1
80
submitted 3 months ago by L3s@lemmy.world to c/technology@lemmy.world

Greetings everyone,

We wanted to take a moment and let everyone know about the !business@lemmy.world community on Lemmy.World which hasn't gained much traction. Additionally, we've noticed occasional complaints about Business-related news being posted in the Technology community. To address this, we want to encourage our community members to engage with the Business community.

While we'll still permit Technology-related business news here, unless it becomes overly repetitive, we kindly ask that you consider cross-posting such content to the Business community. This will help foster a more focused discussion environment in both communities.

We've interacted with the mod team of the Business community, and they seem like a dedicated and welcoming group, much like the rest of us here on Lemmy. If you're interested, we encourage you to check out their community and show them some support!

Let's continue to build a thriving and inclusive ecosystem across all our communities on Lemmy.World!

2
7

WhatsApp is developing an AI-powered feature allowing users to create personalized stickers using their own images. The feature is currently in beta testing and is expected to be rolled out to the public soon.

3
102
submitted 6 hours ago by 0x815@feddit.org to c/technology@lemmy.world

cross-posted from: https://feddit.org/post/373442

Archived link

Here is the report (pdf).

Serbian authorities have adopted invasive surveillance practices and facial recognition technology to monitor political opponents, civic activists and critical journalists, says a BIRN report entitled ‘Digital Surveillance in Serbia – A Threat to Human Rights?’, published on Friday.

Equipment from Chinese manufacturers, such as Dahua and Hickvision, predominates.

Serbia’s aspirations for EU membership mean that it faces pressure to adhere to EU standards on data protection and privacy as well as cybersecurity. However, Serbia has simultaneously strengthened ties with authoritarian countries, especially China and Russia.

4
73
5
231

The rocket was undergoing a static fire test of the stage, in which a vehicle is clamped to a test stand while its engines are ignited, when the booster broke free. According to a statement from the company, the rocket was not sufficiently clamped down and blasted off from the test stand "due to a structural failure."

Video of the accidental ascent showed the rocket rising several hundred meters into the sky before it crashed explosively into a mountain 1.5 km away from the test site.

6
73
submitted 12 hours ago by jeffw@lemmy.world to c/technology@lemmy.world
7
387

The EU Council has now passed a 4th term without passing its controversial message-scanning proposal. The just-concluded Belgian Presidency failed to broker a deal that would push forward this regulation, which has now been debated in the EU for more than two years.

For all those who have reached out to sign the “Don’t Scan Me” petition, thank you—your voice is being heard. News reports indicate the sponsors of this flawed proposal withdrew it because they couldn’t get a majority of member states to support it.

Now, it’s time to stop attempting to compromise encryption in the name of public safety. EFF has opposed this legislation from the start. Today, we’ve published a statement, along with EU civil society groups, explaining why this flawed proposal should be withdrawn.

The scanning proposal would create “detection orders” that allow for messages, files, and photos from hundreds of millions of users around the world to be compared to government databases of child abuse images. At some points during the debate, EU officials even suggested using AI to scan text conversations and predict who would engage in child abuse. That’s one of the reasons why some opponents have labeled the proposal “chat control.”

There’s scant public support for government file-scanning systems that break encryption. Nor is there support in EU law. People who need secure communications the most—lawyers, journalists, human rights workers, political dissidents, and oppressed minorities—will be the most affected by such invasive systems. Another group harmed would be those whom the EU’s proposal claims to be helping—abused and at-risk children, who need to securely communicate with trusted adults in order to seek help.

The right to have a private conversation, online or offline, is a bedrock human rights principle. When surveillance is used as an investigation technique, it must be targeted and coupled with strong judicial oversight. In the coming EU council presidency, which will be led by Hungary, leaders should drop this flawed message-scanning proposal and focus on law enforcement strategies that respect peoples’ privacy and security.

Further reading:

8
88
submitted 14 hours ago by jeffw@lemmy.world to c/technology@lemmy.world
9
35
submitted 12 hours ago by jeffw@lemmy.world to c/technology@lemmy.world
10
108
submitted 14 hours ago by jeffw@lemmy.world to c/technology@lemmy.world
11
352
12
119

The cable industry has been in a nose-dive for years. Comcast's Q1 2024 earnings report showed its cable business losing 487,000 subscribers. The cable giant ended 2022 with 16,142,000 subscribers; in January, it had 13,600,000.

