1
78
submitted 3 months ago by L3s@lemmy.world to c/technology@lemmy.world

Greetings everyone,

We wanted to take a moment and let everyone know about the !business@lemmy.world community on Lemmy.World which hasn't gained much traction. Additionally, we've noticed occasional complaints about Business-related news being posted in the Technology community. To address this, we want to encourage our community members to engage with the Business community.

While we'll still permit Technology-related business news here, unless it becomes overly repetitive, we kindly ask that you consider cross-posting such content to the Business community. This will help foster a more focused discussion environment in both communities.

We've interacted with the mod team of the Business community, and they seem like a dedicated and welcoming group, much like the rest of us here on Lemmy. If you're interested, we encourage you to check out their community and show them some support!

Let's continue to build a thriving and inclusive ecosystem across all our communities on Lemmy.World!

2
187
submitted 11 months ago* (last edited 11 months ago) by PopBobert@lemmy.world to c/technology@lemmy.world

Hey everybody,

Due to the bombardment of Elon Musk content, the mods have decided to make a pinned mega thread. Please post all of your Elon Musk related news, gossip, technology and articles here.

We know many of you are deeply interested in Elon Must, but we need to allow space for other technology content as well.

As always, be excellent to each other.

Yours truly, moderators.

3
52
submitted 11 months ago* (last edited 11 months ago) by PopBobert@lemmy.world to c/technology@lemmy.world

Hey everybody, feel free to post any tech support or general tech discussion questions you have right here.

As always, be excellent to each other.

Yours truly, moderators.

4
41
submitted 2 hours ago by jeffw@lemmy.world to c/technology@lemmy.world
5
17

tl;dr The LockBit ransomware group claims to have stolen 33TB of data from the Federal Reserve Board and is threatening to release it unless a ransomeware is paid and time is running out.

6
25

Found via the author's Mastodon Post

Generally, the media has focused on the (mainly) men whose names and desires were taken from the company’s subscriber database and shared with the world. [...] Ashley Madison was never really about that. Avid Life Media, its parent company, wasn’t in the business of sex, it was in the business of bots. Its site became a prototype for what social media platforms such as Facebook are becoming: places so packed with AI-generated nonsense that they feel like spam cages, or information prisons where the only messages that get through are auto-generated ads.

7
32
submitted 2 hours ago by jeffw@lemmy.world to c/technology@lemmy.world
8
-17
Hire bu (jlai.lu)

Hiring a Bubble.io Developer from Empiric Infotech LLP offers the assurance of a skilled and passionate professional well-versed in the versatile bubble io platform. Our expertise enables the creation of exceptional web applications that cater to your unique requirements, whether it's e-commerce, data-driven tools, or user-friendly applications. Committed to a client-centric approach, Empiric Infotech LLP values open communication and collaboration, prioritizing your project's success. With a proven track record and a focus on delivering projects on time and within budget, we are a trusted partner dedicated to helping you excel in the competitive digital landscape

9
246
submitted 6 hours ago by sverit@lemmy.ml to c/technology@lemmy.world

There were a number of exciting announcements from Apple at WWDC 2024, from macOS Sequoia to Apple Intelligence. However, a subtle addition to Xcode 16 — the development environment for Apple platforms, like iOS and macOS — is a feature called Predictive Code Completion. Unfortunately, if you bought into Apple's claim that 8GB of unified memory was enough for base-model Apple silicon Macs, you won't be able to use it. There's a memory requirement for Predictive Code Completion in Xcode 16, and it's the closest thing we'll get from Apple to an admission that 8GB of memory isn't really enough for a new Mac in 2024.

10
159

The music industry has officially declared war on Suno and Udio, two of the most prominent AI music generators. A group of music labels including Universal Music Group, Warner Music Group, and Sony Music Group has filed lawsuits in US federal court on Monday morning alleging copyright infringement on a “massive scale.”

The plaintiffs seek damages up to $150,000 per work infringed. The lawsuit against Suno is filed in Massachusetts, while the case against Udio’s parent company Uncharted Inc. was filed in New York. Suno and Udio did not immediately respond to a request to comment.

“Unlicensed services like Suno and Udio that claim it’s ‘fair’ to copy an artist’s life’s work and exploit it for their own profit without consent or pay set back the promise of genuinely innovative AI for us all,” Recording Industry Association of America chair and CEO Mitch Glazier said in a press release.

11
388
12
104
submitted 10 hours ago by mox@lemmy.sdf.org to c/technology@lemmy.world
13
630
  • Microsoft removes guide on converting Microsoft accounts to Local, pushing for Microsoft sign-ins.
  • Instructions once available, now missing - likely due to company's preference for Microsoft accounts.
  • People may resist switching to Microsoft accounts for privacy reasons, despite company's stance.
14
-32
  • Firefox 127 has introduced privacy tweaks that are causing user dissatisfaction, particularly due to changes like the separation of normal and private windows on the taskbar and the closing of private tabs when the main instance closes on iOS.
  • Despite user complaints, the update includes new privacy and security enhancements such as upgrading subresources from HTTP to HTTPS and masking CPU architecture to reduce fingerprinting.
  • Mozilla plans to address user feedback by reintroducing the "browser.privateWindowSeparation.enabled" preference as an opt-in and adding more intuitive privacy settings in future updates.
15
155
16
105

The C.E.O. and his team drove Meta’s efforts to capture young users and misled the public about the risks, lawsuits by state attorneys general say.

17
195
submitted 16 hours ago by lemmee_in@lemm.ee to c/technology@lemmy.world

A few months after opening a non-compliance case on Apple and the Digital Markets Act (DMA), the European Commission has shared its preliminary findings with Apple. And the bottom line is that the current App Store rules are in breach of the DMA. Confirmed violations of the DMA can lead to fines of up to 10% of global annual turnover.

“‘Act different’ should be their new slogan,” the EU’s internal market commissioner, Thierry Breton, wrote on X. “For too long, Apple has been squeezing out innovative companies — denying consumers new opportunities & choices.”

In this particular case, the European Commission believes third-party developers should be able to inform customers of alternative purchasing possibilities — free of charge.

For instance, developers who have released apps on the App Store can’t advertise different prices or alternative distribution channels in their apps. While Apple now allows developers to include a link to their site, the European Commission believes there are too many restrictions with this link-out mechanism.

Even if developers redirect users to their websites and handle transactions on their websites, they have to report transactions to Apple and pay a commission. Apple only waives a 3% payment processing fee for web purchases.

18
125
19
68
20
81
submitted 18 hours ago* (last edited 17 hours ago) by MHSJenkins@infosec.pub to c/technology@lemmy.world

My thoughts on the #futureoftheinternet, #digitalfreedom, #freedomofinformation, and #accessibility--with some #FOSS and #anarchy thrown in, of course.

I absolutely welcome comments and feedback offered in good will from the informed minds gathered in this particular digital space #Lemmy #Fediverse #keepsmesane

21
70
submitted 17 hours ago by 0x815@feddit.de to c/technology@lemmy.world

Archived link

Even by conservative measures, researchers say that China's subsidies green-tech products such as battery electric vehicles and wind turbines is multiple times higher compared to the support granted to countriesin tbe European Union (EU) and the Organisation for Economic Co-operation and Development (OECD).

The researchers conclude that the EU should use its strong bargaining power due to the single market to induce the Chinese government to abandon the most harmful subsidies.

TLDR:

  • Quantification of overall Chinese industrial subsidies is difficult due to "China-specific factors”, which include, most notably, below-market land sales, but also below-market credit to state-owned enterprises (SOEs), support through state investment funds, and other subsidies for which there are no official numbers.
  • Even when taking a conservative approach and considering only quantifiable factors of these subsidies, public support for Chinese companies to add up to at least €221.3 billion, or 1.73% of GDP in 2019. Relative to GDP, public support is about three times higher in China than in France (0.55%) and about four times higher than in Germany (0.41%) or the United States (0.39%).
  • Large industrial firms such as EV maker BYD are offered disproportionately more support. The industrial firms from China received government support equivalent to about 4.5% of their revenues, according to a research report. By far the largest part of this support comes in the form of below-market borrowing.

Regarding electrical vehicles, the researchers write:

China’s rise to the world’s largest market and production base for battery electric vehicles has been boosted by the Chinese government’s longstanding extensive support of the industry, which includes both demand- and supply-side subsidies. Substantial purchase subsidies and tax breaks to stimulate sales of battery electric vehicles (BEV) are, of course, not unique to China but are also widespread within the EU and other Western countries, where (per vehicle) purchase subsidies have often been substantially higher than in China. A distinctive feature of purchase subsidies for BEV in China, however, is that they are paid out directly to manufacturers rather than consumers and that they are paid only for electric vehicles produced in China, thereby discriminating against imported cars.

