You are here


AI needs adult supervision

Info World - Mon, 05/27/2024 - 03:00

Whether OpenAI did or didn’t copy Scarlett Johansson’s voice to front ChatGPT’s “Sky” personality, it’s somewhat telling that people don’t seem to find it hard to imagine OpenAI CEO Sam Altman capable of the misappropriation. Despite the promise of AI, we keep seeing examples of AI run amok, as with Google’s attempts to set AI loose on search results (to very bad effect in some instances). Speaking of the Johansson incident, Charlie Warzel writes in The Atlantic that this seems like “yet another example of a tech company blowing past ethical concerns and operating with impunity.”

To read this article in full, please click here

Categories: Technology

10 big devops mistakes and how to avoid them

Info World - Mon, 05/27/2024 - 03:00

Devops continues to grow in popularity as organizations look for ways to add efficiencies to the development process. Research and Markets, a market research firm, predicts that the worldwide market for devops tools and services will grow from $10.56 billion in 2023 to $29.79 billion in 2028.

Among the drivers for devops are increased demand for scalability, growing industry recognition and best practices, the maturing of devops tools and the devops ecosystem, and increased demand for continuous integration and deployment.

To read this article in full, please click here

Categories: Technology

Why enterprises rely on JavaScript, Python, and Java

Info World - Mon, 05/27/2024 - 03:00

Despite advances in cloud computing, mobile development, and AI, the day-to-day business of enterprises around the world still runs on three programming languages that made their debut in the 1990s. In nearly every ranking system, JavaScript, Python, and Java appear near the top of the most popular languages.

To read this article in full, please click here

Categories: Technology

TWiT 981: Grab Your Rabbit - Sky's voice, Copilot+ Surface devices, Car Thing's discontinuation

This week in tech - Sun, 05/26/2024 - 20:13

Sky's voice, Copilot+ Surface devices, Car Thing's discontinuation

  • OpenAI didn't copy Scarlett Johansson's voice for ChatGPT, records show
  • China's latest answer to OpenAI is 'Chat Xi PT'
  • Microsoft unveils Copilot+ PCs with generative AI capabilities baked in
  • Pioneering instant messaging program ICQ is finally shutting down after nearly 30 years
  • Google scrambles to manually remove weird AI answers in search
  • Rabbit Holed
  • Elon Musk says AI will take all our jobs
  • A jury hands Bungie a victory in a landmark anti-cheating decision
  • Atari Acquires Intellivision Brand
  • Congress Just Made It Basically Impossible to Track Taylor Swift's Private Jet
  • Spotify is going to break every Car Thing gadget it ever sold
  • Kabosu, Shiba Inu dog who inspired 'Doge' meme, dies at 18
  • Bitcoin pizza day
  • C. Gordon Bell, Creator of a Personal Computer Prototype, Dies at 89

Host: Leo Laporte

Guests: Christina Warren, Wesley Faulkner, and Alex Wilhelm

Download or subscribe to this show at

Get episodes ad-free with Club TWiT at


Categories: Podcasts, Technology

JetBrains releases RustRover IDE for Rust development

Info World - Fri, 05/24/2024 - 03:00

JetBrains has released RustRover, a dedicated IDE for the Rust programming language that combines an integrated Rust toolchain with support for AI assistance through an optional plugin and subscription.

Announced May 21, RustRover is positioned to simplify the Rust coding experience while “unlocking the language’s full potential,” JetBrains said. Capabilities include real-time feedback, code suggestions, simplified toolchain management, and team collaboration.

To read this article in full, please click here

Categories: Technology

The cloud repatriation tempest in a teacup

Info World - Fri, 05/24/2024 - 03:00

The tech industry is buzzing with talk of cloud repatriation, partly due to some articles I have written here. What frustrates me about this industry is the lack of nuance. People make everything seem like drastic shifts.

The last example of this was edge computing. Many articles I read claimed that “the shift is to the edge.” That caused a lot of confusion. Reporters, clients, and students all reached out to ask if the cloud was dead since edge computing now seemed like the way to go.

To read this article in full, please click here

Categories: Technology

Class and object initialization in Java

Info World - Fri, 05/24/2024 - 03:00

Classes and objects in Java must be initialized before they are used. You've previously learned that class fields are initialized to default values when classes are loaded, and that objects are initialized via constructors—but there is still more to initialization. This tutorial introduces all of Java's features for initializing classes and objects.

What you'll learn in this Java tutorial
  • How to initialize a Java class
  • How to work with class initialization blocks
  • How to initialize Java objects
download Get the code Download the source code for example applications in this tutorial. Created by Jeff Friesen for JavaWorld. How to initialize a Java class

Before we explore Java's support for class initialization, let's recap the steps of initializing a Java class. Consider Listing 1.

To read this article in full, please click here

Categories: Technology

Classes and objects in Java

Info World - Fri, 05/24/2024 - 03:00

Classes, fields, methods, constructors, and objects are the building blocks of object-based Java applications. This Java tutorial teaches you how to declare classes, describe attributes via fields, describe behaviors via methods, initialize objects via constructors, and instantiate objects from classes and access their members. You'll also learn about setters and getters, method overloading, and setting access levels for fields, constructors, and methods.

What you'll learn in this Java tutorial
  • How to declare a class
  • Using fields to describe attributes
  • Using methods to describe behaviors
  • Using constructors to initialize objects
  • How to work with Java objects
download Get the code Download the source code for example applications in this tutorial. Created by Jeff Friesen for JavaWorld. How to declare a class

A class is a template for manufacturing objects. You declare a class by specifying the class keyword followed by a non-reserved identifier that names it. A pair of matching open and close brace characters ({ and }) follow and delimit the class's body. This syntax appears below:

To read this article in full, please click here

Categories: Technology

Angular 18 arrives with server-side rendering improvements

Info World - Thu, 05/23/2024 - 18:28

Google has published Angular 18, a major upgrade of Google’s TypeScript-based web app development framework that brings server-side rendering improvements and experimental support for zoneless change detection. The release also moves deferrable views and declarative control flow out of developer preview to a stable stage.

Angular 18 was released May 22. It can be accessed from GitHub.

To read this article in full, please click here

Categories: Technology

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security - Thu, 05/23/2024 - 17:32

The homepage of Stark Industries Solutions.

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.

At least a dozen patriotic Russian hacking groups have been launching DDoS attacks since the start of the war at a variety of targets seen as opposed to Moscow. But by all accounts, few attacks from those gangs have come close to the amount of firepower wielded by a pro-Russia group calling itself “NoName057(16).”

This graphic comes from a recent report from Arbor NETSCOUT about DDoS attacks from Russian hacktivist groups.

As detailed by researchers at Radware, NoName has effectively gamified DDoS attacks, recruiting hacktivists via its Telegram channel and offering to pay people who agree to install a piece of software called DDoSia. That program allows NoName to commandeer the host computers and their Internet connections in coordinated DDoS campaigns, and DDoSia users with the most attacks can win cash prizes.

The NoName DDoS group advertising on Telegram. Image:

A report from the security firm Team Cymru found the DDoS attack infrastructure used in NoName campaigns is assigned to two interlinked hosting providers: MIRhosting and Stark Industries. MIRhosting is a hosting provider founded in The Netherlands in 2004. But Stark Industries Solutions Ltd was incorporated on February 10, 2022, just two weeks before the Russian invasion of Ukraine.


Security experts say that not long after the war started, Stark began hosting dozens of proxy services and free virtual private networking (VPN) services, which are designed to help users shield their Internet usage and location from prying eyes.

Proxy providers allow users to route their Internet and Web browsing traffic through someone else’s computer. From a website’s perspective, the traffic from a proxy network user appears to originate from the rented IP address, not from the proxy service customer.

These services can be used in a legitimate manner for several business purposes — such as price comparisons or sales intelligence — but they are also massively abused for hiding cybercrime activity because they can make it difficult to trace malicious traffic to its original source.

What’s more, many proxy services do not disclose how they obtain access to the proxies they are renting out, and in many cases the access is obtained through the dissemination of malicious software that turns the infected system in a traffic relay — usually unbeknownst to the legitimate owner of the Internet connection. Other proxy services will allow users to make money by renting out their Internet connection to anyone. is a company that tracks VPNs and proxy services worldwide. Spur finds that Stark Industries (AS44477) currently is home to at least 74 VPN services, and 40 different proxy services. As we’ll see in the final section of this story, just one of those proxy networks has over a million Internet addresses worldwide available for rent worldwide.

Raymond Dijkxhoorn operates a hosting firm in The Netherlands called Prolocation. He also co-runs SURBL, an anti-abuse service that flags domains and Internet address ranges that are strongly associated with spam and cybercrime activity, including DDoS.

Dijkxhoorn said last year SURBL heard from multiple people who said they operated VPN services whose web resources were included in SURBL’s block lists.

“We had people doing delistings at SURBL for domain names that were suspended by the registrars,” Dijkhoorn told KrebsOnSecurity. “And at least two of them explained that Stark offered them free VPN services that they were reselling.”

Dijkxhoorn added that Stark Industries also sponsored activist groups from Ukraine.

“How valuable would it be for Russia to know the real IPs from Ukraine’s tech warriors?” he observed.


Richard Hummel is threat intelligence lead at Arbor NETSCOUT. Hummel said when he considers the worst of all the hosting providers out there today, Stark Industries is consistently near or at the top of that list.

“The reason is we’ve had at least a dozen service providers come to us saying, ‘There’s this network out there inundating us with traffic,'” Hummel said. “And it wasn’t even DDoS attacks. [The systems] on Stark were just scanning these providers so fast it was crashing some of their services.”

Hummel said NoName will typically launch their attacks using a mix of resources from rented from major, legitimate cloud services, and those from so-called “bulletproof” hosting providers like Stark. Bulletproof providers are so named when they earn or cultivate a reputation for ignoring any abuse complaints or police reports about activity on their networks.

Combining bulletproof providers with legitimate cloud hosting, Hummel said, likely makes NoName’s DDoS campaigns more resilient because many network operators will hesitate to be too aggressive in blocking Internet addresses associated with the major cloud services.

“What we typically see here is a distribution of cloud hosting providers and bulletproof hosting providers in DDoS attacks,” he said. “They’re using public cloud hosting providers because a lot of times that’s your first layer of network defense, and because [many companies are wary of] over-blocking access to legitimate cloud resources.”

But even if the cloud provider detects abuse coming from the customer, the provider is probably not going to shut the customer down immediately, Hummel said.

“There is usually a grace period, and even if that’s only an hour or two, you can still launch a large number of attacks in that time,” he said. “And then they just keep coming back and opening new cloud accounts.”


Stark Industries is incorporated at a mail drop address in the United Kingdom. UK business records list an Ivan Vladimirovich Neculiti as the company’s secretary. Mr. Neculiti also is named as the CEO and founder of PQ Hosting Plus S.R.L. (aka Perfect Quality Hosting), a Moldovan company formed in 2019 that lists the same UK mail drop address as Stark Industries.

Ivan Neculiti, as pictured on LinkedIn.

Reached via LinkedIn, Mr. Neculiti said PQ Hosting established Stark Industries as a “white label” of its brand so that “resellers could distribute our services using our IP addresses and their clients would not have any affairs with PQ Hosting.”

“PQ Hosting is a company with over 1,000+ of [our] own physical servers in 38 countries and we have over 100,000 clients,” he said. “Though we are not as large as Hetzner, Amazon and OVH, nevertheless we are a fast growing company that provides services to tens of thousands of private customers and legal entities.”

