Everything posted by Angel of Death
-
LONDON -- London finally honoured the late Princess Diana Wednesday with a blue plaque at the place she called home in the two years before she married Prince Charles and her life in the goldfish bowl began. For Diana, 60 Coleherne Court, an apartment near London's fashionable King's Road, was the start of a new adventure. Settling in the capital on reaching her 18th birthday, Diana shared the apartment with a number of friends from 1979 to 1981. It was there that she first started to court Charles. One of her roommates then, Virginia Clarke, helped unveil the English Heritage plaque during Wednesday's ceremony."Those were happy days for all of us and the flat was always full of laughter," she said. "Diana went off to become so much to so many. It's wonderful that her legacy will be remembered in this way." According to Andrew Morton's 1992 best-selling book "Diana, In Her Own Words," Diana described her years at the property as "the happiest time" of her life. Diana, who died in a car crash in Paris in 1997, is the highest profile former member of the monarchy to be bestowed the honor. She was nominated by the London Assembly in 2019 after the body ran a campaign asking Londoners to suggest women worthy of a blue plaque. "Diana had, and still has, a very special place in the hearts of Londoners and we are thrilled to see her blue plaque formally placed as a monument to her work for others," said Andrew Boff, chairman of the London Assembly. The honor comes in the year when she would have celebrated her 60th birthday. "Diana was one of the world's most famous women and she used her fame and influence to raise awareness of issues such as homelessness and landmines," said Anna Eavis, the curatorial director at English Heritage. "It is fitting that our blue plaque remembers her at this place where her life in the public eye first began," she added. The renowned London blue plaque program began more than 150 years ago. The plaques commemorate people who achieved something worthwhile in their lives and who made London their home at some point. There are more than 900 official plaques in the capital.
-
Lance Corporal Robert Cook will receive full military honours after his identity was confirmed by experts, known as the War Detectives. He was among tens of thousands of soldiers who lost their lives during intensive fighting around the town of Ypres, dying on 2 May 1915 aged 38. Born in Bishop Wilton in 1876 in the East Riding of Yorkshire, he was one of seven children and served with the 2nd Battalion The Essex Regiment. He had also served in the Boer War in South Africa. He will be buried at the Commonwealth War Graves Commission's New Irish Farm Cemetery near Ypres on Wednesday afternoon. L/Cpl Cook's great-nephew and great-niece are set to attend the service on behalf of his surviving family.Also present will be members of the modern equivalent of his regiment - members of the C "Essex" Company of 1st Battalion The Royal Anglian Regiment. His body, like so many others, had been missing for a century and his name was among 54,000 inscribed on the Menin Gate memorial to the missing. Between 2014 and 2015, the remains of 24 soldiers were found during construction work, near what is believed to have been a Regimental Aid Post during the war.His was found with a medal ribbon bar, shoulder ties and the cap badge of The Essex Regiment. All but one of the soldiers have been buried following investigations by the Ministry of Defence's Joint Casualty and Compassionate Centre (JCCC). To this day, tens of thousands of those who fell in Flanders fields, including during the five battles of Ypres, have never been found.
-
1. The Supreme Court again refused to block Texas’ abortion law, but agreed to fast-track suits challenging it. Arguments are set for Nov. 1. The court will consider two appeals: one from the Justice Department and one from abortion providers in Texas. The arguments will be limited to the procedural question of whether the Texas law is subject to review in federal court given its novel structure, which was designed to evade judicial challenges. The Texas law, which makes no exceptions for pregnancies resulting from incest or rape, deputizes private individuals to sue anyone who performs an abortion or “aids and abets” one. The court turned down a request from officials in Texas to decide whether to entirely overturn the right to abortion established in 1973, in Roe v. Wade. That question is already before the court in a case challenging a Mississippi law that bans most abortions after 15 weeks. Arguments in that case are set for Dec. 1.
-
Since their commercialization in 1991, lithium-ion batteries have received worldwide success. However, this cannot hide their intrinsic limitations in terms of safety, performance, and form factor. Most current lithium-ion technologies employ liquid electrolytes, with lithium salts such as LiPF6, LiBF4, or LiClO4 in an organic solvent. However, the solid electrolyte interface, which is caused as a result of the decomposition of the electrolyte at the negative electrode, limits the effective conductance. Furthermore, liquid electrolytes need membranes to separate the cathode and anode, as well as an impermeable casing to avoid leakage. Therefore, the size and design freedom for these batteries are constrained. In addition, liquid electrolytes have safety and health issues as they use flammable and corrosive liquids. Samsung's Firegate has particularly highlighted the risks that even large companies incur when flammable liquid electrolytes are used, as well as the dozens of electric vehicle fire accidents caused by battery combustion. Current high-end lithium-ion batteries can reach an energy density of over 700 Wh/L at cell level, with a maximum driving range of about 500 Km for electric vehicles. The high-nickel-cathode materials being improved may further push the energy density but the characteristics of the active materials may draw a threshold. Solid-state batteries can make a difference Solid-state batteries replace organic liquid electrolytes with solid-state counterparts, enabling safer, long-lasting batteries. In addition, solid-state electrolytes can be compatible with high voltage-cathode materials and high-capacity lithium metal anode. It is possible to push the energy density beyond 1,000 Wh/L. Better safety means less safety monitoring electronics in the battery modules/packs. Therefore, even the initial generations of solid-state batteries may have similar or even less energy density than conventional lithium-ion batteries. The energy available in the battery pack can be comparable or even higher than the latter. With the larger electrochemical window that the solid electrolytes can provide, high voltage cathode materials can be used. In addition, high-energy-density lithium metal anode can further push the energy density beyond 1,000 Wh/L. These features can further make the solid-state battery a game-changer. Within solid-state batteries, there are various technology approaches. IDTechEx has identified solid-state battery technologies including solid polymer electrolyte, as well as other 8 inorganic electrolyte types such as LISICON-like, argyrodites, garnet, NASICON-like, Perovskite, LiPON, Li-Hydride, and Li-Halide. In general, oxide, sulfide, and polymer systems have become po[CENSORED]r options in next-generation development. Sulfide electrolytes have advantages of high ionic conductivity, even better than liquid electrolytes, low processing temperature, wide electrochemical stability window, etc. Many features make them appealing, being considered by many as the ultimate option. However, the difficulty of manufacturing and the toxic by-product hydrogen sulfide generated in the process make the commercialization relatively slow. Polymer systems are easy to fabricate, and they are closest to commercialization, while the relatively high operating temperature, low anti-oxide potential, and worse stability indicate challenges. Oxide systems are stable and safe, while the higher interface resistance and high processing temperature show some difficulties in general. The race between polymer, oxide, and sulfide systems is unclear so far and it is common to see battery companies trying multiple approaches. Complex technology approaches make the decision difficult. What is next? There have been numerous press releases on the progress of solid-state batteries and electric vehicle prototypes equipped with solid-state batteries. It seems the focus on solid-state batteries will mainly be battery cells. However, this will only be part of the future focus. Another important trend is the cell to pack (CTP) approach. CTP is not a new concept and it can be found in designs based on lithium-ion batteries already, such as BYD's blade battery and CATL's CTP designs. The CTP concept will become more important due to the better safety of solid-state battery cells. Better battery safety means a more flexible pack design and fewer electronics/components used in the battery module/packs. For instance, the bipolar design enables higher energy density. It is possible that initial generations of solid-state batteries may not equip with high-voltage, high-capacity cathode, and lithium metal anode, thus leading to energy densities less than commercial lithium-ion batteries. It is also expected that the initial costs of solid-state battery cells are higher than lithium-ion counterparts. However, with higher energy density at pack level with flexible design and fewer materials/components used, it is possible that solid-state battery packs can be comparable to or even better than lithium-ion batteries. For further understanding of the markets, players, technologies, opportunities, and challenges, please refer to IDTechEx's report "Solid-State and Polymer Batteries 2021-2031: Technology, Forecasts, Players". For more information on this report, please visit www.IDTechEx.com/SSB, or for the full portfolio of Energy Storage research available from IDTechEx please visit
-
Bungie is coming down on players who've been exploiting a major game-breaking bug in Destiny 2, but the current solution may be pulling legitimate players into the crossfire too. The min/max glitch has quietly been on Bungie's radar for a few months, but a video showing how to replicate the bug has thrown the exploit out in the open. Popping the game into windowed mode and holding down the minimise window button for five seconds before using certain super abilities causes the game to have a bit of a moment, tanking framerate and dropping a ton of Orbs of Power—essentially allowing for a constant stream of supers. It's a huge issue for PvP in particular, with the glitch theoretically letting teams who use steamroll their opponents.Senior community manager dmg04 says that the development team has been "silently working" on a fix for a while now, but called it "an incredibly deep and difficult to fix bug." A patch is currently penned in for December, but Bungie is starting to take action against those exploiting the issue.Significant dips in framerate will now force Rutabaga errors, bumping you out of whatever you're doing. Dmg04 also warned that erroring out a handful of times "can be met with escalating restrictions," adding "aside from recommending you don't negatively impact the experience of others by reproducing this issue, I also recommend not ruining your own."The main issue with the current solution is that it can cause issues for those who suffer from regular framerate hitches and even people who regularly Alt+Tab out of the game to be slapped with a PvP timeout. Dmg04 said it shouldn't result in a full account ban though, and players who are being wrongfully errored out can respond to a Destiny help thread. While the current band-aid may come with some frustrating caveats, it beats getting unfairly crapped on during matches.A fresh writer in the industry, Mollie has been taken under PC Gamer's RGB-laden wing, making sure she doesn't get up to too much mischief on the site. She's not quite sure what a Command & Conquer is, but she can rattle on for hours about all the obscure rhythm games and strange MMOs from the 2000s. She's been cooking up all manner of news, previews and features while she's been here, but especially enjoys when she gets to write about Final Fantasy, Persona, The Sims, and whatever other game she's currently hopelessly fixated on. There's a good chance she's boring another PC Gamer writer about her latest obsession as we speak.
-
will not offer an estate version of the new Fabia, despite earlier confirmations from high-ranking company executives that it was inbound. As the Czech brand ramps up its move towards an electrified model range, it has decided to pull the plug on development of the wagon, which was due to arrive in 2023 and be produced at Skoda’s factory in Mladá Boleslav. The decision was made in line with the firm’s commitment to Skoda's Next Level strategy, which includes the launch of three EVs by 2030.The outgoing Fabia Estate has been essentially unrivalled in the UK for the last two years; the closely related Seat Ibiza ST was pulled from sale in 2017 and Dacia hasn't directly replaced the similarly sized and priced Logan MCV. Skoda confirmed to Autocar that the model would be removed from the Fabia range in an effort to meet emissions targets set by the EU. It said: “The European Commission’s recent decision to reduce the EU’s greenhouse gas emissions by 55% by 2030 is accelerating the transformation from the internal combustion engine to the e-car [EV]. “However, this also means we will be discontinuing some ICE products more quickly – particularly against the backdrop of increasingly stringent emissions legislation in Europe (Euro 7), compliance with which is associated with very high costs. “Following this decision, there will be no successor to the Fabia Estate. Nevertheless, our Czech plants will be working to full capacity. The demand for our vehicles is already exceeding our production capacities, and we're responding to the accelerated transformation to e-mobility by introducing additional e-vehicles.” Skoda CEO Thomas Schäfer previously said the variant would return in a post on his LinkedIn profile, before Volkswagen Group chairman Herbert Diess confirmed a planned 2023 launch date. “We will again have a combi [estate] version,” Schäfer said last December. “This is very important to us, because it underlines our commitment to offering affordable, practical mobility in the entry-level segments.” Czech sources had suggested the Fabia would exit production back in 2017, but the firm later confirmed the next-generation model would arrive by the end of 2022. The Fabia Estate accounts for 34% of the outgoing Fabia's total sales and can still be configured on Skoda's UK website, with prices starting from £18,205.
-
Karwa Chauth 2021 is one of the pious festivals wherein married women worship and observe fast for the long lives of their husbands. They observe fast from sunrise to moonrise and breaks it after sighting the moon. The fasting woman also sees her husband through the same sieve and intakes sweet and water that is given to her by her husband to break the fast.The romantic festival is much anticipated by the ladies in India, as they get ready in beautiful outfits, wear make-up, apply henna, and do the 16 sringaar. To enjoy this auspicious day with your partner, we have brought you the Karwa Chauth playlist for this year's festival.The Hum Dil De Chuke Sanam song is sung by Udit Narayan, Alka Yagnik. The music video features Salman Khan and AishwaryaKabhi Khushi Kabhi Gham song is sung by Amit Kumar, Udit Narayan, Alka Yagnik, Kavita Krishnamurthy, Sonu Nigam. The movie features, Kareena Kapoor, Shah Rukh Khan, Kajol, and Hritik Roshan.
-
While some Friends stars tried to shake off their former characters and move on with their careers after the series ended in 2004, Tyler always seemed relaxed about being known as Gunther. The waiter and manager at coffee house Central Perk gradually became a fan favourite over the sitcom's 10-year run. And long after the show ended, Tyler kept close ties to the Friends brand. He would speak to the press every time the Friends set went on tour around the world. He would pose for selfies and sign autographs when stopped by fans of the show. "Occasionally, I'll still get recognised as Gunther, which is OK with me," he said in 2018. As an actor, Tyler didn't have a huge number of other film and TV credits to his name. But he did appear alongside Matt LeBlanc once again in the BBC comedy Episodes in 2012, as part of a storyline where the Joey actor attempted (and largely failed) to get the other stars of Friends back together.After the six main stars, Gunther was the character with the most appearances in Friends, cropping up in 185 episodes - more than Janice, Carol, Susan, Phoebe's husband Mike, and Ross and Monica's parents Jack and Judy put together.Having said that, he didn't necessarily speak in every episode he appeared in. Tyler often wasn't even credited because Gunther was simply seen in the background, behind the bar, particularly in the early years. He initially got the job on Friends because he knew how to work a coffee machine. But he was gradually given more and more material over the years, delivering killer one-liners in his character's droll manner. To remember the actor and the part he played, here are some of Gunther's best moments:
-
It looked like a calculator app. But it was actually spyware recording my every keystroke — the type of data that would give a stalker unfettered access to my private life. That’s what I concluded after downloading the free app Flash Keylogger onto an Android smartphone this week. The app described itself as a tool to monitor the online activities of family members by logging what they type. Once it was installed from Google’s official app store, its icon could be changed to that of a calculator or calendar app. In my tests, the app documented all of my typing, including web searches, text messages and emails. Flash Keylogger is part of a rapidly expanding group of apps known as “stalkerware.” While these apps numbered in the hundreds a few years ago, they have since grown into the thousands. They are widely available on Google’s Play Store and to a lesser degree on Apple’s App Store, often with innocuous names like MobileTool, Agent and Cerberus. And they have become such a tool for digital domestic abuse that Apple and Google have started in the last year acknowledging that the apps are an issue. From last September to May, the number of devices infected with stalkerware jumped 63 percent, according to a study by the security firm NortonLifeLock. This month, the Federal Trade Commission said it had barred one app maker, Support King, from offering SpyFone, a piece of stalkerware that gains access to a victim’s location, photos and messages. It was the first ban of its kind.It’s extremely invasive, it’s a very big deal and it’s linked to some of the worst abuse I’ve seen in intimate partner abuse,” Eva Galperin, a cybersecurity director at the Electronic Frontier Foundation, the digital rights organization, said of the apps. Stalkerware is a thorny issue because it lives in a gray area. There are legitimate uses for surveillance apps, like parental control software that monitors children online to protect them from predators. But this technology becomes stalkerware when it’s stealthily installed on a partner’s phone to spy on him or her without consent. Such apps are more pervasive on phones running Android, researchers said, because the more open nature of Google’s software system gives the programs deeper access to device data and lets people install whatever apps they want on their phones. Yet new stalking software targeting iPhones has also emerged.Google said it banned apps that violated its policies, including the Flash Keylogger app after I contacted Google about it. An Apple spokesman referred me to a safety guide that it published last year in response to the threat of these apps. He added that the new stalkerware was not a vulnerability in the iPhone that could be fixed with technology if an abuser had access to a person’s device and passcode. Editors’ Picks David Sedaris Knows What You’ll Laugh at When No One Is Judging ‘The End of Bias’ Says There’s Hope for Meaningful Change What We Learned From Week 7 in the N.F.L.
-
"I've heard increasing concern about these kinds of issues from our members, who are familiar with the computing, software, and networking technologies upon which these truly societal-scale systems are built," said IEEE Computer Society President Forrest Shull. "It was clear to us that an event like this one could be of real service to the computing profession, providing a platform for us to address critical issues by doing what the Computer Society is best at - developing communities and supporting communication among thought-leaders in diverse stakeholder groups, as well as the larger professional community." The fast-paced development of innovative computing technologies that constitute truly societal-scale social media systems, and the equally large-scale impacts – good and bad – that those systems have on day-to-day life, are among the defining issues of our time. With a combination of keynotes, Q&A sessions, and panel discussions with dedicated breakout sessions following, the forum provides a unique environment for attendees to hear the latest approaches to these critical problems. Mitigating Societal Harms in a Social Media World will provide opportunities to: Hear about existing technologies that could solve challenges presented by societal harms. Participate in dynamic break-out discussions that provide an objective space for civil attendees and policy makers to meet with technical professionals. Dispel myths through access to a baseline of knowledge suited for government officials and employees, and gain objective insights into the spectrum of challenges and solutions. Share concerns with technologists who are actively working on solutions. Viewpoints from experts working in policy will be explored, along with technical standards, use cases, and strategies built on promising technologies such as AI and machine learning. The forum will bring together policymakers and technologists to explore the intersection of current technical efforts and public policies and the resulting impacts on society. Passes are complimentary for a limited time only - REGISTER TODAY. About the IEEE Computer Society The IEEE Computer Society is the world's home for computer science, engineering, and technology. A global leader in providing access to computer science research, analysis, and information, the IEEE Computer Society offers a comprehensive array of unmatched products, services, and opportunities for individuals at all stages of their professional career. Known as the premier organization that empowers the people who drive technology, the IEEE Computer Society offers international conferences, peer-reviewed publications, a unique digital library, and training programs. Visit computer.org for more information. SOURCE IEEE Computer Society
-
might just be the perfect Halloween game. It gets you together with friends. Its gameplay is built on tension, thrills, and kills. It even features a hall-of-fame-level cast of original characters and iconic legends from horror’s biggest film and gaming franchises. Halloween is in our DNA, and with a new tome open in the archives, a new survivor joining the roster, and a huge Halloween event locked and loaded, there are more reasons than ever to step into the Fog this October. If you’re playing for the first time you can even try Dead by Daylight for free until October 25 with Free Play Days! The Archives – Tome 9: Crescendo Not only does our latest Tome feature three new terrifying tales from the world of Dead by Daylight, but for the first time ever a pair of those stories intersect, presenting two very different perspectives of a single chilling event.Picking up with the All-Kill Chapter’s fan-favorite K-Pop legends, The Trickster and Yun-Jin Lee, we’re treated to each character’s POV as an unexpected abduction on the eve of a violent storm puts their relationship to the test. Players can also jump into the Cresendo Rift, free to all, and earn unique fan-inspired outfits for The Plague and Élodie Rakoto. If you brought your king-size pillowcase trick or treating this year, the Premium Track lets you claim over 60 cosmetic items worth over 20,000 Auric Cells. As featured Tome 9 characters, we’re also offering 50% off the Auric Cell, and 25% off the Iridescent Shard (in-game currency) prices for The Trickster and Yun-Jin Lee from now until October 27 at 11 a.m. ET.Mikaela Reid not only loves Halloween she loves horror stories too. She reads them, she writes them, and over time has even developed a keen interest in witchcraft. In addition to her unique look and personality, her Perks are also one of a kind. Mikaela stands as the first Survivor with the ability to harness the power of Totems, creating healing and protection boons for herself and her allies, and instantly making her an invaluable part of any team. Not all witches are wicked, and this one is poised to do great things in the Entity’s Realm. The Midnight Grove Halloween Event Dead by Daylight brings the creepy vibes 365 days of the year, but Halloween is our chance to take it to the next level. Starting today and running until November 4th, players can take part in The Midnight Grove in-game event – which includes an all-new time-limited Event Tome, available through the Archives. The event decks our maps out with Halloween decorations, special items, and new this year: interactable jack-o-lanterns aplenty. Smash these sinister pumpkins to complete challenges and roll the dice to receive an instant trick or treat. For the (very short) duration of event, players can also earn special outfits for our new survivor, Mikaela Reid and The Doctor, as well as three new charms — all Midnight Grove exclusives. Completing challenges will also unlock a series of scary stories written by Mikaela herself. That’s all for now, folks! We hope this jam-packed October in Dead by Daylight will deliver more reasons than ever to step into (or back into!) the Fog and make this a Halloween to remember. And don’t forget, Dead by Daylight is currently free until October 25 with Free Play Days. See you in the Fog!
