Morrissey Technology

Loading

Huawei

No Longer Needed, Huawei Completely Abandons Android

Morrissey TechnologyHuawei officially launched HarmonyOS NEXT, the latest version of its operating system, at Huawei’s annual developer conference, HDC 2024, which is the stage for the company’s biggest announcement. This announcement comes after years of development of the HarmonyOS operating system, which was originally known as Hongmeng.

This Chinese-developed operating system (OS) completely ditches the Linux kernel and Android Open Source Project (AOSP) codebase in favor of a completely independent architecture built around Huawei’s Hongmeng kernel and system.

Huawei claims that the new system architecture delivers a 30% improvement in overall machine performance and a 20% reduction in power consumption. Currently in beta testing, HarmonyOS NEXT is looking for developers and a number of early adopters to participate. Those interested should be aware that the beta version may be unstable and may cause data incompatibility issues.

The main feature of HarmonyOS NEXT is the ability to bridge the gap between different devices. According to Huawei, developers only need to create one version of an app to ensure a consistent user experience across different screen sizes in the Huawei ecosystem FOR4D.

This was demonstrated at the conference with popular apps such as Taobao, Yiche, and Bilibili running smoothly across different devices. Additionally, HarmonyOS NEXT offers a unique “App Continuation” function. Imagine starting a video call on your tablet and seamlessly transferring it to your phone with one click. This system also allows easy sharing of data between devices. For example, you can easily cut and paste images from your phone to your tablet while working on a document.

HarmonyOS NEXT FOR4D is claimed to be more than just device connectivity. This system integrates artificial intelligence (AI) capabilities directly into the system, referred to as “Harmony Intelligence.”

This integration unlocks a variety of features, including:

  • AIGC image creation: Create unique images from line drawings, colorize existing photos, or even enlarge them.
  • Industry-first AI voice repair: This feature aims to help people with speech disorders by improving communication.
  • “Xiaoyi Sees the World” for visually impaired users: This feature uses AI to “read images” by describing their content aloud, potentially helping users identify objects around them.
  • AI-powered control: HarmonyOS NEXT allows third-party apps to leverage the system’s AI for features like real-time text reading, smart form filling, and image/text translation.
  • Then Huawei’s virtual assistant feature, Xiaoyi, has received an upgrade and is called Xiaoyi Intelligent Agent. Xiaoyi no longer requires a wakeup word and can be “summoned” by simply dragging and dropping content onto the navigation bar.

This allows for more intuitive interactions where Xiaoyi can analyze content and offer relevant actions, such as creating charts from images or summarizing documents. Security remains a top priority for Huawei. HarmonyOS NEXT FOR4D introduces the new Star Shield security architecture, designed to keep user data safe. This architecture implements several steps:

  • Rigorous application inspection: Code and applications that do not meet security standards will be blocked from being installed.
  • Multi-device data encryption: Data is encrypted end-to-end across multiple devices for increased protection.
  • Hardware-level encryption: Individual files are encrypted with a unique key stored on the device’s hardware.
  • Permission control: Restrict unnecessary app permissions to minimize privacy risks.
  • HarmonyOS NEXT is still in the development phase, with a commercial launch expected in Q4 2024. The beta testing phase has begun, and Huawei is actively seeking developers and early adopters to provide feedback and help improve the system.

https://psychcjr.com/for4d/

Ransomware National Data Center

National Data Center Down, Cyber ​​Expert Says Suspected of Being Attacked by Ransomeware

Morrissey TechnologyThe National Data Center (PDN) experienced disruption from Thursday (20/6/2024) until today there are no signs of progress towards returning to normal operations. Cyber ​​experts suspect that PDN suffered a Ransomeware cyber attack. As a result, PDN experienced problems resulting in long queues carrying out the immigration process not only at Soekarno-Hatta Airport, but at all Immigration Offices throughout the country.

Chairman of the CISSReC Cyber ​​Security Research Institute, Pratama Persadha, revealed several things that could cause total disruption like this, including electricity supply disruption, server damage, internet connection disruption, as well as cyber attacks such as DDoS or Ransomware.

“If the disruption occurs due to a cyber attack, then the risk is even greater because it not only disrupts services but can also result in personal data being leaked,” said Pratama in his written statement.

Previously there had also been a cyber attack on Immigration which resulted in the leak of personal data, namely the leak of 34 million passport data. What’s even more dangerous, said Pratama, is if hackers can access the servers at the National Data Center, of course the data leak that occurs will not only affect the Directorate General of Immigration but also other institutions that use PDN to store citizen data.

If we look at the pattern of disturbances that occur, Pratama believes that there is a possibility that the problems that occurred at PDN were caused by cyber attacks using the ransomware method, as was the case that happened to Bank Syariah Indonesia previously.

“If the problem faced by PDN is a technical problem, it certainly won’t take that long. The electricity supply problem can be resolved immediately by using electricity supply from another substation or using a generator for temporary supply,” he said.

Likewise, if the problem is an internet connection, such as a break in the fiber optic cable entering the PDN, it can still be resolved quickly using a Point-to-Point radio connection which has a large bandwidth and doesn’t take long to install.

“Similarly, if you are hit by a cyber attack using the DDoS method, the response time required will not be that long because it can be easily resolved by utilizing Anti-DDoS devices and collaborating with ISPs to increase bandwidth capacity and help overcome DDoS from the ISP side,” he explained. .

By seeing this incident, Pratama said that using PDN could endanger the country if it is not equipped with strong security, so that each government agency hosting PDN must create a strong Business Continuity Plan (BCP) so that it does not depend 100 ℅ on PDN infrastructure.

He said that with the PDN down incident, the government must clearly explain what happened and from the start explain BCP from this kind of risk. It should be noted that the PDN currently being built only provides the infrastructure to store data from each agency that owns the SPBE.

“The cyber security factor also still needs special attention because what PDN managers currently guarantee is the cyber security of the PDN infrastructure itself, while the cyber security of each SPBE application is still the responsibility of the agency that owns the SPBE,” he concluded.

https://jakartautara.imigrasi.go.id/js/sdemo/

http://nem-lb.com/web/-/togelonline/

https://smkwalisongojakarta.sch.id/-/togelonline/

https://gidapp.bangkok.go.th/cibma/-/togelonline/

Apple and Meta

Apple and Meta Face Regulatory Challenges in Europe, Why?

Morrissey Technology – Two giant American technology companies, Apple and Meta, are reportedly facing new regulatory challenges in Europe. Apple is related to its application store App Store, while Meta is centered on artificial intelligence (AI) assistants.

Based on a report from the Financial Times (FT), the European Commission (EC) will file charges against Apple. The iPhone maker did not comply with requirements that allow app developers to direct users to offers available outside the App Store BO Togel without charging them.

If such charges are indeed filed against Apple, it could be the first time the EC has done so under the recently implemented Digital Markets Act (DMA), according to the report. The European Commission said in March that it was using its powers under the DMA to investigate Apple, Alphabet and Meta.

The report adds that regulators are only making preliminary findings, they may reassess any final decision if Apple changes its practices, and that the timing of any decision is subject to change.

“We believe our plans comply with the DMA, and we will continue to engage constructively with the European Commission as they conduct their investigation,” Apple FOR4D said in a statement.

Meta, meanwhile, said earlier that it had paused plans to launch its AI assistant, Meta AI, in Europe after the Irish Data Protection Commission (DPC), on behalf of the European data protection authority (DPA), asked it to postpone training of large language models ( LLM) with content shared by adults on Facebook and Instagram Meta platforms.

Meta said in an update that it was disappointed with the request, that it had incorporated feedback from DPA Europe and that the request marked a step backwards for European innovation.

“We are committed to bringing Meta AI FOR4D, along with the models that power it, to more people around the world, including in Europe,” Meta said in the update.

“However, simply put, without including local information, we can only offer people a second-class experience. This means we cannot launch Meta AI in Europe at this time,” he continued.

Apple Intelligence

Apple Intelligence’s Move to Protect Privacy Even though ChatGPT is Integrated

Morrissey Technology – Apple continues to strengthen its commitment to user privacy at the WWDC 2024 event. A series of new privacy and security features will be presented in iOS 18, iPadOS 18, macOS Sequoia and Apple Intelligence updates. There are four principles that Apple adheres to in maintaining user privacy. First, they minimize the data that can be accessed by Apple itself and other parties using technology and other innovative techniques.

Both Apple attempts to minimize data collection by processing as much data as possible on users’ devices rather than sending it to servers. Third, transparency and control, help users better understand the data collected so they can make their own choices about how that data is used. And finally security protection. These four aspects are a reference in maintaining privacy in Apple Intelligence. Because this technology giant from Cupertino believes that strong AI goes hand in hand with strong privacy too. For this reason, Apple finally made its own silicon chips. So it can deeply integrate personal artificial intelligence systems on iPhone, iPad and Mac, as well as their applications FOR4D.

