Page 2,483«..1020..2,4822,4832,4842,485..2,4902,500..»

Balogun, Ogbiyoyo Crowned National Chess ChampionsTHISDAYLIVE – THISDAY Newspapers

Femi Solaja

Top Nigerian chess player, International Master Oluwafemi Balogun, has emerged as the new National Champion of chess in the country after dominating the rest of the pool at the just concluded National Chess Championship in Lagos.

Balogun, a three-time participant at the World Chess Olympiad, garnered seven points in a nine-round robin tournament.

For his efforts, the only unbeaten player in the tournament won for himself, N1.5m just as Abimbola Osunfuyi was runners up with six points and won the sum of N1m. Chukwunonso Oragwu was second runner up with five points and bagged N750,000.

Its a special moment for me and will want to continue with same tempo that helped me to achieved this feat.

Combining chess with the reality of the countrys economic situation has not been easy but residual knowledge and personal ability have been the motivating factors for me, Balogun remarked after collecting his prize.

Before this unique feat, Balogun two years ago was one the African representatives at the annual World Chess Championship in Russia where he was eliminated by number one player in the world, Magnus Carlsen in the opening match.

Woman FIDE Master, Ogbiyoyo Perpetual Eloho, also emerged as the winner in the womens section.

She won the championship having recorded a total score of 7 points out of the possible 9. Her only defeat was in the hands of Ofowino Toritsemuwa, who finished second in the championship.

Woman International Master (elect) Ofowino Toritsemuwa secured second spot, half a point behind the champion.

Enomah Emmanuella Trust finished third on the log with a total of 6 of the possible 9 points.

Akinwamide Oluwadamilare won the Masters division of the open section with an impressive six points out of the possible 9 points. Adejoh Joshua claimed second place, while Tinubu Babajide settled for third place on tiebreaks.

The closing ceremony was fully attended by chess players, partners, supporters and board members of the Nigeria Chess Federation (NCF) and officials of the Federal Ministry of Sports.

NCF President, DIG Mohammed Sani Usman (rtd) gave an opening remark before the kick off of competitions.

Like Loading...

See the article here:
Balogun, Ogbiyoyo Crowned National Chess ChampionsTHISDAYLIVE - THISDAY Newspapers

Read More..

Chess Legend Viswanathan Anand Confirms His Biopic, Wants Aamir Khan To Play Him & Theres Reason Behind It – koimoi

Viswanathan Anand Biopic Is On The Cards, Aamir Khan To Play The Lead? ( Photo Credit Wikipedia )

In the past few years, biopics have become a trendy topic for the majority of filmmakers. From MS Dhoni: The Untold Story to Shershaah, the audience also seems to love such human interest stories as it motivates them to do more. Meanwhile, there are many personalities whose stories can be made for the big screen, and recently, chess grandmaster, Viswanathan Anand finally confirmed his biopic and he wants Aamir Khan to play him on screen.

Although nothing major has been revealed yet but previously too the chess player had expressed his desire that whenever his biopic will be made, Dangal star would be the best fit for the role.

Meanwhile, confirming his biopic, Viswanathan Anand said, I have agreed to the biopic. The matter has already been discussed with the producer several times. I told them the stories of my life. The scriptwriting work will start very soon. However, due to Corona, the work has come to a standstill. Hopefully, everything will start very soon. I cant say much about the biopic now. I dont know when or how the shooting will start. Wait for a few days everything we will get to know about this biopic.

Viswanathan Anand was also asked if he wants any particular actor to portray him in the biopic, to which, the chess player replied, I cant say who will play my role in the movie. But I can say my choice. Maybe it would be nice if Aamir Khan play Viswanathan Anand on screen. I think Aamir Khan has a lot in common with me.

Recently, stand-up comedian, Samay Raina, held a zoom meeting, where he invited personalities from various fields. One of them was the Dhoom 3 star. In one of the segments, the comedian asked Aamir if he was ever offered the biopic of the world chess champion and if he would take the lead role?

Responding to him, Aamir Khan told, That is one of the easiest questions to answer. It would be not only an honour to play Vishy, but it would be highly exciting to get into his mind. When I play a character, I try to understand a persons mind, and Vishy is a real person; I would obviously spend a lot of time with him to understand how his mind works. And I would understand from his wife and family how his mind works, and then hopefully, I will surprise Vishy when I play him on-screen. If and when that happens, and I would look forward to it.

