Connect with us

Biz & IT

Google Assistant picks up a few new tricks

Published

on

Google Assistant, the voice-driven AI that sits inside Google Home (plus Android phones, newer Nest cameras and a bunch of other devices) and awaits your “Hey, Google” commands, is already pretty clever. That doesn’t mean it can’t learn a few new tricks.

In a quick press briefing this week, Google told us a couple of new abilities Assistant will pick up in the coming weeks.

First, and perhaps most interestingly: routines can now be set to trigger the moment you dismiss an alarm on your phone. Routines are basically Google Assistant combo moves; you build them to trigger multiple actions at once. You can build a “Hey Google, I’m going to bed” command, for example, that turns off your smart lights, shuts down the TV and locks your smart locks. For a while now, you’ve been able to have routines triggered at specific times; now you can have them triggered by alarm dismissal.

The difference? If you snooze the alarm on your phone, the routine won’t go off just yet. So you can build a routine, for example, that turns on the lights and starts reading the news — but now it can go off when you’re really getting out of bed, roughly two snooze-buttons after when you probably should’ve gotten up. You’ll find this one hiding in Android’s Clock app.

Another feature, meanwhile, is getting an upgrade: broadcasts. If you’ve got multiple Google Home devices around your house, you can already “broadcast” to all of them to make house-wide announcements like “Dinner’s ready!” or “help I need toilet paper downstairs” (THE FUTURE!). Now you can broadcast messages back to your home while out and about via Google Assistant on your phone, and people inside the home can respond. You can say, “Hey Google, broadcast ‘Do we need milk?’” and anyone inside your house can say “Hey Google, reply ‘no but please get eggnog, come on, please, it’s basically December, you said we could get eggnog in December.’ ”

Broadcast replies will be sent back to your phone as a voice message and a transcription.

Google is also starting to introduce “character alarms” — which are, as the name implies, alarms voiced by popular characters. Right now they’re adding the heroes in a half shell from Nickelodeon’s “Rise of the Teenage Mutant Ninja Turtles,” and a bunch of LEGO animated series characters (alas, no LEGO Batman.) They’ll presumably expand this with more licenses if it proves popular.

And if you listen to podcasts or audiobooks on your Google Assistant devices, you can now adjust the playback speed by saying “Hey Google, play at 1.5x” or “1.8x” or whatever you want up to twice the speed. “Play faster” or “Play slower” also works if you’re not feeling specific.

Oh, and for good measure: Google Assistant can now silence all the phones in your house (or, at least, the Android phones tied to your Google account) with a quick “Hey Google, silence the phones” command.

Source link

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published.

Biz & IT

Crypto-driven GPU crash makes Nvidia miss Q2 projections by $1.4 billion

Published

on

Getty Images

Nvidia doesn’t officially announce its second-quarter financial results until the end of the month, but the company is trying to soften the blow by announcing preliminary results today. And as with so many other tech companies in the last month, the results are mixed at best. With $6.7 billion in revenue, Nvidia managed to eke out year-over-year growth, but the results are still bad news because that number is down from a previously forecasted $8.1 billion, a miss of $1.4 billion.

Nvidia blamed this shortfall on weaker-than-expected demand for its gaming products, including its GeForce graphics processors. Nvidia pointed to “a reduction in channel partner sales,” meaning that partners like Evga, MSI, Asus, Zotac, Gigabyte, and others were selling fewer new GPUs than anticipated. This drop can be attributed partly to a crash in the value of mining-based cryptocurrencies like Bitcoin and Ethereum—fewer miners are buying these cards, and miners looking to unload their GPUs on the secondhand market are also giving gamers a cheaper source for graphics cards.

“As we expect the macroeconomic conditions affecting sell-through to continue, we took actions with our Gaming partners to adjust channel prices and inventory,” said Nvidia CEO Jensen Huang. That means we may see further price drops for existing GeForce GPUs, which have already been dropping in price throughout the year. Some cards still haven’t reverted to their originally advertised prices, but they’re getting closer all the time.

By contrast, AMD grew its quarterly gaming revenue from $1.3 billion last year to $1.7 billion this year, thanks partly to its semi-custom hardware powering consoles like the Xbox Series S and X and the PlayStation 5. Nvidia’s GPU tech powers the Nintendo Switch, but otherwise, Nvidia is more dependent on PC gaming for its revenue.

In better news for Nvidia, the small overall increase in revenue is driven almost exclusively by the company’s data center business, including GPU-accelerated AI and machine learning applications and GPU acceleration for cloud-hosted virtual machines. Nvidia’s data center revenue is projected to be up 61 percent from last year, from $2.37 billion to $3.81 billion.

Nvidia will supposedly launch its next-generation RTX 4000 series GPUs later this year. Based on the new Lovelace architecture, these GPUs may appeal to some gamers who originally sat out the RTX 3000 series due to shortages and inflated prices and are now avoiding the GPUs because they know a replacement is around the corner.