-
Nickname: Nasty Age: 19 Link with your forum profile: https://csblackdevil.com/forums/profile/76534-nasty語/ How much time do you spend on our channel ts every day?: all day Where do you want to moderate? Check this topic: free time How much time you can be active on the Journalists Channel?: 6 and 8 Link with your last request to join in our Team: https://csblackdevil.com/forums/topic/368043-journalists-request-prodexor/ Last 5 topics that you made on our section:https://csblackdevil.com/forums/topic/408021-animals-por-primera-vez-en-150-años-fotografían-a-un-búho-gigante-en-las-selvas-tropicales-de-ghana/?do=findComment&comment=2075471 https://csblackdevil.com/forums/topic/408020-auto-drawing-fire-we-talk-to-bmws-design-director/?do=findComment&comment=2075470 https://csblackdevil.com/forums/topic/408019-sport-sport-integrity-australia-to-yield-details-of-probe-into-claims-of-inappropriate-behaviour-in-womens-football/?do=findComment&comment=2075469 https://csblackdevil.com/forums/topic/408017-lifestyle-vakratunda-sankashti-chaturthi-2021-check-out-shubh-muhurat-significance-puja-vidhi-and-more-about-this-day/?do=findComment&comment=2075459 https://csblackdevil.com/forums/topic/408016-news-leon-bailey-how-aston-villa-forward-defied-odds-to-make-it-from-jamaica-to-premier-league/?do=findComment&comment=2075458
-
El búho real de Shelley es el búho más grande de las selvas tropicales africanas; se le considera una especie en peligro de extinción. Un búho gigante fue redescubierto en las selvas tropicales ghanesas luego de que en 150 años no se tuvieran avistamientos de él. Hablamos del búho real de Shelley, el cual puede llegar a medir hasta 60 centímetros de longitud. Este búho fue descrito por primera vez en 1872 por el investigador y curador del de la colección de aves del Museo de Historia Natural de Londres, Richard Bowdler Sharpe, cuando obtuvo un ejemplar gracias a un cazador de Ghana. Las últimas imágenes obtenidas del búho real de Shelley datan de 1975 de un ejemplar del zoológico de Amberes. Sin embargo, se trata de imágenes granuladas de escasa calidad. La otra supuesta fotografía del ave es una imagen manchada e imprecisa tomada en el Congo en la cual no se puede apreciar a ciencia cierta que se trate del animal que nos ocupa. Para ser más precisos, los últimos avistamientos oficiales de este búho gigante datan de la década de 1870. Luego de muchos intentos de investigar al ave y reportes falsos de avistamientos del búho real de Shelley, este hallazgo se convierte en un gran acontecimiento para los círculos científicos. Fue el 16 de octubre de 2021 cuando la casualidad y la buena suerte se cruzaron en el camino del Dr. Joseph Tobias, del Departamento de Ciencias de la Vida (Silwood Park) en el Imperial College de Londres, y su colega doctor Robert Williams. Ambos se encontraban de visita en el bosque de Atewa en Ghana cuando de pronto vieron a un pájaro enorme salir de su refugio a plena luz del día. La reacción no se hizo esperar: «ERA TAN GRANDE, AL PRINCIPIO PENSAMOS QUE ERA UN ÁGUILA», DIJO JOSEPH TOBIAS EN UN COMUNICADO. «AFORTUNADAMENTE, SE POSÓ EN UNA RAMA BAJA Y CUANDO LEVANTAMOS NUESTROS BINOCULARES. La imagen no dejaba lugar a dudas: los distintivos ojos negros, pico amarillo y enorme tamaño, no podía ser otro más que del búho real de Shelley. Ninguna otra especie de búho luce una apariencia similar. Búho real de Shelley a detalle Las medidas de esta especie de búho nos hacen notar por qué es el rey entre los búhos localizados en África. La longitud total de la especie es de 53 a 61 cm. La cuerda del ala mide de 420 a 492 mm, la cola mide 233 a 266 mm, el tarso mide de 76 a 84 mm y el pico mide de 56 a 62 mm. Las hembras pueden alcanzar longitudes más grandes que los machos. Se le considera una especie en peligro de extinción debido de manera principal a la destrucción de su hábitat por la mano del hombre. Al no tenerse tanta información acerca de esta especie de búho por las escasas ocasiones en que se le ha visto, hay muchos detalles no confirmados en torno a él. Su dieta se basa sobre todo en mamíferos y aves de tamaño mediano a grande. Las regiones de África central y occidental es donde el búho real de Shelley vive en su mayor parte. Esto contempla a Sierra Leona y Costa de Marfil, con una población aislada en Ghana. En África Central ocupa una zona entre Camerún y Gabón, además de una parte de República Democrática del Congo.
-
"It’s very authentic for BMW to do bold statements,” Domagoj Dukec says with the confident grin of someone who knows that he isn’t dealing in hyperbole. In this case, we’re talking about the i Vision Circular, the radical concept car that showcases how BMW will apply ‘circular economy’ principles to future production machines. But the head of BMW Design could also be talking about much of his recent work, from the ever-growing range of SUVs to the ever-growing kidney grilles.While it’s often divisive, Dukec has chosen to go for bold over bland. And that philosophy should stand BMW in good stead as the car industry undergoes a generational transformation through electrification, digitalisation and sustainability. For a car designer, that must be a huge but very exciting challenge.“You can’t choose in which epoch you’re a designer, but it’s very interesting to be one in a time when the car industry is facing such major challenges, where you don’t even know if it will survive,” says Dukec. “You can use your creativity to offer more, to offer new experiences of mobility.” The changes in the car industry go beyond the switch to EVs, which BMW has embraced with the likes of the iX3 and i4. Those cars are essentially electric versions of combustion-engined BMW models; for the third phase of its electrification strategy from 2025, BMW is taking a “radically new” approach, including a commitment to sustainability, new software and a new flexible platform that can underpin a huge range of cars. Company boss Oliver Zipse has named the new phase of models Neue Klasse (new class), reviving the name of the hugely po[CENSORED]r line of 1960s models that transformed the fortunes of the Munich firm. As you might have read in last week’s Autocar, the range will encompass all of BMW’s models, including an equivalent of the 3 Series.Before you get too excited about retro designs, Dukec insists that the only backward-looking thing about the Neue Klasse is the title. “We don’t make a homage to Neue Klasse,” he says.“But we’re a company who defined a new [market] segment and new product that was very relevant in the 1960s, combining elegance and dynamism in a way nobody else had before.” While BMW has yet to preview any of its new Neue Klasse designs, the i Vision Circular that was revealed at the Munich motor show recently does hint at the philosophy that will underpin it. It put a major focus on sustainability, using entirely recycled or recyclable materials and reducing styling elements such as chrome details. Dukec says that those principles will be applied to BMW’s future models. “Neue Klasse will stand for electrification, digitalisation and sustainability,” he explains. “We’re asking: ‘How can we make a car that’s sustainable and intelligent and do more with less?’ This is something that’s very authentic to BMW. “As designers, it’s about rethinking and reducing. It’s how we treat materials – not using chrome, creating materials to use less leather. For us, electrification alone isn’t the sustainable path it is for others. They think they make electric cars and there, work done. But the problem is bigger.” Dukec says that his design team has embraced the challenge of making more sustainable cars with conviction because “they’re completely convinced that this is the right thing” to do. He adds: “Designers are very responsible in their private lives, so they were always fighting, going: ‘I’m working in the car industry producing cars but at home I’m eating no meat.’ So our differentiator is to make a green car that isn’t greenwashing. We really believe luxury for our customers will be that they want consumption that’s really sustainable.”