Asked about the constant stream of DDoS attacks whose origins have traced back to Stark Industries over the past two years, Neculiti maintained Stark hasn’t received any official abuse reports about attacks coming from its networks.

“It was probably some kind of clever attack that we did not see, I do not rule out this fact, because we have a very large number of clients and our Internet channels are quite large,” he said. “But, in this situation, unfortunately, no one contacted us to report that there was an attack from our addresses; if someone had contacted us, we would have definitely blocked the network data.” finds Ivan V. Neculiti was the owner of war[.]md, a website launched in 2008 that chronicled the history of a 1990 armed conflict in Moldova known as the Transnistria War and the Moldo-Russian war.

An ad for, circa 2009.

Transnistria is a breakaway pro-Russian region that declared itself a state in 1990, although it is not internationally recognized. The copyright on that website credits the “MercenarieS TeaM,” which was at one time a Moldovan IT firm. Mr. Neculiti confirmed personally registering this domain.


The data breach tracking service Constella Intelligence reports that an Ivan V. Neculiti registered multiple online accounts under the email address Cyber intelligence firm Intel 471 shows this email address is tied to the username “dfyz” on more than a half-dozen Russian language cybercrime forums since 2008. The user dfyz on Searchengines[.]ru in 2008 asked other forum members to review, and said they were part of the MercenarieS TeaM.

Back then, dfyz was selling “bulletproof servers for any purpose,” meaning the hosting company would willfully ignore abuse complaints or police inquiries about the activity of its customers.

DomainTools reports there are at least 33 domain names registered to Several of these domains have Ivan Neculiti in their registration records, including, which was registered to an Ivan Neculiti at and referenced the MercenarieS TeaM in its original registration records.

Dfyz also used the nickname DonChicho, who likewise sold bulletproof hosting services and access to hacked Internet servers. In 2014, a prominent member of the Russian language cybercrime community Antichat filed a complaint against DonChicho, saying this user scammed them and had used the email address

The complaint said DonChicho registered on Antichat from the Transnistria Internet address 84.234.55[.]29. Searching this address in Constella reveals it has been used to register just five accounts online that have been created over the years, including one at, where the user registered with the email address Constella also returns for that email address a user by the name “Ivan” at and

Constella finds that the password most frequently used by the email address was “filecast,” and that there are more than 90 email addresses associated with this password. Among them are roughly two dozen addresses with the name “Neculiti” in them, as well as the address support@donservers[.]ru.

Intel 471 says DonChicho posted to several Russian cybercrime forums that support@donservers[.]ru was his address, and that he logged into cybercrime forums almost exclusively from Internet addresses in Tiraspol, the capital of Transnistria. A review of DonChicho’s posts shows this person was banned from several forums in 2014 for scamming other users.

Cached copies of DonChicho’s vanity domain (donchicho[.]ru) show that in 2009 he was a spammer who peddled knockoff prescription drugs via Rx-Promotion, once one of the largest pharmacy spam moneymaking programs for Russian-speaking affiliates.

Mr. Neculiti told KrebsOnSecurity he has never used the nickname DonChicho.

“I may assure you that I have no relation to DonChicho nor to his bulletproof servers,” he said.

Below is a mind map that shows the connections between the accounts mentioned above.

A mind map tracing the history of the user Dfyz. Click to enlarge.

Earlier this year, NoName began massively hitting government and industry websites in Moldova. A new report from Arbor Networks says the attacks began around March 6, when NoName alleged the government of Moldova was “craving for Russophobia.”

“Since early March, more than 50 websites have been targeted, according to posted ‘proof’ by the groups involved in attacking the country,” Arbor’s ASERT Team wrote. “While NoName seemingly initiated the ramp of attacks, a host of other DDoS hacktivists have joined the fray in claiming credit for attacks across more than 15 industries.”