By far the largest recipient of purchase subsidies was Chinese NEV manufacturer BYD, which in 2022 alone received purchase subsidies amounting to €1.6 billion (for about 1.4 million NEV) (Figure 4). The second largest recipient of purchase subsidies was US-headquartered Tesla, which received about €0.4 billion (for about 250,000 BEV produced in its Shanghai Gigafactory). While the ten next highest recipients of purchase subsidies are all Chinese, there are also three Sino-foreign joint ventures (the two VW joint ventures with FAW and SAIC as well as SAIC GM Wuling) among the top 20 purchase subsidy recipients.

22
597
submitted 23 hours ago by lemmee_in@lemm.ee to c/technology@lemmy.world

Microsoft has been pushing hard for its users to sign into Windows with a Microsoft Account. The newest Windows 11 installer removed the easy bypass to the requirement that you make an account or login with your existing account. If you didn't install Windows 11 without a Microsoft Account and now want to stop sending the company your data, you can still switch to a local account after the fact. Microsoft even had instructions on how to do this on its official support website - or at least it used to...

23
224
24
50
submitted 23 hours ago by 0x815@feddit.de to c/technology@lemmy.world

Hacking group RedJuliett compromised two dozen organisations in Taiwan and elsewhere, report says.

A suspected China-backed hacking outfit has intensified attacks on organisations in Taiwan as part of Beijing’s intelligence-gathering activities on the self-governing island, a cybersecurity firm has said.

The hacking group, RedJuliett, compromised two dozen organisations between November 2023 and April of this year, likely in support of intelligence collection on Taiwan’s diplomatic relations and technological development, Recorded Future said in a report released on Monday.

RedJuliett exploited vulnerabilities in internet-facing appliances, such as firewalls and virtual private networks (VPNs), to compromise its targets, which included tech firms, government agencies and universities, the United States-based cybersecurity firm said.

RedJuliett also conducted “network reconnaissance or attempted exploitation” against more than 70 Taiwanese organisations, including multiple de facto embassies, according to the firm.

“Within Taiwan, we observed RedJuliett heavily target the technology industry, including organisations in critical technology fields. RedJuliett conducted vulnerability scanning or attempted exploitation against a semiconductor company and two Taiwanese aerospace companies that have contracts with the Taiwanese military,” Recorded Future said in its report.

“The group also targeted eight electronics manufacturers, two universities focused on technology, an industrial embedded systems company, a technology-focused research and development institute, and seven computing industry associations.”

While nearly two-thirds of the targets were in Taiwan, the group also compromised organisations elsewhere, including religious organisations in Taiwan, Hong Kong, and South Korea and a university in Djibouti.

Recorded Future said it expected Chinese state-sponsored hackers to continue targeting Taiwan for intelligence-gathering activities.

"We also anticipate that Chinese state-sponsored groups will continue to focus on conducting reconnaissance against and exploiting public-facing devices, as this has proved a successful tactic in scaling initial access against a wide range of global targets,” the cybersecurity firm said.

China’s Ministry of Foreign Affairs and its embassy in Washington, DC did not immediately respond to requests for comment.

Beijing has previously denied engaging in cyber-espionage – a practice carried out by governments worldwide – instead casting itself as a regular victim of cyberattacks.

China claims democratically ruled Taiwan as part of its territory, although the Chinese Communist Party has never exerted control over the island.

Relations between Beijing and Taipei have deteriorated as Taiwan’s ruling Democratic Progressive Party has sought to boost the island’s profile on the international stage.

On Monday, Taiwanese President William Lai Ching-te hit out at Beijing after it issued legal guidelines threatening the death penalty for those who advocate Taiwanese independence.

“I want to stress, democracy is not a crime; it’s autocracy that is the real evil,” Lai told reporters.

Lai, whom Beijing has branded a “separatist”, has said there is no need to formally declare independence for Taiwan because it is already an independent sovereign state.

25
155

To use the Montreal subway (the Métro), you tap a paper ticket against the turnstile and it opens. The ticket works through a system called NFC, but what's happening internally? How does the ticket work without a battery? How does it communicate with the turnstile? And how can it be so cheap that you can throw the ticket away after one use? To answer these questions, I opened up a ticket and examined the tiny chip inside.

view more: next ›

Technology

55421 readers
3527 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS