Subscribe Us

Worse than competitors .. Low sales of important products from Apple

 


Sales of Apple's Mac computers worldwide fell 40.5% year-on-year in the first quarter of 2023, amid a broader contraction in consumer demand. About research firm IDC, Monday.

All of the five major computer makers, Apple, ASUS, Dell, HP and Lenovo, saw declines

of more than 10% in first-quarter shipments, reflecting weak demand and persistent inventory problems, but Apple's decline was the largest, according to the website.

Apple's share of the worldwide computer market between the first quarter of 2022 and the first quarter of 2023 fell from 8.6% to 7.2%, and the company shipped 2.8 million fewer devices year-over-year in the first quarter of 2023, according to IDC data.

This was expected, as Apple's Chief Financial Officer, Luca Maestri, said last February that the company "expects a decline of more than 10% in sales of Macs and iPads compared to the same period a year earlier (Q1 through March)."

Mac revenue fell 28.66% year-over-year during the December quarter. Apple CEO Tim Cook said at the time that the difficult macroeconomic environment affected sales of the iPhone, Mac and Apple Watch.

We will know the truth after 8 years.. Why are people now racing towards Jupiter?
The "follow the water" rule is still what drives scientists in the search for extraterrestrial life, and what prompts them to send a spacecraft, next Thursday, to explore the "icy moons" orbiting Jupiter, Saturn, Neptune and Uranus.

Many of these moons, which are very far away, are suspected of having oceans under their icy shells, and it is believed that they may be eligible for life on them, according to the magazine ".The Economist". 

A new spacecraft is scheduled to launch from Kourou base, in French Guiana, carrying the probe "Joss" to Jupiter, with the aim of checking some of these moons closely.

Next Thursday, Joss, or what he called the European Space Agency's "Icy Moon Explorer", will embark on its very long journey, as it will not reach Jupiter before 2031, that is, after about 8 years.

Goose will look at three of the moons, Callisto, Europa and Ganymede, all of which are believed to have subterranean oceans.

The probe will focus on Ganymede, which, despite being a moon, is larger than the planet Mercury, and its subsurface ocean may contain more water than all of Earth's oceans combined.

The probe's cameras will add more detail to existing, limited-resolution maps of Ganymede's surface, while ice-penetrating radar will survey several kilometers below its surface.

And "Joss" is not the only probe on the way to Jupiter, as the US Space Agency (NASA) will launch next year the "Europe Clipper", which will take a faster route and arrive seven months before the European Space Agency's probe, but it will focus more on the moon "Europe" and not Ganymede.

To compete with GBT Chat.. the Chinese Alibaba asks "the truth from a thousand questions"
China's Alibaba Group Holdings on Tuesday unveiled its generative industrial intelligence model, its version of the technology used to power a chatbot (ChatGPT), and said the technology would be integrated into all of the company's applications in the near future.

The disclosure follows Sense Time's launch of a slew of new AI products this week, and the government's publication of draft rules outlining how generative AI services should be managed.

In a video demonstration, the new AI model, dubbed Tong Yi Qian Wen, or "Truth from a Thousand Questions," drafted invitation letters, made itineraries for planned trips, and advised shoppers on the appropriate cosmetics to buy.

Tong Yi Qian Wen will initially be integrated with Alibaba's DingTalk workplace messaging app, and can be used to summarize meeting notes, write emails and draft business proposals. It will also integrate with Tmall Genie, Alibaba's voice assistant.

The company's cloud computing unit plans to roll out the app to customers so they can create their own models and start recording on Friday.

The draft rules, published by the Cyberspace Administration of China, said Beijing supports technology innovation and dissemination, but the content created must abide by "fundamental socialist values" as well as laws on data security and protection of personal information.

She added that those who break the rules may face fines or a criminal investigation.

The proposed rules, which are open for public debate through May 10, come as governments around the world grapple with how best to regulate generative artificial intelligence technology, which has sparked much concern about its ethical implications as well as its impact on national security, jobs and education.

“No apparent reason.” A sudden jump in Bitcoin after an absence

The price of the cryptocurrency “Bitcoin” exceeded the $30,000 barrier, on Tuesday, for the first time in ten months, which raised questions about the reason for that jump.

At the beginning of today's trading, the most prominent cryptocurrency reached 30 thousand and 379 dollars, before it fell to 29 thousand and 787 and then rose again to become in the latest transaction 30 thousand and 146 dollars, according to the platform. Coin Desk". 

The digital currency has been confined to a range of $26,500 to $29,400 over the past three weeks, but in one day it rose more than $1,800.

