‘Switch Pro’ Reportedly Cancelled As Nintendo Shifts Focus To Next-Gen Console
Read more of this story at Slashdot.
Sales And Repair
1715 S. 3rd Ave. Suite #1
Yakima, WA. 98902
Mon - Fri: 8:30-5:30
Sat - Sun: Closed
Sales And Repair
1715 S. 3rd Ave. Suite #1
Yakima, WA. 98902
Mon - Fri: 8:30-5:30
Sat - Sun: Closed
Read more of this story at Slashdot.
It’s catching on in the tech world. Uber boss Dara Khosrowshahi and his team invoked (PDF) the term seven times during the ride-hailing firm’s investor day. At a similar event in June executives from music streaming service Spotify mentioned (PDF) it 14 times, with another 47 references to the abbreviation LTV. Earnings transcripts for 4,800 U.S.-listed companies analyzed by Bedrock AI show executives and analysts mentioned “lifetime value” over 500 times between October and mid-December, up from just 47 times in three months to March 2019.
The problem is that everyone seems to have a different definition of lifetime value. Food delivery firm DoorDash looks at it as a metric to measure “customer retention, order frequency, and gross profit per order” over a fixed payback period. Uber and its Southeast Asian peer Grab treat it as the ability to bring in one customer and then cross-sell different services at a lower cost. The $49 billion e-commerce firm Shopify defines lifetime value as the total amount of money a customer is expected to spend with the business over the course of an “average business relationship.” But lifetime value isn’t a silver bullet, as Gurley noted a decade ago. As capital becomes more scarce, generating free cash flow remains the most important target. As with previous buzzwords, investors may find that references to lifetime value do more to confound than clarify.
Read more of this story at Slashdot.
December is expected to be an even bigger month based on early data coming in. For example, Tesla has already delivered 5,000 Model Y vehicles in Norway alone in December. The Model Y’s rise in popularity in Europe coincides with Tesla ramping-up Model Y production at Gigafactory Berlin. The automaker recently confirmed that the factory is now producing 3,000 Model Y vehicles per week. All those vehicles are for the European market, and Tesla also ships cars from Gigafactory Shanghai to Europe.
Read more of this story at Slashdot.
If you’re in the country and have access to the beta release, you’ll get a pop-up that states: “using reports from drivers and your route, you may see alerts for ‘History of crashes’ on some roads.” While the feature is only in beta, it’s likely to release to the general public soon. But if you would rather not have Waze paint the roads red when it comes out, the feature can be turned off with a toggle located under the app’s settings section designated for alerts.
Read more of this story at Slashdot.
Codex was trained on billions of lines of public code to suggest additional lines of code and functions given the context of existing code. The system surfaces a programming approach or solution in response to a description of what a developer wants to accomplish (e.g. “Say hello world”), drawing on both its knowledge base and the current context. According to the researchers, the study participants who had access to Codex were more likely to write incorrect and “insecure” (in the cybersecurity sense) solutions to programming problems compared to a control group. Even more concerningly, they were more likely to say that their insecure answers were secure compared to the people in the control.
Megha Srivastava, a postgraduate student at Stanford and the second co-author on the study, stressed that the findings aren’t a complete condemnation of Codex and other code-generating systems. The study participants didn’t have security expertise that might’ve enabled them to better spot code vulnerabilities, for one. That aside, Srivastava believes that code-generating systems are reliably helpful for tasks that aren’t high risk, like exploratory research code, and could with fine-tuning improve in their coding suggestions. “Companies that develop their own [systems], perhaps further trained on their in-house source code, may be better off as the model may be encouraged to generate outputs more in-line with their coding and security practices,” Srivastava said. The co-authors suggest vendors use a mechanism to “refine” users’ prompts to be more secure — “akin to a supervisor looking over and revising rough drafts of code,” reports TechCrunch. “They also suggest that developers of cryptography libraries ensure their default settings are secure, as code-generating systems tend to stick to default values that aren’t always free of exploits.”
Read more of this story at Slashdot.
Crypto lender BlockFi, which like FTX has filed for bankruptcy, alleged in a court document (PDF) that it was owed the rights to the Robinhood shares due to a deal Bankman-Fried made in early November. The shares were pledged as collateral against a loan taken out by Alameda Research — the same firm whose funds were used to purchase the shares to begin with, according to Tuesday’s filing.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Since iOS has its own font format, the developer performed the experiment using only a few fonts, including DejaVu Sans Condensed, Serif, Mono, and Choco Cooky. And in case you’re wondering, Choco Cooky is the weird font that used to come pre-installed by default on Samsung smartphones. Now you can finally have it on your iPhone. Zhang explains that the process should be safe for everyone, since all changes are reversed after rebooting the device. Still, the developer recommends users trying out the app to back up their devices before replacing the default system font. He also details that the change only affects some of the text on iOS, as other parts of the system use different fonts. More details about the project, including its source code, are available on GitHub.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Undaunted, Microsoft partnered with a company called Portable Computer Support Group to produce the Mach 20, released in 1987. You probably remember the Portable Computer Support Group for their disk cache software called Lightning. The Mach 20 took the same basic idea as the Mach 10, but to the next level: As before, you unplugged your old 4.77 MHz 8088 CPU and replaced it with an adapter that led via ribbon cable to the Mach 20 card, which you plugged into an expansion slot. This time, the Mach 20 had an 8 MHz 80286 CPU, so you were really cooking with gas now. And, like the Mach 10, it had a mouse port built in. According to a review in Info World, it retailed for $495. The Mach 20 itself had room for expansion: it had an empty socket for an 80287 floating point coprocessor. One daughterboard was the Mach 20 Memory Plus Expanded Memory Option, which gave you an astonishing 3.5 megabytes of RAM, and it was high-speed RAM since it wasn’t bottlenecked by the ISA bus on the main motherboard. The other daughterboard was the Mach 20 Disk Plus, which lets you connect 5 1/4 or 3 1/2 floppy drives.
A key detail is that all these expansions connected directly to the main Mach 20 board, so that they didn’t consume a precious expansion slot. The IBM PC came with five expansion slots, and they were in high demand. You needed one for the hard drive controller, one for the floppy drive controller, one for the video card, one for the printer parallel port, one for the mouse. Oh no, you ran out of slots, and you haven’t even gotten to installing a network card or expansion RAM yet! You could try to do some consolidation by buying so-called multifunction cards, but still, the expansion card crunch was real. But why go to all this trouble to upgrade your IBM PC to something roughly equivalent to an IBM PC AT? Why not just buy an IBM PC AT in the first place? Who would be interested in this niche upgrade product?
Read more of this story at Slashdot.