Continue Reading

Biz & IT

Cyberattack on Albanian government suggests new Iranian aggression

Published

on

Enlarge / Tirane, Albania.

Pawel Toczynski | Getty Images

In mid-July, a cyberattack on the Albanian government knocked out state websites and public services for hours. With Russia’s war raging in Ukraine, the Kremlin might seem like the likeliest suspect. But research published on Thursday by the threat intelligence firm Mandiant attributes the attack to Iran. And while Tehran’s espionage operations and digital meddling have shown up all over the world, Mandiant researchers say that a disruptive attack from Iran on a NATO member is a noteworthy escalation.

The digital attacks targeting Albania on July 17 came ahead of the “World Summit of Free Iran,” a conference scheduled to convene in the town of Manëz in western Albania on July 23 and 24. The summit was affiliated with the Iranian opposition group Mujahadeen-e-Khalq, or the People’s Mojahedin Organization of Iran (often abbreviated MEK, PMOI, or MKO). The conference was postponed the day before it was set to begin because of reported, unspecified “terrorist” threats.

Mandiant researchers say that attackers deployed ransomware from the Roadsweep family and may have also utilized a previously unknown backdoor, dubbed Chimneysweep, as well as a new strain of the Zeroclear wiper. Past use of similar malware, the timing of the attacks, other clues from the Roadsweep ransomware note, and activity from actors claiming responsibility for the attacks on Telegram all point to Iran, Mandiant says.

“This is an aggressive escalatory step that we have to recognize,” says John Hultquist, Mandiant’s vice president of intelligence. “Iranian espionage happens all the time all over the world. The difference here is this isn’t espionage. These are disruptive attacks, which affect the lives of everyday Albanians who live within the NATO alliance. And it was essentially a coercive attack to force the hand of the government.”

Iran has conducted aggressive hacking campaigns in the Middle East and particularly in Israel, and its state-backed hackers have penetrated and probed manufacturing, supply, and critical infrastructure organizations. In November 2021, the US and Australian governments warned that Iranian hackers were actively working to gain access to an array of networks related to transportation, health care, and public health entities, among others. “These Iranian government-sponsored APT actors can leverage this access for follow-on operations, such as data exfiltration or encryption, ransomware, and extortion,” the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency wrote at the time.

Tehran has limited how far its attacks have gone, though, largely keeping to data exfiltration and reconnaissance on the global stage. The country has, however, participated in influence operations, disinformation campaigns, and efforts to meddle in foreign elections, including targeting the US.

“We’ve become used to seeing Iran being aggressive in the Middle East where that activity just has never stopped, but outside of the Middle East they’ve been far more restrained,” Hultquist says. “I’m concerned that they may be more willing to leverage their capability outside of the region. And they clearly have no qualms about targeting NATO states, which suggests to me that whatever deterrents we believe exist between us and them may not exist at all.”

With Iran claiming that it now has the ability to produce nuclear warheads, and representatives from the country meeting with US officials in Vienna about a possible revival of the 2015 nuclear deal between the countries, any signal about Iran’s possible intentions and risk tolerance when it comes to dealing with NATO are significant.

This story originally appeared on wired.com.

Continue Reading

Biz & IT

“Huge flaw” threatens US emergency alert system, DHS researcher warns

Published

on

Enlarge / Obstruction light with bokeh city background

The US Department of Homeland Security is warning of vulnerabilities in the nation’s emergency broadcast network that makes it possible for hackers to issue bogus warnings over radio and TV stations.

“We recently became aware of certain vulnerabilities in EAS encoder/decoder devices that, if not updated to most recent software versions, could allow an actor to issue EAS alerts over the host infrastructure (TV, radio, cable network),” the DHS’s Federal Emergency Management Agency (FEMA) warned. “This exploit was successfully demonstrated by Ken Pyle, a security researcher at CYBIR.com, and may be presented as a proof of concept at the upcoming DEFCON 2022 conference in Las Vegas, August 11-14.”

Pyle told reporters at CNN and Bleeping Computer that the vulnerabilities reside in the Monroe Electronics R189 One-Net DASDEC EAS, an Emergency Alert System encoder and decoder. TV and radio stations use the equipment to transmit emergency alerts. The researcher told Bleeping Computer that “multiple vulnerabilities and issues (confirmed by other researchers) haven’t been patched for several years and snowballed into a huge flaw.”

“When asked what can be done after successful exploitation, Pyle said: ‘I can easily obtain access to the credentials, certs, devices, exploit the web server, send fake alerts via crafts message, have them valid / pre-empting signals at will. I can also lock legitimate users out when I do, neutralizing or disabling a response,’” Bleeping Computer added.

This isn’t the first time federal officials have warned of vulnerabilities in the emergency alert system.

Continue Reading

Trending