The German independent news outlet last week published a scathing investigative report on Stark Industries and MIRhosting, which notes that Ivan Neculiti operates his hosting companies with the help of his brother, Yuri.

Image credit:

The report points out that Stark Industries continues to host a Russian disinformation news outlet called “Recent Reliable News” (RRN) that was sanctioned by the European Union in 2023 for spreading links to propaganda blogs and fake European media and government websites.

“The website was not running on computers in Moscow or St. Petersburg until recently, but in the middle of the EU, in the Netherlands, on the computers of the Neculiti brothers,” Correctiv reporters wrote.

“After a request from this editorial team, a well-known service was installed that hides the actual web host,” the report continues. “Ivan Neculiti announced that he had blocked the associated access and server following internal investigations. “We very much regret that we are only now finding out that one of our customers is a sanctioned portal,” said the company boss. However, RRN is still accessible via its servers.”

Correctiv also points to a January 2023 report from the Ukrainian government, which found servers from Stark Industries Solutions were used as part of a cyber attack on the Ukrainian news agency “Ukrinform”. Correctiv notes the notorious hacker group Sandworm — an advanced persistent threat (APT) group operated by a cyberwarfare unit of Russia’s military intelligence service — was identified by Ukrainian government authorities as responsible for that attack.


Public records indicate MIRhosting is based in The Netherlands and is operated by 37-year old Andrey Nesterenko, whose personal website says he is an accomplished concert pianist who began performing publicly at a young age.

DomainTools says mirhosting[.]com is registered to Mr. Nesterenko and to Innovation IT Solutions Corp, which lists addresses in London and in Nesterenko’s stated hometown of Nizhny Novgorod, Russia.

This is interesting because according to the book Inside Cyber Warfare by Jeffrey Carr, Innovation IT Solutions Corp. was responsible for hosting StopGeorgia[.]ru, a hacktivist website for organizing cyberattacks against Georgia that appeared at the same time Russian forces invaded the former Soviet nation in 2008. That conflict was thought to be the first war ever fought in which a notable cyberattack and an actual military engagement happened simultaneously.

Responding to questions from KrebsOnSecurity, Mr. Nesterenko said he couldn’t say whether his network had ever hosted the StopGeorgia website back in 2008 because his company didn’t keep records going back that far. But he said Stark Industries Solutions is indeed one of MIRhsoting’s colocation customers.

“Our relationship is purely provider-customer,” Nesterenko said. “They also utilize multiple providers and data centers globally, so connecting them directly to MIRhosting overlooks their broader network.”

“We take any report of malicious activity seriously and are always open to information that can help us identify and prevent misuse of our infrastructure, whether involving Stark Industries or any other customer,” Nesterenko continued. “In cases where our services are exploited for malicious purposes, we collaborate fully with Dutch cyber police and other relevant authorities to investigate and take appropriate measures. However, we have yet to receive any actionable information beyond the article itself, which has not provided us with sufficient detail to identify or block malicious actors.”

In December 2022, security firm Recorded Future profiled the phishing and credential harvesting infrastructure used for Russia-aligned espionage operations by a group dubbed Blue Charlie (aka TAG-53), which has targeted email accounts of nongovernmental organizations and think tanks, journalists, and government and defense officials.

Recorded Future found that virtually all the Blue Charlie domains existed in just ten different ISPs, with a significant concentration located in two networks, one of which was MIRhosting. Both Microsoft and the UK government assess that Blue Charlie is linked to the Russian threat activity groups variously known as Callisto Group, COLDRIVER, and SEABORGIUM.

Mr. Nesterenko took exception to Recorded Future’s report.

“We’ve discussed its contents with our customer, Stark Industries,” he said. “We understand that they have initiated legal proceedings against the website in question, as they firmly believe that the claims made are inaccurate.”

Recorded Future said they updated their story with comments from Mr. Nesterenko, but that they stand by their reporting.

Mr. Nesterenko’s LinkedIn profile says he was previously the foreign region sales manager at Serverius-as, a hosting company in The Netherlands that remains in the same data center as MIRhosting.

In February, the Dutch police took 13 servers offline that were used by the infamous LockBit ransomware group, which had originally bragged on its darknet website that its home base was in The Netherlands. Sources tell KrebsOnSecurity the servers seized by the Dutch police were located in Serverius’ data center in Dronten, which is also shared by MIRhosting.

Serverius-as did not respond to requests for comment. Nesterenko said MIRhosting does use one of Serverius’s data centers for its operations in the Netherlands, alongside two other data centers, but that the recent incident involving the seizure of servers has no connection to MIRhosting.

“We are legally prohibited by Dutch law and police regulations from sharing information with third parties regarding any communications we may have had,” he said.

A February 2024 report from security firm ESET found Serverius-as systems were involved in a series of targeted phishing attacks by Russia-aligned groups against Ukrainian entities throughout 2023. ESET observed that after the spearphishing domains were no longer active, they were converted to promoting rogue Internet pharmacy websites.


A review of the Internet address ranges recently added to the network operated by Stark Industries Solutions offers some insight into its customer base, usage, and maybe even true origins. Here is a snapshot (PDF) of all Internet address ranges announced by Stark Industries so far in the month of May 2024 (this information was graciously collated by the network observability platform

Those records indicate that the largest portion of the IP space used by Stark is in The Netherlands, followed by Germany and the United States. Stark says it is connected to roughly 4,600 Internet addresses that currently list their ownership as Comcast Cable Communications.

A review of those address ranges at shows all of them are connected to an entity called Proxyline, which is a sprawling proxy service based in Russia that currently says it has more than 1.6 million proxies globally that are available for rent.

Proxyline dot net.

Reached for comment, Comcast said the Internet address ranges never did belong to Comcast, so it is likely that Stark has been fudging the real location of its routing announcements in some cases.

Stark reports that it has more than 67,000 Internet addresses at Santa Clara, Calif.-based EGIhosting. Spur says the Stark addresses involving EGIhosting all map to Proxyline as well. EGIhosting did not respond to requests for comment.

EGIhosting manages Internet addresses for the Cyprus-based hosting firm ITHOSTLINE LTD (aka HOSTLINE-LTD), which is represented throughout Stark’s announced Internet ranges. Stark says it has more than 21,000 Internet addresses with HOSTLINE. finds Proxyline addresses are especially concentrated in the Stark ranges labeled ITHOSTLINE LTD, HOSTLINE-LTD, and Proline IT.

Stark’s network list includes approximately 21,000 Internet addresses at Hockessin, De. based DediPath, which abruptly ceased operations without warning in August 2023. According to a phishing report released last year by Interisle Consulting, DediPath was the fourth most common source of phishing attacks in the year ending Oct. 2022. likewise finds that virtually all of the Stark address ranges marked “DediPath LLC” are tied to Proxyline.

Image: Interisle Consulting.

A large number of the Internet address ranges announced by Stark in May originate in India, and the names that are self-assigned to many of these networks indicate they were previously used to send large volumes of spam for herbal medicinal products, with names like HerbalFarm, AdsChrome, Nutravo, Herbzoot and Herbalve.

The anti-spam organization SpamHaus reports that many of the Indian IP address ranges are associated with known “snowshoe spam,” a form of abuse that involves mass email campaigns spread across several domains and IP addresses to weaken reputation metrics and avoid spam filters.

It’s not clear how much of Stark’s network address space traces its origins to Russia, but big chunks of it recently belonged to some of the oldest entities on the Russian Internet (a.k.a. “Runet”).

For example, many Stark address ranges were most recently assigned to a Russian government entity whose full name is the “Federal State Autonomous Educational Establishment of Additional Professional Education Center of Realization of State Educational Policy and Informational Technologies.”

A review of Internet address ranges adjacent to this entity reveals a long list of Russian government organizations that are part of the Federal Guard Service of the Russian Federation. Wikipedia says the Federal Guard Service is a Russian federal government agency concerned with tasks related to protection of several high-ranking state officials, including the President of Russia, as well as certain federal properties. The agency traces its origins to the USSR’s Ninth Directorate of the KGB, and later the presidential security service.

Stark recently announced the address range from April 27 to May 1, and this range was previously assigned to an ancient ISP in St. Petersburg, RU called the Computer Technologies Institute Ltd.

According to a post on the Russian language webmaster forum searchengines[.]ru, the domain for Computer Technologies Institute — ctinet[.]ruis the seventh-oldest domain in the entire history of the Runet.

Curiously, Stark also lists large tracts of Internet addresses (close to 48,000 in total) assigned to a small ISP in Kharkiv, Ukraine called NetAssist. Reached via email, the CEO of NetAssist Max Tulyev confirmed his company provides a number of services to PQ Hosting.

“We colocate their equipment in Warsaw, Madrid, Sofia and Thessaloniki, provide them IP transit and IPv4 addresses,” Tulyev said. “For their size, we receive relatively low number of complains to their networks. I never seen anything about their pro-Russian activity or support of Russian hackers. It is very interesting for me to see proofs of your accusations.” mapped the entire infrastructure of Proxyline, and found more than one million proxies across multiple providers, but by far the biggest concentration was at Stark Industries Solutions. The full list of Proxyline address ranges (.CSV) shows two other ISPs appear repeatedly throughout the list. One is Kharkiv, Ukraine based ITL LLC, also known as Information Technology Laboratories Group, and Integrated Technologies Laboratory.

The second is a related hosting company in Miami, called Green Floid LLC. Green Floid featured in a 2017 scoop by CNN, which profiled the company’s owner and quizzed him about Russian troll farms using proxy networks on Green Floid and its parent firm ITL to mask disinformation efforts tied to the Kremlin’s Internet Research Agency (IRA). At the time, the IRA was using Facebook and other social media networks to spread videos showing police brutality against African Americans in an effort to encourage protests across the United States.

Categories: Technology, Virus Info

EDB unveils EDB Postgres AI

Info World - Thu, 05/23/2024 - 15:00

Relational database provider EnterpriseDB (EDB) on Thursday introduced EDB Postgres AI, a new database aimed at transactional, analytical, and AI workloads.

EDB Postgres AI, which was internally named Project Beacon during its development, started its life as a data lakehouse project with support for Delta Live Tables and later evolved into a product that combines EDB’s PostgreSQL software and other components such as data lakehouse analytics into a singular unified offering.  

To read this article in full, please click here

Categories: Technology

Microsoft Build 2024: 6 takeaways for developers, data professionals

Info World - Thu, 05/23/2024 - 07:21

With AI and generative AI becoming the dominant theme for most enterprise software vendors at their annual conferences, Microsoft’s 2024 version of Build stuck to the norm.

Microsoft CEO Satya Nadella took the stage to summarize his keynote right at the beginning to say that the event was all about Copilots and the Copilot stack across most of the company's offerings.

At the event, Nadella introduced a host of updates to Microsoft's cloud platform to make working with LLMs easier and added generative AI-based assistants to many of its offerings. Here are some key takeaways from the conference that are relevant for developers and data professionals:

To read this article in full, please click here

Categories: Technology

Architecting flexible back ends with GraphQL

Info World - Thu, 05/23/2024 - 03:00

As businesses traverse the complexities of the digital landscape, the seamless integration of diverse systems has emerged as a key element in driving business success. However, traditional integration approaches, burdened by their reliance on fixed data schemas, often make it harder to keep up with the demands of modern applications.

Taking a more modern approach to data access can make all the difference. By adopting GraphQL, organizations can design more flexible, scalable, and responsive back-end systems to extract maximum value from their data, fostering innovation and differentiation in the marketplace.

To read this article in full, please click here

Categories: Technology

How to implement identity authentication in minimal APIs in ASP.NET Core

Info World - Thu, 05/23/2024 - 03:00

Minimal APIs in ASP.NET Core allow us to build lightweight APIs with minimal dependencies. However, often we will still need authentication and authorization in our minimal APIs. There are several ways to achieve this in ASP.NET Core including basic authentication, token-based authentication, and identity-based authentication.

We discussed implementing basic authentication in minimal APIs here, and JWT token-based authentication in minimal APIs here. In this article we’ll examine how we can implement identity-based authentication for minimal APIs in ASP.NET Core.

To read this article in full, please click here

Categories: Technology

Sorting Java objects with Comparable and Comparator

Info World - Thu, 05/23/2024 - 03:00

Programmers frequently need to sort elements from a database into a collection, array, or map. In Java, we can implement whatever sorting algorithm we want with any type.

Using the Comparable interface and compareTo() method, we can sort using alphabetical order, String length, reverse alphabetical order, or numbers. The Comparator interface allows us to do the same but in a more flexible way.

Whatever we want to do, we just need to know how to implement the correct sort logic for the given interface and type.

Sorting with Java's Comparable and Comparator interfaces

Here's what you'll learn in this article about sorting Java objects:

To read this article in full, please click here

Categories: Technology

JetBrains debuts Kotlin 2.0.0 with K2 compiler performance boost

Info World - Thu, 05/23/2024 - 02:00

With the newly released Kotlin 2.0.0 language, JetBrains offers the K2 compiler for improved performance and the open source Kotlin dataset for large language (LLM) model creators.

Kotlin 2.0.0 was announced on May 23. With this release, K2 reaches the stable state, having been completely rewritten based on a new architecture. The rewritten compiler boosts performance and daily productivity, JetBrains said. Compilation time is as much as two times faster with Kotlin 2.0.0 versus Kotlin 1.9.20. The new K2 compiler is more consistent with an improved ability to understand code, according to JetBrains.

To read this article in full, please click here

Categories: Technology

The Linux Link Tech Show Episode 1053

The Linux Link Tech Show - Wed, 05/22/2024 - 20:30
joel hams it up.
Categories: Podcasts, Technology

.NET Aspire cloud development stack launches

Info World - Wed, 05/22/2024 - 14:46

Microsoft’s .NET Aspire, an opinionated, cloud-ready stack for building distributed applications, is now generally available.

The .NET Aspire stack was announced on May 21. Intended to simplify cloud-native development, the Aspire stack unites tools, templates, and NuGet packages to build observable, production-ready applications in .NET more easily, the company said. Developers can get started with .NET Aspire now in Visual Studio 2022 17.10, the .NET CLI, or the Visual Studio Code editor. The stack had been in preview since last November.

To read this article in full, please click here

Categories: Technology

MariaDB plc: Shareholders speak, but execs are quiet

Info World - Wed, 05/22/2024 - 14:21

There appears to be many questions and few answers about MariaDB plc’s long-term strategy following an announcement that its shareholders have accepted an offer by California-based investment firm K1 Investment Management.

News that the company that provides database and SaaS services around the open-source database MariaDB had been acquired came on Monday, when it was announced that a trio of companies—K1; Meridian Bidco LLC, a K1 affiliate; and K5 Capital Advisors—“now have irrevocable shareholder support in respect of 68.51% of MariaDB shares.”

To read this article in full, please click here

Categories: Technology

Snowflake acquires TruEra’s AI observability platform

Info World - Wed, 05/22/2024 - 14:10

Cloud-based data warehouse company Snowflake is acquiring assets in the form of an observability platform from Redwood-based TruEra — a startup that specializes in providing lifecycle management capabilities for machine learning and large language models (LLMs) — for an undisclosed sum.

To read this article in full, please click here

Categories: Technology


Subscribe to Some Place in Ohio aggregator - Technology