-
Sankashti Chaturthi is one of the significant festivals dedicated to the supreme god, Lord Ganesha. As per the Hindu calendar, each month has two Chaturthi Tithi, namely Sankashti Chaturthi and Vinayaka Chaturthi. Sankashti Chaturthi falls after Purnima during Krishna Paksha, while Vinayaka Chaturthi falls after Amavasya during Shukla Paksha. However, when a Sankashti Chaturthi falls in the Ashwin month, it is called Vakratunda Sankashti Chaturthi Vrat. This month it will be observed on October 24, 2021. On this day, devotees observe a day-long fast and worship Lord Ganesha to seek his blessing for prosperous and obstacle-free life. Lord Ganesha is the supreme lord of intelligence and removes obstacles from his devotees' life. Vakratunda Sankashti Chaturthi 2021: Date and Shubh Muhurat Date: October 24, 2021, Sunday Chaturthi Tithi Begins - 03:01 AM on Oct 24, 2021 Chaturthi Tithi Ends - 05:43 AM on Oct 25, 2021 Moonrise on Sankashti Day - 08:07 PM Vakratunda Sankashti Chaturthi 2021: Significance Each month, Lord Ganesha, also known as Vighnaharta, is worshipped with the name and Peeta. On this day, devotees perform puja in the evening, after the moon is visible. It is believed, those who observe fast on this day are blessed with happy, prosperous and obstacle-free life. Also, on this day, Hindu married women observe Karwa Chauth for the safety and longevity of their husbands.Wake up early in the morning, take a bath and wear clean clothes. - Take a vow to observe fast religiously - In the evening, perform the puja by offering durva grass, flowers, incense stick, etc - Offer bhoj such as laddoo, puri, halwa, etc. - Read Vakratunda Sankashti Chaturthi vrat Katha and conclude the puja by performing aarti. - After the aarti, worship Lord Moon and offer araghya and break the fast. Posted By: Niharika Sanjeeiv
-
The 24-year-old, a £30m summer signing from Bayer Leverkusen, was brought on with just over an hour played. Within 21 minutes, he had delivered a swerving corner that led directly to a Lucas Digne own goal, sealed the victory with a powerful strike and, in doing so, sustained a hamstring injury that would see him substituted and ruled out for the next three games. He could return against Arsenal on Friday. If the Jamaican winger seemed to thump the ball past Asmir Begovic that day with singular purpose, it is probably because scoring a first Premier League goal is a moment he had been expecting for some time. "As soon as Leon walked into the first-team changing room, you could just feel that this guy had a lot of ambition," remembers Sandy Walsh, the Dutch full-back who played alongside a teenage Bailey with Belgian side Genk. "All of us want to make it, to make a step to a big club. But with him you could just feel it. So much ambition could be seen in his body language." That self-belief has carried him a long way. Bailey first came to Europe aged 12, accompanied by his adoptive father, Craig Butler, and brothers Kyle and Kevaughn. Butler ran the Phoenix All-Star academy in Kingston, Jamaica, which was part football school, part foster home, and Bailey was one of more than 20 boys he has adopted. Convinced of Bailey's talent, Butler sold his home and car to fund a cross-continental journey, but they barely had enough money to sustain themselves as they hopped from hostel to hostel, without appropriate clothes for the cold European weather. Bailey didn't see his mother for four years. They stopped in Austria, where Butler begged Red Bull Salzburg to offer his boys a trial. The club acquiesced but declined to sign the siblings. They instead joined second-tier USK Anif after being spotted playing in a local park by the club's sporting director. By the time Bailey was 15, Genk wanted to sign him and agreed to take on his brothers, too. However, Fifa rules preclude clubs from signing under-18 players from different continents. And when Butler travelled to Mexico for a business trip - and to obtain documents that would satisfy the Fifa laws and allow Bailey's signing for Genk to be ratified - he was kidnapped and robbed, leaving him with injuries serious enough to put him in hospital. Bailey's older brother Travis had to take care of the boys in Belgium. Upon Butler's return, he was denied residency and fell out with Genk after the club refused to a link-up deal with his academy back home. Bailey and co had to leave, returning to Jamaica. Undeterred, Bailey was back in Europe in February 2015, with Ajax trying to recruit him. But his age - still only 17 - meant he could not be signed professionally. He instead joined Trencin in Slovakia, with an eventual move to Ajax promised. But that switch collapsed and by August, after he turned 18, he instead - at last - signed for Genk. "He would tell stories about before, saying he had it hard in Jamaica," Walsh remembers. "He wanted to become a sprinter like Usain Bolt, an athlete. He was choosing between that and football, knowing that the football level in Jamaica wasn't big. "He wanted to go for being a professional footballer, knowing how hard it is from a country like Jamaica to get into Europe and get a fair chance. When you hear about what he had to go through, you have a lot of respect for him. He was reaching his dream of becoming a professional footballer in Europe." Bailey settled quickly in Belgium, soon breaking into the first team and demonstrating a useful knack for scoring in the most important games, including a rasping 20-yarder in a 5-2 victory over Anderlecht. Having impressed with his skill, speed and powerful shot, he was named Belgium's Young Footballer of the Year at the end of his first season with Genk. "Leon was always on a high level, even in training," says Walsh. "He knew his qualities and we knew his qualities. I loved playing with him in front of me. In all of the European games, he was amazing. In all the top games in Belgium, he was amazing. "When you're in the Europa League with a good team like Genk, if you can perform in the group stage and in the next round, there are going to be teams interested. But he didn't become an egoist on the pitch. He was still a team player. He was pushing me to become better, he was pushing the guys around him with assists and trying to have everybody happy in the changing room." After a stellar start to his second season in Belgium, Bailey moved to Leverkusen for 20m euros in January 2017, reportedly declining offers from Chelsea, Manchester City and Manchester United. He still had his eye on the Premier League though. "He was doubting whether to go to Germany or England," Walsh recalls. "If you perform in the Bundesliga, the way to the Premier League is much easier. Knowing the past, with Romelu Lukaku and [fellow former Genk standout] Kevin de Bruyne going to Chelsea, he saw that the step from the Belgian league to the Premier League is a big step. De Bruyne went to Germany and then became the main player at Manchester City." Bailey's form undulated across three-and-a-half seasons with Leverkusen. He raced to 11 goals and five assists in his first 22 appearances of the 2017-18 campaign but added just one more goal to his tally that season. The highs included an impressive series of stunning strikes - not least both goals in a 2-1 win at Bayern Munich in November 2019 - but the lows led to him falling from favour, starting just 12 Bundesliga games in 2019-20. But Bailey rediscovered his best form last season, scoring a career-high 15 goals and providing 11 assists, adding a level of consistency and maturity to his unquestionable talent. "He's a very good player, very skilful, a fast player with a very good shot," says Leverkusen's director of sport, Simon Rolfe. "He came here as a really young guy and developed a lot. At the end, he was a really top player. "He is very self-confident. He is a good team-mate. He is helpful to the other guys in the locker room. He was always a full part of the team. "There was a lot of interest in him in the last years because of his performances. This summer, he wanted to join the Premier League and that's why we agreed with Aston Villa for the transfer." He might only be 24 and with his best years ahead of him, but Bailey's lightning-rod Villa Park bow was more than a decade in the making, the realisation of a long-held Premier League dream.
-
icrosoft has released the first preview of the Windows Subsystem for Android (WSA) that finally brings support for Android apps to Windows 11. Although the company has decided to collaborate with Amazon to download the apps using the Amazon Appstore, it's possible to sideload Android apps. The new platform is currently available for computers using "United States" as the region, are enrolled in the Beta Channel of the Windows Insider Program, and meet the memory, processor, virtualization, and build of Windows 11 requirements. You will also need a United States-based Amazon account to use the Amazon Appstore. Since the Amazon Appstore only offers a limited number of apps, and not everyone has an Amazon account or an account based in the U.S., you can use the Android Debugging Bridge (ADB) tools to install apps from any source, using the ".apk" file.
-
The warnings had been issued for years. The techniques were simple enough — penetrate the platform through the onboard navigation system and then go horizontally across the onboard networks to gain control of key systems such as steering and the throttle. The hackers did exactly this — surprisingly without foreknowledge of the specific systems they were to hack prior to beginning the penetration. They were in and through the navigation interface in a remarkably short time and had control of both the steering systems and the throttle in quick succession. From this effort came a coveted “Black Badge” from the Maritime Hacking village of the annual cyber security conference DefCon, held in August 2021 in Las Vegas. The conference’s Hack the Sea Village “SeaTF” hacking challenge allowed teams of three to five individuals to gain hands-on experience hacking real maritime hardware in a controlled environment using Fathom5’s “Grace” maritime cyber security testbed. The simulated maritime bridge setup is meant to be an accurate facsimile of equipment typically in use onboard ocean-going vessels, allowing hacking teams to attack the afloat environment. Using realistic components and protocols, hackers were able to penetrate different maritime subsystems including navigation, firefighting, and steering systems. While this year’s challenge required hackers to tap into propulsion, steering, and navigation systems through a wired connection to their laptops, next year the hope is to provide a wireless environment.Importantly, the 2021 competition once more demonstrated that hacking skills from land-based systems and environments are easily transposable to a maritime environment. The winning team had neither experience in the simulated environment or in maritime hacking in general. A skilled hacking team typically takes at most 14 hours to penetrate the system safeguards and remotely take control of both steering and throttle controls. While the simulation used at DefCon did require “plugging into” the equipment, remote-access hacking is possible as demonstrated in February 2017, when hackers took control of a German-owned container vessel traveling from Cyprus to Djibouti. The hackers compromised both steering and maneuver controls. It was only when an information technology team came aboard to remediate that the ship’s crew regained control of the steering. Segregation of a ship’s internet protocol and serial networks can prevent this. Maritime Chokepoints Make Attractive Targets The vast bulk of the world’s critical economic and military traffic passes through a handful of narrow strategic waterways known as “maritime chokepoints.” While these waterways have always been prey to pirates, weather, and maritime accidents, these perils are now joined by maritime cyber attacks — whether conducted for ransom, malicious disruption, piracy, or as part of larger geopolitical conflicts. When a commercial vessel or warship is strategically delayed via sea-hacking, critical shipments are delayed by days or weeks. The massive size of modern container ships such as the Ever Given makes hacking their steering systems or forward speed a means of weaponizing the vessel. It is worth a bad actor’s effort to experiment with grounding a major new container ship remotely from land-based cells. The Suez Canal could be one of the more lucrative cyber disruption targets due to the amount and expected speed of traffic flow through its two-lane and one-lane sections. 