Although this price is much lower than the highest level this currency has ever reached at $68,000 in November 2021, this jump raised questions and fears of widespread market manipulation, according to the newspaper. Guardian". 

The collapse of the Silicon Valley bank last month, and the contagion it triggered across financial markets, has led some cryptocurrency enthusiasts to turn to bitcoin as a way of protection amid fears of an economic meltdown.

However, the CEO of the “Lolli” application that specializes in Bitcoin, Alex Adelman, said that the rise of the most prominent and valuable cryptocurrency in this sector “had no apparent reason,” but he believed that this may be due to the return of confidence in cryptocurrencies, and the growing interest in them. By investors, whether they are individuals or institutions.

Charging the phone in public places... A warning against a "common error" and simple ways to protect yourself




The FBI in Denver warned, in a tweet, against "using free USB charging stations at airports, hotels or shopping malls," explaining that some hackers use public USB ports to introduce malware and spyware on devices that charge.

He advised the use of special chargers, a USB cable, and the use of an electrical outlet instead of these charging stations

What is the purpose of the warning? And how do you get piracy or electronic penetration? And in what way can it be confronted?

The consultant for security, information technology and digital transformation, Roland Abi Negm, indicates in an interview with Al-Hurra that using a public place charger has several risks, since all smart phones have what is known as one entry, that is, the same tape that is used to charge the phone through which data is exchanged.

He adds that sometimes, after connecting the phone to the charging bar in public places, people agree to the messages that appear on the screen without reading, thinking that approval will contribute to starting charging the phone, while actually agreeing may allow the other party connected to the cable to withdraw the information on the phone. the phone.

For his part, technology and digital transformation expert Paul Semaan explains in an interview with Al-Hurra that what is happening is known as juice jacking, and it happens through the charging tape, in public places, and these tapes enable other parties to transfer information, or download viruses on the phone. Smartphone, or download applications in the phone that allow them to transfer information.

He says that the FBI's warning came after the proliferation of these electronic attacks and also with the aim of raising people's awareness.

Juice jacking is a type of cyberattack, in which a hacker inserts port forwarding that delivers malware into public charging stations at airports, malls, and other places. When a user plugs their device into the malware-laden port, malware is installed on their phone or other device, allowing hackers to steal sensitive information or take control of the device. To avoid juice jacking, it is advised to use only reliable charging outlets or carry a portable charger, the two experts said.

The malware that is used in juice-jacking is usually the type of malware that aims to infiltrate and spy on systems and devices.

And when this malware is installed on the victim's device, hackers can use it to steal sensitive information, such as personal data, bank accounts, passwords, photos, and other important information, the two experts add.

Malware can also cause significant damage to devices, such as permanent device damage, file deletion, or hardware failure. It may be transmitted from one device to another by communicating between different devices when they are connected to the same infected port.

Therefore, users should be careful when using public ports for charging, and not connect their devices to any untrusted or unknown port. It is also recommended to use special portable chargers to avoid these electronic attacks, the two experts say.

Abi Negm points out that if the phone was switched off and connected to a public charging center, the other party would not be able to withdraw information if the phone remained switched off from the moment of connection until the tape was removed. But most people use the phone while charging in public places.

In this context, resher site Nelnet Campus Commerce Until locking the phone before charging in a public place, and setting a password for the electronic device, protect data and prevent hacking.

And he continues: "Therefore, it is better not to use the charger in public places, and in case of necessity, the messages that appear after connecting to the charger must not be approved, and it is preferable to turn off the phone before charging and not open it until after removing the tape."

For more security, what is known as a USB data blocker can be placed on the end of the charger, which prevents data transfers from the phone and limits the work of the tape to charging only, according to Abi Najm.

As for Semaan, he explains that the other party can sell the data if it is important, or steal private data and people’s accounts, blackmail, and also close the device.

And he confirms that this type of attack is not new, so in order to avoid these problems, people should not use free charging in public places, in addition to not using free public Wi-Fi, which is more dangerous than free charging that exposes people to this type of electronic attack.

It is popular among young people.. What is the social application on which the leaked Pentagon documents were published?


Dozens of leaked pictures of secret American documents related to the Russian invasion of Ukraine have spread through several applications on social networking sites, on top of which is an application called "Discord". What is this application and what was it used for when it was launched?

What is it?

Discord is a text, voice and video chat application used by tens of millions of people over the age of 13 to talk and communicate with their communities and friends, according to Discord. The official website of the application".

The platform is eight years old and very popular among young people and video game players, and the leaked Pentagon documents were said to have circulated on the platform as early as March before they appeared on other sites, according to a report by the newspaper. The New York Times".

How did the application start?