Viswanathan Anand joked and said, I promise I wouldnt put you in that situation where you would have to gain weight for your role. This left everyone in splits.

Stay tuned to Koimoi for more information.

Must Read: KBC 13: Jaya Bachchans Thought Shuts Amitabh Bachchan As Rani Mukerji Says Har Bengali Ke Andar Ek Kali Toh Hai

Follow Us: Facebook | Instagram | Twitter | Youtube

Originally posted here:
Chess Legend Viswanathan Anand Confirms His Biopic, Wants Aamir Khan To Play Him & Theres Reason Behind It - koimoi

Read More..

Race to make Chess national team heats up – diggers.news

IT is getting heated in the Chess national team selection trials in Lusaka with Kela Kaulule and Timothy Kabwe tied on the table in the run to be named in the national team with three points.

In the Womens section, Portiah Mututubanya took sole leadership of the run with a flawless run of three straight wins at the Islamic Cultural Centre in Makeni.

Kabwe built on his opening win over Mula Bwembya with a round two win over Terrene Chasaya before staging an upset against national Zambia Open champions International Master (IM) Richmond Phiri.

The checkmate against Phiri was a sweet one for Kabwe considering that the Phiri came into the event as the highest-ranked player.

On the other hand, Kaulule collected his three points from wins against David Hamoonga, veteran Tabala Simasiku, and Dennis Mwape before coming up against Kabwe in Round Four by press time.

The pairs hold on the summit is however not safe in that they only lead the pack with half a point against the likes of Nase Lungu, Geoffrey Luanja, Michael Kaoma, Prince Daniel Mulenga, Kelvin Chumfwa, and Godwin Phiri who are sitting in joint second.

In the Womens Section, Mututumbanya managed to keep her winning run in the first three rounds against Nilla Sauti and Naomi Mwale and favourite Woman Candidate Master (WCM) Phyllis Mwilola.

By press time, Mututumbanya had a date with second-placed Maris Banda in round four.

Banda has 2.5 points after a run of two wins and one stalemate in the opening three rounds.

She checkmated Victoria Mweetwa and Gladys Chishimba before settling for a draw against Daisy Simenda in round three.

Also on 2.5 points is Copperbelt University (CBU) student WCM Lubuuto Bwalya who beat Precious Nshikokola and Namakau Likando before being held by Bertha Phiri.

View post:
Race to make Chess national team heats up - diggers.news

Read More..

How To Talk to Strangers Where No One Can See You – The Phoenix – Swarthmore College The Phoenix Online

Today, Im writing about something that was first used by the Ancient Mesopotamians. It used to be illegal to export under weapons trafficking treaties, and it is frequently bemoaned by law enforcement. Its also a critical component of almost every electronic device, and without it, the global economy would come to a screeching halt. Im talking, of course, about encryption algorithms.

Encryption is technically a subset of cryptography, which is the study of how to communicate securely in the presence of an adversary (who might try to eavesdrop, edit, or disrupt said communication). To encrypt something is to take some information, like my password is 1234, and combine it with a key (a chunk of hopefully random data) via some encryption algorithm such that it becomes unreadable gibberish. Said gibberish is only decipherable by providing an identical key, or a key thats mathematically related to the original key in a complicated way.

The kind of encryption youre most likely familiar with is symmetric encryption: encrypt a message with one key, and decrypt it with the same key. Symmetric encryption dates back to ancient times; Julius Caesar invented (or popularized) a cipher where the letters of the alphabet were simply shifted some number of places down (e.g. A becomes C, B becomes D, and so on). But cryptography didnt really take off until the early 20th century, with the advent of technologies like radio, which enabled longer-range communication at the cost of being trivially easy to eavesdrop on. World War II saw use of the Enigma Machine, a fascinatingly complicated electromechanical device that was only decoded by the Allies after a Herculean effort. These days, though, encryption generally refers to modern computerized algorithms like AES.