30 percent of the world’s shipping container volume carrying 12 percent of global trade passes through the canal. Ships, including the very largest container vessels, can cut an average 12 days off a three-week trip from India to Italy by transiting the canal. The 205-meter-wide canal is known to be challenging even at modest speeds for ships the size of the Ever Given. Its 120-mile-long narrow transit offers the opportunity for cyber-induced disruption, particularly if one wanted to stall oil and gas deliveries to the Mediterranean and Europe. If the canal is blocked companies must take the alternative route — around the Cape of Good Hope, adding 10 to 12 days transit time, fuel costs, and security costs. Comparatively, according to a 2006 RAND study, the closing of the Malacca Strait would increase transit time by only an additional three days. With the grounding of the enormous container ship — the Ever Given — on March 23, 2021, the world was reintroduced to the issue of “maritime choke points”. The giant ship blocked the Suez Canal for six days. The Ever Given was not a cyber target this time but its grounding demonstrated the potential impact on global trade when a ship blocks a chokepoint. For example, the BBC reported that fears that the blockage would tie up shipments of crude oil resulted in crude prices rising by 4 percent on international markets. The Ever Given was launched in 2018, and is one of the largest ships in the world. It was built and is owned by a Japanese firm, leased and operated by a Taiwanese company, and sailing under a Panamanian flag. Similar-sized ships carry an increasing percentage of global trade, and the relatively recent 2015 addition of a second channel to the Suez Canal was undertaken in part to accommodate them. The canal is wide enough to accommodate such large vessels but physical clearance on either side of both channels is currently still limited. Mistakes in speed or understanding of wind effects on huge vessels can (and did in this case) come from human error. But they can also be stimulated by difficult-to-detect cyber intrusions into the navigation and steering systems of these ships, especially in newer vessels. The internet protocol networks used for steering and navigation are often not segregated effectively for cyber security. They are connected to the serial bus networks that make up the supervisory control and data acquisition systems critical to ship operations. The blockage caused by the grounding of the Ever Given demonstrates to cyber-competent terrorists or adversaries the potential for disruption if they are able to mani[CENSORED]te or disrupt transit mechanisms from the ships themselves, their containers’ content, and pilotage management systems. Even basic electricity supplies for locks such as those in the Panama Canal offer disruption options to a world of bad actors who have already demonstrated a willingness to attack critical infrastructure. The 900-kilometer-long Malacca Strait carries 40 percent of the world’s maritime trade, including a quarter of the globe’s seaborne oil supplies and 80 percent of the Middle East’s oil and gas supplies to China. Traffic congestion is its major challenge, particularly where the strait narrows to just 2.7 kilometers wide near Singapore. In addition to posing a lucrative target, these chokepoints also afford the opportunity, both from shore and through remote means, for potential bad actors to track particular ships, owners’ fleets, crew, content, origin, destination nationalities, or missions in order to select targets. These risks are aggravated as ships and systems rely increasingly on automation. Fully autonomous ships are a stated goal of the industry and the U.S. Navy. Such systems should include proper cyber security. Ships and Cyber Security Still Strangers In 2018, security researchers at Pen Test Partners found vulnerabilities in electronic chart display and information systems commonly used on cargo and container ships. These chart systems are often linked to GPS-guided autopilots, which when exploited give hackers the ability to access the operational technology of the ship: If networks are not segregated, hackers can remotely mani[CENSORED]te the ship’s steering, ballast pumps, and navigation. The electronic charting system is often slaved directly to the autopilot on many ships, causing the ship to automatically follow the charted course. Hackers can redirect the ship’s course by planting false information messages via satellite communications in order to mislead navigational decisions. Many satellite communications terminals on ships are available on the public internet with default credentials and can be hacked remotely. Numerous other paths can also prove useful vectors in the cyber attack of a vessel. For example, the 2018 research also showed that the electronic charting systems on some ships were still using relic operating systems with many known major vulnerabilities, such as Windows NT, often because these are expensive to upgrade. Even when malicious control is discovered, as the cliché goes, it can be very difficult to regain control in a timely manner. Commercial ship networks tend to have flat network architectures that are originally unsegmented networks without firewalls or other cyber security measures as part of their architecture. Once inside such networks, it is not difficult to travel around across the systems of the entire ship. Internal systems often use manufacturer default passwords, not just on firewalls but also on the critical programmable logic controllers running systems, as well as satellite communication equipment. Researchers have identified other vulnerabilities in computer-security forums, such as using the ship’s satellite terminal as a point of penetration. The terminal opens the system itself to attackers replacing the poorly secured firmware or simply reverting to an even less secure previous version, and then altering the applications running the terminal. Similar research results have produced similar concerns. Access in — whether through the electronic charting system, the satellite communications terminal, or any other outward-facing communications — means the ability to control critical ship systems covertly and use the massive bulk for any reason the attacker desires. At the outset some experts suggested that the Ever Given grounding was a cyber incident. When the voyage data recorder was examined, this speculation was shown to be wrong in this case. However, as long-time cyber control systems expert Joe Weiss noted, the potential for cyber disruption still exists. Despite the ship’s relative youth, the latest marine electronics likely installed for control and navigations do not resolve the vulnerabilities discussed earlier. The recent DefCon exercise is not a one-off example of success in simulated seahacking. Concurrent with the actual grounding of the Ever Given, a team of doctoral students competed in a NavalX “Hack the Machine” exercise — using the same “Grace” maritime system as DefCon — in order to determine if “hackers” could successfully attack maritime systems remotely through a cloud network. The team succeeded, “hacking and crashing the [fictional ship’s] cyber security monitoring system.” These oversights are major safety and security issues currently left unaddressed. One reason is a gap in crew skills and the costs of maintaining cyber secure systems while underway. Leaving poor default administrative passwords on essential systems means that attackers can take control of those systems. Shipping as a Cyber Campaign Weapon Attackers will not ignore the opportunities presented by poor maritime cyber security. A cyber campaign can provide a good enough return on investment in either economic or political benefits to make it attractive, and possibly even lucrative. American adversaries such as China, Russia, and Iran learn from these exploits and integrate them in larger cyber-enabled campaigns. Russia, for example, has spoofed a ship’s GPS at least 7,910 times between 2016 and 2019, affecting about 1300 commercial ships. In 2017, North Korean navigation jamming was said to be behind the forced return of hundreds of South Korean fishing vessels, and its cyber attacks led to the devastating NotPetya attacks that crippled the large Maersk shipping line the same year. In July 2021, Sky News reported the acquisition of documents said to originate from an Iranian offensive cyber unit called Shahid Kaveh, which is part of the Islamic Revolutionary Guard Corps cyber command. They present research on how to sink a cargo ship using cyber techniques and include details on the satellite communications systems used in the global shipping industry. The routine hacking of ships from space is coming. Currently the Global Navigation Satellite System constellation includes the American-run GPS, the Russian GLONASS, the European Union’s GALILEO, Japan’s QZSS, China’s BeiDou, and the Indian system known as NAVIC. Each nation’s ships tend to use their own national system. No nation’s commercial ships are as secure as necessary today, and they lag in securing the shipboard systems in the near and medium term. There is some talk of using older but functional radio wave technology as a more secure alternative to satellite-based systems, but the discussions are only just beginning. It is questionable how rapidly or widely alternatives such as eLORAN will spread. It will take investment and a sense of urgency on cyber security from major shipbuilding firms and shipping lines to accomplish this. As one researcher states, “[Electronic charting] systems pretty much never have anti-virus.” The anti-virus industry that protects land-based personal computers in the United States and Europe started over 30 years ago, but a multitude of huge ships launched during that time with complex computer architectures contain only basic cyber protection. U.S. and allied warships — as well as most of the world’s exporting economies — plan on free transit through the Suez Canal and other chokepoints. Iranian intelligence services have collected maps, means, and incentive to use maritime cyber weaknesses for Iranian campaigns. In the mid-1990s, Osama bin Laden’s al-Qaeda group experimented with a variety of attempted attacks using public transit, notably in Paris. Six years later al-Qaeda used commercial airliners against the Twin Towers in New York City on Sept. 11. The maritime cyber environment is abysmally insecure. The technical means to exploit these ships is well distributed across land-based hackers with no prior maritime systems experience. It doesn’t take much to mess with a passing ship. The opportunities are well-known, from the chokepoints and the ship dependence on external networks, clouds, and satellite navigation communications. The motivation is as varied as the adversary, ranging from the ransomware criminal, to the “just because they can” opportunist, to the state adversary and its proxies. The gauntlet is on the deck for the westernized democracies to pick up or ignore. Positive discussions of increasing national support for U.S. shipping — dangerously dependent on Chinese or other foreign shippers — don’t address the lagging cyber security and global disruption potential from hacking huge container ships. 90 percent of the world’s trade travels by sea and 40 million U.S. jobs depend on trade. In classic military strategic thought, the triad of means, opportunity, and motivation lacks only the final “when.” National security strategic actions should include a dramatic change in commercial shipping’s incentives that ensure — not merely indemnify — cyber defense of the vessels. The threat to maritime traffic can’t be ignored. The threat is real, bigger than merely assuring ports and hulls for the U.S. Navy. Serious national security responses should include both a carrot and stick. We suggest requiring proof of cyber security for container and other commercial ships that enter U.S. waters, and vastly increased federal financial support for cyber security for the ports, shipping, and shipbuilders that serve the needs of the U.S. maritime industry. In effect, the U.S. maritime industry should extend the 2020 National Maritime Cybersecurity Plan and the proposed bills in the current negotiations behind the SHIPYARD Act beyond ports alone to include container ships as an urgent first step. New policies need to require proof of and enable funding for cyber security upgrades in all container ships delivering cargo to U.S. ports. This is a strategic and national response that ought to be in concert with and cooperatively implemented with the other established seafaring nations. United with democratic allies, the U.S. government can strongly influence what is considered normal but is grossly inadequate in the construction, operations, and insurance of the worldwide maritime fleet. The United States and its allies are major stakeholders in the global maritime socio-technical-economic system. It is the same system that America’s major adversary, China, intends to dominate with ships, ports, export volumes, political and personal coercion, military saber-rattling, and technological command. Cyber vulnerabilities feed their lead in all these areas throughout the globe. Either the United States directly addresses the problem with commercial and government stakeholders, or it will spend much more in blood and treasure when adversaries attack at the time and place of their choosing. As the DefCon exercise demonstrated, even hacker curiosity could make a ship into a weaponLt. Col. (ret.) Michael L. Thomas, Ph.D., is currently assigned to Maxwell Air Force Base as a professor of cyberwarfare studies at the U.S. Air Force Cyber College. He is a graduate of both the Air Command and Staff College and the Air War College. Chris C. Demchak, Ph.D., is Grace Hopper Chair of Cyber Security and Senior Cyber Scholar, Cyber Innovation Policy Institute, U.S. Naval War College. Her manuscripts in progress are “Cyber Westphalia: States, Great Systems Conflict, and Collective Resilience” and “Cyber Commands: Organizing for Cybered Great Systems Conflict.” Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors and do not represent the views of the Air University, the U.S. Air Force, the U.S. Navy, the Department of Defense, or any other U.S. government agency.
-
This year I reconnected with a childhood friend and dragged him back into PC gaming. I chaperoned him through a few recent games, some casual multiplayer things (Back 4 Blood, Chivalry 2) and stuff that rekindled what we loved in the '90s (MechWarrior 5, Streets of Rage 4). I imagine a lot of you have had this experience, too, as our hobby has only become more mainstream with each passing year. Seeing PC gaming through a newcomer's eyes got me thinking: What's the best way to onramp someone to PC gaming today? Is it better to hand them homework and history, games that are at the heart of what makes PC gaming unique (whatever that means), or lighter stuff they'll enjoy instantaneously? It's a surprisingly hard question. You're a board-certified representative of your hobby. They're an impressionable baby-gamer. Their joy is a malleable lump in your hands. You don't want to throw someone straight into Kerbal Space Program as their first PC game. Counterpoint: Actually, do hurl your naive friend into the deep end, let them struggle, then experience the earned joy of successfully launching a shuttle to the Mün. Let's see if we can come up with a list of introductory games we all agree on. I'm sure that will go smoothly.
-
They have been almost a decade in the making, but have finally arrived: new U.S. export controls on “cybersecurity items,” including products and technology involving “intrusion software” and IP network communications surveillance. Published today but effective January 19, 2022, the interim final rule from the U.S. Commerce Department’s Bureau of Industry and Security (“BIS”) amends the Export Administration Regulations (“EAR”) to add these new cybersecurity export controls. The interim final rule is highly technical and complex, but ultimately contains a mix of good news and bad for the cybersecurity community. BIS states in its press announcement that the rule is only intended to restrict “malicious cyber activities,” but it nonetheless imposes compliance obligations and costs even when activities ultimately are not restricted. At least in this sense, the rule will impact the entire cybersecurity sector. Similar export controls have been in place for years in the EU and other jurisdictions, as this has been driven by an agreement reached several years ago by a multilateral export controls body, the Wassenaar Arrangement. The U.S. for its part has delayed implementation of this rule due to the controversy that has surrounded it. Many stakeholders, including some U.S. and non-U.S. government officials, have viewed this effort to impose export controls on “intrusion software” items as fundamentally misguided or at least improperly scoped, as the same cyber tools can be used either for positive (security) purposes or for nefarious (hacking or surveillance) purposes. Therefore, the critics say, it is like putting a round peg in a square hole to try to use export controls in this context. Moreover, some have questioned the potential of these rules to deter nefarious activities. Having taken account of these criticisms, BIS has tailored the interim final rule relatively narrowly. Still, it imposes new regulatory burdens on the vast majority of impacted parties that are engaged in critical security work, and ultimately in effect only restricts a small sliver of cyber activity that may be more controversial or malicious. BIS has invited industry and other stakeholders to (re)engage, and will be accepting comments over the course of the next 45 days on the expected impacts of the rule, including how it may deter, restrict or overburden legitimate cybersecurity research, defensive activity, and incident response. Comments must be submitted by December 6, 2021. BIS is expected to review constructive comments with an open mind, and changes to the rule are still possible. Below is a more detailed discussion of the new rule, starting with the background, which may be of particular interest for those considering (re)engaging on these issues with the government, and then going into the nuts and bolts of the new controls that are being imposed along with the key exceptions. Background and Context for (Re)engagement While advocacy groups have been raising concerns for well over a decade about nefarious uses of cyber technologies that have been implicated in violations of human rights, the key event in the history of the development of these cybersecurity export controls was the December 2013 plenary meeting of the Wassenaar Arrangement, where the U.S. government and other participants agreed to implement within their national laws new export controls on products and technologies involving “intrusion software” and IP network communications surveillance. This agreement at the 2013 Wassenaar Arrangement plenary was preceded by years of discussion, primarily within the EU, about how an expansion of export controls in this area could help address the increasing problem of malicious uses of cyber tools. The EU had begun a consultation process on this in 2011, and, at the time, had ambitions to enact a sweeping recast of its own EU export control regime to include a new “human security” element, which would have included even broader controls on cybersecurity items. See our previous advisories (here and here) on those historical developments in the EU. Ultimately, after intense backlash from industry and even many government stakeholders and others (including civil society security advocates), and following an arduous and protracted legislative process, the EU just last month enacted a much watered-down version of that initial regulatory concept. See our blog post for more on those EU developments. But the EU had already amended its dual-use control list soon after the December 2013 Wassenaar Arrangement plenary to add the basic list-based controls on “intrusion software” items and IP network communications surveillance items. The U.S. government did not follow the EU in promptly implementing these new Wassenaar Arrangement controls on cybersecurity items. The Wassenaar Arrangement does not operate pursuant to a binding international treaty, but rather relies on essentially political commitments by participating states to implement the agreed restrictions. The U.S. government is typically a leader of the Wassenaar Arrangement’s initiatives, normally implementing the controls adopted at each year’s plenary within just a few months. So this delay involving cybersecurity controls was exceptional in this respect. The U.S. government, through BIS, eventually published a proposed implementation of these controls in 2015. See our previous advisory for more on that BIS proposed rule, along with the accompanying FAQs from BIS, many of which are also informative in helping to interpret and understand the current interim final rule. This 2015 proposal by BIS was met with a great deal of concern from the cybersecurity community, particularly as it related to “intrusion software” items. (The proposed controls on IP network surveillance products were less controversial and are also being implemented now in the interim final rule.) The U.S. Congress also became involved, requiring senior administration officials to testify following the publication of BIS’s 2015 proposed rule and pressuring the administration to try to renegotiate the Wassenaar Arrangement agreement from 2013. Following an interagency debate, the Secretary of Commerce took the unusual step of writing a public letter to major industry associations in March of 2016, informing them that “the United States has proposed in this year’s Wassenaar Arrangement to eliminate the controls” on certain intrusion software items, while continuing discussions “aimed at resolving the serious scope and implementation issues raised by the cybersecurity community concerning remaining controls” other such items. The Secretary closed by stating that “President Obama has identified cybersecurity as one of the greatest national security challenges we face as a Nation. Cognizant of this, we commit to ensuring that the benefits of controlling the export of the purpose-built tools at issue outweigh the harm to effective U.S. cybersecurity operations and research.” After a failed attempt in 2016, the U.S. and other countries succeeded in implementing some fairly significant changes to these controls in the 2017 Wassenaar Arrangement plenary. These changes are detailed in the preamble to the current interim final rule and are reflected in the rule. While these 2017 changes were helpful, many observers continued to have concerns regarding the potential impact of the controls on cybersecurity, and the U.S. government delayed implementing these regulations for the next several years while the debate continued. However, in recent years the protection of human rights has become an increasingly prominent element of U.S. export control policy. See our blog post from last year for a more detailed discussion of these important policy shifts around human rights in the export controls arena. BIS’s press announcement for the interim final rule itself “encourages” regulated parties to consult the State Department’s human rights-focused due diligence guidance from last year for exports of surveillance products as a compliance aid in this context. The Biden administration has been particularly vocal about its goal of elevating human rights as a driver of U.S. foreign policy, including pushing in recent months for a revision of the U.S. Conventional Arms Transfer (“CAT”) policy with this in mind. BIS is also under a statutory mandate to impose new and expanded export controls on “emerging and foundational technologies,” as discussed in more detail in our previous blog post, and has been on the receiving end of considerable pressure from members of Congress to move more quickly and aggressively in those efforts. We have also seen a shift in recent enforcement actions toward more of a focus on human rights issues, including an unprecedented criminal case last month under the U.S. International Traffic in Arms Regulations (“ITAR”) against former U.S. intelligence community personnel for helping the government of the UAE to develop its own hacking capabilities, including through the use of “intrusion software” tools. In this context, the interim final rule from BIS is now emerging after a years-long debate both within the U.S. government and among other stakeholders about how export controls should be applied to restrict unwanted or malicious uses of cyber tools, including trying to avoid the grave human rights impacts that these technologies can have. Industry and others now have the opportunity to (re) engage in the comment process to raise questions or concerns regarding the imposition of any regulatory restrictions that they believe would unduly impact legitimate security work or negatively impact U.S. cybersecurity policy objectives. The Interim Final Rule In drafting the interim final rule, BIS has made efforts to achieve a policy balance between regulating malign uses of cyber tools and trying to avoid undue licensing burdens on the cybersecurity community. The new rule builds on the changes implemented at the Wassenaar Arrangement in 2017, and narrows the scope of the restrictions even further through a broad license exception. The rule will nonetheless impose additional compliance obligations on legitimate security work, as is inevitable when export controls intrude into a new area, particularly one as dynamic and fundamentally international as cybersecurity. In particular, the rule will require a detailed analysis to be undertaken for compliance assessments. In the multiple layers of control and de-control that BIS has built into this rule, the agency has created a sharp scalpel that is designed to focus in on the most controversial uses of “intrusion software” items, while trying to avoid restrictions on beneficial activity. The preamble to the interim final rule states that, “because of the limited scope of this rule, BIS believes the impact would be minimal.” Stakeholders may have real questions regarding the scope and costs of the rule. The government has estimated the cost to be $2,250.00 per year, which may strike affected companies as an underestimation Below we set out the two-step process for understanding the interim final rule, starting with what is subject to control in the first instance, and then assessing whether export activity for covered items is nonetheless authorized under new License Exception Authorized Cybersecurity Exports (“ACE”) or another carve-out from the EAR. In rare cases when a covered item cannot take advantage of one of these carve-outs, the licensing requirements are broad. The “intrusion software” items are to be controlled under the EAR for National Security (“NS Column 1”) reasons, which applies an authorization requirement for all countries in the world (and their nationals) except Canada. The IP network communications surveillance items are subject to less comprehensive but still broad NS Column 2 controls, which apply to all but the least sensitive countries (and their nationals). Step 1: What is a covered “cybersecurity item”? Covered “cybersecurity items” are described in the following new or expanded Export Control Classification Numbers (“ECCNs”) in the EAR’s Commerce Control List (“CCL”). (See also the 2015 FAQs from BIS, which provide some detailed and practical guidance on the intended scope of these controls.) ECCN 4A005: “Systems,” “equipment,” and “components” therefor, “specially designed” or modified for the generation, command and control, or delivery of “intrusion software” Note that “intrusion software” itself is not controlled. The definition of “intrusion software” (which already exists in Part 772 of the EAR) is “software” specially designed or modified to avoid detection by “monitoring tools,” or to defeat “protective countermeasures,” of a computer or network-capable device (including mobile devices and smart meters), and performing any of the following: (1) The extraction of data or information, from a computer or network-capable device, or the modification of system or user data; or (2) The modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions. Excluded from this definition are: Hypervisors, debuggers and Software Reverse Engineering (SRE) tools; Digital Rights Management (DRM) “software”; and “software” designed to be installed by manufacturers, administrators or users, for the purposes of asset tracking or recovery. The term “monitoring tools” means “software” or hardware devices, that monitor system behaviors or processes running on a device. This includes antivirus (AV) products, end point security products, Personal Security Products (PSP), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and firewalls. The term “protective countermeasures” means techniques designed to ensure the safe execution of code, such as Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR) and sandboxing. The EAR also includes a complex definition of the term “specially designed,” which is often not intuitive. ECCN 4D004: “Software” “specially designed” or modified for the generation, command and control, or delivery of “intrusion software.” ECCN 4D004 does not apply to “software” specially designed and limited to provide “software” updates or upgrades if: a. The update or upgrade operates only with the authorization of the owner or administrator of the system receiving it; and b. After the update or upgrade, the “software” updated or upgraded is neither “software” specified by 4D004 nor “intrusion software.” ECCN 4D001.a: “Software” “specially designed” or modified for the “development” or “production” of equipment controlled by (among other pre-existing ECCNs) 4A005 or “software” controlled by (among other pre-existing ECCNs) 4D004 ECCN 4E001 a: “Technology” for the “development”, “production”, or “use” of equipment controlled by (among other pre-existing ECCNs) 4A005 or “software” controlled by (among other pre-existing ECCNs) 4D004; and 😄 “Technology” for the “development” of “intrusion software.” Note 1 is an important exclusion stating that ECCNs 4E001.a and 4E001.c do not apply when otherwise controlled “technology” under these ECCNs is exchanged for the purpose of “vulnerability disclosure” or “cyber incident response”. “Vulnerability disclosure” means “the process of identifying, reporting, or communicating a vulnerability to, or analyzing a vulnerability with, individuals or organizations responsible for conducting or coordinating remediation for the purpose of resolving the vulnerability.” “Cyber incident response” means “the process of exchanging necessary information on a cybersecurity incident with individuals or organizations responsible for conducting or coordinating remediation to address the cybersecurity incident.” Note that there is not a similar carve-out for the related hardware and software controls. Note 2 emphasizes the regulatory burden of these controls even when not applicable, stating that “Note 1 does not diminish national authorities’ rights to ascertain compliance with 4E001.a and 4E001.c.” BIS explains in the preamble to the interim final rule that this Note 2 is intended “to clarify that BIS can request information on items decontrolled by Note 1 to ensure compliance with the controls. BIS does not intend this note to require any additional compliance measures beyond what is otherwise required by the EAR.” In particular, this is a reminder about the EAR’s broad recordkeeping requirements (along with subpoena authorities, etc.). Regulated parties should be aware that the EAR imposes compliance obligations even when no licensing requirements apply. ECCN 5A001.j:. IP network communications surveillance systems or equipment, and “specially designed” components therefor, having all of the following [along with related software, technology, and test, inspection and production equipment]: j.1. Performing all of the following on a carrier class IP network (e.g., national grade IP backbone): j.1.a. Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC 7498-1)); j.1.b. Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and j.1.c. Indexing of extracted data; and j.2. Being “specially designed” to carry out all of the following: j.2.a. Execution of searches on the basis of “hard selectors”; and j.2.b. Mapping of the relational network of an individual or of a group of people. Note: ECCN 5A001.j does not apply to “systems” or “equipment”, “specially designed” for any of the following: Marketing purpose; Network Quality of Service (QoS); or Quality of Experience (QoE). BIS explains the interactions between these cybersecurity controls and other potentially related controls under the EAR as follows: Notes 3 to Categories 4 and 5 Part 1 of the CCL state that the EAR’s encryption controls generally trump these cybersecurity controls. However, these notes also caution that both the encryption controls and the cybersecurity controls may apply to source code (and, according to the preamble, also technology) that includes elements of each. Notes 4 to Categories 4 and 5 Part 1 state that the EAR’s Surreptitious Listening (“SL”) controls also trump these cybersecurity controls, as the SL controls are subject to broader (worldwide) restrictions. Step 2: Does License Exception ACE apply? Even when an item is in the first instance subject to the cybersecurity controls discussed above, License Exception ACE may still apply, in which case no specific license from BIS would be required. License Exception ACE generally authorizes exports, reexports, and transfers (in-country), including “deemed” exports and reexports to foreign nationals, of covered “cybersecurity items,” except as follows: Sanctioned countries: License Exception ACE does not apply to activity involving Cuba, Iran, North Korea or Syria (or their nationals). Restricted “government end users”: License Exception ACE does not apply to a “government end user” of any country listed in EAR Country Groups D:1, D:2, D:3, D:4 or D:5, except for such “government end users” whose country is also listed in EAR Country Group A:6 (e.g., Cyprus, Israel and Taiwan) and when the export is either of the following: Of “digital artifacts” that are related to a cybersecurity incident involving information systems owned or operated by a “favorable treatment cybersecurity end user,” or to police or judicial bodies of such governments “for purposes of criminal or civil investigations or prosecutions of such cybersecurity incidents.” (We note that it is not entirely clear whether authorized exports to police or judicial bodies are limited to “digital artifacts,” and it would be helpful if BIS could clarify this point.) “Digital artifacts” are items (e.g., “software” or “technology”) found or discovered on an information system that show past or present activity pertaining to the use or compromise of, or other effects on, that information system. A “favorable treatment cybersecurity end user” is any of the following: (i) A “U.S. subsidiary”; (ii) Providers of banking and other financial services; (iii) Insurance companies; or (iv) Civil health and medical institutions providing medical treatment or otherwise conducting the practice of medicine, including medical research. To “national computer security incident response teams” (an undefined and not entirely clear term) “for purposes of responding to cybersecurity incidents, for purposes of ‘vulnerability disclosure’, or for purposes of criminal or civil investigations or prosecutions of such cybersecurity incidents.” A “government end user” includes international governmental organizations, government operated research institutions, and parties acting on behalf of such organizations. The regulations also state that “[t]his term includes retail or wholesale firms engaged in the manufacture, distribution, or provision of items or services, controlled on the Wassenaar Arrangement Munitions List.” Clarification regarding how BIS will interpret the scope of a “government end user” would be helpful to industry, as the current definition allows for gray areas in interpretation. The interim final rule states explicitly that this “government end user” restriction applies to deemed exports, although it presumably applies to actual export activity as well, a point which BIS should clarify. Other restricted end users: License Exception ACE does not apply to actual exports (i.e., deemed exports are still allowed) for purposes other than “vulnerability disclosure” or “cyber incident response” (which are still allowed) to non-government end users located in any country listed in EAR Country Groups D:1 or D:5, except for “favorable treatment cybersecurity end users” in such countries (to which such exports are allowed). Restricted end uses: Finally, License Exception ACE does not apply if the exporter has reason to know at the time that the “cybersecurity item” will be “used to affect the confidentiality, integrity or availability of information or information systems, without authorization by the owner, operator or administrator of the information system (including the information and processes within such systems).” Even when License Exception ACE does not apply, other exclusions or license exceptions under the EAR could potentially apply, such as for “published” software and technology. One important limitation that BIS has implemented in the interim final rule is generally excluding the availability of License Exception Strategic Trade Authorization (“STA”) for these cybersecurity items. Conclusion The publication by BIS of the interim final rule shows the U.S. government’s willingness to move forward with these export controls on cybersecurity items following the active debate around these policies over the past several years. The narrower scope of the rule compared to its predecessors demonstrates the challenge the government faces in striking the appropriate policy balance. Industry and other affected stakeholders may wish to take advantage of the 45 day comment period and communicate to BIS any concerns about the interim final rule to help the government understand its impacts and ambiguities, and how it can be improved to achieve the desired policy objectives. While it seems likely that export controls in some form will be enacted in this space, by publishing this as an interim final rule, BIS has signaled that there is still time for these regulations to be made more clear and potentially even more narrowly tailored to hone in only on the targeted malicious or otherwise controversial uses of these tools without imposing undue burdens on the cybersecurity community.
-
These are the steps you need to enable .NET Framework 2.0 and 3.5 in Windows 11: Open Control Panel from the Start Menu. Make sure your View by is set to Categories. Then click Programs > Program and Features. Click Turn Windows features on or off. Tick .NET Framework 3.5 (includes .NET 2.0 and 3.0) and click Ok. You may be asked to download files from Windows Update. So, click Let Windows Update download the files for you. After this, you have to follow the on-screen instructions to complete the process.Alternatively, you can open Run by Win + R, type “optionalfeatures“, and click Ok. This way, you can skip the first 4 steps. This is how you enable the desired framework on your Windows 11 computer.NET is a platform consisting of different tools, programming languages, and other things required to build or create a program. Microsoft .NET Framework is what most of the desktop apps, websites, etc need to run on your computer. .NET Framework is made up of a couple of components, namely, Common Language Runtime (CLR) and Class Library. Common Language Runtime (CLR) handles the applications that are running on your system. It provides services such as exception handling, garbage collection, etc. Whereas, Class Library gives Application Programming Interface or API, such as strings, numbers, and more. It will read and/or write files, create a database, etc. Here coding is done in C#, F#, or Visual Basic programming language. After coding, it is mortified into Common Intermediate Language (CIL), which then will be saved with .dll or .exe extensions. That’s it! Read next: How to check .NET Framework version installed.
-
i everyone, this is Keisuke Kikuchi, the producer of Fatal Frame: Maiden of Black Water. Alongside the series director, Mr. Shibata, I have been involved in every title in the Fatal Frame series, and thanks to all of our fans and their support, we are now celebrating the 20th anniversary of the franchise. While the series condenses the essence of Japanese horror in each title, we decided on a different type of fear as the overarching theme for each game. For the upcoming Fatal Frame: Maiden of Black Water, we use the motif of Japanese “haunted places,” and the ability of the player to take their camera and walk around these stages. The main theme for this particular entry in the series is “fear related to water.” To accomplish this, we made sure many of the locations were very damp to give them the feel that a ghost could appear at any time, a theme that is very common in Japanese horror.One of the main features I would like to discuss with all of our fans today is the new photo mode, a first for the series. You can now make your own “ghost photography” and post them on social media so that others can see how interesting and scary the series really is. While other games have implemented a photo mode, the Fatal Frame series puts an emphasis on cameras and pictures as the most important items in the game (even using the camera, called the camera obscura, as a weapon to defeat the ghosts!), so the things you can do in this mode are a bit different when compared to other series. And since the main concept behind this new mode is to allow players to make their own original “ghost photography,” we made sure to include filters and other features to provide a number of different options to customize their work. Players can utilize photo mode with the press of a button at almost any part of the game, with the exception of a few particular events.After entering photo mode, you can place any ghosts or characters you have met or encountered up until that point into the picture, and change their position and the way they are facing. After that, you can adjust the poses of the characters and decide on the composition of your picture. You can then use different lenses in order to add in ghost-like effects and turn up the contrast and other options, in order to alter the qualities of your ghost photography. Furthermore, by obtaining the “psychic lens,” you can look forward to ghosts appearing in your photo when you least expect it. At a certain time and by going to a certain place, special ghosts may also appear in your photosOnce your photo appears how you like it, you can choose a frame for your picture, decorate it, adjust the depth of field, focal length and the aperture in order to increase the quality of your picture and then simply utilize the photo features in the platform you are utilizing in order to save the photo.After testing out photo mode, I recommend two methods on how to create your own ghost photography: One is to create a convincing picture that feels like it could actually be real, and the other is to create a really funny photo to make you and your friends laugh. There is a lot of value in creating a situation that you yourself find to be incredibly frightening, and then taking it to its utmost limit. Creating a picture of the characters being surrounded by ghosts as if they are being blessed by them, or changing out the character that is being spoken to with a ghost during a really serious scene can make for unexpected situations that can make you crack up laughing.This is what I really love about photo mode. The storylines throughout the Fatal Frame series always progress with such a very serious tone, but photo mode allows you to create really fun scenes, which has made this one of my favorite parts of the game. So while I’m looking forward to all of your videos playing through the game, I feel like the true charm of this series is to experience the fear for yourself by taking in the world and creating your own ghost photography. I really can’t wait to see what people create and seeing all of the photos everyone puts together after Maiden of Black Water releases October 28. The fear is real, but don’t forget to take a moment or two to soak in the scene and take a few pictures. You never know where the next ghost will turn up!