The app was introduced in 2015 by video game streamer and computer programmer, Jason Citron, who created it so that people could use it to communicate with each other while playing games.

By late 2021, the app had more than 150 million active users each month, up from 56 million in 2019, and the app was recently valued at $14.7 billion, according to market data provider PitchBook.

Controversial app?

Discord has faced numerous accusations of spreading "harmful content" over the past years, including nationalists using the app's servers to stage a rally in Charlottesville, Virginia, in 2017.

The person who killed 10 people in a grocery store in Buffalo, New York, also used it to post his plans and racist messages on the platform before his attack in May 2022.

After supporters of former US President Donald Trump, who follow conspiracy theories and the hypothesis of white supremacy, were expelled from major electronic platforms in the United States, they retreated to more secretive networks that are difficult to control, including the Discord application, according to Agence France-Presse.

For its part, the company that owns the application said that it is getting more serious about moderating content, and that 15 percent of its more than 900 employees work in trust and safety teams.

Serious violation?

prohibit Community Guidelines for the app, hate speech, harassment, threats, violent extremism, child sexual abuse material, and misinformation, but it was not clear if the leaked documents violated the company's guidelines.

On Sunday, Discord said it was working with authorities regarding the leaked Pentagon documents.

"In connection with an apparent breach of confidential material, we are cooperating with law enforcement authorities," a company spokeswoman said in a statement.

On Monday, the Pentagon considered the leak a "very serious threat" to the national security of the United States, according to "Agence France Presse".

A spokesman for the US Department of Defense, Chris Meagher, confirmed that the circulation of these documents on the Internet poses a "very serious threat to the national security of the United States and that it may spread misleading information."

Many of these documents are related to the war in Ukraine, and some of them assess the situation of the conflict in early March, including the size of the Russian and Ukrainian losses, while others deal with the situation on specific fronts, such as Bakhmut.

The documents speak, among other topics, of Kiev's air defenses, which are crucial to countering Russian strikes, and of international assistance to Ukrainian forces.

The leak could endanger US intelligence sources, as well as provide Russia with valuable information on the conditions of Ukrainian forces.

Tesla is being sued after "intimate and embarrassing" car camera videos were leaked

The owner of a Tesla car is seeking class action status to represent the largest group of victims in his lawsuit against the electric car maker, which he accuses of letting its employees hack video recordings captured by the car's camera system, some of them intimate and embarrassing, just for the sake of "vulgar entertainment". , According to Agency France-Presse".

Henry Yeh of San Francisco filed the lawsuit in federal court on Friday, following a Reuters report that former Tesla employees said videos or photos of people's cars had been hacked.

The lawsuit alleged that Tesla employees "disseminated video recordings of Tesla customers in private and embarrassing situations without their consent" thanks to an advanced camera system built into the cars.

Examples included in the lawsuit papers include a video of a naked man walking towards a Tesla and fights between Tesla owners while driving with drivers of other cars.

The lawsuit also states that a video showing a Tesla car hitting a child on a bicycle quickly spread throughout the automaker's Silicon Valley office.

She added that Tesla employees shared pictures of pets for the owners of the electric car, and turned some of them into jokes with comments, before sharing them in chat groups.

The suit alleged that cameras in Tesla cars captured "very private video and images" that were used by Tesla employees for "vulgar and painful entertainment".

These behaviors date back to at least 2019, according to the lawsuit, which asked the court to stop this "unfair behavior" and pay unspecified compensation.

The lawsuit accuses Tesla of negligence, fraud and invasion of privacy.

The company did not immediately respond to an AFP request for comment, according to the agency.

Why did the FBI warn of public phone charging stations?

Charging stations in public places, such as airports and hotels, have become necessary to charge our phones while moving from one place to another, but using them is dangerous, according to a recent warning issued by the Federal Bureau of Investigation (FBI).

And an account for the office's Denver branch posted a tweet, calling for "avoid using free USB charging stations at airports, hotels or malls."

He explained that some hackers use public USB ports to introduce malware and spyware on devices that are being shipped.


He advised the use of special chargers and a USB cable, and the use of an electric socket instead of these charging stations.

site said Android Authority In general, devices are at risk of being hacked using the USB charging port, but traditional ports are not safe either.

The best way to avoid being hacked is to simply not use any public USB ports, and if you need to charge, use a "portable power bank" or wait until you find somewhere you can trust.

Check first.. "artificial intelligence" calls and how to steal money


The continuous development of artificial intelligence programs raises concerns about its potential negative impact and the consequences of its incorrect use by criminals or fraudsters.

This prompted a number of tech leaders, including Elon Musk and Apple co-founder Steve Wozniak, to sign, among others, a petition against the startup Open AI, which launched Chat GBT in November. In the past, development has been suspended for six months, until it can be audited and supervised by independent experts.

And this is not an exaggeration of concerns, as fraudsters are currently using advanced fraud techniques that rely on artificial intelligence, and last year they succeeded in stealing nearly $ 11 million from individuals, by fabricating the voices of their loved ones or doctors, and asking for money from their relatives and friends, according to the newspaper. "Guardian".

Commission issued US Federal Trade, a warning on March 20, that fraudsters are using artificial intelligence by cloning voices.

She explained: "(If) you get a call and you hear a panicked voice on the line from your grandson telling you he's in big trouble but you can help by sending money. Don't trust the voice. Call the person who supposedly called you and check the story. If you can't get through To your loved one, try contacting him through another family member or through their friends.

"All the fraudster needs is a short audio clip of the voice of one of your family members, which he can obtain from online content and audio cloning software," the committee added.

A newspaper report states, Guardian" These incidents are not limited to individuals only, companies of all sizes are quickly falling victim to this new type of fraud.

The Guardian provides an example of what happened with a bank employee in Hong Kong, who received fake calls from a bank manager asking him to transfer $35 million, which he did.

A similar incident occurred at a UK-based energy company, where an employee inadvertently transferred nearly $250,000 to criminals, believing the recipient to be the CEO of the parent company.

The FBI is now warning companies that criminals are using deep fakes during job interviews for remote jobs, in order to gain access to company information.

The use of deep fake video techniques has increased over the past few years, targeting mostly celebrities and politicians, such as Mark Zuckerberg, Tom Cruise, Barack Obama and Donald Trump, and such videos may increase with the approach of the US presidential elections next year.

Experts advise to take caution when dealing with phone calls related to financial matters and transfers.

And the Guardian newspaper says: “This means that no financial manager in your business should be allowed to conduct any financial transaction such as a money transfer based on an incoming phone call, even if it is from the CEO of the company .. It must be verified.”

It also advises that no transaction exceeding a predetermined amount should be approved without the prior written approval of several company executives.

Last month, Europol, the European police agency, warned of the risk that criminals could take advantage of GBT Chat to engage in fraud or commit cybercrimes.

The agency noted that artificial intelligence is still in its infancy, and expects its "capabilities to improve over time."

The agency stressed "the utmost importance of raising awareness in this regard, in order to ensure that any potential vulnerability is discovered and addressed as soon as possible."

Why is Shaqra?.. "The presenter Fadda" is on trial in Kuwait


"Fedda" has become a virtual broadcaster using artificial intelligence in an electronic newspaper, as part of a test phase aimed at creating new content, the project organizers told AFP.

"Fedda" appeared for the first time on Twitter on the account of the electronic newspaper "Kuwait News", one of the media arms of the newspaper "Kuwait Times", which is the first daily newspaper published in English in Kuwait and the Arabian Gulf 61 years ago.

"Fidha" wore a white shirt and a black jacket, saying in fluent Arabic, "I am Fadda, the first broadcaster in Kuwait who works with artificial intelligence at the Kuwait New Media Corporation. What type of news do you prefer? Let's hear your opinions."

The co-director of "Kuwait News" newspaper, deputy editor-in-chief of the "Kuwait Times" newspaper, Abdallah Boftin, said that "Fedda" is under trial "to take advantage of its advantages in creating new and innovative content."

He added, "Fidha is an old popular Kuwaiti name that symbolizes silver, and the stereotypical image in minds of robots is always silver in color and made of metal, so we combined the two elements and named the virtual broadcaster silver."

A team is monitoring the observations to take them into account, and "Fedda" may later use the Kuwaiti dialect to present its news on the newspaper's Twitter account, which is followed by more than 1.2 million people.


Bovetin explained that the presenter's appearance, which appeared blonde, "reflects the diversity that brings together Kuwaitis and residents... Silver represents everyone."

Many media professionals, correspondents and program presenters also interacted with her. One of them wrote, "Our job is in danger, so will Fadda and her colleagues be our replacements in the near future?"

While some of them saw that she and other "artificial colleagues and colleagues in the profession are competitors who are not dangerous to the (human) broadcaster, at least for the time being, because she and others lack body language, including facial expressions and voice coloration, all of which are important pillars in the broadcaster's profession in order to convince the audience."

"Chat GBT" .. a new "much needed" feature


OpenAI, the developer of the AI-powered chatbot, has announced that it will allow ChatGBT to use plugins that allow it to browse the web for "live" information, perform commands such as reservations, and complete purchases, not just type. Texts and codes.

OpenAI said on its website that it will use plugins to carry out these tasks, saying that they will serve as “eyes and ears” for the language models that have been trained, helping them access “very recent, very personal, or very specific information.”

This update enables the program to surf the Internet and carry out orders, such as booking trips and even buying groceries from stores, according to the programCnet websitetechnical.

The program can now, with add-ons, for example, compare the sales of Oscar-winning films this year with the sales of other recently released films.

This is done through plugins that are added to the browser to accomplish these tasks.

Sam Altman, one of the founders of the developer, wrote in a tweet: "The add-ons are still very experimental, but we think there is something great in this direction.. It was a much-needed feature."


It weighs 20 million suns..Hubble accidentally catches a "hidden giant"


The US space agency, "NASA", recently revealed that the Hubble Space Telescope was able to detect a giant black hole that is moving rapidly in galactic space at super speed.

And instatement Posted on its website, Thursday, "NASA" confirmed that the giant black hole is moving at a tremendous speed, noting that it can travel a distance estimated at that which separates our Earth and the Moon in just 14 minutes.

The agency stated that the black hole weighs about 20 million suns, and left behind a line of modern stars 200,000 light-years long, twice the diameter of our galaxy, the Milky Way.

And “NASA” suggested that the modern stars arise due to the storming of the giant black hole of gases in front of it.


Professor of Theoretical Physics, Michio Kaku, likened this recent discovery to a giant broom that cannot absorb dirt in front of it because it is moving quickly, but wreaks havoc around it, according to what he told the network.CNN", Friday.

NASA indicated that the incident, which had never been documented before, was captured by Hubble by chance.

A "historic moment"... the first Arab to walk in space

The Emirati astronaut, Sultan Al Neyadi, will be the first Arab to walk in space, according to what he announced himself, in a tweet on Twitter.

Al Neyadi, who is currently on the International Space Station, wrote on his page, "Choosing you as the first Arab astronaut to walk in space alongside NASA astronaut Stephen Bowen is an honor and a great responsibility."

Then he continued, "I am eagerly awaiting this historic moment, which I trained extensively for at the Johnson Space Center."

Al Neyadi said that he wants to represent his country, the UAE, in the best way, and wrote, "I look forward to representing my country and continuing the exceptional journey started by generations of astronauts before me."

The Arab astronaut attached a picture of his tweet while he was next to another astronaut, and another picture of him sitting next to two of his suits that he will use to get out of the spacecraft in his first steps in space.


Al-Neyadi, 41, is the first Arab to spend six months in space after his launch on February 26 to the International Space Station via the “Falcon 9” rocket manufactured by the “SpaceX” company, and the second Emirati to participate in a trip to space, after Hazza Al-Mansouri, who spent eight Days on the International Space Station in September 2019.


Despite its recent entry into the world of space exploration, the UAE is making rapid steps in this field. In February 2021, the Emirati "Hope" probe entered the orbit of Mars, becoming the first Arab country to reach the Red Planet.

Al Neyadi spent 20 years in the UAE Armed Forces and holds a PhD in data leak prevention technology.

What is the use of "flight mode" on the phone while traveling on the plane?


Shortly before a plane takes off or lands, flight attendants ask passengers to put their cell phones on flight mode. What is the real reason behind this?

Air navigation and communications depend on radio services, which have been coordinated to minimize interference since the 1920s.CNNnews.

The digital technology in use today is more advanced than some of the older analog technologies that were in use even 60 years ago.

Research has shown that personal electronic devices can transmit a signal within the same frequency range as aircraft's navigation and communication systems, creating what's known as "electromagnetic interference."

But in 1992, the US Federal Aviation Administration and Boeing, investigated the dangers of using electronic devices while flying.

They did not find any problems with computers or other personal electronic devices during the non-critical phases of flight, as take-offs and landings are considered "critical phases".

The US Federal Communications Commission has also begun to create frequency bands that are reserved for different uses, such as cell phones, aircraft navigation and communications, so that they do not interfere with each other.

Governments around the world have put in place the same strategies and policies to prevent interference problems with aviation.

why then?

Despite these global standards in place, the aviation industry continued to ban the use of cell phones, with one problem being "terrestrial interference".

Wireless networks are linked by a series of towers, and the networks can become overburdened if passengers flying over these ground networks are all using their phones.

And when it comes to mobile networks, the biggest change in recent years is the transition to a new standard related to the existing 5G wireless networks.

The bandwidth of the fifth generation network is much closer to that used in the aviation industry, which raises the possibility of this causing interference with navigation systems near airports, which help the plane to land.




Post a Comment

0 Comments