Amazon Warehouse Manager Pleads Guilty To Stealing $273K of Computer Parts
Read more of this story at Slashdot.
Sales And Repair
1715 S. 3rd Ave. Suite #1
Yakima, WA. 98902
Mon - Fri: 8:30-5:30
Sat - Sun: Closed
Sales And Repair
1715 S. 3rd Ave. Suite #1
Yakima, WA. 98902
Mon - Fri: 8:30-5:30
Sat - Sun: Closed
Read more of this story at Slashdot.
“For example, the ‘castling’ move was only introduced in its current form in the 17th century. What would chess have been like had castling not been incorporated into the rules?”
AfterAlphaZero was trained to play 9 different “variants” of chess, it then played 11,000 games against itself, while the researchers assessed things like the number of stalemates and how often the special new moves were actually used. The variations tested:
– Castling is no longer allowed
– Castling is only allowed after the 10th move
– Pawns can only move one square
– Stalemates are a win for the attacking side (rather than a draw)
– Pawns have the option of moving two squares on any turn (and can also be captured en passant if they do)
– Pawns have the option of moving two squares — but only when they’re in the second or third row of squares. (After which they can be captured en passant )
– Pawns can move backwards (except from their starting square).
– Pawns can also move sideways by one square.
– It’s possible to capture your own pieces.
“The findings of our quantitative and qualitative analysis demonstrate the rich possibilities that lie beyond the rules of modern chess.”
AlphaZero’s ability to continually improve its understanding of the game, and reach superhuman playing strength in classical chess and Go, lends itself to the question of assessing chess variants and potential variants of other board games in the future. Provided only with the implementation of the rules, it is possible to effectively simulate decades of human experience in a day, opening a window into top-level play of each variant. In doing so, computer chess completes the circle, from the early days of pitting man vs. machine to a collaborative present of man with machine, where AI can empower players to explore what chess is and what it could become….
The combination of human curiosity and a powerful reinforcement learning system allowed us to reimagine what chess would have looked like if history had taken a slightly different course. When the statistical properties of top-level AlphaZero games are compared to classical chess, a number of more decisive variants appear, without impacting the diversity of plausible options available to a player….
Taken together, the statistical properties and aesthetics provide evidence that some variants would lead to games that are at least as engaging as classical chess.
“Chess’s role in artificial intelligence research is far from over…” their article concludes, arguing that AI “can provide the evidence to take reimagining to reality.”
Read more of this story at Slashdot.
But Wired points out that more than 20 U.S. federal agencies are already using a digital identification system (named Login.gov and built on services from LexisNexis) that “can use selfies for account verification.”
It’s run by America’s General Services Administration, or GSA….
The GSA’s director of technology transformation services Dave Zvenyach says facial recognition is being tested for fairness and accessibility and not yet used when people access government services through Login.gov. The GSA’s administrator said last year that 30 million citizens have Login.gov accounts and that it expects the number to grow significantly as more agencies adopt the system.
“ID.me is supplying something many governments ask for and require companies to do,” says Elizabeth Goodman, who previously worked on Login.gov and is now senior director of design at federal contractor A1M Solutions. Countries including the UK, New Zealand, and Denmark use similar processes to ID.me’s to establish digital identities used to access government services. Many international security standards are broadly in line with those of the U.S., written by the National Institute of Standards and Technology (NIST).
Goodman says that such programs need to provide offline options such as visiting a post office for people unable or unwilling to use phone apps or internet services….
In fact, Wired argues that in many cases, a selfie or biometric data is virtually required by U.S. federal security guidelines from 2017:
NIST’s 2017 standard says that access to systems that can leak sensitive data or harm public programs should require verifying a person’s identity by comparing them to a photo — either remotely or in person — or using biometrics such as a fingerprint scanner. It says that a remote check can be done either by video with a trained agent, or using software that checks for an ID’s authenticity and the “liveness” of a person’s photo or video…. California’s Employment Development Department said that ID.me blocked more than 350,000 fraudulent claims in the last three months of 2020. But the state auditor said an estimated 20 percent of legitimate claimants were unable to verify their identities with ID.me.