This personal intelligence system provides a human model as well as enormous language capabilities that are specific to any task and can adapt quickly to the user’s current activities, including semantic indexes that can organize and surface information. That means when a user makes a request, Apple Intelligence will identify relevant personal data and feed it to a generator model that has the necessary personal contacts to best help the user.

Even though most of this is processed on the device, there are times when you need a larger model than can fit on an iPhone, iPad or Mac. Then a server could be the solution. It’s just that traditional servers can store usage data unknowingly and use it without the owner knowing. That’s why Apple created Private Cloud Compute. With this solution, Apple can flexibly increase computing capacity and create larger server-based models for more complex requests while still protecting user privacy FOR4D.

This starts with Secure Enclave, which protects critical encryption keys on the server just like on the user’s iPhone, while Secure Boot ensures the OS running on the server is signed and verified, just like on iOS. Trusted Execution Monitor ensures only signed and verified code runs, and authentication allows user devices to securely verify the identity and configuration of a Private Cloud Compute cluster before sending requests.

So when a user makes a request, Apple Intelligence analyzes whether it can be processed on the device or processes it on Apple Silicon servers by sending only data that is relevant to the task. That means no one can access it including Apple, even while the data is being processed. Data is not stored by Private Cloud Compute after it is returned to the user. Apple guarantees that the data submitted is used exclusively for the user’s request and does not exercise it or do anything else. To guarantee that, independent experts can check the code running on the server to verify.

Regarding integration with ChatGPT with Siri, this function must be enabled by the user as it is not available by default. After that, as soon as the user makes a request, Siri writes down which tools can be used to fulfill the request, one of which is ChatGPT FOR4D. However, users must agree first for data to be sent to ChatGPT. Apple guarantees that the only thing that goes into ChatGPT is what the user requests. For example, requesting a document summary, only the sent PDF file is accessed by ChatGPT.

It doesn’t stop there, from a technical perspective, when sending data, Apple disguises the user’s IP address. Apart from that, each user’s IP sending is made different so that ChatGPT does not recognize the usage. In the contract, Apple and OpenAI legally do not allow ChatGPT to store data or train it at all. Users who subscribe to ChatGPT Plus can connect their accounts to this integration. However, data sent to OpenAI becomes part of the integration which is fully governed by OpenAI’s privacy policy.

AI Image Contest Tricked by Real Photos Snapped by Photographers

AI Image Contest Tricked by Real Photos Snapped by Photographers

Morrissey Technology – Usually internet users are confused when they see images that they think are real photos but are actually made by AI. But what happened to photographer Miles Astray was the opposite, because the photo he took was thought to be made by AI by a photography contest. Astray submitted his photo entitled ‘F L A M I ​​N G O N E’ to participate in the 1839 Color Photography FOR4D Awards photo contest. The photo was submitted in the AI ​​category, the only non-camera category in the contest.

For the non-AI category, the contest organizer will ask for proof that the photo was not created by AI as well as proof of ownership of the original file. But for the AI ​​category, the photo contest organizers do not ask for proof that the images submitted are created by AI.

Because of this, Astray can register the photos it takes in the AI ​​category. The photo was not only named third place in the AI ​​category but also won the People’s Choice Award for the AI ​​category.

At first glance, the photo registered by Astray looks like the result of an AI hallucination. The photo shows a flamingo standing on the beach but its head is not visible at all. Astray said he took the photo in Aruba at 5.00 am. He submitted the photo to the AI ​​category to prove that nature can be more surprising than machines.

“I want to show that nature can still beat machines and that there are still benefits from real work created by creative workers,” Astray told PetaPixel FOR4D.

“After seeing AI-generated images beat real photos in competitions, I started thinking about changing the story and its impact by submitting real photos to AI competitions,” he continued.

Astray immediately informed the contest organizers that the photos he submitted were not created by AI. The organizers immediately disqualified the photo because it did not meet the criteria, but they appreciated the message of Astray’s action.

“We understand the intent, but we don’t want to prevent other artists from winning in the AI ​​category. We hope this will bring awareness (and hope) to other photographers who are worried about AI,” said a spokesperson for the contest organizers.

MediaTek

MediaTek Prepares Arm Chips for Windows Laptops

Morrissey TechnologyMediaTek is said to be developing an Arm chip for Windows-based laptops, which appears to be prepared to compete with Qualcomm’s Snapdragon X chip. According to Reuters, this information came from a source familiar with this matter, but who was not named.

The Windows operating system referred to here is the Copilot+ PC device which was just showcased by Microsoft in May 2024. This is a laptop equipped with a chip with advanced AI processing capabilities, and Microsoft claims will be the laptop for the future. Both Microsoft and MediaTek declined to comment on MediaTek’s new chip.

However, according to sources, the MediaTek chip will only be launched in 2025, namely after Qualcomm’s exclusive agreement to supply the laptop chip ends. The chips will use Arm’s “off-the-shelf” designs to make them easier to manufacture.

In fact, MediaTek also has a Kompanio chip for Chromebooks. This chip could be used as a basis for designing the Windows chip. It is not yet known whether Microsoft has given the green light for this chip from MediaTek for Copilot+ PC.

For information, in 2016 Microsoft collaborated with Qualcomm FOR4D to work together on a Windows operating system but running on Arm architecture, which is usually used in cellphones and tablets – which have a smaller battery capacity than laptops.

From there, Microsoft then gave exclusive rights to Qualcomm to make chips for Arm-based Windows until 2024. The agreement will end this year, and that’s why other companies have started making Arm chips that are compatible with Arm versions of Windows.

Apart from MediaTek, there are also Nvidia and AMD which are working on Arm chips for Windows laptops. Interestingly, Nvidia worked on this chip with the help of MediaTek. However, this latest MediaTek chip is reportedly separate from their collaboration with Nvidia.

Artificial Intelligence

Using AI During University Entrance Exams, Turkish Students Arrested

Morrissey Technology – A student in Turkey was arrested after being caught trying to cheat on a university entrance exam using artificial intelligence (AI) technology. This incident occurred during the Basic Ability Test (TYT) on June 8 2024, which shows how many people are willing to do various things to get university entrance tickets.

Students identified as MEE. This man had carefully planned the fraud attempt, he was known to have embedded a camera in the button of his shirt and hidden the electronic device in the lining of his shoe. MEE also managed to get past police surveillance at the entrance to the exam room, and then took the device in the restroom.

While in the exam room, MEE started taking photos of the exam questions and sent them to his friend with the initials AB. AB uses the ChatGPT platform to provide answers, which are then relayed back to the MEE headset via the router FOR4D.

Despite the elaborate scheme, the police became suspicious of MEE’s suspicious behavior and intervened. They confiscated a router disguised as a credit card, three cameras disguised as buttons, and MEE’s personal phone. Both MEE and AB were detained, and MEE faces charges that could result in prison time.

“ChatGPT not only detects written questions but also any image and if it is a question, then it can be used in any process such as solving the question. In this case, all the necessary technological mechanisms have been prepared for the system to work properly,” said IT expert Osman Demircan FOR4D.

Demircan further emphasized the dual potential of artificial intelligence and stated that artificial intelligence systems can be used for evil acts as well as for good. Extra steps should be taken to prevent this and similar cheating attempts on future exams.

Police are considering increased use of metal detectors and more thorough candidate searches to prevent such incidents.

Demircan suggested that law enforcement also monitor individuals using computers or phones near test centers and be alert to vehicles parked nearby, as they could be involved in cheating attempts.

Google Search Algorithm

Thousands of Google Search Algorithm Data Leaked, SEO Secrets Revealed

Morrissey Technology – Thousands of documents about Google Search algorithm leaked. This leak dismantles Google’s search engine algorithm and search engine optimization (SEO) in detail. The documents in question detail data collected by Google, some of which may be used in Google’s closely guarded SEO algorithms. The existence of the leaked document was first brought to light by SEO specialists Rand Fishkin and Mike King, who each published initial analyzes of the document.

The leaked documents reveal that Google collects and potentially uses data that Google representatives say does not contribute to ranking web pages in Google Search, such as clicks, Chrome user data, and more. The document holds a lot of information for Google employees, but it’s not clear which data is used to rank search content. This information may be out of date, for training purposes only, or not specifically used for Search FOR4D.

The document also does not explain how various elements are weighted in the search. However, this information being revealed to the public will likely cause upheaval in the SEO, marketing, and publishing industries. Google is usually very secretive about how its search algorithms work, but these documents have provided further clarity on what signals Google is thinking about when ranking websites.

