Boston Dynamics’ Latest Atlas Video Demos a Robot That Can Run, Jump and Now Grab and Throw
Read more of this story at Slashdot.
Sales And Repair
1715 S. 3rd Ave. Suite #1
Yakima, WA. 98902
Mon - Fri: 8:30-5:30
Sat - Sun: Closed
Sales And Repair
1715 S. 3rd Ave. Suite #1
Yakima, WA. 98902
Mon - Fri: 8:30-5:30
Sat - Sun: Closed
Read more of this story at Slashdot.
It’s now possible to cram more than 192 x64 cores into your typical 2U dual socket system, something that just five years ago would have required at least three nodes. However, as Uptime noted, many legacy datacenters were not designed to accommodate systems this power dense. A single dual-socket system from either vendor can easily exceed a kilowatt, and depending on the kinds of accelerators being deployed in these systems, boxen can consume well in excess of that figure. The rapid trend towards hotter, more power dense systems upends decades-old assumptions about datacenter capacity planning, according to Uptime, which added: “This trend will soon reach a point when it starts to destabilize existing facility design assumptions.”
A typical rack remains under 10kW of design capacity, the analysts note. But with modern systems trending toward higher compute density and by extension power density, that’s no longer adequate. While Uptime notes that for new builds, datacenter operators can optimize for higher rack power densities, they still need to account for 10 to 15 years of headroom. As a result, datacenter operators must speculate as the long-term power and cooling demands which invites the risk of under or over building. With that said, Uptime estimates that within a few years a quarter rack will reach 10kW of consumption. That works out to approximately 1kW per rack unit for a standard 42U rack.
Read more of this story at Slashdot.
The U.S. Energy Department said the newly approved design “equips the nation with a new clean power source to help drive down” planet-warming greenhouse gas emissions. It’s the seventh nuclear reactor design cleared for use in the United States. The rest are for traditional, large, light-water reactors. Diane Hughes, NuScale’s vice president of marketing and communications, said the design certification is a historic step forward toward a clean energy future and makes the company’s VOYGR power plant a near-term deployable solution for customers. The first small modular reactor design application package included over 2 million pages of supporting materials, Hughes added. “NuScale has also applied to the NRC for approval of a larger design, at 77 megawatts per module, and the agency is checking the application for completeness before starting a full review,” adds the report.
Read more of this story at Slashdot.
Former Microsoft engineer Dave Amenta and Microsoft MVP Rafael Rivera created EarTrumpet, and Rivera pointed out the similarities of Microsoft’s new Windows 11 feature on Twitter this week. “Oh snap. Microsoft is catching up to EarTrumpet,” said Rivera. […]
The operating system has long needed improvements here, and Windows users shouldn’t really have to resort to third-party tools that put another volume icon in your system tray. Microsoft’s implementation isn’t as quick and easy as EarTrumpet, but there’s still time for the company to refine it before launch.
Read more of this story at Slashdot.
IBM is said to have created the appearance of demand for these Strategic Imperative products by bundling them into three- to five-year mainframe Enterprise License Agreements (ELA) with large banking, healthcare, and insurance company customers. In other words, it is claimed, mainframe sales agreements had Strategic Imperative products tacked on to help boost the sales performance of those newer offerings and give investors the impression customers were clamoring for those technologies from IBM. “Defendants used steep discounting on the mainframe part of the ELA in return for the customer purchasing catalog software (i.e. Strategic Imperative Revenue), unneeded and unused by the customer,” the lawsuit stated.
IBM is also alleged to have shifted revenue from its non-strategic Global Business Services (GBS) segment to Watson, a Strategic Imperative in the CAMSS product set, to convince investors that the company was successfully expanding beyond its legacy business. Last April the plaintiff Trust filed a similar case, which was joined by at least five other law firms representing other IBM shareholders. A month prior, the IBM board had been presented with a demand letter from shareholders to investigate the above allegations. Asked whether any action has been taken as a result of that letter, IBM has yet to respond.
Read more of this story at Slashdot.
The call was hosted by Guglielmo, Lindsey Turrentine, CNET’s EVP of content and audience, and Lance Davis, Red Ventures’ vice president of content. They answered a handful of questions submitted by staff ahead of time in the AMA-style call. Davis, who was listed as the point of contact for CNET’s AI stories until recently, also gave staff a more detailed rundown of the tool that has been utilized for the robot-written articles. Until now, most staff had very little insight into the machine that was generating dozens of stories appearing on CNET.
The AI, which is as of yet unnamed, is a proprietary tool built by Red Ventures, according to Davis. AI editors are able to choose domains and domain-level sections from which to pull data from and generate stories; editors can also use a combination of AI-generated text and their own writing or reporting. Turrentine declined to answer staff questions about the dataset used to train AI in today’s meeting as well as around plagiarism concerns but said more information would be available next week and that some staff would get a preview of the tool.
Read more of this story at Slashdot.
“We’re giving the core D&D mechanics to the community through a Creative Commons license, which means that they are fully in your hands,” Brink said in the blog post. “If you want to use quintessentially D&D content from the SRD such as owlbears and magic missile, OGL 1.2 will provide you a perpetual, irrevocable license to do so.” So much trust has been lost over the last several weeks that it will no doubt take a while for legal experts — armchair and otherwise — to pour over the details of the new OGL. These are the bullet points that Wizards is promoting in this official statement: – Protecting D&D’s inclusive play experience. As I said above, content more clearly associated with D&D (like the classes, spells, and monsters) is what falls under the OGL. You’ll see that OGL 1.2 lets us act when offensive or hurtful content is published using the covered D&D stuff. We want an inclusive, safe play experience for everyone. This is deeply important to us, and OGL 1.0a didn’t give us any ability to ensure it
– TTRPGs and VTTs. OGL 1.2 will only apply to TTRPG content, whether published as books, as electronic publications, or on virtual tabletops (VTTs). Nobody needs to wonder or worry if it applies to anything else. It doesn’t.
– Deauthorizing OGL 1.0a. We know this is a big concern. The Creative Commons license and the open terms of 1.2 are intended to help with that. One key reason why we have to deauthorize: We can’t use the protective options in 1.2 if someone can just choose to publish harmful, discriminatory, or illegal content under 1.0a. And again, any content you have already published under OGL 1.0a will still always be licensed under OGL 1.0a.
– Very limited license changes allowed. Only two sections can be changed once OGL 1.2 is live: how you cite Wizards in your work and how we can contact each other. We don’t know what the future holds or what technologies we will use to communicate with each other, so we thought these two sections needed to be future-proofed. A revised version of this draft will be presented to the community again “on or before February 17.”
“The process will extend as long as it needs to,” Brink said. “We’ll keep iterating and getting your feedback until we get it right.”
Read more of this story at Slashdot.
“We are very much aware this is costing taxpayers a significant amount of money,” Aaron Osborne, the assistant superintendent of finance at the Hampden-Wilbraham Regional School District, told NBC News. “And we have been doing everything we can to get this problem solved.” Osborne said it’s difficult to say how much money it’s costing because during the pandemic and in its aftermath, energy costs have fluctuated wildly. “I would say the net impact is in the thousands of dollars per month on average, but not in the tens of thousands,” Osborne said. That, in part, is because the high school uses highly efficient fluorescent and LED bulbs, he said. And, when possible, teachers have manually removed bulbs from fixtures in classrooms while staffers have shut off breakers not connected to the main system to douse some of the exterior lights.
But there’s hope on the horizon that the lights at Minnechaug will soon be dimmed. Paul Mustone, president of the Reflex Lighting Group, said the parts they need to replace the system at the school have finally arrived from the factory in China and they expect to do the installation over the February break. “And yes, there will be a remote override switch so this won’t happen again,” said Mustone, whose company has been in business for more than 40 years.
Read more of this story at Slashdot.
The improvements are thanks largely to structural changes in how Android is developed and deployed. For example, Project Treble was launched in 2017 to re-architect the platform, separating the OS framework from the low-level vendor code. This made it easier to update devices without waiting on vendors to provide updated drivers. We saw evidence of improvement that very year, and it’s gotten better ever since.
Read more of this story at Slashdot.
By default, Apple stores encryption keys for some iCloud data types on its servers to ensure that users can recover their data if they lose access to their Apple ID account. If a user enables Advanced Data Protection, the encryption keys are deleted from Apple’s servers and stored on a user’s devices only, preventing Apple, law enforcement, or anyone else from accessing the data, even if iCloud servers were to be breached.
iCloud already provides end-to-end encryption for 14 data categories without Advanced Data Protection turned on, including Messages (excluding backups), passwords stored in iCloud Keychain, Health data, Apple Maps search history, Apple Card transactions, and more. Advanced Data Protection expands this protection to the vast majority of iCloud categories, with major exceptions including the Mail, Contacts, and Calendar apps. For more information, you can read Apple’s Advanced Data Protection support document.
Read more of this story at Slashdot.