AES is short for Advanced Encryption Standard and has been the standardized encryption method for the U.S. governments classified information since 2002. Its also used for most web traffic, disk encryption on iOS and macOS, password managers, end-to-end encrypted chat applications, and a zillion other things. In fact, most modern processors have specific hardware components just to encrypt and decrypt AES data. But symmetric encryption still has a flaw: you need both parties to have the same key for them to talk to each other. How does that happen when theres no secure communication channel, like when accessing a website over the Internet? It would obviously be impractical for every computer to come pre-programmed with what would be millions or billions of different encryption keys for everything. So, we need a way for two parties, communicating solely over an insecure communication channel, to have a conversation thats impervious to eavesdropping. It sounds impossible, but as it turns out, its perfectly achievable with a bit of sorcery known broadly as asymmetric-key encryption.

Its not particularly an exaggeration to say that without asymmetric-key encryption, the Internet wouldnt exist anywhere near its current form. It would be impossible to transmit any sensitive information like credit cards, passwords, or private email, unless you obtained an encryption key offline (which kind of obviates the entire point). Its hard to speculate on exactly what an Internet in this world would look like, or whether it would exist at all, but I can safely say that it would be a lot worse than it is now.

So how does asymmetric-key encryption work? The first hint is in a more common name for it: public-key cryptography. Instead of one key that encrypts and decrypts (symmetric encryption), asymmetric encryption uses a pair of keys: a public key and a private key. If you encrypt a message with the public key, it can only be decrypted with the corresponding private key, and theres no way you can figure out the private key from just the public key. So, you can make the public key as public as you want: transmit it over a public WiFi network, give it to your friends, even post it on social media. Meanwhile, the private key is private only to you. If someone wants to send you a message, all they have to do is encrypt it with your freely available public key and transmit it to you through any channel, even an insecure one. You can think of public-key cryptography as like a safe with two separate keys one key can only lock, and the other one can only unlock. You can duplicate the locking key as much as you want, and anyone can use it to put stuff in the safe and then lock it. But to access whats inside after the safe has been locked, youd need your secret unlocking key.

But the lock analogy breaks down at a certain point, because theres no difference in principle between the public and private key. If I encrypt something with my private key, it can only be decrypted with the corresponding public key. This is useful for identity verification through something called a digital signature. If I take a message, encrypt it (or sign it) with my private key, and publish the encrypted and original messages together, then you can verify the encrypted message decrypts successfully to the original. If they match, then you know I am who I say I am. (This concept, by the way, is key to the security of blockchain-based cryptocurrency: transfers out of a specific account are only accepted by the rest of the network if they have a valid digital signature proving that whoever submitted the transfer possesses the private key for said account.)

The specific mathematical underpinning behind public-key cryptography is sort of complicated and varies based on the specific algorithm. For many algorithms, we rely on the fact that multiplying very large numbers together is relatively easy, while finding the factors of a very large number is very, very hard. (For performance reasons, some modern algorithms use things that are kind of similar to large numbers like elliptic curves, but we can safely ignore that.) Either way, though, the mathematical details of public-key cryptography are somewhat less interesting than the fact that it exists and you can do things with it.

Almost everything you do on the Internet nowadays relies on public-key cryptography. If youre reading this on a computer, the webpage was transmitted via the HTTPS protocol, which (to simplify things) means your computer transmitted an encrypted request using The Phoenix websites public key, which lets your computer talk to the server through a private channel. If youre reading this in the print edition, then public-key cryptography was still involved I send in these articles via email, which involves my computer making a secure connection to my mail server using its public key via the same method. (Technically, asymmetric encryption is generally used just to secretly transmit a key for symmetric encryption, since symmetric encryption is considerably faster.)

But why does any of this matter, aside from it being really cool and interesting? Well, Ive previously written about why HTTPS makes paying for a VPN somewhat unhelpful for a lot of people. Today, though, Im going to cover end-to-end encryption, which is a fascinating application of cryptography and an interesting thing to be aware of in your own life.

When you send an email, its (usually) encrypted in transit via the methods I talked about above: if someone is eavesdropping on your Internet traffic, they cant read your mail. But once it reaches your mail server, its decrypted and is readable by your mail provider (e.g. Gmail). Its important to note that readable doesnt mean someone at Google is regularly snooping through your mail to learn all your secrets, it just means that Googles systems can process the plain contents of messages. This can be for innocuous reasons: checking whether messages are spam, for instance, or automatically adding a booking to your calendar based on a confirmation email. But theres nothing technically stopping Google from scanning your email to target advertisements. (Google explicitly says that they dont do this. Sometimes it might seem like they do, but those are often cases where, e.g., you search for winter coats, spend an hour browsing winter-coat-related websites, and then see an ad for winter coats next to an email you sent to a friend asking about coat recommendations.)

But the fact that Google could read your email if they wanted to is more important in a different way: if Google can theoretically do it, then the government can too. If youre worried about government surveillance (from any government), then you dont care what a company says they will or wont look at, you want a cryptographic guarantee that they cant provide data to anyone even if they were made to by a court order, subpoena, or police raid. This is where end-to-end encryption comes in.

End-to-end encryption is when your data stays encrypted all the way from you to the person or people youre talking to. Most commonly, this is in the context of chat applications like WhatsApp or iMessage. To secure your messages, instead of the server publishing its public key, everyone on the service publishes a public key. The private keys never leave each persons device. If you want to send a message to your friend, you ask the server for your friends public key and use it to encrypt the message. The server here just passes encrypted messages back and forth, so all it can possibly know is when you send messages and who you send them to. (Through a little bit more cryptography, its actually also possible to also obscure the fact that youre sending the messages kind of like dropping a letter in a mailbox without writing a return address.) Actual end-to-end encryption as implemented also uses a bit more stuff on top of the public/private key business, via something called a double ratchet: the two parties constantly change their public and private keys via an agreed-upon method. This means that if a private key is compromised, an attacker can only view a few messages before the keys are regenerated.

Full end-to-end encryption (or at least, end-to-end encryption that didnt suck) was pioneered in 2013 by what would eventually become Signal. Signal was the first end-to-end encrypted messaging app that tried to be usable by non-computer-nerds while still being secure, and as a result has seen extensive use among whistleblowers, journalists, and any social movement you care to name. But whats had an even bigger impact is the Signal Protocol that the Signal app was built on. The protocol defines a standardized and secure method for sending text and other communication completely securely between two or more parties. In 2016, WhatsApp, the most popular messaging application in the world, switched over to the Signal Protocol for all of its messages and data. This means that every text sent on WhatsApp is unreadable to WhatsApp, its parent company Facebook, or anyone else, except the intended recipients. (Unlike Signal, however, WhatsApp does collect and use data about when and to whom messages were sent, and might use that information to target advertisements.)

So, if end-to-end encryption is so easy to use, why isnt it used for everything? Mostly because it turns out that not having a usable copy of your data stored on a companys servers is annoying from a usability standpoint for anything more complicated than simple text chat. You may have experienced this yourself if youve ever been added to a WhatsApp group chat in progress: since previous messages were only encrypted with the previous participants keys, you cant read them and miss any context that happened before you got there. End-to-end encryption also means that mirroring messages or conversations between multiple devices is difficult: since only your phone holds the keys to decrypt the messages, keeping chat records consistent between your laptop and phone requires awkward relay setups. Finally, its sort of pointless for public-facing things like social media where everyone is supposed to be able to read it anyway.Notice that in this article I havent really talked about any possibility of breaking a key. Thats because modern encryption algorithms are, for all intents and purposes, unbreakable: cracking a single 256-bit AES key with every computer on the planet would take about 14 thousand trillion trillion trillion trillion, or 14,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000, years.

Its impossible to even begin to give a perspective on how big that number is. If you try to express it in terms of multiples of the age of the universe, another mind-bogglingly big number, you get another number thats still too big to properly express. (About 900 thousand trillion trillion trillion times the age of the universe, if youre wondering.) But the fact that properly implemented AES encryption is effectively impossible to break via computational brute force doesnt mean that your secrets are necessarily safe from, say, regular brute force (as a classic xkcd comic illustrates). One of the fundamental lessons of encryption (and indeed of all computer security) is that the humans that use encryption algorithms are almost always more vulnerable to deception, persuasion, or blunt force trauma than the algorithms themselves. It doesnt matter how big your encryption key is if the password used to generate said key is just the word password.

Read the original post:
How To Talk to Strangers Where No One Can See You - The Phoenix - Swarthmore College The Phoenix Online

Read More..

How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud – BollyInside

This tutorial is about the How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud. We will try our best so that you understand this guide. I hope you like this blog How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud. If your answer is yes then please do share after reading this.

The WhatsApp messaging service adds end-to-end encryption to the backups of its users data stored in iCloud or Google Drive. WhatsApp introduced encryption to its messaging service in 2016, although there have been doubts recently about claims that it prevents surveillance. Now, the Facebook-owned service has announced that the users own backup of messages will be end-to-end encrypted if stored on Google Drive or Apples iCloud.

While the end-to-end encrypted messages you send and receive are stored on your device, many people also want a way to back up their chats in case they lose their phone, the company said in a post. blog. Starting today, we offer an optional additional layer of security to protect backups stored on Google Drive or iCloud with end-to-end encryption.

IPhone owners should note that an unencrypted version of their chat history is backed up to iCloud if they have iCloud backup enabled. To make sure this doesnt happen, you need to disable iCloud Backup and only allow WhatsApp to upload backups directly to iCloud Drive.

I hope you understand this article How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.

Follow this link:
How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud - BollyInside

Read More..

Vaultree’s Executive Team and Advisors Drive Innovation in the Cybersecurity Industry – Yahoo Finance

Encryption Startup Assembles Expert Security Advocates to Guide Company Growth

CORK, Ireland, Nov. 18, 2021 /PRNewswire/ -- Vaultree, provider of Encryption-as-a-Service, announced today that it has assembled a highly qualified roster of executives and advisors comprising some of the cybersecurity industry's most experienced luminaries. This team brings together engineering know-how and business-savvy entrepreneurship to steer Vaultree's direction and growth.

(PRNewsfoto/Vaultree)

The executive team is made up of five co-founders who bring a wealth of varied experience:

Dr. Kevin Curran is a professor of cybersecurity, executive co-director of the Legal Innovation Centre and group leader of the Cyber Security and Web Technologies Research Group at Ulster University. He sits on the Advisory Group of the UK Cyber Security Council and the Northern Ireland Civil Service Cyber Leadership Board (FBBA).

Maxim Dressler is a project and sales leader with international experience in the software and fintech industry in leading commercial and strategic roles. His drive to make his clients' lives easier has contributed to his track record of establishing new brands, opening markets and implementing processes.

Ryan Lasmaili is a commercial and strategic leader with international experience in leading complex projects across different verticals. With 12 years of startup experience, he is an expert in technical product development, market growth strategy and business operations. In the last five years, Ryan's core focus has been on complex cybersecurity and encryption development.

Shaun McBrearty is a software security engineer with over 10 years of experience in designing, implementing, testing and deploying cryptographic solutions. His expertise is developing solutions that overcome the shortcomings of traditional cryptographic algorithms.

Tilo Weigandt is a program manager, strategic tech marketer and business developer with a "nothing is impossible" attitude and more than a decade of experience in starting things from scratch, developing highly scalable tech products, business segments and brands in global markets. Data protection lies at the heart of everything he has been implementing.

These experts comprise Vaultree's Board of Advisors:

Story continues

John N. Stewart Former Cisco chief security & trust officer and "Startup Whisperer," using his 30 years of cybersecurity experience to provide guidance to startups.

Sarah Armstrong-Smith Microsoft's chief security advisor and a keynote speaker on cybersecurity and information protection.

Stav Pischits Co-founder at Cynance and Cyber Club London, and a director of ISACA.

Rik Ferguson Vice president of security research at Trend Micro, special advisor to Europol's Cybercrime Centre, and co-founder of Respect in Security.

David Currie Nubank's chief information security officer with a history of IT leadership roles, including cryptography.

Leticia Gammil Cisco Security channels leader and the founder and president at WOMCY, a non-profit focused on the development of cybersecurity.

Andreas Bittner Managing director at Vanguard and a co-founder and COO of Solaris Bank.

Rik Ferguson, Vaultree advisor and vice president of security research at Trend Micro, said: "The world of cybercrime and the lack of accessible and affordable data encryption continues to be a threat to businesses around the globe. During my 27 years of experience in information security, I have yet to see a solution that offers a fully encrypted, searchable and scalable solution like Vaultree's, which is why I am working with this team of experts."

Shaun McBrearty, co-founder, Vaultree, said: "Cybercrime rates are climbing every year, proving a need for a new generation of data protection. This is why we made it our mission to create an encryption-as-a-service software that provides a scalable, easy-to-use solution to protect business data and make data protection attainable for enterprises of any size. We are grateful to be working with a seasoned team of experts as we chart our growth course."

About VaultreeVaultree's Encryption-as-a-Service solution enables businesses of all sizes to process fully end-to-end encrypted data. Easy to use and integrate, Vaultree delivers peak performance without compromising security, neutralizing the weak spots of traditional encryption. Follow Vaultree on Twitter @Vaultree or LinkedIn. Visit http://www.vaultree.com and join our waitlist to stay up to date on product development and company news.

Media Contact Madison DailyNadel Phelan, Inc. madison.daily@nadelphelan.com

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/vaultrees-executive-team-and-advisors-drive-innovation-in-the-cybersecurity-industry-301427750.html

SOURCE Vaultree

Read more:
Vaultree's Executive Team and Advisors Drive Innovation in the Cybersecurity Industry - Yahoo Finance

Read More..

Google Cloud partially fixes load balancer SNAFU that hit Discord, Spotify, others today – The Register

Updated Google Cloud suffered a brief outage, seemingly bringing down or disrupting a whole bunch of websites relying on its systems.

If you've had trouble accessing Snapchat, Discord, Spotify, Etsy, retailers like Home Depot, and others today, this is likely why: a fault developed in Google Cloud's networking infrastructure, resulting in websites throwing up 404 errors. Netizens found themselves unable to log into or use certain services properly.

The good news is that, by now, the IT breakdown has been resolved in that sites using Google's cloud-based load balancers should work again.

The bad news is that Google's customers can't update their load balancing configurations until the web giant gives the word, and when that will be isn't known.

The outage was acknowledged by Google at 1010 PST (1810 UTC), about 35 minutes minutes after websites apparently started going wrong, and a fix was deployed within a few minutes to stop the "page not found" errors. Since that update, though, changes by customers to their external proxy load balancers are being ignored.

According to the tech titan's status page:

The load-balancing blunder had a knock-on effect of temporarily disrupting Google Cloud's App Engine, Cloud Functions, Apigee, and Cloud Run services.

We'll let you know when Google considers this situation fully restored.

"The issue with Cloud Networking has been resolved for all affected projects as of Tuesday, 2021-11-16 11:28 US/Pacific," Google said on its status page, noting the issue has been fully fixed.

"Customer impact from 10:10 to 11:28 US/Pacific was configuration changes to External Proxy Load Balancers not taking effect. As of 11:28 US/Pacific configuration pushes resumed."

Read more:
Google Cloud partially fixes load balancer SNAFU that hit Discord, Spotify, others today - The Register

Read More..

TI will splash out up to $30B on wafer fabs – The Register

Everything's bigger and better in Texas, as the saying goes. Texas Instruments (TI) has announced it's fixin' to build two silicon wafer fabrication plants there and maybe another pair after that.

The venerable company will soon break ground on a pair of new 300mm semiconductor wafer fabs in Sherman, in the northeast of the Lone Star State. The site is apparently large enough to host four such facilities. If TI builds 'em all, it expects to spend $30 billion on the project.

Work will commence in 2022, and production is predicted to commence in 2025 if all goes well.

The company's not discussed the particulars of the products it proposes to produce in the facilities, but did state it sees "industrial and automotive markets" as hot markets.

TI has another 300mm wafer fab already under construction in Richardson, Texas, and expects it will start producing product in the second half of 2022. Another facility in Utah will get to work in early 2023. They'll join two existing 300mm facilities that TI already operates. `

It is unclear if TI plans to sell the new facilities' output as bare wafers, or combine its die services, or both.

Whatever the firm chooses, the new fabs will be welcomed by a great many companies further up the semiconductor value chain. Even if current supply problems have eased by the time the factories come online, increasing numbers of products rely on electronic innards.

TI's forthcoming fabs seem set to be joined by facilities owned by Samsung, according to Korean media reports that point out the Chaebol has active regulatory paperwork pending only in the city of Taylor, deep in the heart of Texas. Intel has also committed to building new facilities in Arizona.

Read the original:
TI will splash out up to $30B on wafer fabs - The Register

Read More..

Ubuntu desktop team teases ‘proof of concept’ systemd on Windows Subsystem for Linux – The Register

Canonical may be working on introducing systemd to Ubuntu on Windows Subsystem for Linux (WSL), according to a post by Ubuntu Desktop Team Technical Leader Didier Roche.

Roche's remarks were posted on the Ubuntu Desktop Team Updates two days ago. "PoC of systemd on WSL at startup of an instance," he said, raising hopes (or fears) that the component will be introduced in a future WSL 2 update. The remark was first spotted by Phoronix.

Systemd manages services and other system software on Linux, and is widely used by the most popular distributions, such as Debian, Ubuntu, SUSE, and the Red Hat family. The original WSL did not support systemd for technical reasons, starting with the fact it had its own init process.

When WSL 2 was introduced, with a new container-based model for running Linux on Windows, supporting systemd seemed feasible (Linux distros running on Micrsoft's Hyper-V hypervisor have no problem with it) but Microsoft continued with its own init presumably for reasons related to the integration between WSL and the rest of Windows.

WSL 2 users though have frequently requested systemd support. The reasons are many and varied, but the lack of systemd does introduce friction for users familiar with other distros that include it. Canonical's Snap packaging system depends on systemd, and since Canonical regards Snap as the future of application deployment one can understand why the company is keen to have it supported in WSL, particularly now that GUI Linux applications are supported in Windows 11.

Another problem is that users do not always realise that commands they use like systemctl for managing services are actually part of systemd. As far as some are concerned, this is a bug in WSL 2, in this case because an attempt to start the SSH daemon gave the error, "System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down."

There are a number of workarounds to enable systemd on WSL 2 but an official solution would still be welcome.

It is important that systemd does not only run, but runs as PID 1, the first process in the operating system. A developer has come up with a project called genie to ensure this happens.

Then there's Distrod, which is described as "a systemd-based meta-distro for WSL2 that allows you to install Ubuntu, Arch Linux, Gentoo and many other distros with systemd in a minute, or make your current distro run systemd." We note such solutions are unofficial.

Here's Distrod, one of several unofficial solutions for systemd on Windows Subsystem for Linux 2

Both projects work by introducing another container. Distrod, for example, "is a binary that creates a simple container that runs systemd as an init process, and starts your WSL sessions within that container." According to its author, even WSLg, for GUI desktop application support, works with Distrod. Genie, so called because it creates a systemd "bottle," also works with WSLg but the docs state that "Linux GUI apps started from the Windows Start Menu items created by WSLg will run outside the bottle."

Canonical is not Microsoft, of course, but has worked closely with the WSL team. There is little doubt that systemd in WSL 2 is a desirable feature for various users, at least as an option, so we will be watching progress with interest.

Read the rest here:
Ubuntu desktop team teases 'proof of concept' systemd on Windows Subsystem for Linux - The Register

Read More..

Intel audio drivers give Windows 11 the blues and Microsoft Installer borked following security update – The Register

Windows 11 has continued to notch up known issues as Microsoft admitted to problems in the Intel Smart Sound department and Microsoft Installer following a security update.

The former turned up earlier this week, when Microsoft realised that "certain versions" of drivers for Intel Smart Sound Technology (SST) could tip Windows 11 into a blue screen (of death). The driver involved is IntcAudioBus.sys and file versions 10.29.0.5152 and earlier or 10.30.0.5152 and earlier are affected.

The workaround is, unsurprisingly, to get an updated driver from one's OEM. 10.30.00.5714 and later or 10.29.00.5714 and later should do it, according to Microsoft. Slightly confusingly, "for addressing this issue, 10.30.x versions are not newer than 10.29.x versions." The key bit is the last of the version number.

While a compatibility block was flung up to prevent any more users with sound drivers not to Windows 11's taste updating the OS, others optimistically applying the company's security patches may not have been so lucky.

KB5007215 was dispensed to the faithful on 9 November and, as well as noting problems with connecting to print servers in the patch's known issues, yesterday Microsoft had to add one of its side effects to the Windows release health dashboard. In this case the Microsoft Installer has been left unwell following the update (or its later siblings) and could "have issues repairing or updating apps."

One of the affected apps is part of Kaspersky's Endpoint Security 11 for Windows. Kaspersky noted that while its app would remain functioning correctly, problems might happen when updating or changing the scope of the application.

Kaspersky's recommendation is to temporarily hold off from the update (Microsoft said it is "working on a resolution and will provide a new update in an upcoming release"). Otherwise the mitigation appears to be an uninstall and reinstall of the afflicted application.

Very much the software equivalent of turning it off and on again. Even in 2021, the old ways remain the best, it seems.

See the rest here:
Intel audio drivers give Windows 11 the blues and Microsoft Installer borked following security update - The Register

Read More..