Google’s search choices greatly influence many online businesses. Many people try to understand or outsmart Google’s algorithm, although they often get different answers. Google’s internal documents now provide some insight into how the company thinks.

In the document, there are more than 14,000 attributes mentioned, which would require researchers to spend weeks examining each page. The leaked data also exposed the practices of ‘Twiddlers,’ namely changes in rankings that do not go through major system updates, which affect the ranking of content based on certain criteria FOR4D.

The content of the document also touches on important elements on the web page, such as the identity of the author and the level of ‘authority’ of the website. Google has confirmed this data leak and issued an official statement. However, they also asked people not to speculate carelessly about the leaked data.

“We caution against making inaccurate assumptions about Search based on out-of-context, outdated, or incomplete information,” Google spokesperson Davis Thompson told The Verge.

“We have shared comprehensive information about how search works and the types of factors our system considers, as well as working to protect the integrity of search results from manipulation,” he concluded.

TikTok

Paris Hilton and Sony’s TikTok Accounts Were Attacked by Hackers

Morrissey Technology – A number of large social media accounts on TikTok were hacked, from the accounts of celebrity Paris Hilton, to technology company Sony and media companies. Based on a report from Forbes, even though the hacked account has not posted anything, what is of concern is the method of the hack.

This is because hackers sent malware in file form via the direct message (DM) feature in the TikTok application. From this malware, victims do not have to click on links or download any files. However, every account that has opened the DM feature is guaranteed to be immediately infected with the malware.

“Our security team is aware of a potential exploit targeting a number of brand and celebrity accounts. We have taken steps to stop this attack and prevent it from occurring in the future. We are working directly with affected account owners to restore access, if necessary, ” said a TikTok spokesperson FOR4D.

The news media, which was one of the victims of hackers, was forced to temporarily delete its TikTok account. It was reported by the Semafor news media that this hack occurred due to a team error that was careless about operational security.

However, the hacking of a number of other large accounts shows that this is not CNN’s fault. A TikTok spokesperson said that they are collaborating with CNN to restore hacked accounts.

“Our security team was recently alerted to a malicious actor targeting CNN’s TikTok account FOR4D. We have collaborated closely with CNN to restore account access and implement enhanced security measures, to protect their account,” a TikTok spokesperson said.

“We are dedicated to maintaining the integrity of the platform (TikTok) and will continue to monitor for further inauthentic activity,” he continued.

Elon Musk AI

Elon Musk Predicts All Human Jobs Will Be Taken by AI

Morrissey TechnologyElon Musk said that artificial intelligence or AI will take over human jobs. However, that is not a bad thing. Why is that?

“Probably none of us will have a job,” Elon Musk said about AI at the VivaTech technology conference in Paris.

Elon Musk also described that in the future, work will be optional, aka a choice for humans or not a necessity, as AI becomes more widespread.

“If you want to do work that is similar to a hobby, you can do it. But if not, AI and robots will provide whatever goods and services you want,” said Musk.

He explains that for this scenario to work, there needs to be a ‘universal high income’ system FOR4D. However, it should not be confused with universal basic income, although he himself does not explain what that would look like. (UBI or Universal Basic Income refers to the government giving a certain amount of money to everyone regardless of how much they earn).

“There will be no shortage of goods or services,” he added.

AI capabilities have surged over the past few years, fast enough that regulators, companies, and consumers are still looking for ways to use this technology responsibly. Concerns also continue to rise about how various industries and jobs will change as AI advances in society.

In January, researchers at MIT found that adoption of AI in some workplaces was slower than expected. They also report that many jobs thought to be vulnerable to AI are simply not economical to automate.

Experts believe that jobs that require emotional intelligence and human interaction, such as mental health professionals, creatives, and teachers, do not need to be replaced. Musk himself has voiced his concerns about AI. During his keynote speech on Thursday, he called technology his biggest fear.

He cited the ‘Culture Book Series’ by Ian Banks, a fictional utopian view of a society run by advanced technology, as the most realistic and best depiction of AI in the future.

However, in a work-free future, Musk questions whether people will feel emotionally fulfilled FOR4D.

“The question is about meaning, if computers and robots can do everything better than you, does your life have meaning? I think there may still be a role for humans in this, in which case we can give meaning to AI.” he explained.

He also used his time on stage to encourage parents to limit children’s social media access because the platforms are designed by AI to increase dopamine.