Page 312«..1020..311312313314..320330..»

Who Won HooHacks 2024? These 2 UVA Teams Are Still Glowing – UVA Engineering

Imagine an artificially intelligent piano tutor that beams a glowing light on the individual keys you should strike, then follows along with your fingers as you play.

Or, consider AI that conducts mock interviews based on your resume and the description of the jobs for which youre applying.

Sound like products youd buy if anyone ever dreamed them up?

Well, two teams of University of Virginia students won top honors for these very inventions Sunday at HooHacks, the prestigious hackathon that takes place each year at the UVA School of Engineering and Applied Science.

A "hackathon" is a time-constrained social coding event that unites computer programmers and others interested in building new software programs or upgrading older ones. HooHacks is Virginia's largest hackathon, and it is ranked among the top 50 biggest collegiate hackathons nationwide. Major employers such as Intel, Leidos, Capital One, Appian, Google Cloud and Pinnacle all had representatives at HooHacks during the weekend, ready to discuss careers with talented attendees.

What makes the two UVA projects even more impressive is that they were created, like all the entries, within just 24 hours.

Second-year students Alexander Halpern, from Weston, Connecticut, teamed up with pals Tao Groves of Charlottesville and Ryland Birchmeier of San Diego, California. They met through UVA Engineerings Rodman Scholars program.

The trio created KeyGlow, a sort of Simon Says observe-and-repeat approach to learning piano. For their efforts, they landed first place in the Best Art and Gaming category.

The 24-hour deadline was definitely intense, Halpern said. Our team had a ton of different ideas for features that would make KeyGlow awesome, but we made sure to start by building out the most essential features of our project before moving on to more complicated bonus features.

The basics included about five hours figuring out how to display colored light on a keyboard so the AI could process which keys a student was playing.

We finally were able to move on to implementing luxuries like having our virtual instructor be able to speak out loud to the student and give them feedback on their playing, Halpern said.

Ronish Dua, a McLean, Virginia, native, joined forces with Herndon, Virginia, natives Alec McCue, Tommy Qu and Vishal Kamalakrishnan. Their first-time entry won them Best Beginners.

They called their mock interview tool Chiron, for the Greek mentor.

Since the Chiron crew had local digs, they werent among the participants who had to crash in the basement of Rice Hall if they wanted to rest. Not that they tried. They were extremely focused.

All four of us spent all 24 hours working in my living room with zero sleep, Dua said.

But zoning out and getting some Zs actually turned out to do the KeyGlow group some good, Halpern said.

At around 2 a.m., we ran into this annoying bug where our software kept crashing every time we tried to check if the timing of what the user played was accurate, he said. After multiple hours of debugging, we were very tired and hungry, so we decided to order some food and take a break. We had some great laughs sitting on the fifth floor of Rice Hall, typing random things into our text-to-speech function.

Eventually, we decided to go to bed, and after recharging from a few hours of sleep, we fixed the bug in less than half an hour.

This year, a Virginia Tech team took best overall from among the 170 projects submitted. (See complete winners list below.) With more entrants than ever before, competition was tight.

Yet friendship and hospitality were in evidence all around. HooHacks even provided free transportation for those coming from Northern Virginia Community College, Howard University, George Washington University, George Mason University, University of North Carolina at Chapel Hill, Duke University, North Carolina State University and Virginia Tech.

Halpern and Dua praised the events organizers, including HooHacks co-presidents Ankisha Singh and William Mueller, and UVA computer science professor N. Rich Nguyen.

I was able to make some new friends, ran into some current friends, and was quite amazed at some of these student's project ideas and execution, Dua said.

He took a selfie with Nguyen as he collected his prize. Each member of his team won a Holy Stone HS440 drone and received winner pins.

I will 100% enter again next year, he said.

Best Overall

3Dera - Mikhail Sannikov, Andrew Kim, Noah Provenzano, and Rituraj Sharma

Best Beginner

Chiron - Alec McCue, Vishal Kamalakrishnan, Ronish Dua, Tommy Qu

Best Accessibility and Empowerment

1st Place: Bytes - Elias Lahrim, Dhruv Varshney, Mallory Beemus, Modusami

2nd Place: Raven - Siddharth Lakkoju, Saahith Janapati

Best Art and Gaming

1st Place: KeyGlow - Ryland Birchmeier, Alexander Halpern, Tao Groves

2nd Place: Murality - Waleed Raza, Pete Pongpeauk, Feng Guo, Zhang Baiyi

Best Data Science

1st Place: Crime-Aid - Saketh Chintalapati, Anthony VR, Hemang Vasu, Jonathan Vu

2nd Place: Fake News Detector - Shekhar Kumar, Laxman Muthe

Best Education

1st Place: Canvas CoPilot - Matthew Nguyen, Saadi-Fay Fayyaz, Steven Qian, Tiara Allard

2nd Place: ProficioAI - Lucas Kohler, Milo Schwartz, Mohammed Akinbayo, Barrett Ruth

Best Finance

1st Place: Stock Options Calculator - Alexander Zhou, David Hu, Michael Martinez

2nd Place: Five Nights at Wall Street - Ratik Mathur, Kunsh Singh, Sooren Ghodsi, Kenny Zhang

Best Health

1st Place: Doctor Hoo - Jealmonte Almonte, Frank Hyun, Kareem Fenaish, Ayan Rasulova

2nd Place: InspireHealth - Ahnaf Talukder, Lilly M, Matthew Shipe

Best Sustainability

1st Place: Green Threads - Peter Do, Youssef Cherrat, Ethan Do, Alan Chai

2nd Place: EcoEats - Amanda Xiao, Lydia Moore, Nupur Joshi

Learn more about the HooHacks and the winning projects.

Read more here:

Who Won HooHacks 2024? These 2 UVA Teams Are Still Glowing - UVA Engineering

Read More..

Take advantage of the ‘Year of AI’ The Daily Texan – The Daily Texan

Before coming to UT, when I heard someone talk about artificial intelligence, my mind wandered to HAL from 2001: A Space Odyssey. My understanding of the technology was lackluster at best, and, like many, I viewed it as distant and unrelated to my majors.

Fast forward to 2024, and UT declared the Year of AI. For many, this barely registered. So many of us dont deal with AI daily, so a focus on it from administration felt irrelevant. In reality, AI is the fastest-adopted technology in history, and the implications its growth has on every profession are vast. UT students cant afford to ignore the growth of this field, and we must take advantage of the resources we have on this campus to familiarize ourselves.

When I arrived on campus, we talked about AI in my journalism classes consistently. Instead of fearing this technology that many treat as a threat, we were learning what it did and how we could use it to make ourselves more productive. It was an example of its expansion as a tool in fields beyond those typically associated with technology.

Computer science professor Swarat Chaudhuri believes AI is largely perceived as untrustworthy because of its potential to make biased decisions. While these faults are certainly present, the technology also has great potential if understood.

Artificial intelligence the name just has this mystical air about it, Chaudhuri said. Its really just finding patterns in data, learning those patterns and then reproducing them.

Chaudhuri, an expert in trustworthy AI, also acknowledged the threats the software poses. The inclusion of false information in AI-generated answers, known as hallucinations, and its use in disinformation campaigns, has led many to distrust the technology. Despite its problems, Chaudhuri believes the benefits are worth exploring. From medical research to combing through data at high speeds, Chaudhuri says the future of many industries revolves around AI.

Raymond Mooney, a computer science professor whos been studying AI at UT for nearly 37 years, said that UT is now investing in the Year of AI to produce results with technology that rival that of schools like Princeton. In doing so, researchers can discover new information about AI and refine its uses.

I used to be able to do decent AI research with a graduate student of mine with a relatively small amount of computational resources, Mooney said. Now, to be state of the art, you need humongous computational resources.

Robert Quigley, a professor of practice in the School of Journalism and Director of Innovation and Entrepreneurship for the Moody College of Communication, said this is the first time he recalls UT designating a year to a specific area of research or interest in his time as a professor. He believes it emphasizes the importance of focusing on this technology and its uses.

When leadership sets the agenda for something, it causes things to happen, Quigley said. Theres a lot more interest in it, theres a lot more people wondering, How do I become a part of that?

As investment and attention toward AI and its development increases, some embrace the approaching new era while others resist accepting the technology. Quigley said that may be the worst thing someone can do.

My biggest warning is being too scared of it and not learning about it, Quigley said. Theres a huge opportunity here for communications, for business, for engineering, but if we dont embrace it and try to learn, if we dont try to find the good uses, then all well get are the bad.

AI technology is the future. It will connect in some way to every industry, and ignoring its prevalence will only make someone less prepared to utilize it as a tool in their work.

It can be daunting to approach something as vast and complex as artificial intelligence. However, most of us dont need to be experts. We dont have to understand everything, but we must try to understand some. As UT prioritizes the expansion of AI technologies, we must do the same in prioritizing our understanding of systems that will inevitably play an instrumental role in the way we live our lives.

Doud is a journalism and government freshman from Conroe, Texas.

Read this article:

Take advantage of the 'Year of AI' The Daily Texan - The Daily Texan

Read More..

BU Dean Recommends Replacing Striking TAs with AIs (updated) – Daily Nous – Daily Nous

The actual dean of an actual college of arts and sciences at an actual university has actually recommended replacing striking instructors with artificial intelligence apps.

Last week, graduate student workers at Boston University (BU) went on strike to demand increased stipends and improved benefits.

Yesterday, Stan Sclaroff, Dean of Boston Universitys College of Arts & Sciences, emailed recommendations to faculty on how to manage course discussion and lab sections while their teaching assistants are on strike. Among his suggestions: Engage generative AI tools to give feedback or facilitate discussion on readings or assignments (via The Daily Beast and a source at Boston University).

Dean Sclaroffs home discipline is computer science.

Readers are referred to to this earlier post.

UPDATE (3/29/24): Heres the text of the email that Dean Sclaroff sent:

To: Arts & Sciences Faculty and Staff From: Stan Sclaroff, Dean of Arts & Sciences Subject: Course discussion sections and labs that are impacted by the BUGWU strike Date: March 27, 2024

Dear Colleagues, I understand that many of you have questions about how to manage course discussion sections and labs that are impacted by the BUGWU strike. I understand as well that faculty and staff are working to creatively and thoughtfully ensure our students continue to achieve their learning.

Given the disciplinary and pedagogical breadth across the College, there are a wide-range of approaches that can be taken. We know that one size does not fit all. However, in the hope that they can be useful and serve as inspiration for brainstorming, we have provided below some general guidance and examples of approaches that could be utilized during this time.

In general, you may employ all teaching modalities, including holding live Zoom sessions, sharing asynchronous recordings, or combining discussion sections. We appreciate that this openness to remote teaching is a deviation from past University guidance; however, given the circumstances and the need to support our students continued learning, these options may be employed. Below, we have listed some creative ways in which, we have heard, some faculty are adapting their course formats and using technology to serve their students.

For discussion sections:

For labs:

BUs Center for Teaching and Learning offers faculty consultation, which can be booked here; they are prioritizing appointments for faculty with questions on these topics.

The Geddes Language Center and CAS IT can also be useful resources for technology enabled approaches.

We encourage you to connect with your colleagues to share ideas and insights about various approaches. Ultimately, you are in the best position to know what will work for your course and students, and we encourage you to think creatively about how you can best conduct your teaching during these challenging times.

Finally, we are launching a process to support replacement coverage requests. If you identify other faculty, graduate students, or staff to cover teaching activities, including discussion sections and grading, these individuals will be paid for their time. A separate email has been shared with chairs, directors, and administrators that explains how to request payment for replacements. Please coordinate with your chair, director and/or administrator to facilitate this process.

As I said in my note Monday, thank you for your advocacy, hard work, and continued commitment to and care for all of our students. Please know that the Deans Office and in particular your associate deans of the faculty are available to help with any questions or concerns as they arise.

Sincerely, Stan

Stan Sclaroff Dean of Arts & Sciences Boston University Pronouns: he/him/his

See the rest here:

BU Dean Recommends Replacing Striking TAs with AIs (updated) - Daily Nous - Daily Nous

Read More..

Podcast: What is distributed cloud storage and what are its benefits? – ComputerWeekly.com

In this podcast, we look at distributed cloud storage with Enrico Signoretti, vice-president of product and partnerships at Cubbit.

We talk about how storage has shifted to hybrid and multicloud modes and how distributed cloud storage separates the control plane from data to provide data retention in multiple locations, on-site and in multiple clouds.

Signoretti also talks about how organisations that need to retain control over data over costs and location, for example can achieve that with distributed cloud, as well as talking about the workloads to which it is best suited.

Enrico Signoretti: So, I can start with why it is important right now and then delve into what it is and what it does.

It is important because we live in a moment where companies are shifting from traditional models, at the beginning, [to] just cloud, and then we discovered hybrid cloud, so keeping some of your IT stuff on-premise and some in the public cloud.

Then we were talking more and more about multicloud; most large enterprises have multiple clouds and multiple applications running in different environments.

So, from this point of view, a distributed cloud is a model thats totally different to what were used to seeing in the market. So, the big hyperscalers do everything in single datacentres. So yes, you see the cloud, but everything running in one or a set of very closed datacentres.

With the model of distributed cloud you separate the control plane from the data plane; something that happened in the past when we were talking about software-defined.

So, the service provider keeps control of this control plane . . . but resources can be used and deployed everywhere. They could be in the same public cloud environment that I mentioned before, or in your datacentre. So, you are building this distributed cloud.

More so, when it comes to storage, when we talk about geo-distributed cloud, it means these resources are really distributed geographically, meaning that you can have some of your data in France maybe and other segments of the data in Italy or Germany, or even more distributed than that.

This is the main concept, and its really important for everybody because it removes a lot of obstacles when it is time to work with the multicloud.

Signoretti: The main benefit of distributed cloud is control. You can have control at several levels. When you start thinking about distributed cloud there is no lock-in because you have the possibility to choose where you put your data.

There is data sovereignty as well as we can call it data independence. Its not only data sovereignty that you achieve but you achieve control on all the layers and all aspects of data management.

And this is very important because even though most of the hyperscalers are very quick to respond to new regulations here in Europe, and also in the US, that are popping up, its still a complex world and for many organisations in Europe giving your data to this kind of organisation is not feasible.

The idea here is that with distributed cloud you have this level of sovereignty that you need but also control on cost, control on policies that are applied on this data management.

Maybe if we think about a comparison between the three models on-premises, public cloud and distributed cloud you can see that distributed cloud is just in the middle between the others. On the one hand, you keep control of the entire stack, and on the other hand, you have the flexibility of the public cloud.

So, matching these two, you can have a very efficient infrastructure that is deployed and managed by your organisation but still keeping all the advantages of public cloud.

Signoretti: You have to think of distributed cloud still as cloud. So, if you have a low latency, high-performance workload for which you usually need the CPU [central processing unit] very close to the storage, thats not for distributed cloud.

In that case, its way better to choose something that is on-premise or in the same cloud.

From my point of view, all other workloads are fine from backup, disaster recovery, collaboration and even big data lakes to store huge amounts of data for AI [artificial intelligence] and ML [machine learning].

In most cases you can have a good throughput. Its just the latency thats not there but the same goes for the public cloud. This is probably the set of use cases that are more suited for distributed cloud.

Read more from the original source:
Podcast: What is distributed cloud storage and what are its benefits? - ComputerWeekly.com

Read More..

Removing the hefty price tag: cloud storage without the climate cost – DatacenterDynamics

Tackling the sustainability issue

As of 2022, over half of all corporate data resides in the cloud, meaning demand for cloud storage has never been higher. Like a falling domino, this has triggered severe energy consumption throughout the data center industry, resulting in substantial greenhouse gas (GHG) emissions.

Disturbingly, the European Commission estimates that by 2030, EU data center energy use will increase from 2.7 percent to 3.2 percent of the Union's total demand. This would put the industrys emissions almost neck and neck with pollution from the EUs international aviation.

Yet, it must be remembered that cloud storage is still far more sustainable than the alternatives.

Its crucial to put the energy used by cloud storage into context and consider the savings it can make elsewhere. Thanks to sharing services and file storage, teams can collaborate and work wherever they are, removing the need for large offices and everyday commuting.

This means businesses can downsize their workspaces as well as reduce the environmental impact caused by employees traveling. In fact, its estimated that working from home four days a week can reduce nitrogen dioxide emissions by around 10 percent.

Getty Images

Besides this, cloud storage reduces dependence on physical, on-premises servers. For small and medium-sized businesses (SMBs), having on-site servers or their own data centers can be expensive, whilst running and cooling the equipment requires a lot of energy, which means more CO2 emissions.

Cloud servers, on the other hand, offer a more efficient alternative. Unlike on-premises servers that might only be used to a fraction of their capacity, cloud servers in data centers can be used much more effectively. They often operate at much higher capacities, thanks to virtualization technology that allows a single physical server to act as multiple virtual ones.

Each virtual server can be used by different businesses, meaning fewer physical units are needed overall. This means less energy is required to power and cool, leading to a reduction in overall emissions.

In addition, on-premises servers often have higher storage and computing capacity than needed just to handle occasional spikes in demand, which is an inefficient use of resources. Cloud data centers, by contrast, combine large amounts of equipment to manage these spikes more efficiently.

In 2022, the average power usage effectiveness of data centers improved. This indicates that cloud providers are using energy more efficiently and helping companies reduce their carbon footprint with cloud storage.

Importantly, there are ways to further improve the sustainability of services like cloud storage, which could translate to energy savings of 30-50 percent through greening strategies. So, how can businesses make the sustainable transition from normal cloud storage to green cloud storage? Well, we believe there are three fundamental steps.

Firstly, businesses should consider location. This means picking a cloud storage provider thats close to a power facility. This is because distance matters. If electricity travels a long way between generation and use, a percentage is lost. In addition, data centers located in underwater environments or cooler climates can reduce the energy required for cooling.

Next, businesses should ask green providers about what theyre doing to minimize their environmental impact. For example, powering their operations with solar, wind, or biofuels reduces reliance on fossil fuels and so lowers GHG emissions. Some facilities will house large battery banks to store renewable energy and ensure a continuous, eco-friendly power supply.

Last but certainly not least, technology offers a powerful avenue for enhancing the energy efficiency of cloud storage. Some providers have been investing in algorithms, software, and hardware designed to optimize energy use. For instance, introducing AI and machine learning algorithms or frequency scaling can drastically improve how data centers manage power consumption and cooling.

This is illustrated by Googles use of its DeepMind AI that reduced its data center cooling bill by 40 percent a prime example of how intelligent systems can contribute towards greater sustainability.

With the world warming up at an accelerating rate, selecting a cloud storage provider that demonstrates a clear commitment to sustainability can have a significant impact. In fact, major cloud providers like Google, Microsoft, and Amazon have already taken steps to make their cloud services greener, such as by pledging to move to 100 percent renewable sources of energy.

Undeniably, the cloud is reshaping the nature of business as we know it, but this digital growth risks an unpredictable future with serious environmental consequences. But businesses shouldnt have to choose between the Earth and innovation.

Instead, its a balancing act. And the answer lies in green cloud storage. By choosing providers powered by renewable energy, efficient data centers, and innovative technologies, businesses can reap the rewards of the cloud without incurring a harmful energy penalty on the planet.

Theres no time to waste. We must act now. Businesses have an obligation to choose green cloud storage and be part of the solution, not the problem. By making the switch today, we can ensure the cloud remains a convenient sanctuary, not a climate change culprit.

Continue reading here:
Removing the hefty price tag: cloud storage without the climate cost - DatacenterDynamics

Read More..

Sovereign cloud services pick up steam as Rackspace unveils new public sector platform – ITPro

Rackspace Technology has become the latest firm to tap sovereign cloud services as a product offering, in this case specifically aimed at supporting workloads in the UK public sector and other regulated services.

Aligning itself with the National Cyber Security Centre (NCSC) and other UK regulatory bodies, Rackspaces UK Sovereign Services platform will provide dedicated compute and storage Pods for various sectors.

With segregation between each pod, Rackspace said it will provide a cost-effective hosting solution for customers designed to provide high levels of data and workload security.

As this platform has a focus on public sector cloud workloads, this separation is key to ensuring bodies from UK healthcare, government, and law enforcement dont operate on overlapping compute or disk workloads.

Government agencies need to adhere stringently to regulatory compliance measures, so operating with sovereign cloud services helps to ensure they can do this more easily while simultaneously benefiting from a reduction in cyber security risk.

Digital independence and sovereignty within the UK have become key requirements of the public sector and many other regulated industries, said Rick Martire, general manager for sovereign services at Rackspace.

This truly digital Sovereign offering allows for the UK public sector to achieve cost savings and compliance all through a single provider, without compromising on security or performance, he added.

Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2023.

Cloud sovereignty has been a recurring talking point in both the UK and European Union (EU) over the last year or so, with major companies announcing various plans to introduce dedicated regional cloud services in a bid to adhere to regulations.

While Rackspaces new offering puts the question of cloud service sovereignty more firmly into the UKs market rather than the EUs, it still makes a clear impression as to the increasing global focus on sovereignty in cloud computing.

Microsoft was a notable early voice in the space, revealing plans for its EU data boundary solution that would see a staggered rollout take place in January 2023.

The idea behind this data boundary, set to first be established for the public sector and commercial customers, was to allow users the ability to store and process customer data within the European Union (EU).

Microsoft then upped its commitment to sovereign cloud requirements in January 2024, extending EU processing capabilities to include data found in system-generated logs.

More recently, IBM announced the launch of a data center in Germany which promised to ensure a greater level of data sovereignty for European customers, followed swiftly by Oracles unveiling of its Sovereign Cloud region.

Oracle heralded its new region as paving the way for public and private sector organizations across the EU to gain a greater level of control over both data privacy and sovereignty requirements.

Nvidia also looked to the EU as a focus, partnering with Scaleway to drive the increased availability of sovereign infrastructure in the region.

The rest is here:
Sovereign cloud services pick up steam as Rackspace unveils new public sector platform - ITPro

Read More..

How to open HEIC images on your Android phone or tablet – Android Police

When you capture pictures on your iPhone, the device stores them in the High-Efficiency Image Container (HEIC, or HEIF). Compared to JPEGs and PNGs, HEIC produces high quality at a small size. Android 10 introduced compatibility with the format, so you can open it on your Google Pixel and other phones. Older devices and some apps may not support it.

You must convert them to the acceptable formats before uploading them. With Google Photos, cloud storage services, and third-party apps, you can easily view and convert them. Here's how.

You can open HEIC files on Android if your device runs the Android 10 operating system (OS). HEIC is the default format for capturing images on iPhones and iPads running iOS 11, iPadOS, and macOS High Sierra or newer versions. Before it introduced HEIC support in 2017, Apple's devices used the JPG format.

If you send a HEIC image to the latest Android devices, it retains the format and doesn't automatically change to another format. Google Photos and Files by Google are among the few apps that can open it. Cloud Storage apps like Drive and Dropbox also work, or you can install dedicated HEIC viewer apps on the Play Store.

If you use an Android device from a third-party manufacturer, it should have its own gallery app. You'll see a broken image icon, an error message, or other signs if the device and its built-in apps don't support HEIC.

Upload or back up HEIC images to Google Photos to view them in their original format. The app doesn't convert them, even when you download them to your device. Likewise, the website version retains the default format. Conversion isn't necessary since HEIC is already a small size. Also, Photos focuses on being a cloud storage service where any mobile user can stash pictures and videos and then access them at any time.

Create a shareable link for your photos when you want others to see them. It's the most convenient way to distribute access, as long as everyone has internet access to view the link. If you send the files to others on WhatsApp, Instagram, and other social media apps, the file automatically converts to JPG.

Editing the image within Photos and saving a copy also changes it to JPG. However, you must alter the image before storing it as a copy. You can resize it slightly or apply filters at a minimal level. Samsung Gallery can also open HEIC files on Galaxy devices. The app used to have an option to convert them to JPG. Samsung has since removed it with the One UI 4 update. You can move any images on the app to Google Photos.

Files by Google also has built-in HEIC support, and you can view images without separate conversion software. Plus, it displays all local files on your device, and you can view them offline. Navigate to the folder where the HEIC file is, or search for it. Then tap or click it to view it.

You can edit the image within the app. It has similar tools to Google Photos, including Crop, Adjust, and Filters. Files doesn't have an in-built option to convert the file. However, you can share it with Photos or photo editing apps. Samsung's My Files app works similarly, although it's exclusive to Galaxy smartphones and tablets. It should be preinstalled if you own any of those devices.

Most cloud storage apps have HEIC support and provide web and app interfaces to access the files. Google Drive doesn't automatically convert HEIC files when you download them. But you can create a shareable link for others to view them through an internet connection.

You can also use Dropbox. It provides an option to upload HEIC files as JPG. Recently, some users complained that this option was missing, and the company hasn't officially stated that it removed it. OneDrive is another solution, although you won't find any options to upload HEIC photos in another format.

Third-party apps may provide extensive features beyond basic HEIC support. However, some charge a fee. If you use one, download it from the Google Play Store, as it's the safest app source for your Android device.

HEIC is a newer file format than JPG, PNG, and other image types. Though it offers better image compression and quality, not all devices and apps can open it. If you're an Apple user and frequently share such files with other devices, it's worth switching your default image capture settings to JPG. There isn't much quality difference.

With the iOS 11 update, you can capture and store photos on your iPhone or iPad in JPG format. Use the steps below to do it:

HEIC files aren't a headache if you own an iPhone, but they will be if you share them with Android users. If their devices don't have the latest OS versions or apps that support the format, they can't view the files. Consider setting up Google Drive on your iPhone or a Google Photos account. This way, you only need to share links to the files and save storage space.

See original here:
How to open HEIC images on your Android phone or tablet - Android Police

Read More..

NEAR launches tool for signing transactions on Bitcoin, Ethereum and more – Blockworks

Swiss non-profit organization NEAR Foundation has launched Chain Signatures, enabling users to sign transactions on supported blockchains from a single NEAR account.

Chain Signatures enables accounts and smart contracts on NEAR to sign transactions for different chains. At launch, this will include Bitcoin, Ethereum and Cosmos network chains, as well as DogeCoin and XRP Ledger. It will soon support Solana, TON Network and Polkadot, according to the team.

By enabling Chain signatures, DeFi protocols can utilize assets from other chains without requiring a cross-chain bridge. This is possible because Chain Signatures are designed to be account-based rather than bridge-based.

Read more: NEAR Foundation applies for .near top-level domain

According to Kendall Cole, director of research and development company Proximity Labs which supports projects on NEAR and Aurora Chain Signatures can potentially unlock new use cases for DeFi protocols.

Users can use XRP as collateral to borrow USDC, or trade DOGE for SOL. This is particularly innovative for non-smart-contract chains like Bitcoin, DogeCoin and Ripple because none of the major bridges support these chains today, Cole said.

NEAR protocol documents show that Chain Signatures link NEAR account addresses to other blockchains using an Additive Key Derivation. This mechanism enables the single master key to be derived into multiple subkeys.

When a user wants to transact between different blockchains, a deployed multichain smart contract will make a signature request for the transaction on the target blockchain network, and a Multi-Party Computation (MPC) service will sign the transaction.

Read more: MPC wallets have a trade-off. Is it worth it?

Once the signature is obtained, the smart contract will return it to the user, allowing the user to send the signed transaction to execute it on the target blockchain.

Smart contracts on NEAR will be able to custody assets on any chain (since they can sign transactions on any chain via chain signatures), and maintain user balances similar to how single chain lending protocols or DEXs do now, Cole explained.

The Chain Signatures MPC network will be launched in partnership with EigenLayer, which will secure the network using its restaked ETH. At launch, there will be ten node providers, including a handful of Actively Validated Services (AVS) infrastructure providers.

Post-launch, EigenLayer will be used to provide economic security to the network and transition the MPC network to a permissionless version. To participate in the MPC network, prospective node operators will need to re-stake their ETH and will be penalized if they maliciously authorize any transactions that did not originate from a NEAR account, Cole explained.

Dont miss the next big story join ourfree daily newsletter.

Read more:

NEAR launches tool for signing transactions on Bitcoin, Ethereum and more - Blockworks

Read More..

Wi-Fi Hacking Happens. Here Are 10 Expert-Recommended Tips to Prevent It – CNET

You'll get faster speeds using an Ethernet connection, but there's no denying the convenience of Wi-Fi. The technology makes it possible to connect numerous devices around your home, from laptops and phones to security cameras and streaming sticks, but it's not without its flaws. Aside from a little speed loss, the main concern with Wi-Fi is that it also makes it easier for others -- perhaps unwanted users and devices -- to connect to your network.

Consider the information on your Wi-Fi-connected devices and how accessible that information might be if someone gained access to your Wi-Fi network: credit cardnumbers, bank records, login credentials, live camera feeds.

A secure home network will help reduce the risk of getting hacked and having someone access your sensitive information. Not only that, it will keep away unwanted or unauthorized users and devices that would slow down your connection or freeload on the internet service you pay for.

It's fairly simple to create and maintain a secure home Wi-Fi network. Below, you'll find 10 tips for securing your network. Some are more effective than others at keeping hackers and freeloaders at bay, but all are useful in their own way.

Keep in mind that nothing can guarantee absolute security from hacking attempts, but these tips will make it harder for anyone to compromise your network and data. (For more Wi-Fi tips, check outhow to tell if your internet provider is throttling your Wi-Fiand ourtips on how to speed up your Wi-Fi connection).

Here are the basics for protecting your home Wi-Fi network. Keep reading for more information on each below.

1. Place your router in a central location.

2. Create a strong Wi-Fi password and change it often.

3. Change the default router login credentials.

4. Turn on firewall and Wi-Fi encryption.

5. Create a guest network.

6. Use a VPN.

7. Keep your router and devices up to date.

8. Disable remote router access.

9. Verify connected devices.

10. Upgrade to a WPA3 router.

Strong network security starts with a smart setup. If possible, place your router at the center of your home. Routers send wireless signals in all directions, so strategically placing your router in a central location will help keep your connection to the confines of your home. As a bonus, it will likely also make for the best connection quality.

For example, if you have internet in an apartment where neighbors are immediately to the left and right of you, placing your router next to a shared wall could send a strong, and tempting, signal their way. Even if you aren't in an apartment, a good router can cast signals next door or across the street. Placing your router in a central location will help reduce how far those signals travel outside your home.

This should go without saying, but I'm still going to cover it to emphasize its importance. Creating a unique password for your Wi-Fi network is essential to maintaining a secure connection. Avoid easily guessed passwords or phrases, such as someone's name, birthdays, phone numbers or other common information. While simple Wi-Fi passwords make them easy to remember, they also make it easy for others to figure them out. (Here's how to access your router settings to update your Wi-Fi password.)

Be sure to change your password every six months or so or whenever you think your network security may have been compromised.

Along the same lines of password-protecting your Wi-Fi network, you'll also want to keep anyone from being able to directly access your router settings.

To do so, go ahead and change your router's admin name and password. You can log in to your router settings by typing its IP address into the URL bar, but most routers and providers have an app that lets you access the same settings and information.

Your router login credentials are separate from your Wi-Fi network name and password. If you aren't sure what the default is, you should be able to find it on the bottom of the router. Or, if it's been changed from the default somewhere along the way, here's how to access your router settings to update the username and password.

Most routers have a firewall to prevent outside hacking and Wi-Fi encryption to keep anyone from eavesdropping on the data sent back and forth between your router and connected devices. Both are typically active by default, but you'll want to check to ensure they're on.

Now that you know how to log in to your router settings, check to make sure the firewall and Wi-Fi encryption are enabled. If they're off for whatever reason, turn them on. Your network security will thank you.

Before sharing access to your main home network, consider creating a separate guest network for visitors. I'm not suggesting your guests will attempt anything nefarious with your main Wi-Fi connection, but their devices or anything they download while connected to your network could be infected with malware or viruses that target your network without them knowing it.

A guest network is also ideal for your IoT devices, such as Wi-Fi cameras, thermostats and smart speakers -- devices that may not hold a lot of sensitive information and are perhaps more easily hackable than a smarter device such as a computer or phone.

There are a few reasons to use a good VPN, and network security is one of them. A virtual private network hides your IP address and Wi-Fi activity, including browsing data.

VPNs are probably more useful when connected to a public network, but they can still add a level of security and privacy to your home network. Some VPNs are better than others, but like anything, you often get what you pay for. Free VPN services are available, but paying a little extra (just a few bucks per month) will deliver a much better, more secure service.

While software updates can be annoying, they have a purpose, and it often includes security updates. When companies become aware of potential or exposed security vulnerabilities, they release updates and patches to minimize or eliminate the risk. You want to download those.

Keeping your router and connected devices current with the latest updates will help ensure you have the best protection against known malware and hacking attempts. Set your router to automatically update in the admin settings, if possible, and periodically check to make sure your router is up to date.

Remote router access allows anyone not directly connected to your Wi-Fi network to access the router settings. Unless you need to access your router while away from home (to check or change the configuration of a child's connected device, for example), there should be no reason to have remote access enabled.

You can disable remote access under the router's admin settings. Unlike other security measures, disabled remote router access may not be the default.

Frequently inspect the devices connected to your network and verify that you know what they are. If anything on there looks suspicious, disconnect it and change your Wi-Fi password. After changing your password, you'll have to reconnect all your previously connected devices, but any users or devices that are not authorized to use your network will get the boot.

Some devices, especially obscure IoT ones, may have odd default names of random numbers and letters you don't immediately recognize. If you encounter something like that when auditing your connected devices, disconnect them. Later on, when you can't start your robot vacuum cleaner from your phone, you'll know that's what it was.

WPA3 is the latest security protocol for routers. All new routers should be equipped with WPA3, so if you buy a new router, you should have nothing to worry about. However, many people rent their routers directly from the provider, which may not include the most up-to-date equipment.

If your router was made before 2018, you might have a WPA2 device, which lacks the same security protocols as newer WPA3 devices. A quick search of your device's model should tell you when it came out and any specific features, such as whether it has WPA2 or WPA3. If you've got a router with WPA2, call your provider and negotiate for a better, more recent router.

Again, even with the most recent and effective methods of protecting your home network, security will never be 100% certain. As long as there is the internet, hackers and cybercriminals will find ways to exploit it. But with the tips above, you can better keep your network secure from anyone trying to use your connection or access your data.

For more, check out how to find free Wi-Fi anywhere in the world and the ideal location for your router.

Link:
Wi-Fi Hacking Happens. Here Are 10 Expert-Recommended Tips to Prevent It - CNET

Read More..

WatchGuard report reveals drastic surge in evasive malware – SecurityBrief New Zealand

The latest Internet Security Report from WatchGuard Technologies reveals a drastic growth in evasive malware, a resurgence of "living-off-the-land" attacks, escalating cyberattack commoditisation, and a continued decline in ransomware, amid potential thwarting attempts by international law enforcement targeting ransomware extortion groups.

WatchGuard Technologies, one of the global front-runners in cybersecurity, derived these findings from its unified analysis of top malware trends, as well as threats to network and endpoint security. Most prominently, the data underscores a considerable surge in evasive malware, contributing to a significant rise in total malware. It also highlights the security risk posed by threat actors who exploit on-premise email servers as primary targets.

Corey Nachreiner, Chief Security Officer at WatchGuard, commented, The latest research from the Threat Lab demonstrates that threat actors utilise diverse techniques while searching for vulnerabilities to exploit. This includes targeting older software and systems, stressing the urgency for organisations to adopt a defence-in-depth approach to counter such threats.

Nachreiner continued, Updating the systems and software that organisations depend on is a fundamental step in addressing these vulnerabilities. Furthermore, modern security platforms run by managed service providers can deliver the comprehensive, unified security that organisations require, enabling them to tackle the latest threats effectively."

The Q4 2023 Internet security report discovered that evasive, basic, and encrypted malware all saw a rise, causing an 80% increase in total malware compared to the previous quarter. TLS and zero-day malware instances also surged. Although both JS. Agent. USF and Trojan.GenericKD.67408266 entered the top five most widespread malware variants, both redirect users to malicious links and attempt to load DarkGate malware onto a victims computer.

Another significant finding is the resurgence of "living-off-the-land" techniques with script-based threats increasing by 77% from Q3. Exchange server attacks related to the ProxyLogon, ProxyShell, and ProxyNotShell exploits emerged as four of the top five most extensive network exploits, indicating the need to decrease the dependence on on-premises email servers for better security.

The ongoing trend of cyberattack commoditisation, especially towards "victim-as-a-service" offerings, saw Glupteba and GuLoader establish their presence as two of the most prolific variants during Q4. The former is particularly notorious due to its extensive global victim targeting and its multi-faceted malware-as-a-service (MaaS) capabilities.

In contrast, the report points to a 20% decrease in ransomware detections during the last three months of 2023. This decline suggests successful international law enforcement actions against ransomware extortion groups effectively disrupting their activities.

With data sourced from WatchGuard's active network and endpoint products, the report offers valuable insights into the latest cybersecurity threats and protection methods. This collaborative approach underscores WatchGuards commitment to a unified security platform and to its continuous efforts to combat the myriad of challenges in the ever-evolving threat landscape.

More here:
WatchGuard report reveals drastic surge in evasive malware - SecurityBrief New Zealand

Read More..