Caitlin Seeley George, director of campaigns and operations with nonprofit Fight for the Future, says ID.me uses the specter of fraud to sell technology that locks out vulnerable people and creates a stockpile of highly sensitive data that itself will be targeted by criminals. …
Read more of this story at Slashdot.
It’s about that iconic descending musical notes accompanying the onslaught of the aliens…
The more aliens a player shot, the faster they approached; their drumbeat quickened, the tension mounted. Ironically, says Bill Adams, director of game development for Midway Manufacturing Co., of Chicago, Ill., which licensed Space Invaders for sale in the United States, these features of the game were accidental. “The speeding up of the space invaders was just a function of the way the machine worked,” he explained. “The hardware had a limitation — it could only move 24 objects efficiently. Once some of the invaders got shot, the hardware did not have as many objects to move, and the remaining invaders sped up. And the designer happened to put out a sound whenever the invaders moved, so when they sped up, so did the tone.”
Accident or not, the game worked. As of mid-1981, according to Steve Bloom, author of the book Video Invaders, more than 4 billion quarters had been dropped into Space Invaders games around the world — “which roughly adds up to one game per earthling.”
But Space Invaders also enjoyed at least one special home-grown revival earlier this month. Hobbyist Nu Iotachi used an Arduino Pro Micro board to build their own Space Invaders arcade cabinet that’s just 3.15 inches tall (80 millimeters).
Made from thin hand cut plywood with pinhead joysticks, “Its Microchip ATmega328 microcontroller contains a processor running at 16MHz,” reports the project’s site Hackster.io, “which is far faster than the processor in the original Space Invaders arcade cabinet.”
Read more of this story at Slashdot.
This decision set off a firestorm, with some projects complaining that this was an out-of-the-blue roadblock for them as they still needed to mint NFTs but suddenly couldn’t. Shortly after, OpenSea reversed course and announced that it would remove the limit, as well as provided some reasoning for the limit in the first place: The free minting tool is being used almost exclusively for the purposes of fraud or spam. “Every decision we make, we make with our creators in mind. We originally built our shared storefront contract to make it easy for creators to onboard into the space,” OpenSea said in a tweet thread. “However, we’ve recently seen misuse of this feature increase exponentially. Over 80% of the items created with this tool were plagiarized works, fake collections, and spam.”
Read more of this story at Slashdot.
“We propose you negotiate directly with us before taking any further action. The exploit and loss of funds have a profound effect on thousands of real people. If the maximum bounty offer is not what you are looking for, we are open to have a conversation. Let’s figure out a situation,” the Qubit Finance Team wrote. The company later explained in a blog post that their Qubit protocol “was subject to an exploit to our QBridge deposit function.” […] Blockchain security company CertiK released a detailed explanation of how the attack occurred and has been tracking the stolen funds as the hackers move them to different accounts. “For the non-technical readers, essentially what the attacker did is take advantage of a logical error in Qubit Finance’s code that allowed them to input malicious data and withdraw tokens on Binance Smart Chain when none were deposited on Ethereum,” CertiK explained.
Read more of this story at Slashdot.
They have not stated the cause of the spill. “Spill investigators and scientists took a look at the area Jan. 18-19 and saw iron staining in the tributary channel consistent with a low pH environment,” reports local news station KXAN, citing the memo. “WPD says it was in this tributary stretch from the Samsung plant to the main branch of Harris Branch Creek that WPD staff found no surviving aquatic life, including fish.”
Read more of this story at Slashdot.
Read more of this story at Slashdot.
[…] The fight over the measure highlights the potential conflicts of interest in lawmakers’ shareholdings. A Bloomberg Businessweek examination of financial filings found that at least 18 senators and 77 House members report owning shares of one or more of the companies, and the law could have a significant effect on the value of their portfolios. Pelosi disclosed that her husband has as much as $25.5 million in Apple stock alone. Republican Representative Mike McCaul of Texas reported that his family holds shares of all four tech giants, with a collective value topping $8 million. Last year members of Congress filed more than 4,000 trading disclosures involving more than $315 million of stock and bond transactions, according to Tim Carambat, a researcher who maintains databases of lawmakers’ financial trades.
Read more of this story at Slashdot.