Page 769«..1020..768769770771..780790..»

Growing AI computing demands result in major improvements in … – DIGITIMES

The LLM behind generative AI requires processing massive amounts of data for training and faster transmission, which has presented lucrative business opportunities for manufacturers. President of ASUS Cloud and Taiwan Web Service Corporation (TWSC) Peter Wu highlighted the distinctions between traditional AI and generative AI by referring to the two as AI 1.0 and 2.0 respectively.

Wu pointed out that AI 1.0 involves building specific models through supervised learning and requires project creation and labeling. This process needs to be repeated for different models and can only solve specific problems. On the other hand, the generative AI of AI 2.0 is different. Once the model is built, it can learn autonomously. From an application perspective, generative AI is also smarter and more versatile.

The volume of training data that needs to be processed for AI 2.0 is also significantly larger than previous AI models. Past models have parameters in the tens of thousands, while generative AI now demands tens of billions of parameters. Wu pointed out that many people will feel that the machine is smart when using ChatGPT. This is because once a model surpasses the 4060 billion parameter threshold, it reaches a kind of "enlightenment."

OpenAI's GPT-3 has 175 billion parameters, and GPT-3.5 has around 200 billion parameters. GPT-4's LLM was announced on March 14, 2023, but it didn't disclose its parameter count. Some estimations suggest that GPT-4's parameters could be several times larger than GPT-3, while some suggest that it has reached one trillion parameters.

To make AI smarter and increase the number of parameters, corresponding improvements in hardware equipment are necessary. Past architectures that required just one GPU or even just a CPU now require parallel processing with hundreds of GPUs. This shift necessitates changes in servers, network switches, and even the entire data center architecture.

When looking purely at server design, in response to the cooling requirements of Nvidia's HGX module, it uses the 3D Vapor Chamber (3D VC) architecture. This architecture has a heatsink height of 3U (13.35cm), meaning that the chassis needs to be 4U or taller. As the chassis height increases, the internal mechanical component design needs to be adjusted to account for factors like airflow and pressure. The chassis's weight capacity and material also need to be reconsidered.

The descriptions above have to do with air-cooling designs. Considering power usage effectiveness (PUE), liquid cooling can be a potential solution. However, liquid cooling would introduce even more significant changes, involving considerations for cold plates, water blocks, pipes, and cooling distribution units (CDUs). Additionally, how would one address the notorious leakage issues for water cooling? The other option is immersion cooling, and that presents its own set of challenges as well.

Apart from mechanical components, power supply also needs to be considered. As power increases, the size of the power supply will also get bigger, but space is limited. Furthermore, with the increase in wattage, the power supply's conversion efficiency will reach titanium levels of 97% or higher. On top of that, not only is the server itself going to use more power but the entire data center's power design will also need to be elevated.

Besides servers, the architecture of network switches also needs to change. Traditional data center architectures use PCIe switches to connect CPU and GPU NICs. However, for data transmission used in AI or machine learning, this architecture will face three limitations: inability to properly expand, lower performance, and higher transmission latency.

Network switch manufacturer Accton pointed out that the new generation of data centers will need a different architecture to optimize the AI and machine learning process. This involves utilizing server fabric accelerators along with an integration of CXL memory technology and NICs. This allows for flexible expansion in AI or machine learning and reduces transmission latency. While this design still needs testing, it is expected to be the direction of AI network architecture.

Go here to read the rest:
Growing AI computing demands result in major improvements in ... - DIGITIMES

Read More..

The Privacy, Data Protection and Cybersecurity Law Review … – Lexology

This article is an extract from The Privacy, Data Protection and Cybersecurity Law Review, 10th Edition.Click here for the full guide.

I Introduction

As organisations are embracing remote work culture and formulating their strategies based on data-driven analytics to drive productivity, efficiency and revenue growth, so are the cyber threat actors using 'data as a weapon' to increase the impact of cyberattacks and to gain leverage to fulfil their financial motives. Historically, cyber breaches were a matter of discussion for the information security teams working at the heart of the organisations to run and manage digital assets enabling users to perform their duties, but because of the increasing breaches and harsh implications and the several strict government regulations, the subject has also now made its way to board level in majority of organisations.

As the governments mandate stricter data regulations and reporting timelines it becomes essentially important for the organisations to not only know their regulatory obligations but to also prepare for them and it is equally important for the forensic professionals assisting in the investigation to be able to collect and analyse data enabling the organisations to make informed decisions while responding to regulators and their customers.

In this publication we present an overview of the data exfiltration aspects seen in the top cyberattacks faced by organisations and the common challenges faced during such investigations.

II Overview of regulations related to cyber breaches in China, including Hong Kong

Before we begin with taking a deep dive into the cyberattacks and analysing the data exfiltration aspect, let us examine briefly the prevailing data-related regulations in China.

i The China Cyber Security Law

This law is formulated to (1) ensure cybersecurity; (2) safeguard cyberspace sovereignty and national security, and social and public interests; (3) protect the lawful rights and interests of citizens, legal persons and other organisations; and (4) promote the healthy development of the informatisation of the economy and society. According to the Cyber Security Law (CSL), the organisations impacted by the breach are required to report and notify relevant authorities and affected data subjects of actual or suspected personal information breaches in a timely manner.

ii China's Personal Information Protection Law (PIPL)

Personal information processors are required to 'promptly' notify relevant personal information protection authorities and data subjects in the event a data incident has occurred or is likely to occur. Administrative fine up to 50 million yuan or 5 per cent of the turnover in the last year may apply.

iii China's Data Security Law (DSL)

Applicable to data processing activities carried out within the territory of China and data processing activities conducted outside China that harm China's national security or the public interest, or the legal interests of citizens and organisations in China. Requires organisations to have incident planning. Organisation needs to immediately remediate incidents, promptly notify relevant individuals, and report such data security incidents to the regulator.

iv Personal Data Privacy Ordinance (PDPO), Hong Kong

The Personal Data (Privacy) Ordinance (Cap. 486) (the PDPO) is a set of laws that is technology-neutral and provides a set of data protection principles outlining how data users should collect, handle and use personal data. Data users are required to take steps to ensure that personal data is protected against unauthorised or accidental access, processing, erasure, loss or use, if data breaches or leaks were to occur.

v Privacy Commissioner for Personal Data, Hong Kong

The Privacy Commissioner for Personal Data (PCPD) recommends the filling in of a data breach notification as the recommended practice for proper handling of such incidents.

III Analysing data exfiltration aspects of common cyber incidents faced by organisations

Multiple regulations focused on data privacy and breach notification are in place to mandate reporting and motivating organisations to improve their cybersecurity position, which allow for understanding of the various aspects of data exfiltrations during typical cyberattacks faced by organisations and the key challenges faced during investigations.

i Data compromise in a business email compromise breach

Email-based attacks have been on a constant rise, with a steeper rise seen during the pandemic. As the situation evolved, the threat actors changed their lures to more relatable pandemic-related themes to bank on the uncertainty and changing anti-pandemic measures increasing their chances of baiting their victims. Business email compromise is a cyberattack that involves threat actors gaining access to victims' mailboxes and carrying out a financial transaction by hijacking or creating an existing email chain and tricking the victim into making a fund transfer to a bank controlled by the threat actors. In the process of executing the attack, to reach a final motive of making financial gains, the threat actors modify the bank account details on a legitimate pending invoice and trick the victim into transferring funds to the threat actors' bank account.

While it is clear how the threat actors target and execute the attack, the attack also encompasses several other information discovery steps taken by the threat actors. From our analysis and information collected from public threat reports of multiple similar breaches, we have noted that threat actors prior to carrying out the final impact of the attack that is, the financial transaction gathered and reviewed emails and files that may have contained financial information such as pending bills, customer details, etc. In addition to data review to understand the language, terminology or writing style used within the organisation, they also gathered and replicated the user mailboxes to offline access and accessed global address lists (GAL) containing contact cards of all employees of the organisation. The details captured by the threat actors from GAL or from the files and emails accessed may contain details of customers, personal information, sensitive information and may give the threat actors the ability to carry out further cyberattacks based on information collected.

The key challenges in the investigations related to business email compromise cases are as follows:

Case study: business email compromise scam causing a financial impact of over US$5 million

We were engaged by one of our clients in mainland China to investigate a business email compromise attack that resulted in payments of over US$5 million in fraudulent transactions. During our investigation, we noted that the threat actors were able to gain access to the mailbox of several finance team members over a period of four months prior to the initiation of the fraudulent transaction. A common technique used by the threat actors during this campaign for maintaining access to information was forwarding a copy of incoming emails to the email controlled by the threat actors by using an email forwarding rule as a method of data exfiltration. During our review, we noted multiple simultaneous ongoing conversation chains hijacked by the threat actors and were nearing agreements on payments which were then stopped by our team, mitigating a cumulative loss of about US$8 million. On the advice of the clients' legal counsel, potential data exfiltrated was reviewed to determine the nature of information exfiltrated and accordingly impacted customers were notified about the information (such as proforma invoices, letter heads with declarations, etc.) that may have been exfiltrated and stored by the threat actors.

ii Data compromise in a ransomware breach

Threat actors have been increasingly targeting organisations with ransomware and part of the attack locks the files in the system and exfiltrates data from the organisation with a threat to make it public or force organisations to pay and avoid leak. According to Verizon's data breach report 2022,2 ransomware has increased on an upward trend of 13 per cent. The threat actors before exfiltrating data try to identify valuable data in the organisation network to encrypt and exfiltrate the data. In a typical ransomware investigation done by our team, we have noted the use of public file storage websites and cloud servers as one of the file storage methods used by the threat actors.

The key challenges faced during investigations of ransomware cases are outlined below.

Inadequate or absence of network and endpoint visibility leading to gaps in timeline analysis

Systems event logs are available in all operating systems and capture system activity and actions based on the level of verbosity configured. The system logs are used for gathering and determining operating system level activity such as exploitation or malicious activities during a forensic review and provide details of when the activity occurred but the lack of in-depth visibility such as the amount of data transferred over the network, files transferred over USB, etc. leads to gaps in answering questions around files transferred over network or USBs, etc., and can be mitigated by using external software to collect and monitor such logs because of a lack of availability of such logs within the commonly used operating systems.

Unreliable timestamps and file metadata because of encryption

Typically, in a ransomware incident, threat actors exfiltrate data and execute ransomware to encrypt the files, which leads to an update in the file metadata such as 'file modified date'. Due to this filesystem activity, the file metadata becomes unusable for the forensic reviewer and questions such as number of files accessed by threat actors before encryption or files modified before encryption to identify potential malicious activity may not be answered accurately.

Loss of system artifacts becqause of anti-forensic techniques used by threat actors

Threat actors frequently use anti-forensic techniques to evade leaving footprints of the actions carried out by them to delay creation of counter measures by security companies, evade detection of malware and actions performed by the threat actors. From our experience of investigation, sophisticated attacks and information gained from analysis of various reputed threat reports, it was noted that commonly employed anti-forensic measures include clearing of system logs, deletion of malicious files post execution, high obfuscation of the malicious code and malware capability of self-destruction on receiving commands from the threat actors. These anti-forensic techniques lead to loss in the system artifacts and files impacting the root cause analysis resulting in gaps establishing the timeline of events that may have occurred.

The use of the outdated GeoIP database (GeoIP data contains mapping of IP addresses with their allocated country IP range and autonomous system numbers mapping the IP addresses to the organisations controlling the IP blocks) on firewalls leading to enrichment of connecting IP addresses with inaccurate geolocation, ASN organisation, ISP details, etc. Information leading to miscalculation during statical analysis based on these factors, for example: an outdated entry in the GeoIP database for a malicious IP address allocated to a highly reputed ASN org or internet service provider can lead to exclusion of connection from further scrutiny by the forensic analyst because of the reputation of the ASN organisation controlling the IP address block.

The lack of internal network telemetry amd NetFlow data leads to gaps in visibility of lateral movement across devices in the network. One of the tactics used by the threat actors after gaining access to the compromised endpoint is to carry out several discovery steps to identify potential data of importance to the organisation within the network and in some cases dump the collected data to exfiltrate. Limited details of such connection events are stored in operating system logs for connections that are made using an operating system's inbuilt functions and services but lack overall visibility in the amount of data transferred, the method used for connections and may lack any information at all if a custom tool is deployed by the threat actors for data movement and accessing computer systems within the network.

There are jurisdictional issues faced by the law enforcement agencies in securing access to cloud servers used by threat actors. Usage of cloud-based systems has been noted by the threat actors for hosting command and control infrastructure, data exfiltration destination, etc. from our experience in such investigations. In an event where a law enforcement action is involved to cease and desist the servers (based on the server IP address) used by the threat actors, the law enforcement agencies often face challenges because of jurisdictional issues and the inherent nature of the cloud server provisioning that enables the cloud service subscription holder to deploy servers at or for a short duration and the cloud service provider may provide the same IP address to another customer who may not be related to the incident.

Case study: A ransomware incident impacting a client in the mainland China office and Hong Kong

In a recent case investigated by our team, one of our clients in mainland China was impacted by a ransomware incident leading to encryption of systems across several Mainland China offices and Hong Kong region because of the interconnectivity of the networks. We were engaged as first responders to identify the root cause of the incident, gaps exploited by the threat actors and identify data exfiltration activity. During our review, we identified the initial access was carried out by the threat actors using an exposed remote desktop application which was followed by data exfiltration and encryption of files as final impact. During this review, our team carried out digital forensics and identified the threat actors' actions but could not determine the exact number of files accessed by the threat actors as the metadata was updated as a result of file encryption and a fallback method was used after discussion with the clients' legal counsel to determine the activity by relying upon the fact that if a system was accessed by the threat actor, the data was considered as exfiltrated. In other instances where our clients had more network visibility and endpoint logs, the data exfiltration has been very accurate as the logs provide more details of the various processes executed by the threat actors and contain details of the volume of data transferred in terms of packets during execution of the attack.

iii Data compromise because of cloud misconfigurations

As more and more organisations are shifting towards adaptation of cloud infrastructure to expand to scalable operations, utilising cutting-edge interactive web applications functioning on the user behaviour matrix, it was noted in various threat reports that some of the aspects of cloud security have been challenging for the IT professionals working in traditional on-premises infrastructure that gave more control. In the recent IBM Cost of a Data Breach Report 2022,3 the cost of breaches as a result of cloud misconfigurations to totalled US$4.14 million. Some of the impacts because of cloud misconfiguration result in data loss, access to sensitive or personal information, credentials or API keys, which can in turn be used to further access computer systems in the IT environment.

Key challenges faced during investigation are outlined below.

Lack of application logs

Application logs for a web application capture details of system events and actions performed by the users depending upon the configuration. The details captured in the logs can be a useful source to determine the impact of the malicious actions performed in addition to the logs from the webserver or load balancer, which capture limited details of interaction with the application based on the web requests and not the details of the events themselves in the web application.

Lack of cloud server logs for extensive periods

As organisations are moving towards more digitalisation and usage of cloud systems to reduce overheads and automate workflows, this leads to an increase in the usage of cloud systems. The cloud systems are natively designed on optimising performance and tend to provide limited storage space to manage the cost factor. The limited storage on cloud servers and gaps in the technical understanding of the administrators and the logs of such systems are in general kept for short durations on the systems for the best utilisation of storage as other types of data such as databases or code are also stored, leading to availability of a limited period of logs.

Difficulties in forensic image creation of the storage as compared with traditional hard drives

Cloud system (server) file storage is different in architecture than the traditional hard drives obtained in computer systems. The forensic preservation of cloud server storage poses a variety of challenges for the forensic analysts to efficiently collect images without compromising the integrity of the evidence files. Some of the cloud infrastructure providers may offer methods to download the existing operating system image as a virtual machine as part of the backup functionality, which can be used by the forensic analyst as an image because it is system-generated, indicating no possibility to tamper with it during creation and it contains the image hashes but in some cloud infrastructure providers may not provide such backup methods, posing a challenge for forensic collection and limiting the possibility of retrieving deleted evidence, which may in turn impact the investigation.

Case study: Investigation of a compromised web application

We investigated an incident related to an exposed vulnerable web application that was exploited by the attackers to gain initial access. The breach was identified because of security alerts to the storage by the IT security team. During our root-cause analysis, it was noted that the application was vulnerable for at least eight months before exploitation but as a result of the limitation of logs, previous instances of other security breaches resulting from the vulnerability were not discovered, leading to gaps in the investigation and stronger mitigation measures.

iv Data compromise as a result of insider data theft

Insider data thefts have been on a constant rise. With organisations working remotely, instances of such cases are increasing. Analysis of a recent news story4 also indicates potential advertisements by ransomware-related threat actors for rewarding insiders willing to enable the groups in introducing malware to internal systems.

The key challenges are as follows:

v Good practice to utilise to mitigate challenges during forensic investigations

To investigate a cyber incident and gain visibility of actions performed by the threat actors, digital evidence from computer systems and log files serves as a vital source to understand the activities of the threat actor and to determine data exfiltration activity. We list below some of the best practices for maintaining and preserving the critical digital evidence:

Read this article:
The Privacy, Data Protection and Cybersecurity Law Review ... - Lexology

Read More..

Keeping up with the demands of the cyber insurance market – Help Net Security

Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into completely unknown territory to gain market share. Now, 26 years later, cyber insurance has made the transition from an idea pitched to 20 people, to a strategic necessity, largely driven by executive leadership.

Although cyber insurance could still be considered a nascent area of the market, getting a policy is now a priority for many company boards to reduce any financial losses resulting from a security incident and reassure stakeholders and investors.

Theres also clear evidence that companies increasingly rely on their policies. New research from Delinea found that almost half (47%) of businesses used their policy more than once in the last year, with a seven percent increase from 40% the previous year. With the average data breach cost now standing at $4.45 million, insurance can provide crucial support in covering payments for legal services, remediation and investigations.

While insurers are bringing new products to the market, they are increasingly tightening the requirements for prospective and existing policy holders for the cyber risks they underwrite, asking organizations to demonstrate a high level of security preparedness to gain coverage.

In this scenario, thorough planning ahead of the application process ensures that organizations are in the best position to get coverage and reap the benefits of their policy. So, what are the priorities and the key security factors at play to ensure organizations can improve their chances of qualifying?

While in the UK adoption rates of cyber insurance vary significantly depending on the size of an organization, the US has seen a notable spike in demand across many markets for the past two years, with premiums increasing by 50% in 2022, in large part due to increasing ransomware attacks. And as more organizations seek cyber insurance policies to act as a financial safety net, it has been estimated that the global cyber insurance market could double in value to reach $40.3 billion by 2027.

On one side, these figures indicate that more companies are proactively taking steps to shield their businesses, but on the other they also show that prices are sharply increasing. After initial fierce competition among insurers, vying to offer the most attractive terms to potential clients, providers have been learning from their data and their losses and started to reduce their risk exposure. They are deeply scrutinizing applications and increasing the number of requirements needed to secure a policy at a reasonable premium.

Our own research has shown, the number of organizations requiring six months or more to qualify for cover has been growing steeply, just like the list of exclusions that could make cyber insurance coverage void. This is the case not only for new applicants, but also companies wanting to renew their policies, who should be more aware of the fine print and have clear insight into what they are covered for, and when they can and cannot make a claim.

As underwriters get to grips with the complexity of cybersecurity, comprehensive cyber risk governance from applicants has become a prerequisite for coverage.

Insurers in the US, for example, are increasingly referencing the NIST cybersecurity framework when determining policy requirements. As such, there are several key areas that organizations should focus on to improve their chances of securing a premium.

Businesses must thoroughly understand their specific cyber risks before seeking coverage. This means conducting detailed cybersecurity risk assessments to pinpoint vulnerabilities and determine their organizations cyber risk tolerance.

Insurers expect organizations to demonstrate robust measures such as malware defense layers and a clear data security and maintenance strategy to protect their critical assets. Identity security is particularly important, with just under half (49%) of companies in Delineas research reporting that Identity and Access Management (IAM) and Privileged Account Management (PAM) controls were required by their policies.

IAM and PAM give organizations greater visibility and control over how accounts are used and how identities are behaving and accessing systems a critical capability when so many attacks focus on exploiting identity. Controls such as Multi-Factor Authentication (MFA) should likewise be in place as a standard.

Cyber insurers also prioritize an organizations capability to detect risks and breaches, especially those involving endpoints like laptops and cloud servers. This means that advanced security tools that can deliver timely detection and response to incoming security threats, as well as comprehensive monitoring and alerting systems for potential misuse on workstations and servers, are vital for protecting the company and getting coverage.

Additionally, insurers pay close attention to incident response plans, anticipating a robust strategy that aligns IT, security, and developers for a swift, effective reaction to cyber threats. Devising thorough plans, with role checklists and response measures, and organizing regular simulation exercises will enhance organizations incident readiness and show insurers that they are genuinely prepared.

Finally, post-attack recovery plans also play a significant role in coverage viability. Insurers rigorously evaluate how an organization plans to restore operations after a breach, and how they will use the cyber incidents to reassess their strategy and as a learning opportunity for all employees to improve the companys security posture.

Cyber insurance is becoming an indispensable asset with cyber risk levels showing no sign of abating. However, obtaining this coverage requires more than just filling out an application. Businesses must demonstrate a proactive approach to cybersecurity, aligning with industry best practices and frameworks. As the cyber insurance market evolves, one thing remains clear: thorough preparedness is not just a requirementit is a necessity.

Original post:
Keeping up with the demands of the cyber insurance market - Help Net Security

Read More..

Six To Try: Salad Servers That Make Even Iceberg Lettuce Look … – Broadsheet

Cutipol Goa salad set

Designed by Jos Joaquim Ribeiro and made by a family-owned business in the village of Sao Martinho de Sande in Portugal, Cutipols Goa salad set features a brushed stainless-steel spoon and fork with contrasting resin handles. Slim and minimalist, theyll add a touch of effortless chic to any refined dining experience. $98

@mudaustralia

Melbourne-based homewares label Fazeek has a track record of creating curvaceous colour-loving glassware. Following suit, its salad servers are made of hand-blown borosilicate glass, with elongated handles that lead to softly rounded spoons. Available in three playful colourways: pink and green, clear and amber, and lilac and teal. $89

Handmade from resin in its Strawberry Hills studio, iconic Sydney label Dinosaur Designs stone servers come in 26 striking hues, from solid colours to textured, marble-like swirls. Go for hot-pink Flamingo, the dappled greys of Abalone, or Sky a mix of blue and white inspired by the vapour of early evening skies. $125

@dinosaur_designs

Loosely resembling the claws of a friendly lobster, cult Sydney-born label Maison Balzacs Cloud serving spoons are made of bamboo polymer with a soft, matte finish. Lightweight yet highly durable, theyre also biodegradable and designed to add a bit of whimsy to your table. Available in sky blue and beige. $49

@maisonbalzac

Known for Aussie-style understated luxury, Country Roads approach to salad servers is unsurprisingly chic. The Nolan features a minimalist design with tapered handles and sleek spoons a timeless style for seasons of dinner parties. Made of high-quality stainless steel in three neutral finishes: soft gold, brushed silver and shiny graphite. $59.95

@countryroad

Wooden salad servers are always a classic. Turkish-inspired, Sydney-based label Saardes are handcrafted using natural olive wood from pruned branches and dead trunks. With a simple pared-back design, the woods textured character does most of the heavy lifting, style-wise. Each piece gets darker and richer in colour as it ages. $45

@saardehome

Looking for more carefully curated buys for your home? Read here.

This article first appeared in Domain Review, in partnership with Broadsheet.

Continued here:
Six To Try: Salad Servers That Make Even Iceberg Lettuce Look ... - Broadsheet

Read More..

How to Block Ads on Hulu in 2023 [Stop Hulu Ads Easily] – Cloudwards

Key Takeaways: How to Stop Hulu Ads

If you spend a lot of time watching content on Hulu and youre not paying for the more expensive, ad-free plans, youre probably annoyed with just how many ads show up. Users of the more affordable, ad-supported plans may be tempted to upgrade just for this alone, but knowing how to block ads on Hulu doesnt have to cost you anything.

Even though there are ways to get Hulu in Canada and other countries, the streaming service is only officially available in the United States and Japan. You can get around that limitation with a VPN, though ExpressVPN is our favorite. There are a few Hulu plans to choose from, but save for the on-demand ad-free plan, all of them are ad-supported to an extent.

If you want to block Hulu ads and enjoy your affordable Hulu subscription, there are a few ways to go about it. Well show you how to block Hulu ads for the on-demand content, but keep in mind that theres no way to avoid commercials on live TV channels.

Hulu has several subscription tiers, some that only offer on-demand content, and others with live TV content too. If you only need on-demand content, the more affordable plan is ad-supported. The more expensive plan removes all ads, but also excludes several shows that play with ads before and after the actual content.

If youre looking at the Hulu + Live TV plans, unfortunately all of them have annoying ads. The most affordable plan has ads on the on-demand content, as well as the Disney and ESPN packages. You can choose a more expensive plan that removes ads from the on-demand content, but youll still have ads with ESPN Plus.

As with any other live TV provider, commercials on live TV cannot be avoided. This is why, even if you opt for Hulus ad-free on-demand plan, you will still get commercials when watching live TV channels.

To add to this, Hulu also bundles Disney+ and ESPN+ content with its live TV plans. While you can get the on-demand content and Disney+ with no ads, you can only get ESPN+ content with ads.

While you can block ads on Hulu with a regular ad blocker, you can also take things a step further in the security department and use a VPN ad blocker. Not only do you get the benefits of an ad blocker, but you also enjoy a private, encrypted connection. Here is how to use one, with NordVPN as an example.

Go to NordVPNs website and click get NordVPN. Follow the steps to sign up for an account, then download and install NordVPN on your device of choice.

Using the credentials from step one, launch NordVPN on your device and log in.

In the left side menu, open threat protection. Click the toggle to enable it.

Since Hulu is only available in the U.S. and Japan, choose one of those locations to connect to. From the list of servers to the left, select a server and wait for the VPN to connect.

Once you have an active connection to the VPN server, open your browser or Hulu app, log in with your U.S. or Japanese account and enjoy your favorite content ad-free.

Not all VPNs come with an ad blocker, and not all VPN ad blockers are effective with Hulu. Here are the three weve tested and confirmed do a great job starting with NordVPN.

NordVPNs map UI is a breeze to use on desktop, but the same cant be said for the mobile apps.

Pros:

NordVPN is the best way to enjoy the added security of a VPN while streaming Hulu content without ads. The VPN has plenty of servers in the U.S., allowing you to connect to one that is close to you for the best possible performance. It also has servers in Japan, in case you want to watch Japanese content.

The built-in ad blocker is highly configurable and lets you choose exactly what you want the VPN to block. You can use it on both desktop and mobile devices, so you can enjoy the Hulu video library on the go, too. Keep in mind that the mobile UI isnt the easiest to use and may take some getting used to due to its map interface.

The security and performance are excellent, as noted in our NordVPN review. Pair all of that with affordable long-term pricing and a 30-day money-back guarantee, and youve got an excellent VPN for a Hulu no-ads experience.

Surfshark puts its static IP, MultiHop and dedicated IP address servers in separate lists, letting you choose the exact type of server you want to tunnel through.

Pros:

Cons:

If youre watching Hulu on multiple devices at the same time, Surfsharks unlimited simultaneous connections can come in quite handy. It also has servers in both the U.S. and Japan, so you can pick and choose which one of Hulus content libraries you want to watch. You can find out more about it in our Surfshark review.

The built-in ad blocker, called Clean Web 2.0, does a great job with Hulu ads, blocking most of them before they can even load. Unfortunately, the improved 2.0 version is only available if you use the ad blocker as a browser extension. If you install it on a desktop or mobile device, you can only use the older version, which is slightly less effective.

Surfsharks performance is pretty good, with high speeds but sometimes inconsistent latency, which may lead to buffering issues every once in a while. We discussed this in our fastest VPNs roundup. If thats not a big concern for you, Surfshark is a great VPN to consider for a Hulu no-ads experience, especially with its affordable pricing and 30-day money-back guarantee.

Proton VPNs UI does remind us of someone else, but we have to say, its overall remarkably easy to use.

Pros:

Proton VPN is a provider we recommend often as an excellent free VPN, but if you want to use the ad blocker, youll need a paid plan. The VPN has an excellent and very easy to use UI on both desktop and mobile, making it a breeze to connect to any of its servers in the U.S. or Japan.

Proton VPNs built-in ad blocker is called NetShield, and its a highly effective way of watching Hulu shows with no ads whatsoever. It doesnt only work with ads, but it can also block trackers, and it comes with a dashboard to show you how many ads and trackers its blocked and how much data its saved.

Proton VPNs Achilles heel is pricing even if you opt for the most affordable plan and a two-year subscription, youll still pay a lot more than you would for Surfshark or NordVPN. You do get a 30-day money-back guarantee, though, in case you find you dont like it. You can find out more about it in our ProtonVPN review.

If you want to block Hulu ads on the ad-supported plan without using a VPN ad-blocker, there are several other ways that weve tested. Your experience may vary, as weve found that some of them arent as consistent as using a VPN when it comes to blocking Hulu ads. They are, however, free, and let you skip Hulu ads, so theyre certainly worth considering.

The simplest way to block ads on Hulu is to watch Hulu content in your browser, as opposed to the Hulu app, and use an ad-blocking browser extension. There are extensions for most major browsers and mobile operating systems.

If you only want to block Hulu ads, but not other ads when browsing, you can use Hulu Ad Skipper. This is a dedicated Chrome extension that is made for blocking ads on the Hulu streaming platform. When an ad is detected, the extension will mute it and fast forward through it, letting you enjoy Hulu ad-free. In our experience, it does a great job at moving through ads quickly.

If you want to block Hulu ads while youre watching Hulu on your mobile device, you can use an ad blocking app that works with all apps on your device. You can try AdGuard, which works on both Android and iOS devices, or you can try watching Hulu using the mobile version of the Brave Browser.

Its worth mentioning that Hulu doesnt like you using ad-blocking apps and extensions, and its constantly updating its ad-serving methods to bypass such apps and extensions. It may happen that you see an ad or two if Hulu has updated its ads, but the extension or app youre using still hasnt been updated to block the new ad.

If you want, you can also install a dedicated ad-blocking browser. These browsers have built-in ad blocking functionality, so you dont have to worry about extensions. A great example is Brave Browser, which we reviewed and found to be an excellent alternative to big names like Google Chrome, Mozilla Firefox or Opera.

You can also get creative in your quest to skip Hulu ads and use the two-browser-tabs method. Keep in mind that this will require a fast internet connection, since youll be watching two streams of your show simultaneously. Heres how to watch Hulu without an ad break using two browser tabs.

First, open Hulu in one browser tab and go to the show you want to watch. Start playing the episode youd like to watch and pause it right at the beginning. Open a second browser tab, and navigate to the same episode of the same show. Play your show in both tabs simultaneously (or as quickly as you can), and mute one of the tabs.

The moment you notice the first ad appear in the tab youre watching, mute that tab and then continue watching your show in the second tab. Once you notice more ads in the second tab, mute it and go back to your first tab. This way, you always have the show in at least one tab, uninterrupted, letting you get rid of ads in a slightly unconventional, but very effective way.

Keep in mind that, by doing this, you will end up rewatching parts of the show. The ad length puts you behind on the other tab, which may be a nuisance.

Weve saved this one for last, because even though weve had a good experience with the method itself, it doesnt completely get rid of ads on Hulu. On-demand shows on Hulu have both long and short ads, and you get them seemingly at random.

When youre watching a show, if a long ad starts, you can refresh the browser window. In most cases, this allows you to skip the long ad, instead replacing it with a shorter one thats a bit less annoying. As we mentioned, its not exactly an ad-free viewing experience, but it gets a little closer.

With Hulu increasing its pricing, we wouldnt blame you for wanting to enjoy ad-free streaming without paying for a more expensive subscription. There are quite a few ways to skip ads on Hulu, from ad-blocking browser extensions like Hulu Ad Skipper, to watching on two tabs to avoid pesky ads interrupting your streaming experience.

The best way to get rid of and skip ads on Hulu is to use a VPN ad blocker. In addition to the ad-free experience, you are also getting a secure, encrypted internet connection while you enjoy uninterrupted streaming. NordVPN is the best tool for the job, but Surfshark and Proton VPN are also solid alternatives.

Have you tried to disable ads on the ad-supported Hulu plan? Which of the methods above have you found works best? Let us know in the comments, and as always, thank you for reading.

You can get rid of ads on the Hulu app by either paying for an ad-free plan or by using a VPN with an ad blocker while you watch content.

If youre paying for one of Hulus ad-free live TV plans, unfortunately there are no ways to avoid commercials on the live TV channels. In addition to that, the bundled ESPN+ content is always ad-supported, regardless of the plan.

If youre currently using an ad-supported Hulu plan, you can upgrade to an ad-free plan in your Hulu account settings.

Yes, Hulu offers several plans, many of which are available without ads. However, you will still have commercials on the live TV channels.

Let us know if you liked the post. Thats the only way we can improve.

YesNo

The rest is here:
How to Block Ads on Hulu in 2023 [Stop Hulu Ads Easily] - Cloudwards

Read More..

Googles latest smartphones put AI photo-editing in your hands – Sydney Morning Herald

Where many smartphone-makers fill their software with cascading options and heaps of micro features, Pixels have always put a focus on attractive, understated design and proactively useful touches. The new Pixels are crammed full of stuff, its just that it tends to pop up when its required rather than being tucked away in menus or needing to be stacked all over your home screen.

The Pixel 8 has new cameras, more powerful AI and keeps the chunky camera bar. Supplied

As you might expect, a lot of Googly features are baked in and benefit greatly from the Pixel 8s new Tensor G3 chip, which provides on-device machine learning. That includes fast and accurate voice-to-text for sending messages, interpreting other languages and automatically transcribing recordings, as well as powerful photo and video editing, and health-tracking via Fitbit. The tech even extends to using the device for old-fashioned phone calls, with great noise-cancelling that makes the caller sound clear and the ability to have Google Assistant screen your calls.

But while the Pixel 8s continue the tradition of putting the best of Google front and centre, and may be the best Androids on the market, theyre also a testing ground for new features and developments that dont always feel ready for prime time.

Physically not a lot has changed from last years Pixel 7, with the new phones packing the familiar and wonderfully symmetrical chunky camera bar on the back. Both phones have great screens that can get phenomenally bright (2000 nits on the 8, 2400 on the Pro, though youll only get those maximum results in direct sun), and both have 120Hz refresh rates for very smooth scrolling and animation.

In fact, the two phones are the closest theyve been since the introduction of the Pro moniker with the Pixel 6. The main differences are screen size (6.2 inches or 6.7 inches) and an extra camera, with the Pro packing a 5x telephoto lens in addition to the main shooter and ultra-wide. Oh yeah, and the Pixel 8 Pro has a thermometer.

The Pixel 8 Pro and Pixel 8 (right), with the iPhone 15 Pro Max and iPhone 15 (left). Tim Biggs

I have to assume that Google intended this sensor to be for checking peoples foreheads, and then didnt get the appropriate medical approval or gave up on the idea, because theres no other reason for it to be there. When you use it for the first time you have to tick a box to say you understand it is not a medical device, and then youre free to put it five centimetres in front of any object to check its temperature. It seems to work, but I couldnt find a compelling use for it.

Despite a similar hardware design, Googles own take on the new Android 14 software does a lot to give the Pixel 8s a fresh look. There are a lot of lock-screen styles to choose from, which double as always-on-display designs (I especially like the new one that puts the date and temperature against the phones longer sides), and the options to colour theme your phone, widgets and icons automatically to your wallpaper continue to impress.

Embedded in the top of the display is a little selfie shooter similar to last years, but it has a new trick thanks to AI, in that it can recognise you a lot more accurately. The change means you can authenticate banking apps and sign in to services with your face, just like you can on an iPhone, without a big black spot at the top of the phone. The one downside to Googles approach here is it doesnt work in the dark, so you still need a fingerprint or PIN.

Speaking of AI, this years update is big on generative features, both obvious and subtle. One example of the former is the new AI wallpaper feature, which is a DALL-E style text-to-image generator but with a lot of limitations. Choose a theme, pick some keywords, wait 20 seconds and youll be given eight different options to choose from. Theyre always fairly abstract and dont stand up to close scrutiny to be honest, Id always prefer one of the many real photos or paintings from Googles wallpaper collection but as a gimmick it works and will only get better.

Googles Best Take feature can swap peoples faces when you take multiple shots. Supplied

Generative AI is more present in the new Google Photos editing suite too, where it toes the line between allowing you to realise the intention of a photograph and letting you straight-up invent stuff. The marquee feature here is Magic Editor, which is scarily good at replacing a gloomy sky with a nice blue one, shifting the colours for a golden hour look, removing unwanted elements or even completely changing the composition.

For example, I grabbed an older photo of my two kids at mini golf, posing in the left of the frame. Behind them is a giant statue of a cartoon rhino, centre frame. In the Magic Editor I tapped one kid to select him, held down to edit, then dragged him over to the right of the frame. After processing, the image just looks like the kids were naturally standing either side of the rhino. The part where the repositioned kid used to be standing now has some convincing invented detail, including a bit of path, some scattered bark chips and one of the rhinos hands. It even gives you a few options to choose from so you can pick the most natural. The feature is also great at enlarging the moon, or removing dead tree branches. But for whatever reason, any time I tried to change the size of a person I was told it was against the companys ethics policy.

On the left is my original photo, the middle is with Googles AI-generated sky, the right has golden hour turned on. Tim Biggs

Theres also a feature called Best Take, which appears if youve taken a series of photos featuring a group of people. Pick one of the photos, and you can tap on each persons face to cycle through the various expressions they made throughout the set, ending up with one picture featuring everyones best face. Like the Magic Editor its far from foolproof but can result in fakes nobody would pick at a glance.

To be honest, I cant ever see myself using these tools on my own personal photos. Im aware that some level of AI processing has been present in smartphone photography for a long time and is here to stay, but intentionally changing the content feels unnerving. That said, I can definitely see using it in place of Photoshop if I needed a specific edit of a non-human subject quickly.

For video, a new Audio Eraser will analyse clips for sounds and show a few of them as separate waveforms (for example, wind, speech or nature). Then you can watch and listen to the video while moving the levels around to cut out talking or annoying gusts. Like a lot of AI photo editing it works very well but leaves artefacts youll notice if youre specifically looking for them. Other features, like a video enhancer that utilises Googles cloud servers, are not present at the phones launch.

The new Pixels come hot on the heels of new iPhones, and the two families of devices share some similarities despite being fundamentally tough to compare. Googles phones have been becoming more premium and expensive year over year, while Apples have been becoming more open notably this year with the introduction of a USB-C port so theyre closer to equivalent than ever.

Comparing the standard phones, Pixel 8 and iPhone 15, Googles immediately stands out as more premium despite being $300 cheaper. Theyre similar sizes and have similar camera set-ups, but Apples lacks a fast refresh and an always-on display. Under the hood Apple has also withheld some features from the standard iPhone that the Pixel happily supports, including USB 3.2 for much faster charging and data transfer, and autofocus on the ultra-wide camera which makes for a great close-up macro mode.

When it comes to the high end, Pixel 8 Pro against the iPhone 15 Pro Max, the gap is much closer though the prices are farther apart. (The iPhone starts at 256GB here, so a true like-for-like comparison would put the Pixel 8 Pro at $1800, but thats still a $400 gap.)

Click to reload

The phones are evenly matched across almost all specs, though Apple has the strong advantage of an immensely powerful processor that outpaces the Pixel in raw strength. In cameras Google has opted for bigger sensors and more flexibility in editing, and the Pro has an excellent manual control mode, but Apples shots tend to be more pleasant for quick snaps since you can preset your preferred temperature and crop. When it comes to portrait mode and low light photography the Pixel is far more confident, and both phones now support adding a bokeh blur after the fact; Apple by capturing depth data when it detects a face and Google through the Magic Editor.

Both happily shoot 4K HDR video that looks amazing, though Apple supports Dolby Vision and ProRes which may suit professionals better.

iPhone users have access to a pretty full suite of Google products these days, and even features like the Magic Eraser have made their way from Pixel to iPhone, though the opposite is not true; those who choose Apple services tend to have a hard time on Android. The unique strength of the Pixel, then, is hardware thats been specially tuned for Googles AI tasks, and the latest in experimental features that may or may not become widely used in the future.

Still, putting the AI features aside these are still the nicest Pixels Google has yet produced, with some of the most genuinely useful features and best cameras youll find on an Android.

Get news and reviews on technology, gadgets and gaming in our Technology newsletter every Friday.

Originally posted here:
Googles latest smartphones put AI photo-editing in your hands - Sydney Morning Herald

Read More..

Where to Watch Frasier Reboot in 2023 [StreamFrom Anywhere] – Cloudwards

Key Takeaways: How & Where to Watch Frasier Episodes Online Free

This September marked 30 years since the premiere of comedy series Frasier. The show ran for 11 seasons, and its just shy of 20 years since the last season was on our screens. Now were in for a new 10-episode Frasier reboot starting this October. If you want to know how and where to watch Frasier, keep reading.

Kelsey Grammer will return as psychiatrist Frasier Crane and other members of the original cast will make appearances. However, not all of the cast will be returning, including David Hyde Pierce as Frasiers brother Niles.

The Frasier reboot is exclusively available on Paramount Plus. If youre not in a country where Paramount Plus is available, you wont be able to access the show due to geoblocks. Using a VPN can get you past such blocks, though, and we recommend using ExpressVPN, the best VPN around.

The new season of Frasier will be streamed on Paramount+. The first two episodes premiere Thursday, Oct. 12 in the U.S. and Canada, and new episodes will be available weekly.

The Frasier reboot starts on Oct. 12 on Paramount Plus in the U.S. and Canada.

All other Paramount Plus regions, such as Australia, New Zealand and the U.K., will get the new Frasier season starting on Friday, Oct. 13.

If you dont have a Paramount+ account, the first two episodes will premiere live on the CBS channel on Tuesday, Oct. 17 at 9:15 p.m. EST. If you dont have cable, you can sign up for a live TV streaming service that carries CBS, such as Hulu + Live TV, YouTube TV, fuboTV or DirecTV Stream.

If youre not in a Paramount+ country, you can use a virtual private network (VPN) to unblock the service. This will also work for a live TV streaming service in the U.S.

All you need to do is connect to a VPN server in a country that has Paramount+ or a CBS stream. This will mask your true location, making you look like youre in the country and allowing you to access your chosen service. We have a step-by-step guide further down.

If youre new to the Frasier series or want to rewatch previous seasons, there are plenty of options available.

In the U.S., you can watch all 11 seasons on Paramount+, Hulu and Amazon Prime Video. All of those services offer a free trial. You can also watch Frasier on other services around the globe. Heres a table of all the streaming services where we found it. Remember, if youre outside of any of these countries, a VPN can help.

No, the Frasier reboot isnt on Netflix because its a Paramount+ exclusive. We also didnt find the original Frasier seasons on Netflix.

Netflixs content is always changing, so there is a chance that Frasier could make an appearance at some point. If that happens, well try to keep this information updated. You can check Netflix for yourself, too, and not only in your own location. Netflix regions have slightly different content, so its a good idea to check other countries libraries.

You can use a VPN to check if Frasier is available in a different Netflix library. Just connect to a server in the country you want to check, then log in to your Netflix account. You should see that countrys content library. If not, Netflix may have detected your VPN usage, so connect to a different server and try again.

Since the Frasier reboot is only available on Paramount Plus and CBS, your only option to watch it for free is a free trial. Paramount Plus offers a seven-day free trial, which isnt enough to get you through all 10 episodes as they premiere. A livestreaming services free trial wont allow you to watch the entire reboot either.

Your best bet is to wait until the new season concludes and then use the Paramount Plus free trial to binge-watch it.

As you can see in our table above, there are quite a few options to watch the original Frasier for free. However, since there are 11 seasons, youll want a pretty long trial to get through all the episodes. Hulu and Amazon Prime Video both offer a 30-day free trial, but even then, youll need to watch 8-9 episodes per day to get through it (there are 264 episodes in total).

The best option is to watch it on Channel 4 in the U.K. Its completely free, and all you need to do is create an account. If youre outside the U.K., you can use a VPN to get a U.K. IP address. Most VPNs offer a 30-day money-back guarantee.

Of course, that means youre back to only having 30 days to get through it, but there are free VPNs available with U.K. servers. Windscribe is a great option, but it limits you to 15GB of data per month, so youll need to spread your streaming sessions out a bit. Read our Windscribe review for more information on the service.

In this section, well show you how to use a VPN to watch the new Frasier season on Paramount Plus in the U.S. Weve used ExpressVPN for our example. If you decide to watch it on CBS with a live TV streaming service or use a different VPN, the steps will be fairly similar. Just substitute the name of another service where needed.

Subscribe to a VPN like ExpressVPN. Go to the website and choose a plan. Whichever plan you choose, youll be covered by the 30-day money-back guarantee.

Download the VPN software for your device and install it. After that, open the VPN app and log in to your account.

Find and connect to a U.S. server. ExpressVPNs full server list can be found by clicking the three dots by the server name. You can then scroll through the list or use the search bar to find a U.S. server. Click on the server to connect to it. If needed, click the big power button to manually connect.

Go to the Paramount Plus website and sign up for the service. New customers will get a seven-day free trial. However, you do need a U.S. payment method. If you dont have one, you can use a service like StatesCard to get a prepaid U.S. card with a U.S. billing address.

Search for Frasier on Paramount Plus and start watching the series.

For the best chance of unblocking Paramount Plus and streaming Frasier without hiccups, you need a VPN that can easily bypass geoblocks and has fast speeds. The following VPNs have what you need and more. Lets get into them, starting with our top pick, ExpressVPN.

ExpressVPN easily unblocks streaming services and has excellent speeds.

Pros:

Youll find ExpressVPN at the top in most of our how to watch articles, simply because it is the best VPN for streaming. Its combination of fast speeds, excellent unblocking ability and thousands of servers in 94 countries makes it the best option for accessing most shows. Its also on most devices, providing an easy-to-use app while keeping you secure online.

Its only downside is the price. Its expensive, theres no sugarcoating it. However, you get a premium service that rarely has any issues. It also has a 30-day money-back guarantee, which you can use to test it out before committing. You can also read our ExpressVPN review.

ExpressVPN Plans

NordVPN is the fastest VPN and has an affordable two-year plan.

Pros:

Cons:

NordVPN is another great choice for streaming Frasier. It can easily access streaming services and, although its server spread isnt quite as wide as ExpressVPNs, it still has plenty of servers for watching Frasier. Our daily speed tests also show NordVPN as having the fastest average speeds.

Its app is on different device types and includes a nice interactive server map, though the map can be a little hard to use on mobile due to the smaller screen. Its a secure, fast and reliable VPN that is more affordable if you sign up for two years. Theres a 30-day money-back guarantee, so you can try it without risk. Learn more in our NordVPN review.

Standard

Proton VPN is a great free VPN that has unlimited data and U.S. servers.

Pros:

Proton VPN is the best free VPN for watching Frasier online. While we dont recommend most free VPNs, Proton VPN is an exception because its a premium VPN that offers a limited free plan. Where most free VPNs limit data usage, Proton VPN doesnt. You get unlimited data and access to free servers in the U.S., the Netherlands and Japan.

It can access streaming services and its speeds are mostly good, though the free servers can slow down due to the amount of users connected. Its also easy to use and secure.

Upgrading to the paid plan provides access to more server locations and better speeds since the servers arent so overloaded. Its not as affordable as NordVPN, but if you want to check it out, theres a 30-day money-back guarantee. Read our Proton VPN review for more details.

Though much of the new plot is still unknown, the Frasier reboot portrays a completely new life for Frasier Crane. Frasier decides to reconnect with his son Freddy in Boston, Massachusetts, forging new relationships along the way.

In the trailer, we can see hes taken a new job, possibly in a university, and has found a new place to live. Whether or not Frasier still has his radio talk show remains to be seen, though it would be great to hear some of those funny radio show callers again.

Aside from Kelsey Grammer returning as Frasier Crane, well see the likes of Peri Gilpin and Beatrice Neuwirth make appearances as Roz Doyle and Lilith Sternin, respectively. The rest of the cast will be mostly fresh faces, though. Frasiers own brother Niles (David Hyde Pierce) wont be back, and John Mahoney, who played Frasiers father, sadly passed away in 2018.

The new cast includes Jack Cutmore-Scott as Frasiers son Freddy and Nicholas Lyndhurst as Frasiers old college friend Alan Cornwall. While Niles and Daphne (Jane Leeves) wont be in the show, Anders Keith will play their son and Frasiers nephew, David. Heres a complete table of the Frasier reboot cast.

The original Frasier series was a spinoff from Cheers, where the character Frasier Crane first appeared. After his marriage ends, Frasier leaves Boston and returns to his hometown of Seattle as a radio psychiatrist. His partially disabled father moves in with him and the pair reconnect, although they have a slightly difficult relationship and Frasier has to put up with his fathers love life.

Frasier gains fame as a radio psychiatrist on his own show The Dr. Frasier Crane Show, which gets him nominated for a local broadcasting award. The show revolves around Frasier, Niles and Frasiers dad Martins love lives, bickering, revealing family dialogue and often a personal and professional dilemma for Frasier.

No, David Hyde Pierce will not be returning as Niles in the Frasier reboot.

The Frasier reboot is sure to be popular with both original and new fans of the show. The rumor mill has been flowing about what might happen in the new series, but well have to wait and see though Frasier likely begins dating a pretty young woman.

Paramount Plus is the place to watch it online, but if youre not in a country that has Paramount+, you can use a VPN to get a U.S. IP address and unblock the service. ExpressVPN is the best option, and the 30-day money-back guarantee means you can test it risk-free.

Are you a longtime fan of Frasier, or are you new to the series? Will you be watching the Frasier reboot on Paramount+ or CBS? Will you need to use a VPN? If so, which VPN is your favorite? Let us know in the comment section and, as always, thank you for reading.

The Frasier reboot is available on Paramount Plus in the U.S. and other countries. You can also watch the original series there, as well as on other services, like Hulu and Amazon Prime Video in the U.S. and Channel 4 in the U.K. If youre not in a country where Frasier is available, you can use a VPN to get access.

Frasier is not on Netflix, but you can find all of the original series on Hulu. The new season of Frasier is not available there, though.

No, neither the original series nor the Frasier reboot are available on Netflix. You can watch the show on Paramount Plus.

All seasons of Frasier are available on different services around the world. All 11 previous seasons and the new reboot are available on Paramount+ U.S. Previous seasons are also available on Hulu, Amazon Prime Video U.S., Canal+ in France, Channel 4 in the U.K. and Crave in Canada.

Let us know if you liked the post. Thats the only way we can improve.

YesNo

More here:
Where to Watch Frasier Reboot in 2023 [StreamFrom Anywhere] - Cloudwards

Read More..

Meet Hoor Fatima, a three-year-old chess prodigy – IndiaTimes

Hoor Fatima is a remarkable chess prodigy, and her journey is nothing short of astonishing. At the tender age of just three, an age when most toddlers are learning to speak, Fatima embarked on her chess journey. What sets her apart is not just her early start but her remarkable accomplishment as the youngest champion in the 2nd Kashmir Open International FIDE Rated Chess Tournament.This year's tournament, organized by the Kashmir Chess Club, took place at the Indoor Sports Complex Polo Ground in Srinagar, Jammu and Kashmir. Commencing on June 10 and concluding on October 12, the tournament spanned five intense days, drawing participants from various parts of India, including players from Russia. It may well mark the emergence of a new generation of sporting heroes in Kashmir.Hoor Fatima has garnered global attention, defying all expectations for someone her age. Her victory in the FIDE Chess Championship is truly exceptional. In the Kashmir community, she serves as a beacon of hope and motivation, particularly for children who find inspiration in her remarkable journey.Bilal Ahmad and Salam Ashai, recognizing the importance of education and chess in nurturing well-rounded individuals, have played a pivotal role in nurturing this three-year-old chess prodigy to reach the pinnacle of excellence in sports. Hoor's triumph also underscores the significance of nurturing young talents from remote parts of the country, such as Kashmir.The tournament is conducted in accordance with the rules of the Federation Internationale des Echecs (FIDE), employing the FIDE Swiss System with nine rounds. Fatima's historic win as the youngest champion of the 2nd Kashmir Open International FIDE Rated Chess Tournament has drawn widespread attention. Her story of resilience and brilliance has been covered by top outlets, including Kashmir Life and JK Chrome.

Here is the original post:
Meet Hoor Fatima, a three-year-old chess prodigy - IndiaTimes

Read More..

Israel-Hamas conflict: India withdraws from World Cadet Chess – Rediff.com

IMAGE: Smoke billows following Israeli strikes in Gaza City, October 11, 2023. Photograph: SalehSalem/Reuters

The Indian team has pulled out of the World Cadet Chess Championship scheduled to start at Sharm el Sheikh, Egypt from Saturday in the wake of the ongoing Israel-Hamas conflict, fearing it could jeopardise the safety of the players and officials.

As many as 39 players from India were supposed to compete in the tournament, the venue of which is less than 400kms from the Israel border. The competition will be held in the under-12, 10 and 8 categories from October 14 to 23.

The All India Chess Federation (AICF) has also requested the world body FIDE to postpone the tournament, keeping in mind the tense situation in Gaza.

"Considering the ongoing situation at Gaza Strip between Israel and Hamas and the age of participants, after due deliberations, it was decided to withdraw the participation of the Indian team in the World Cadet Chess Championship-2023," AICF said in a press release.

According to AICF sources, some 80 people, including players, coaches and those accompanying the players, were to head to Sharm el Sheikh for the tournament.

"The All India Chess Federation took this decision considering all the aspects of safety and security of young players as Egypt shares the border with Gaza as well as Israel," the release said.

"Sharm el Sheikh, the host city for the championship is less than 400 KM from the Israel border and the conflict can significantly impact commercial airlines in the Middle East on short notice.

"The Federation took this hard decision based on force majeure and unforeseen scenarios as we give paramount importance to the safety of our players even though our players put in almost one year training to participate in this important event."

Meanwhile, an AICF official said the decision was taken as the safety of the children had to be taken into account and there was uncertainty over flight operations.

Israel has launched an unprecedented offensive against the Islamic militant group Hamas ruling Gaza after its fighters broke through the border fence and stormed into the country's south through air, land and sea on October 7.

Excerpt from:
Israel-Hamas conflict: India withdraws from World Cadet Chess - Rediff.com

Read More..

Judit Polgar’s Global Chess Festival 2023: All The Information – Chess.com

The Judit Polgar Global Chess Festival 2023 (JPGCF) is a series of chess events and activities hosted by the legendary GM Judit Polgar. The festival runs across two days, October 14 and 15, with the first day happening live in Hungary and the second day happening online. The festival also features two online tournaments, one open to the public and one invitational.

You can watch the event's live broadcast on Chess.com/TV and on our Twitch and YouTube channels.

The festival is open for anyone to attend. Participating clubs held tournaments to decide who'd play in the #ChessConnectsUs tournament. They could sign up two players for the open and two for the scholastic section, one female and one male in each. The following google sheetlists the qualified players.

The chess Triathlon is the only invitational tournament, with confirmed participation of the following players:

The in-person activities of the JPGCF start on October 14 at 4 a.m. ET/10:00 CEST, while the online #ChessConnectsUs tournament happens on October 14 at 11 a.m.ET/17:00 CEST. The rest of the online portion of the festival starts on October 15 at 4 a.m. ET/10:00 CEST. Check out the full schedule below:

You can check the full schedule of the festival on its official website.

The festival features a series of in-person activities (click here for more details), an online Educational Chess Sumit, and two online tournaments. Below, you can learn more about the two online tournaments:

The Triathlon is an invitational event featuring three segments, each a round-robin. Players are divided into teams of two and earn points according to their results and are later ranked based on their total points.

Puzzle Battle

Tandem Chess

Bullet

Clubs ran tournaments to determine who would play in the #ChessConnectsUs Finals. Clubs could sign up one man and one woman to the Open Finals and one boy and one girl to the Scholastic Finals. The Finals consist of an 11-round Swiss tournament in the 3+2 time control. Standard Swiss tiebreakers apply.

The chess Triathlon counts with a $10,000 prize fund, distributed as follows:

Community members playing in the #ChessConnectsUs tournament can also enjoy the following prizes:

This year, the in-person portion of the JPGCF will happen in Polgar's hometown of Budapest, Hungary. People from all over the world will gather at the breathtaking Hungarian National Gallery to take part in the festival. The online tournaments will be played on Chess.com's servers.

This year's JPGCF is the festival's ninth edition. You can see the highlights of last year's festival in the video below:

Read the original post:
Judit Polgar's Global Chess Festival 2023: All The Information - Chess.com

Read More..