or subject areas — at Blueskydirectory.com. Explore here to find more collections from which to cherry-pick those you wish to follow, or just explore the comic genius of this Starter Pack about men called Geoff.
Starter Packs can become lists
BlueSky users are incredibly busy building Starter Packs. They cover multiple bases — independent book publishers, RStats Ecosystem Maintainers, dogs of Bluesky, for example — and are maintained and provided by volunteers. The idea is that you can visit these collections and select people you want to follow or follow the entire list. It’s a good way to build a solid selection of feeds for your interests.
Lists are another thing. Lists are groups of accounts that can be used to curate feeds, follow interests, and so on. You might use these to track your favorite writers, researchers, or other high-profile people you want to keep an eye on — that way you don’t need to follow them. The great thing about lists is that, unlike Starter Packs, you can choose to create a separate feed in your own window that follows posts from that list; I follow the BlueSky Team list, for example. This lets me monitor posts in that list without following more people.
But what if you want to turn a Starter Pack into a list, so you can create your own window to follow? You can! Just use the Pack2List web app, where you can paste the URL of that Starter Pack and choose to follow it as a list. That means that all the content in one of those Starter Packs can be made easily available on your account without you following each person on the list.
More people to follow
One quick way to find other like-minded souls might be to find people you do not yet follow who are followed by lots of people you do follow. You do this using the Bluesky network analyzer, which you’ll find right here.
Use Bluesky like Tweetdeck
Anyone out there with a memory that extends further than a few of months might remember Tweetdeck, the incredibly useful tool used by so many professionals to read and manage Tweets. Something very like it is now available to Bluesky users. Deck.Blue is an app you can connect to an account that lets you explore your “skeets’ in a multi-column layout, so you can monitor all your posts, posts from lists you follow, searches, notifications, hashtags — whatever you need. You can also use Deck.Blue to schedule posts, though this is currently a fee-based feature. The tool also works with Buffer, so you can monitor your LinkedIn, Mastodon, and Bluesky channels in one place.
Search tools
The search tools in Bluesky can help you in several ways, for example:
Find a specific phrase: Use quotes around keywords, such as “Austrian Airlines” to find skeets that include that phrase.
Hashtag search: Use any term with an # prefix to find any post with that tag.
Find people: You can search for posts that mention specific people using their Bluesky handle or use from: and a user handle to find all posts from a user.
URL: Paste in a URL to see all the posts that have shared that URL.
There are many more. Two additional third-party tools you should find useful are Skythread, which lets you search for a thread and comments using the thread link, and Label Scanner, which enables you to verify which labels have been applied to an account.
Alternative clients
Bluesky offers its own client, but the experience on an iPad is pretty bad. If you want to use the service on an iPad, take a look at Skeets, which is better and includes a host of additional features, some of which you must pay for. Other alternative Bluesky browsers include the aforementioned Deck.blue, SkyFeed, and SkeetDeck. There are more, and with millions migrating to the service, it is likely additional options will appear pretty swiftly for a while.
You will need an app password to make any of these services work. Rather than using your actual account password, I utterly urge you to create an auxiliary app password. You can use this to give the clients the access they need to work for you, while keeping your primary password secure. Finally, for even more insights into using Bluesky, visit this page.
You can follow me on social media! Join me on BlueSky, LinkedIn, Mastodon, and MeWe.
Source:: Computer World
Download the PDF Computerworld Cheat Sheet today.