-
Sinclair computers are now distant artifacts of technology history. But for a period in the early 1980s, these inexpensive personal computers were the market leader in Britain. Their success made Clive Sinclair, a British inventor and entrepreneur, a business celebrity in a nation straining to come out of a long stretch of economic stagnation. He was lionized in the media and invited to lunch by Queen Elizabeth II and Prime Minister Margaret Thatcher, who pointed to Mr. Sinclair as a model of the entrepreneurial gumption Britain needed. He was knighted in 1983. The Sinclair computers didn’t catch on in the American market, where buyers were willing to pay for more powerful machines from Apple, IBM and others. But they were an affordable introduction to computing for many young people in Britain and beyond. After Mr. Sinclair died on Sept. 16, many took to social media and recalled their Sinclairs. Satya Nadella, chief executive of Microsoft, was a teenager in India when he got one. Mr. Nadella recalled on Twitter “the sense of wonder and empowerment I felt.”“It was your device that sparked my passion for engineering,” he wrote. Elon Musk, who grew up in South Africa, tweeted, “RIP, Sir Sinclair. I loved that computer.” Mr. Sinclair died at his home in London at 81. His daughter, Belinda Sinclair, told the BBC that the cause was cancer. Clive Marles Sinclair was born in West London on July 30, 1940, to George Sinclair and Thora Edith Marles. Both his father and grandfather were engineers. Clive demonstrated a penchant and aptitude for electronics early on, designing radio components as a teenager. He enjoyed free-range discussions with members of British Mensa, an association of people with tested high intelligence quotients. He joined the group when he was 19 and for several years was its chairman. Mr. Sinclair bypassed a university education to pursue his inventions, and he was prolific. He is credited with designing the world’s first pocket calculator, as well as a digital watch and a pocket television. At times, his creations didn’t get much beyond the prototype stage, falling short of commercial success.Mr. Sinclair’s work on the pocket calculator in particular showed him what was becoming increasingly possible in electronics, aided by advances in semiconductor chips. His elegantly designed personal computer kept parts and cost to a minimum. The first model, the ZX80, was introduced in 1980 and priced at less than 100 pounds. His biggest hit was the third version, the Spectrum, introduced in 1982. More than 5 million were sold worldwide over the next few years. The price for the basic Spectrum was 125 pounds, or about $225 at the time. That was a fraction of the price tag, for example, of a basic Apple II, Apple’s first big seller, which cost $1,300 (almost $3,800 in today’s money). “Clive Sinclair’s most important contribution was in making computers affordable,” said Martin Campbell-Kelly, a technology historian at the University of Warwick in England. “The British market was much more price sensitive than the American market, mainly due to a lower standard of living at the time.” Sinclair Research tried to move beyond the home computer market in 1984 with a more expensive offering, the Sinclair QL, intended to appeal to small businesses and professionals. But by then American computer makers like IBM and Compaq were leaders in selling personal computers to businesses, and the Sinclair QL found few buyers.
-
There’s no visual style more iconic that expresses a love for gaming more than retro pixel art. Join us in this love letter to gaming culture from some of the most passionate new voices in the industry, while enjoying discounts of up to 75% during the ID@Xbox Retro Sale. Here’s just a few of the great titles featured: Cuphead (25%) A classic run-and-gun action game heavily focused on boss battles. Inspired by cartoons of the 1930s, the visuals and audio are painstakingly created with the same techniques of the era; traditional hand drawn cel animation, watercolor backgrounds, and original jazz recordings. Play as Cuphead or Mugman (in single player or local co-op) as you traverse strange worlds, acquire new weapons, learn powerful super moves, and discover hidden secrets while you try to pay your debt back to the devil! Baldur’s Gate and Baldur’s Gate II: Enhanced Editions (60%) Forced to leave your home under mysterious circumstances, you find yourself drawn into a conflict that has the Sword Coast on the brink of war. Soon you discover there are other forces at work, far more sinister than you could ever imagine. Can you resist the evil in your blood and forsake the dark destiny that awaits you? Or will you embrace your monstrous nature and ascend to godhood? Customize your hero, recruit a party of brave allies, and explore the Sword Coast in your search for adventure, profit, and your destiny. The Escapists 2 (75%) Risk it all to breakout from the toughest prisons in the world. Explore the biggest prisons yet, with multiple floors, roofs, vents, and underground tunnels. You’ll have to live by the prison rules, attending roll call, doing prison jobs, and following strict routines, all the while secretly engineering your bid for freedom. Your prison escape antics will take you from the frosty Fort Tundra to a train hurtling through the desert, and even to the final frontier! Pixark (75%) A vast, wild world filled with vicious dinosaurs, magical creatures, and endless adventure! To survive in this mysterious land, you must tame creatures both ferocious and cuddly, craft high tech and magical tools, and build your own base out of cubes. With a robust character creator, an infinite number of voxel-based maps and procedurally generated quests, your PixArk adventure will be completely unique. Team up with friends to form a tribe or play on your own. Spend your time building a towering fortress or go on a quest in a sprawling cavern. Fly on the back of a dragon and smite your enemies with a magic wand or ride a mighty T-Rex and blast your foes with a rocket launcher. In the world of PixArk, how you play is up to you – if you survive! The Survivalists (60%) The island is alive! Your newfound home will change with day/night cycles as you explore and uncover its secrets. Hunt (or be hunted by) animals for food and an array of mythical enemies, who aren’t necessarily pleased to see you. Get quests from a Mysterious Stranger or find them washed up on the shore. Prepare to trek into a procedurally generated wilderness, with a variety of biomes, for an adventure that’s unique to every player. Finding the perils of island life too much or just looking to share your building expertise with friends? The Survivalists has you covered! Complete joint adventures, gain loot, trade, and ultimately survive together and as you and up to three fellow castaways explore an island paradise. Kingdom Two Crowns (30%) A side-scrolling micro strategy game with a minimalist feel wrapped in a beautiful, modern pixel art aesthetic. Play the role of a monarch atop their steed and recruit loyal subjects, build your kingdom, and protect it from the greedy creatures looking to steal your coins and crown. In the brand-new campaign mode, monarchs must now work to build a kingdom that stands over time until finding a way to defeat the Greed for good. Explore the environments to discover new mounts and secrets hidden in the deep. All these titles and more are on sale now until October 18 during the ID@Xbox Retro Sale! Hurry up for this great opportunity to build up your retro gallery. See the full list of games at xbox.com.
-
öki is a multi-award winning adventure game inspired by Scandinavian folklore, and arrives on PlayStation 5 on October 28. Set in the stunning, snow-capped wilderness, you play Tove. She’s a young girl plunged into a living fairytale, where you must solve puzzles, collect curiosities, and uncover a tale of tragic loss. Your quest is to rescue your brother Lars from Röki; a gigantic pitch-black creature with a mysterious smile. Like the movie Jaws, our game is eponymously named after its monster, although there may be more to Röki than meets the eyeAs Tove, you explore the enchanting 3D world, find long-forgotten objects, talk with misunderstood monsters, and solve ancient puzzles to unlock paths deeper into the wilderness. You can also dive into the pages of Tove’s handwritten journal that she scribbles in as you explore, charting her adventure. This includes notes of folklore, loot, and wilderness “badge” achievements, as well as some of her inner thoughts and reflections.The game’s combination of fairytale adventure, emotional storytelling, and signature graphical art style has won it many accolades, accumulating in nominations for Best Debut Game at The Game Awards and Best British Game and Best Debut Game at the BAFTA Game Award, which was amazing for us as a tiny indie team.Röki is our take on modernizing the classic adventure games we loved growing up – games like Monkey Island, Day of the Tentacle, and Grim Fandango. We wanted to capture the storytelling and spirit of adventure from those games, but more importantly, update the play style for audiences today. You take direct control of Tove with the pad and can explore the world in 3D, rather than directing her with a cursor. Not only does this make the game feel more immediate and responsive but it also allows the player to form a better bond with Tove, as they’re playing as her, rather than directing her from afar.As much as we love the classic adventure game, we wanted to make a frustration-free adventure that both seasoned and boxfresh adventurers alike could enjoy. Much of this came down to accessible puzzle design that makes real-world sense and then lots of user testing to see how players responded to the gameplay. It was essential for the game to pose a challenge but have optional in-game assistance at hand if players got stuck. To that end, you can flash interactable objects in the scene and also dip into Tove’s journal for extra clues as to what to do next. Essentially, a story isn’t a story without an ending and we wanted our tale to be one that players could enjoy right through to its final climactic pages.The world of Röki has a wide cast of creatures inspired by Scandinavian folklore, but it’s not about shooting or hacking the monsters you meet into tiny bits. Instead, it’s about finding out what’s wrong with them, befriending them, and seeing if you can solve the issues they have. Sometimes even monsters need a helping hand.Now, this sounds lovely but Röki is also pretty creepy. The eighties kid’s films we grew up with (films like The Dark Crystal, Return to Oz, and The Neverending Story) weren’t afraid to scare their diminutive viewers half to death and we decided to follow their lead on not pulling any punches with Röki in the fright department. This also resonates well with the game’s fairytale roots, which in their original forms were pretty grisly.We’re firm believers in the power of video games to tell amazing stories. For our debut indie game we wanted to flex our storytelling muscles and deliver a heartfelt and unforgettable narrative that resonates with players around the world. This isn’t just the story of folklore, jotun and the mystery of the wilderness, it’s also the very human story of a family becoming whole again after life-shattering events. Throughout the game, Tove will confront distorted memories from her past. The player must navigate these living dreams, confront Tove’s fears, and ultimately solve their riddles to reunite her family. Without saying too much, the theme of family runs throughout the game, even among some of its monstrous inhabitants.Thanks for reading. We’re very happy to announce that Röki will be arriving on PS5 on October 28. We’re excited to welcome new adventurers to wrap up warm, pull on their snow boots, and accompany Tove in a journey through a fantastical wilderness in this award-winning adventure.