GamesBeat Next is almost here! GB Next is the premier event for product leaders and leadership in the gaming industry. Coming up October 28th and 29th, join fellow leaders and amazing speakers like Matthew Bromberg (CEO Unity), Amy Hennig (Co-President of New Media Skydance Games), Laura Naviaux Sturr (GM Operations Amazon Games), Amir Satvat (Business Development Director Tencent), and so many others. See the full speaker list and register here.
Web3 finance company 3thix announced today that it’s partnering with Avalanche on a new ad-tech layer, which would offer advertisers a decentralized means of obtaining consumer behavioral data without compromising privacy or protections. This follows 3thix’s $8.5 million fundraise, led by Xsolla, earlier this year to help monetize web3 games.
According to 3thix, this new blockchain-based solution would provide advertisers with a decentralized Identity for Advertisers, or IDFA. This would allow for more-targeted advertising, but without compromising users’ privacy provided by Apple’s protections. 3thix champions an ethical approach to game monetization and in-game transactions, and says this would allow users access to better ads while allowing advertisers to remain compliant with privacy laws.
This ad-tech solution would be built on Avalanche’s Layer 1 blockchain which allows transaction finality and privacy. Andrew Cooper, Avalanche’s head of games, said in a statement, “3thix’s decentralized ecosystem revolutionizes in-game transactions using blockchain. Users earn rewards, advertisers get precise targeting, and developers monetize better, creating sustainable value for all.”
Timothy Tello, 3thix CEO, said in a statement, “The unified platform, along with Avalanche’s industry-leading smart contracts technologies, is miles ahead of competing projects. Through this partnership, we are creating a blockchain-verifiable web of relations that defines how partnerships work and function in the imminent future.”
Advertisement
VB Daily
Stay in the know! Get the latest news in your inbox daily
A new AI-powered video generator from Meta produces high-definition footage complete with sound, the company announced today. The announcement comes several months after competitor OpenAI unveiled Sora, its text-to-video model — though public access to Movie Gen isn’t happening yet.
Movie Gen uses text inputs to automatically generate new videos, as well as edit existing footage or still images. The New York Times reports that the audio added to videos is also AI-generated, matching the imagery with ambient noise, sound effects, and background music. The videos can be generated in different aspect ratios.
In addition to generating new clips, Meta says Movie Gen can also create custom videos from images or take an existing video and change different elements of it. One example shared by the company shows a still headshot of a woman; the added video depicts her sitting in a pumpkin patch sipping a drink.
A still from a video produced using Meta’s Movie Gen.Image: Meta
Advertisement
Movie Gen can also be used to edit existing footage and change the style and transitions or add things that didn’t previously exist. In one example shared by Meta, a relatively innocuous video of what appears to be an illustrated runner is edited using AI in different ways: in one frame, he’s holding pompoms. In another, the background has been edited to depict a desert. In a third, the runner is wearing a dinosaur costume. Changes can be made using text prompts.
Nearly two years after powerful AI image and video generators hit the mainstream, AI companies have pushed the technology further: in just the last six months, major tech companies like Google and OpenAI are working on similar tools, along with smaller startups. OpenAI’s Sora, first announced in February, still hasn’t launched publicly; this week, a co-lead working on the video generator left the company for Google.
Meta’s chief product officer, Chris Cox, writes on Threads that the company “[isn’t] ready to release this as a product anytime soon,” as it’s still expensive and generation time is too long.
Creatives like filmmakers, photographers, artists, writers, and actors also worry about how AI generators will affect their livelihoods, and AI has been a central part of several strikes, including the historic joint Hollywood strikes by the Screen Actors Guild – American Federation of Television and Radio Artists (SAG-AFTRA) and Writers Guild of America (WGA) last year.
CrowdStrike, a global leader in endpoint security, incident response and cybersecurity, recently deployed an update to its Falcon sensor for Microsoft Windows systems. This update, designed to enhance the detection of novel threats, inadvertently caused significant malfunctions in the Windows operating system, leading to widespread crashes and system instability.
Notably, Mac and Linux operating systems were unaffected by this issue.
Keatron Evans
VP for Portfolio and Product Strategy, Instructor & Author at Infosec.
What happened?
Despite concerns, it’s important to clarify that this incident was not the result of a hack, security breach, or malicious attack. Here are three key factors that led to the CrowdStrike chaos:
Advertisement
Faulty internal update: The problem stemmed from an internal update error rather than external tampering.
Elevated privileges: As security software, CrowdStrike Falcon has high privileges and integrates with the Microsoft Windows kernel.
Global impact: The impact was particularly severe because CrowdStrike’s software is deeply integrated into critical infrastructure across large corporations and government agencies.
This integration, while essential for detecting and neutralizing high-level threats, also meant that when the faulty update was rolled out, it led to immediate and widespread disruptions.
Advertisement
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The impact
CrowdStrike is widely used among enterprises and state, local and federal government agencies, so the scale of the disruption was enormous. Delta Airlines, for instance, has engaged high-profile attorney David Boise as they face potential losses exceeding $300 million due to the incident. While many other organizations of similar size recovered within hours, Delta experienced prolonged operational disruptions lasting several days, sparking industry debate over whether the fault lay with CrowdStrike’s update or Delta’s recovery plan and preparedness.
This incident triggered what may be the largest technology outage on record to date, caused by a misconfiguration or bug, with estimated damages reaching into the billions — and that figure continues to climb. The fallout was massive, thousands of flights delayed or cancelled, halting reservation systems worldwide, and causing a cascade of global disruptions. At least 8.5 million computers were affected, leading to unprecedented operational chaos
It is indeed ironic that CrowdStrike, a company renowned for its expertise in incident response, found itself at the center of such a significant episode. This event underscores the complexities and challenges even the most well-regarded firms can face, as well as the recovery plans and response preparedness.
Advertisement
CrowdStrike’s response
In the face of this unprecedented incident, CrowdStrike responded with prompt and decisive action. The company swiftly deployed a fix to address the issue and subsequently released a statement outlining a series of commitments aimed at preventing a recurrence. While the list of actions was thorough and comprehensive, much of it aligned with existing industry-standard practices. However, CrowdStrike notably pledged to revise its update deployment processes, a critical change expected to enhance the reliability and safety of future updates.
Observations and lessons learned
The CrowdStrike outage serves as a reminder for all size organizations to review their processes and ensure steps are in place to help mitigate the impact of future incidents. Not only having a plan, but have it tested for functionality.
Among steps for action that organizations need to have set are:
1. Ensure Robust Backup and Disaster Recovery Plans: Seems simple, but it’s crucial to have well-defined backup, business continuity, and disaster recovery plans in place. Equally important is the regular testing of these plans through actual walkthroughs to ensure they function effectively when needed.
Advertisement
2. Be Cautious with Privileged Software: Any software with privileged access to your systems can potentially cause significant disruptions. While this incident was not a security breach, it serves as a stark reminder that even security tools can introduce vulnerabilities. Security tools, like any other software, can be a source of breaches or downtime, as demonstrated by this incident with CrowdStrike.
3. Maintain Heightened Vigilance During Outages: Large-scale outages create an attractive opportunity for attackers. Amid the noise and disruption, malicious actors can easily slip in undetected and steal data. It is essential to maintain heightened security awareness during such events to prevent opportunistic exploitation.
4. Avoid Knee-Jerk Reactions: While the instinct may be to switch vendors after an incident like this, it’s important to proceed with caution. Quick, unplanned changes can lead to even bigger problems. Any transition to a new vendor should be approached as a phased project, not an overnight swap. This is especially critical for organizations handling sensitive data, such as those involved in national security.
In conclusion, the CrowdStrike incident highlights the importance of robust systems, cautious planning, and the readiness to respond to even the most unexpected challenges.
Advertisement
This has become a reminder that in the realm of cybersecurity, even the leaders in the field are not immune to significant disruptions, nor are they immune from causing them – but being ready for when these may happen may be the difference between swift resolution and loss of business.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
👤 Connect With Me On Other Platforms:
Twitter: https://twitter.com/ShaneHummus
Instagram: https://www.instagram.com/shanehummus/
Facebook: https://www.facebook.com/Hummus.Shane
LinkedIn: https://www.linkedin.com/in/shane-hummus-6bb475165/
🎬 Join A Community Of Aspiring YouTubers: https://www.facebook.com/groups/contentgrowthengine/
———-
These videos are for entertainment purposes only and they are just Shane’s opinion based off of his own life experience and the research that he’s done. Shane is not an attorney, CPA, insurance, or financial advisor and the information presented shall not be construed as tax, legal, insurance, safety or financial advice. If stocks or companies are mentioned, Shane might have an ownership interest in them. Affiliate links may be present, the offers and numbers presented may change over time so please make sure to confirm that the offer is still valid. Some offers mentioned may no longer be available or they have been changed. Please don’t make buying or selling decisions based on Shane’s videos. If you need such advice, please contact the qualified legal or financial professionals, don’t just trust the opinion of a stranger on the internet and always make sure to do your own research and enjoy this family friendly content.
Sources and further readings for jobs and college degrees:
bls.gov(bureau of labor statistics)
nces.ed.gov(national center for educational statistics)
payscale(provides information on jobs and degrees)
https://thebestschools.org/rankings/best-online-bachelors-computer-engineering/
https://www.census.gov/dataviz/visualizations/056/#:~:text=%26%20Visualizations%20Next%20%3E%3E-,Synthetic%20Work%2DLife%20Earnings%20by%20Field%20of%20Bachelor’s%20Degree%20and,Attainment%20is%20a%20Bachelor’s%20Degree&text=A%20bachelor’s%20degree%20holder%20can,his%20or%20her%20work%20life
https://www.ziprecruiter.com/blog/the-most-regretted-college-majors/
https://www.monster.com/jobs/search/?q=Computer-Engineering-degree-job
https://willrobotstakemyjob.com/
https://www.fastweb.com/career-planning/articles/top-10-millionaires-majors .
Get a dbrand skin or case today at https://dbrand.com/shortlinus
Dennis and Colton are here to do some family bonding while building SecretLab’s new Magnus Desk. Its metal build has some unique features, but is it worth the price?
Buy a SecretLab Magnus Desk Pro: https://lmg.gg/kdg6f
Purchases made through some store links may provide some compensation to Linus Media Group.
Want us to unbox something? Make a suggestion at https://lmg.gg/7s34e
► SUBSCRIBE ON FLOATPLANE: https://floatplane.com/ltt
► GET MERCH: https://lttstore.com
► AFFILIATES, SPONSORS & REFERRALS: https://lmg.gg/scsponsors
► PODCAST GEAR: https://lmg.gg/podcastgear
► SUPPORT US ON FLOATPLANE: https://www.floatplane.com/
CHAPTERS
—————————————————
0:00 The dynamic duo is back
0:14 Unboxing
1:19 Just a little kiss
1:36 Checking out all the parts/tools included
2:54 Sponsor – dbrand
3:36 Setting it up
5:04 Powering it on
6:27 The missing pieces
8:01 Don’t forget the accessories!
12:12 Overall thoughts
12:37 Outro .
You must be logged in to post a comment Login