Source:: Computer World
By Siôn Geschwindt It’s been a tough year for air taxi startups. The UK’s Vertical Aerospace is running short of cash, while Germany’s Lillium faces bankruptcy. Targets for commercialisation keep getting extended. Investors are hesitant to commit. The reason for all the struggles is pretty simple. Building, certifying, and commercialising brand-new aircraft designs like electric vertical take-off and landing aircraft (eVTOLs) is complex, notoriously expensive, and depends on lengthy regulatory processes. That’s partly why German startup Vaeridion is pursuing a simpler, potentially cheaper, route to electric flight using an aircraft it calls the “microliner”. “The microliner looks like a regular plane and it…This story continues at The Next Web
Source:: The Next Web
By Kirstie McDermott The Dutch labour market is experiencing a persistent talent shortage, according to a new salary survey report. The research also flags that when it comes to hiring in 2025, artificial intelligence, automation, and machine learning are expected to be among the hottest functional areas companies are most likely to recruit talent for next year. In line with this, a recent study by Indeed found that over the past year, job postings mentioning generative artificial intelligence (Gen AI) or related phrases have increased dramatically across the US and Europe. In Germany, for example, there has been a 3.9x increase, France has…This story continues at The Next Web
Source:: The Next Web
By Siôn Geschwindt Lithium-ion batteries have served us well, powering much of the modern world. However, today’s tech — everything from drones and EVs to the wretched Tesla cyber truck — demands denser batteries that charge faster and take you further. This push is driving scientists to conjure up new battery chemistries or refine old ones. Naturally, it is also spawning a new generation of startups looking to scale the next, best battery. One of those is Molyon. Molyon recently spun out from 15 years of research at the University of Cambridge to commercialise a lithium-sulfur battery that it claims delivers twice the…This story continues at The Next Web
Source:: The Next Web
Nvidia on Monday showed off a new generative AI (genAI) model that can be used to create all kinds of sounds and music: Fugatto (which stands for Foundational Generative Audio Transformer Opus 1).
By entering a text prompt, a user can make Fugatto create basically any sound, such as a trumpet barking like a dog. The genAI model can also be used to change the dialect of a singer or turn a piano piece into a song, according to Reuters.
Fugatto has been trained on open source data, and there is currently no official release date. However, the idea is that the model will eventually be used in the production of music, films and games.
The video below from Nvidia highlights some of Fugatto can do.
Source:: Computer World
Brazil’s antitrust body has joined a chorus of regulators to demand that Apple permit external payment methods in iOS apps. It’s just the latest page in an ongoing story, but might be enough to break this camel’s backbone.
What this means, at the risk of stating the obvious, is that Apple now faces so much pressure to open up to external payment systems, it could finally make sense for it to bite the bullet and open up across all its territories rather than continue to fight.
Apple has already been forced to open up in this way — and also to third-party app stores — in the EU, and to let US developers sell in-app content outside the App Store. It now faces similar pressure in the UK. But while it resists each of these moves, there is a cost to the company in legal fees and reputational damage attached to each battle in this conflict — at some point, it might make better business sense to cede the field.
A potential opportunity
While I don’t expect Apple is at all thrilled at how these cookies are crumbling, perhaps there is a way to turn all of this adversity into opportunity. If there’s ever been a time to add features and improvements to the payment systems Apple already provides, this is it.
It might also be time for Apple to take its payments infrastructure to other platforms and markets. Why shouldn’t you be able to pay for Android apps using Apple’s payment systems? Why not offer Apple payments to gamers from within Fortnite? Why not turn payments into products and grab an Apple-sized slice of the wider payments pie?
Customers from inside other ecosystems might be ready to embrace Apple’s rock-solid, highly secure, privacy-first payment system. What I’m saying is that Apple has a unique chance to compete, one from which it can continue to evangelize the advantages of the services (and platforms) it already provides for in-app purchases and everything else. At the end of the day, the best way to keep people using its payments systems is to convince them that they want to use that system — even if they have a choice of others to use.
With choice being imposed on the company, the company has an excuse to compete right back at competitors.
Who will lose?
Apple will not be blind to this, but support for external payment systems on its platforms remains very new and is only visible in a small number of markets. Given the potential risks of fraud and worse, it makes sense for Apple (and everyone else) to take a wait-and-see approach to extending this openness to new markets. It is just good practice to monitor what scams, frauds, and other attacks will emerge as third-party services are used on iOS in the EU. It’s not inconceivable that part of Apple’s reluctance to open up more widely yet (other than the money) is a desire to assess the perils and pitfalls of doing so — a trial in which Apple’s European customers are the crash test dummies.
But regulators don’t seem terribly keen to wait and see. Regulators in India, Brazil, UK, US, Japan, South Korea, and elsewhere now seem to agree that Apple must lift restrictions on payment methods for in-app purchases. It’s going to happen in the end.
What price platform integrity?
Even then, another problem Apple faces in that is that each nation could demand slightly different approaches to lifting those restrictions. The problem is that there is a development and infrastructure support cost, not to mention legal expenses, to each of those dictated approaches. What that means is that the less harmonious Apple lets payments on iOS become, the higher the cost of business.
To avoid weakening the platform with a thousand cuts, it just makes more sense to lift the restrictions internationally, while also putting in place firm safeguards that permit Apple to swiftly remove any payment services identified as fraudulent or lax in security from its platforms.
Now, I’m on the record arguing that I think there is a very high probability that once payment systems in apps are opened up this way we will see fraud, identity theft, and other forms of financial crime affect against Apple’s so-far highly secure platform. I think that’s inevitable.
Consumers will be damaged, and in the case of those using non-Apple payment services or app stores they cannot expect to get support from Apple. They may have accessed a non-Apple service on an Apple device, but the exchange will be between them and the service, not them and Apple. There will be confusion and broken hearts. This is what will happen.
Managed decline
But Apple can manage the experience and focus on showing the many ways it offers a better and safer system to use. It also means bowing to the inevitable and building something that satisfies regulators enough that they don’t choose to force Apple to build a system that dilutes its own platform.
So, why has Apple resisted so much? Perhaps because it knows there are other criticisms reaching the anti-trust runway. Perhaps it feels that it makes sense to put up a fight on this particular hill in order to give it time to shore up better defenses on the other hills it currently holds.
All the same, the judgment coming out of Brazil suggests the company is running out of time to prepare for other battles, and now might be time to concede on this particular point. Despite which, if I were in Apple (or a regulator’s) shoes, I’d still try to delay any such move until the first casualties from the European experiment are identified and lessons learned.
You can follow me on social media! Join me on BlueSky, LinkedIn, Mastodon, and MeWe.
Source:: Computer World
By Nick Godt Governor Gavin Newsom says California will seek to revive state-tax rebates for EVs should Trump end existing federal incentives.
Source:: Digital Trends
By Siôn Geschwindt Vertical Aerospace has been thrown a crucial lifeline, staving off potential bankruptcy at the cash-strapped air taxi startup. The UK-based company — which makes electric vertical take-off and landing (eVTOL) aircraft — secured the fresh funds from its largest creditor, American debt investor Mudrick Capital. The agreement, announced Monday, includes a $50mn cash injection and a substantial debt-to-equity swap. Mudrick will invest $25mn upfront and guarantee another $25mn in future funding, offset by contributions from third-party investors. Mudrick will also convert half of its $130mn in outstanding loans into equity at $2.75 per share, taking its ownership stake in Vertical…This story continues at The Next Web
Source:: The Next Web
By Hisan Kidwai For years, Realme has delivered some of the best bang-for-the-buck and flagship killer smartphones. But, I…
The post Realme GT 7 Pro Review: Snapdragon 8 Elite on a Budget appeared first on Fossbytes.
Source:: Fossbytes
By Siôn Geschwindt Zurich-based startup Poncho has officially launched its weather insurance platform — and bagged some fresh funding to boot. Founded in 2023, the company aims to transform how the travel and hospitality industries handle unpredictable weather. Poncho’s tech integrates with booking systems, allowing customers to opt for weather protection at checkout. If bad weather, such as heavy rain or wind, occurs during their scheduled event or trip, a refund is processed automatically. You don’t need to file a claim. Maybe torrential rains turn your Alpine ski trip to slush or maybe you’ve splurged on a Mediterranean yacht adventure only to have…This story continues at The Next Web
Source:: The Next Web
The “robust computer that’s very, very tiny” — introduced by Apple CEO Steve Jobs almost 20 years ago — just got even tinier. And once again, if you’re thinking of switching from Windows, there’s little excuse not to climb aboard; the “most affordable Mac ever” is also among the fastest consumer AI desktops money can buy.
While the Mac mini in hand is considerably smaller, its cost increased just a little and computational performance improved exponentially. These impressive changes allow the it to be a gateway for switchers, a second computer for any mobile Mac user, and a highly capable desktop for everyone else.
It’s also a server, a computer to which you can offload big tasks and it’s quite capable of handling the kind of cutting-edge productivity software you might use on a MacBook Pro, though perhaps not as efficiently.
In the interests of objectivity, I should say up from I love the new Mac mini. It’s a triumph, a culmination of everything the first Mac mini aimed to be, but much, much better. Introduced along with the also superb MacBook Pro, Apple’s Mac line-up proves that, with Apple Silicon inside, the company is a the top of its game.
What you can expect under the hood
All this capability comes because of the amazing M-series processor Apple has slotted inside and reflects the device’s extensive processor history that straddles the company’s PowerPC chips on its first release, the Intel years, and today’s super-efficient, low-power chips that put Apple ahead of the industry. There’s a lot to love, starting at $599 (though the M4 Pro with 14‑core CPU and 20‑core GPU, 48GB, and 1TB SSD model I tested costs a lot more, $2,199.) That price tag might dent the superlatives a little, but probably not fatally.
For a company made famous by the quality of its design, the Mac mini you see today isn’t a major departure from the models of yesteryear, other than size. This third major redesign remains faithful to the breed — a compact all-in-one metal box designed to work with the mouse, keyboard and display you already own. Now just 2-in. high, the 5-in.-by-5-in. (100% carbon neutral aluminum) box remains, resolutely, a Mac mini.
Such is the classic simplicity of Apple design, if you’d been abducted by aliens two decades ago and taken to the peaceful planet Zog to hang out with and learn from an enlightened species, you’d still recognize this as a Mac mini when you returned. (Though you’d probably be disappointed at the state of enlightenment here on Terra Ferma.)
But alien adventures aside, because it aims to work with kit you already own, connectivity has always been important to the mini. The new model offers two USB-C ports, HDMI, Gigabit Ethernet, three Thunderbolt 5 ports, a headphone jack, Wi-Fi 6E, and Bluetooth 5.3 — though you no longer get USB-A, putting that standard even further back in history. You also don’t get an SD card slot, but you didn’t in the last model, either. You can now drive up to three external displays, which is amazing, really, and I bet many of us take that for granted.
The power button (which you rarely, if ever, need to touch) is on the lower left corner of the 1.6-pound device; that positioning raised many critical cat calls when it was spotted, but if that’s all the critics have then Apple has got something right.
What it does
Apple says the Mac mini with M4 Pro is up to 20x faster than the fastest Intel-based Mac mini. The benchmark results I got back that assertion up, and more. I was a little open-jawed at the results I got and had to run tests multiple times they impressed me so very much.
Time for some benchmarks:
Geekbench 6.3
Single Core: 3,8715.
Multi Core: 22,314.
OpenCL: 69,013
The CPU results are incredibly impressive. If you check the Geekbench Mac charts, you will find they mean the Mac mini delivers at least as much punch as the currently available Mac Studio, or last year’s 16-in. M3 Max MacBook Pro. There is no performance compromise whatsoever in this machine.
Cinebench R23
22,737 CPU multi core (a top three position, up there with Intel Xeon W and AMD Ryzen Threadripper 2992WX).
2,137 CPU single core (leader of the pack).
Valley
FPS 101.3
It is important to note that Valley isn’t optimized for Apple Silicon and relies on Apple’s Rosetta technology, so it’s not a fair comparative test. But it does illustrate just how performant these little Macs have become.
You’ll find additional benchmark tests at MacStadium, where new M4 Mac minis are already being put into service as servers in real-life, mission-critical environments. They note that the M4 Pro, “tears past all the previously available Mac mini models, and even puts some of the older Studio models to shame.”
You’ll find a similarly fabulous statement from an impressed Jeff Geerling, who says: “The chip isn’t the fastest at everything, but it’s certainly the most efficient CPU I’ve ever tested. And that scales down to idle power, too — it hovers between 3-4W at idle — which is about the same as a Raspberry Pi.”
It is worth noting that most of the time the power efficiency means it will barely feel warm to the touch, no matter how hard you push it. These results, and those of all the other M4-powered Macs, absolutely illustrate the extent to which the shift to Apple Silicon has turned the processor industry upside down, putting once last-place Apple in bidding distance for the throne.
Take it anywhere
The Mac mini is small. You can put it anywhere you need it — on a bookshelf, certainly under a reception desk, anywhere in an office, and in almost any situation where you might need a computer on warehouse or factory floors. The front-mounted USB-C ports and headphone jack make its usage flexible, too. While it is not and nor is it intended to be a portable device, it is worth noting that so long as you have a keyboard, mouse, and display wherever you intend to go, the Mac mini is a computer you can take with you.
What about Thunderbolt 5?
Apple celebrated the introduction of Thunderbolt 5 on these Macs when they were announced. All the same, for most users it means very little. Sure, if you use a compatible Thunderbolt 5 cable and a compatible device, you’ll get data transfer speeds of 120Gbps, but right now those who have those things skew toward being pro gamers and video professionals. That will change of course as Thunderbolt 5 proliferates and becomes cheaper, though it is nice to know that you can use this tiny Mac to power multiple 6K displays.
Thunderbolt 5 will also be important to those who choose to use the new macOS feature that lets them use larger Mac apps that are stored on external SSD drives.
Time to upgrade?
The new model stacks up proudly against Apple’s first M1-series Mac mini. You’ll see significant performance gains, and while the M1 Mac mini I’ve used as my daily drive ever since it was introduced has never let me down, I did experience a perceptible difference in performance.
Four years later, is it time to upgrade? I think it might be, and the fact I’ve had four trouble-free years with an M1 gives me a lot of confidence to expect more great years with an M4 model.
However, in contrast to the Intel Macs, the question of whether or whether not to upgrade shouldn’t be a question at all — of course, you should. The difference in performance was like night and day when the M1 models first appeared; with the M4 series, you’ll feel like you just swallowed a glass of iced water in hell, as someone once said.
Unlike the performance compromise Mac mini represented back in the day, with Apple Silicon you can look forward to pro performance at a price that’s more within reach.
A dream realized
The thing about the price is important. It’s hard to ignore a computer that starts at $599 and can kick out this level of performance. As a desktop, it ticks most boxes:
Windows switchers will like that they might be able to continue using existing kit with the system, and they’ll like it even more once they realize these Macs are so powerful they’ll run Windows better in VM mode than some PCs.
Pro users will quickly find these Macs are capable of pro level performance that matches or exceeds some of last year’s more expensive Mac models.
Enterprises can be confident that these machines can be deployed across a wide array of situations and handle their tasks really well.
And every Mac mini user will appreciate that there is enough processor “oomph” inside these devices that we will still be enjoying a great experience using them in three, four, five or more years’ time. As mentioned above, my M1 Mac mini has never missed its stride and is four years old.
With its new – and still unmistakably Apple Mac mini design — the new model looks good, is whisper quiet, runs almost every application you might want to run, and demands hardly any desk space. If you need an Apple desktop or need to put an Apple system together at as low a price as possible, then the great thing about these Macs is you won’t feel at all compromised – these things shift!
All in all, this is a triumph, an absolute accomplishment of the journey Apple set out on when the first ever Mac mini models appeared. I can’t recommend it enough.
You can follow me on social media! Join me on BlueSky, LinkedIn, Mastodon, and MeWe.
Source:: Computer World
Microsoft has released a new collection of tools and a guide to fix security issues that have arisen around the way the company’s generative AI (genAI) Copilot assistant handles information. Namely, the tool’s indexing of an organization’s internal data can lead to the AI assistant sharing sensitive information when it shouldn’t.
A Microsoft employee familiar with customer complaints tells Business Insider: “Now, when Joe Blow logs into an account and starts Copilot, they can see everything. All of a sudden, Joe Blow can see the CEO’s email.”
Business Insider reports that the behavior prompted several organizations to delay using Copilot for security reasons. “Many data governance challenges associated with AI were not caused by AI’s arrival,” a Microsoft spokesperson told the publication.
Instead, according to the spokesperson, AI tools like Copilot highlight how companies need to take proactive responsibility for how they manage internal documents and other information.
Source:: Computer World
Click Here to View the Upcoming Event Calendar