Charter, the only US cable company bigger than Comcast, is rapidly losing pay-TV subscribers, too. In its Q1 2024 earnings report, Charter reported losing 405,000 subscribers, including business accounts. It ended 2022 with 15,147,000 subscribers; at the end of March, it had 13,717,000.

And, like Comcast, Charter is looking to streaming bundles to keep its pay-TV business alive and to compete with the likes of YouTube TV and Hulu With Live TV.

It’s a curious time as cable TV providers scramble to be part of an industry created in reaction to business practices that many customers viewed as anti-consumer. Meanwhile, the streaming industry is adopting some of these same practices, like commercials and incessant price hikes, to establish profitability. And some smaller streaming players say it's nearly impossible to compete as the streaming industry's top players are taking form and, in some cases, collaborating.

But after decades of discouraging many subscribers with few alternatives, it will be hard for former or current cable customers to view firms like Comcast and Charter as trustworthy competitive streaming providers.

13
27
submitted 14 hours ago by jeffw@lemmy.world to c/technology@lemmy.world
14
291
submitted 20 hours ago by lemmee_in@lemm.ee to c/technology@lemmy.world

It's raining ads in Windows 11. The Microsoft Weather app in the operating system now displays more ads.

You may recall that a year ago, Microsoft had actually removed the ads from the app, and it appeared that the company had finally listened to feedback from users. But the annoying banners are back, and there's two of them now on the Forecast page. For those unaware, the old version of Microsoft Weather was a UWP app, but the company replaced it with an Edge WebView, which is a container that uses the Edge Engine. In other words, the Weather app is technically just a web wrapper for MSN.com/weather. You can test this yourself, just open the website in your browser and temporarily disable your ad blocker to take a look at the ads, now open the desktop app, and you can see that the same ads appear in the Weather app.

15
35
16
438
submitted 23 hours ago by neme@lemm.ee to c/technology@lemmy.world
17
284
submitted 23 hours ago by 0x815@feddit.org to c/technology@lemmy.world

- China implemented new regulations on Monday under its toughened counterespionage law, which enables authorities to inspect smartphones, personal computers and other electronic devices, raising fears among expatriates and foreign businesspeople about possible arbitrary enforcement.

- A Japanese travel agency official said the new regulations could further prevent tourists from coming to China. Some Japanese companies have told their employees not to bring smartphones from Japan when they make business trips to the neighboring country, according to officials from the companies.

The new rules, which came into effect one year after the revised anti-espionage law expanded the definition of espionage activities, empower Chinese national security authorities to inspect data, including emails, pictures, and videos stored on electronic devices.

Such inspections can be conducted without warrants in emergencies. If officers are unable to examine electronic devices on-site, they are authorized to have those items brought to designated places, according to the regulations.

It remains unclear what qualifies as emergencies under the new rules. Foreign individuals and businesses are now expected to face increased surveillance by Chinese authorities as a result of these regulations.

A 33-year-old British teacher told Kyodo News at a Beijing airport Monday that she refrains from using smartphones for communications. A Japanese man in his 40s who visited the Chinese capital for a business trip said he will "try to avoid attracting attention" from security authorities in the country.

In June, China's State Security Ministry said the new regulations will target "individuals and organizations related to spy groups," and ordinary passengers will not have their smartphones inspected at airports. However, a diplomatic source in Beijing noted that authorities' explanations have not sufficiently clarified what qualifies as spying activities.

Last week, Taiwan's Mainland Affairs Council upgraded its travel warning for mainland China, advising against unnecessary trips due to Beijing's recent tightening of regulations aimed at safeguarding national security.

In May, China implemented a revised law on safeguarding state secrets, which includes measures to enhance the management of secrets at military facilities.

18
226

Once upon a time, newly minted graduates dreamt of creating online social media that would bring people closer together.

That dream is now all but a distant memory. In 2024, there aren’t many ills social networks don’t stand accused of: the platforms are singled out for spreading “fake news”, for serving as Russian and Chinese vehicles to destabilise democracies, as well as for capturing our attention and selling it to shadowy merchants through micro targeting. The popular success of documentaries and essays on the allegedly huge social costs of social media illustrates this.

  • Studies suggest that if individuals regularly clash over political issues online, this is partly due to psychological and socioeconomic factors independent of digital platforms.

  • In economically unequal and less democratic countries, individuals are most often victims of online hostility on social media (e.g., insults, threats, harassment, etc.). A phenomenon which seems to derive from frustrations generated by more repressive social environments and political regimes.

  • individuals who indulge most in online hostility are also those who are higher in status-driven risk taking. This personality trait corresponds to an orientation towards dominance, i.e., a propensity to seek to submit others to one’s will, for instance through intimidation. According to our cross-cultural data, individuals with this type of dominant personality are more numerous in unequal and non-democratic countries.

  • Similarly, independent analyses show that dominance is a key element in the psychology of political conflict, as it also predicts more sharing of “fake news” mocking or insulting political opponents, and more attraction to offline political conflict, in particular.

  • n summary, online political hostility appears to be largely the product of the interplay between particular personalities and social contexts repressing individual aspirations. It is the frustrations associated with social inequality that have made these people more aggressive, activating tendencies to see the world in terms of “us” vs “them”.

  • On a policy level, if we are to bring about a more harmonious Internet (and civil society), we will likely have to tackle wealth inequality and make our political institutions more democratic.

  • Recent analyses also remind us that social networks operate less as a mirror than as a distorting prism for the diversity of opinions in society. Outraged and potentially insulting political posts are generally written by people who are more committed to express themselves and more radical than the average person, whether it’s to signal their commitments, express anger, or mobilise others to join political causes.

  • Even when they represent a relatively small proportion of the written output on the networks, moralistic and hostile posts tend to be promoted by algorithms programmed to push forward content capable of attracting attention and triggering responses, of which divisive political messages are an important part.

  • On the other hand, the majority of users, who are more moderate and less dogmatic, are more reluctant to get involved in political discussions that rarely reward good faith in argumentation and often escalate into outbursts of hatred.

  • Social media use seems to contribute to increasing political hostility and polarisation through at least one mechanism: exposure to caricatural versions of the political convictions of one’s rivals.

  • The way in which most people express their political convictions – both on social media and at the coffee machine – is rather lacking in nuance and tactfulness. It tends to reduce opposing positions to demonised caricatures, and is less concerned with persuading the other side than with signaling devotion to particular groups or causes, galvanising people who already agree with you, and maintaining connections with like-minded friends.

19
99
20
57

Apple is not exactly downgrading the cheaper Vision Pros but there will be massive changes.

21
39

cross-posted from: https://lemmy.ml/post/17498098

22
143
23
89

WaPo gift link - no paywall

24
84

cross-posted from: https://lemmy.ml/post/17489781

25
22

Check out our open-source, language-agnostic mutation testing tool using LLM agents here: https://github.com/codeintegrity-ai/mutahunter

Mutation testing is a way to verify the effectiveness of your test cases. It involves creating small changes, or “mutants,” in the code and checking if the test cases can catch these changes. Unlike line coverage, which only tells you how much of the code has been executed, mutation testing tells you how well it’s been tested. We all know line coverage is BS.

That’s where Mutahunter comes in. We leverage LLM models to inject context-aware faults into your codebase. As the first AI-based mutation testing tool, Our AI-driven approach provides a full contextual understanding of the entire codebase by using the AST, enabling it to identify and inject mutations that closely resemble real vulnerabilities. This ensures comprehensive and effective testing, significantly enhancing software security and quality.

We’ve added examples for JavaScript, Python, and Go (see /examples). It can theoretically work with any programming language that provides a coverage report in Cobertura XML format (more supported soon) and has a language grammar available in TreeSitter.

Here's a YouTube video with an in-depth explanation: https://www.youtube.com/watch?v=8h4zpeK6LOA

Here's our blog with more details: https://medium.com/codeintegrity-engineering/transforming-qa-mutahunter-and-the-power-of-llm-enhanced-mutation-testing-18c1ea19add8

Check it out and let us know what you think! We’re excited to get feedback from the community and help developers everywhere improve their code quality.

view more: next ›

Technology

55629 readers
2724 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS