Connect with us

Technology

X is reportedly now complying with orders from Brazil’s Supreme Court

Published

on

X is reportedly now complying with orders from Brazil’s Supreme Court

X is reportedly reversing course after weeks of refusing to comply with conditions set by the Brazilian Supreme Court that would allow it to operate in the country again. According to , the company’s lawyers said in a Friday court filing that X has named a legal representative in Brazil as demanded by justice Alexandre de Moraes and removed accounts that the judge had identified as a threat to democracy, along with paying the fines it owed. But, the publication also reports that the Brazil Supreme Court has said X did not submit all the necessary paperwork, and now has five days to do so.

The paperwork X failed to submit is that which would prove it formally appointed a legal representative in Brazil, as required by Brazilian law, according to . X named Rachel de Oliveira Conceicao as its new legal representative in the filing on Friday. The company has been working to restore service to users in Brazil after it was blocked at the end of August, and briefly came back online earlier this week using Cloudflare’s DNS. But, it said that this was “inadvertent and temporary.” In a statement, at the time, “While we expect the platform to be inaccessible again in Brazil soon, we continue efforts to work with the Brazilian government to return very soon for the people of Brazil.”

Brazil has of nearly $1 million if they do not comply with the ban in the country. Justice Moraes also made it so users in Brazil could be fined roughly $8,900 to access X. The company’s latest move is a step toward resolving the issue and potentially bringing X back to Brazil legally.

Source link

Advertisement
Continue Reading
Advertisement
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Technology

Google teases iPhone on finally using RCS messaging with Pixel devices

Published

on

Google teases iPhone on finally using RCS messaging with Pixel devices

Google has welcomed Apple iPhones to the world of Rich Communication Services (RCS) with a humourous video. The company released a video of a Pixel and an iPhone chatting about Apple’s historic decision to adopt RCS.

Google Pixel and iPhone communicate on RCS platform

Ever since the first iPhone, Apple attempted to create a different class with iMessages. iMessage and Android’s messaging platforms weren’t truly compatible. Apple often degraded the messaging experience whenever iOS detected an Android device was communicating with an iPhone.

Apple hasn’t exactly blurred this division by adopting RCS. However, the company now allows third-party app store support, third-party NFC payments (in the EU), and RCS texting.

As part of Google’s #BestPhonesForever series on YouTube, the search giant has reportedly welcomed Apple’s decision to finally adopt RCS. In the video, a Google Pixel and an Apple iPhone talk about how the two have had “communication issues” in the past.

Advertisement

Google Pixel appreciates the iPhone finally deciding to switch to RCS in the video. However, Google doesn’t miss the chance to reiterate that RCS is the modern standard for texting that other phones have been using for a while.

Why is Google teasing Apple about adopting RCS?

Android devices far outnumber iPhones, at least outside the US. And Google had been trying hard to establish a common messaging platform between the two mobile operating systems.

Apple’s iMessage has its own merits. However, RCS is equally secure and reliable. By adopting RCS, Apple has unlocked the ability to send much higher-quality media between Android and iOS. Some of the other benefits of using a common communication platform are:

  • Typing and “read” receipts
  • Improved group chats
  • Reacting to texts
  • Sending GIFs

Additionally, being on the same messaging platform allows messages to be end-to-end encrypted. It is important to note that encrypted RCS chats aren’t available on iOS yet.

Incidentally, third-party messaging platforms like WhatsApp, Telegram, and others offer end-to-end encryption. Hence, by introducing RCS to iOS, Apple has benefitted users in regions where users don’t primarily use third-party apps for messaging.

Advertisement

Due to Apple’s iMessage, the “Green Bubble, Blue Bubble” implies a clear demarcation between iOS and Android. Strangely, this distinction hasn’t been eliminated. Although Apple’s iOS now accepts messages from the RCS platform, the blue bubble and green bubble remain, and it still distinguishes Android users in a chat.

Source link

Continue Reading

Technology

Pinecone launches serverless vector database on Azure, GCP

Published

on

Oracle keeps AI focus with database updates, new data lake

Pinecone on Tuesday launched its serverless vector database on Microsoft Azure and Google Cloud in a move that enables customers to use the fully managed database on the cloud of their choice.

The vendor first unveiled Pinecone Serverless in January, at which point the platform was only available in public preview on AWS. Now, after being made generally available on AWS in May, the platform’s general availability on all three major public clouds is a significant step for Pinecone in terms of expanding its reach and letting users choose their deployment environment, according to Kevin Petrie, an analyst at BARC U.S.

Pinecone Serverless is a rearchitected version of Pinecone’s vector database designed to remove some of the infrastructure management costs associated with cloud computing. Serverless computing platforms automatically scale up or down based on demand, which can lead to savings with Pinecone charging customers based on consumption.

Meanwhile, by expanding the platform’s availability to the three major public clouds, Pinecone is now making those potential savings available to all customers.

Advertisement

Any viable data platform in this space should run on all three hyperscalers’ infrastructure. Most cloud adopters use more than one hyperscaler, and the more they can standardize tools across clouds, the better.
Kevin PetrieAnalyst, BARC U.S.

“This is an important step to take,” Petrie said. “Any viable data platform in this space should run on all three hyperscalers’ infrastructure. Most cloud adopters use more than one hyperscaler, and the more they can standardize tools across clouds, the better.”

In addition to making Pinecone Serverless generally available on the three major public clouds, Pinecone unveiled new features for the platform. They include enabling users to more efficiently import large amounts of data and better protect data from system failures and accidental deletes, among others.

Based in New York City, Pinecone is a vector database specialist whose tools enable customers to store and operationalize unstructured data that can be used to train analytics models and applications, including generative AI (GenAI).

The vendor raised $100 million in April 2023 as vector search emerged as a key enabler of generative AI development. To date, the 2019 startup has raised $138 million.

Advertisement

Cloud expansion

Vector databases are nothing new, dating back to the early 2000s. However, their popularity has surged over the past couple of years in concert with the exploding interest in generative AI.

Enterprise generative AI applications need to be trained on proprietary data to understand the company and accurately respond to queries about its operations.

While traditional structured data provides some of that needed proprietary information, it’s estimated to make up less than 20% of all data. Therefore, for a generative AI application to have a full understanding of an organization and deliver the most accurate results possible, the more than 80% of its data that is unstructured — text, images, audio files, videos — also needs to be part of the AI’s training.

Vectors, which are numerical representations of data, are a means of giving structure to unstructured data so that it can be searched and discovered to train generative AI.

Advertisement
Graphic listing the differences between traditional and vector search.

Pinecone is one vector database specialist whose tools now can be used to develop the data pipelines that train and update generative AI models. Chroma and Redis are among the other vector database specialists, while data platform vendors including AWS, Databricks, Google and Oracle also provide vector database capabilities as part of their broad offerings.

Pinecone’s vector database capabilities measure up well against those of its peers, according to Stephen Catanzano, an analyst at TechTarget’s Enterprise Strategy Group. With Serverless now on more than one cloud, the vendor can better compete for market share.

“[Pinecone is] very innovative and at the front of what’s happening in GenAI, specifically around helping companies take their enterprise data and build new GenAI apps,” Catanzano said. “They’re very popular for this and for building out tools to make it simple. Being on each cloud, where a customer’s data for these applications lives, is an accelerator for their business.”

Pinecone Serverless is available in Starter, Standard and Enterprise versions. The Starter version — which is free to use — is the most basic, with only community support and topping out at 2 GB storage. The Enterprise version is the most elaborate and includes enhanced support over the Standard version.

Advertisement

Pinecone does not publicize pricing for its Enterprise version, but Pinecone Standard costs $0.00045 per gigabyte, per hour for storage and starts at $8.25 per 1 million read units and $2 per 1 million write units.

By starting with general availability only on AWS before expanding it to Azure and Google Cloud, Pinecone was able to use its initial launch of Serverless as a learning experience to work out any problems before making the database more broadly available, according to Jeff Zhu, the vendor’s director of product management.

Major architectural overhauls risk falling short of customer expectations around quality and reliability, he noted. As a result, Pinecone attempted to ensure there was no decrease in the quality and reliability of its database before making it available on all three major public clouds.

“We focused our efforts on making a single cloud 100% production-ready, and then took those learnings to accelerate the production readiness of the remaining clouds,” Zhu said.

Advertisement

Beyond making Serverless generally available on Azure and Google Cloud, Pinecone introduced bulk imports from object storage to simplify large-scale data ingestion and backups for data stored in Pinecone Serverless. The backups, now available to Standard and Enterprise users, include protection from system failures and accidental deletes, and the ability to restore data indexes to their previous state in the event of a bad update or delete.

In addition, new role-based access control capabilities limit who within an organization can execute certain tasks within Pinecone Serverless.

While useful, the new features don’t represent significant innovation, according to Petrie.

“These features are incremental improvements,” he said.

Advertisement

Bulk imports accelerate the data migrations needed to feed generative AI applications, while access controls help allay security concerns, Petrie noted. But there’s still more Pinecone could do to enable generative AI development, such as add more embedding models to transform unstructured data into vectors.

“That process is not trivial,” Petrie said.

The impetus for developing the new features, meanwhile, came largely from customer feedback, according to Zhu.

With interest in developing AI applications — including generative AI — surging, users of all data management platforms are experiencing new challenges in their attempts to build accurate and secure tools. Among them are efficiently moving large amounts of data and protecting data once it’s in position to train an application.

Advertisement

“These features address some of the top challenges we’ve heard from our customers,” Zhu said.

Future plans

With Pinecone Serverless now generally available on all three major public clouds and new features in the pipeline, Pinecone aims to expand beyond its limited focus on vector databases, according to Zhu.

Developing AI applications requires more than just a vector database, so the vendor is building features such as a GenAI-powered assistant and model ranking and inference capabilities that are designed to enable better data discovery during development.

“We’re working hard to provide a composable platform for developers to rapidly build, deploy and iterate on AI by providing high-quality RAG [retrieval-augmented generation] components in a single place,” Zhu said.

Advertisement

While providing RAG components with a vector database has benefited Pinecone, expansion could provide the vendor with growth opportunities, according to Petrie.

RAG in conjunction with vectors is only one means of feeding generative AI models. Relational databases and graph databases also enable searches and can feed RAG pipelines as generative AI evolves to include more model types and increasingly benefits from diverse data formats.

“Given this convergence of model and data types, Pinecone should branch beyond just vectors,” Petrie said. Knowledge graphs and SQL queries of tabular data represent still other opportunities for diversification, he added.

Catanzano, meanwhile, said Pinecone is providing innovative vector database capabilities that compare favorably with those being developed by competing vendors. Its roadmap, which could include more diversification, should also maintain its focus on being creative to retain its position relative to other vector databases, he said.

Advertisement

“They are doing a great job innovating and leading,” Catanzano said. “I’m not sure what may be next, but [they should concentrate on] keeping up with and exceeding competitors.”

Eric Avidon is a senior news writer for TechTarget Editorial and a journalist with more than 25 years of experience. He covers analytics and data management.

Source link

Advertisement
Continue Reading

Technology

A house haunted by AI and the mysterious murder of a superhero

Published

on

A house haunted by AI and the mysterious murder of a superhero

New releases in fiction, nonfiction and comics that caught our attention.

Putnam Pub Group

An agoraphobic engineer named Henry spends his days locked away in his extremely smart home building freaky little robots, including one that looks like a magician and rides around on a tiny bike. His wife, Lily, is the only person he really ever sees, but things have grown tense between them — a situation only worsened by the fact that he’s usually holed up alone in the attic working on a secret project. One day, Lily invites some former coworkers over to encourage Henry to socialize, and Henry takes the opportunity to finally show off his greatest creation: William, an advanced AI system housed in a crude robot body. Horror ensues.

Advertisement

Mason Coile’s William (stylized W1LL1AM) takes the well-worn trope of a naive creator faced with their out-of-control creation and adds haunted smart-house creepiness, with a twist ending. Naturally, it’s drawn comparisons to Frankenstein and even The Shining, but I’d dare to say there’s a hint of Demon Seed in there, too. This is another short read, coming in at under 250 pages, and it’s just the right thing to get you into the spooky season mood. It takes place, appropriately, on Halloween.

$15 at Amazon

Penguin Press

Advertisement

Elon Musk’s acquisition of Twitter and its subsequent transformation into X as we now know it dominated headlines for months, so you couldn’t be blamed for feeling like you’ve heard all there is to know about the whole saga. But for those who do want a deeper look into how it all transpired, journalists Kate Conger and Ryan Mac have dredged up a ton of previously unreported information in their book Character Limit, which pulls from interviews with insiders and internal recordings from the rooms where it all went down to give us the full story of Twitter’s takeover. And it is a messy one.

$26 at Amazon

Image Comics

Advertisement

I can’t think of another new series in recent memory that’s left me so hungry for the next issue as The Tin Can Society #1. Before I get into it, though, I should note that this first issue opens with a content warning about violence and discussions of ableism and racism. It is intense from the jump. The Tin Can Society begins with a crime scene: tech mogul turned superhero Johnny Moore has been murdered.

Moore, born with spina bifida, rose to fame as the genius creator of advanced exoskeleton-style mobility aids, and he wore a full-body armored version of one of these suits while operating as the vigilante hero, Caliburn. When he’s found dead, the suit is gone. The Tin Can Society follows Moore’s childhood friends, who come together after years apart to get to the bottom of his murder. There’s a lot of heart in the first issue as it bounces between their present-day setting and the past, building out the backstory of Moore’s early life and the tight-knit friend group that once was. I’m excited to see where this one goes. The Tin Can Society will be a nine-part mini series, and the next issue drops in late October.

$5 at Amazon

Source link

Advertisement
Continue Reading

Technology

‘Harvest now, decrypt later’: Why hackers are waiting for quantum computing

Published

on

'Harvest now, decrypt later': Why hackers are waiting for quantum computing

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More


Hackers are waiting for the moment quantum computing breaks cryptography and enables the mass decryption of years of stolen information. In preparation, they are harvesting even more encrypted data than usual. Here is what businesses can do in response.

Why are hackers harvesting encrypted data?

Most modern organizations encrypt multiple critical aspects of their operations. In fact, about eight in 10 businesses extensively or partially use enterprise-level encryption for databases, archives, internal networks and internet communications. After all, it is a cybersecurity best practice.

Alarmingly, cybersecurity experts are growing increasingly concerned that cybercriminals are stealing encrypted data and waiting for the right time to strike. Their worries are not unfounded — more than 70% of ransomware attacks now exfiltrate information before encryption. 

Advertisement

The “harvest now, decrypt later” phenomenon in cyberattacks — where attackers steal encrypted information in the hopes they will eventually be able to decrypt it — is becoming common. As quantum computing technology develops, it will only grow more prevalent.

How ‘harvest now, decrypt later’ works

Quantum computers make the “harvest now, decrypt later” phenomenon possible. In the past, encryption was enough to deter cybercriminals — or at least make their efforts pointless. Unfortunately, that is no longer the case.

Whereas classical computers operate using binary digits — bits — that can either be a one or a zero, their quantum counterparts use quantum bits called qubits. Qubits can exist in two states simultaneously, thanks to superposition. 

Since qubits may be a one and a zero, quantum computers’ processing speeds far outpace the competition. Cybersecurity experts are worried they will make modern ciphers — meaning encryption algorithms — useless, which has inspired exfiltration-driven cyberattacks. 

Advertisement

Encryption turns data, also known as plaintext, into a string of random, undecipherable code called ciphertext. Ciphers do this using complex mathematical formulas that are technically impossible to decode without a decryption key. However, quantum computing changes things.

While a classical computer would take 300 trillion years or more to decrypt a 2,048-bit Rivest-Shamir-Adleman encryption, a quantum one could crack it in seconds, thanks to qubits. The catch is that this technology isn’t widely available — only places like research institutions and government labs can afford it.

That does not deter cybercriminals, as quantum computing technology could become accessible within a decade. In preparation, they use cyberattacks to steal encrypted data and plan to decrypt it later.

What types of data are hackers harvesting?

Hackers usually steal personally identifiable information like names, addresses, job titles and social security numbers because they enable identity theft. Account data — like company credit card numbers or bank account credentials — are also highly sought-after.

Advertisement

With quantum computing, hackers can access anything encrypted — data storage systems are no longer their primary focus. They can eavesdrop on the connection between a web browser and a server, read cross-program communication or intercept information in transit. 

Human resources, IT and accounting departments are still high risks for the average business. However, they must also worry about their infrastructure, vendors and communication protocols. After all, both client and server-side encryption will soon be fair game.

The consequences of qubits cracking encryption

Companies may not even realize they have been affected by a data breach until the attackers use quantum computing to decrypt the stolen information. It may be business as usual until a sudden surge in account takeovers, identity theft, cyberattacks and phishing attempts. 

Legal issues and regulatory fines would likely follow. Considering the average data breach rose from $4.35 million in 2022 to $4.45 million in 2023 — a 2.3% year-over-year increase — the financial losses could be devastating. 

Advertisement

In the wake of quantum computing, businesses can no longer rely on ciphers to communicate securely, share files, store data or use the cloud. Their databases, archives, digital signatures, internet communications, hard drives, e-mail and internal networks will soon be vulnerable. Unless they find an alternative, they may have to revert to paper-based systems.

Why prepare if quantum isn’t here yet?

While the potential for broken cryptography is alarming, decision-makers should not panic. The average hacker will not be able to get a quantum computer for years — maybe even decades — because they are incredibly costly, resource-intensive, sensitive and prone to errors if they are not kept in ideal conditions.

To clarify, these sensitive machines must stay just above absolute zero (459 degrees Fahrenheit to be exact) because thermal noise can interfere with their operations. 

However, quantum computing technology is advancing daily. Researchers are trying to make these computers smaller, easier to use and more reliable. Soon, they may become accessible enough that the average person can own one. 

Advertisement

Already, a startup based in China recently unveiled the world’s first consumer-grade portable quantum computers. The Triangulum — the most expensive model — offers the power of three qubits for roughly $58,000. The two cheaper two-qubit versions retail for less than $10,000.

While these machines pale in comparison to the powerhouse computers found in research institutions and government-funded labs, they prove that the world is not far away from mass-market quantum computing technology. In other words, decision-makers must act now instead of waiting until it is too late. 

Besides, the average hacker is not the one companies should worry about — well-funded threat groups pose a much larger threat. A world where a nation-state or business competitor can pay for quantum computing as a service to steal intellectual property, financial data or trade secrets may soon be a reality. 

What can enterprises do to protect themselves?

There are a few steps business leaders should take in preparation for quantum computing cracking cryptography. 

Advertisement

1. Adopt post-quantum ciphers

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) soon plan to release post-quantum cryptographic standards. The agencies are leveraging the latest techniques to make ciphers quantum computers cannot crack. Firms would be wise to adopt them upon release. 

2. Enhance breach detection

Indicators of compromise — signs that show a network or system intrusion occurred — can help security professionals react to data breaches swiftly, potentially making data useless to the attackers. For example, they can immediately change all employees’ passwords if they notice hackers have stolen account credentials.

3. Use a quantum-safe VPN

A quantum-safe virtual private network (VPN) protects data in transit, preventing exfiltration and eavesdropping. One expert claims consumers should expect them soon, stating they are in the testing phase as of 2024. Companies would be wise to adopt solutions like these.

4. Move sensitive data

Decision-makers should ask themselves whether the information bad actors steal will still be relevant when it is decrypted. They should also consider the worst-case scenario to understand the risk level. From there, they can decide whether or not to move sensitive data. 

Advertisement

One option is to transfer the data to a heavily guarded or constantly monitored paper-based filing system, preventing cyberattacks entirely. The more feasible solution is to store it on a local network not connected to the public internet, segmenting it with security and authorization controls.

Decision-makers should begin preparing now

Although quantum-based cryptography cracking is still years — maybe decades — away, it will have disastrous effects once it arrives. Business leaders should develop a post-quantum plan now to ensure they are not caught by surprise. 

Zac Amos is features editor at ReHack.

DataDecisionMakers

Advertisement

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even consider contributing an article of your own!

Advertisement

Read More From DataDecisionMakers


Source link
Continue Reading

Technology

Electric outboard startup Pure Watercraft is selling itself for parts

Published

on

Electric outboard startup Pure Watercraft is selling itself for parts

A hopeful entrant in the emerging market of electric watercraft is out of action and being sold for parts.

Pure Watercraft was founded in 2011 with the intention of replacing gas-based outboard motors with fully electric ones. We covered the company in 2016 when it began taking preorders for its first commercial outboards, and in 2020 Pure raised $23 million to step up production. GM even took a 25% stake in Pure as part of its big investment in electric infrastructure.

The company offered a electric outboard and battery combo that could be mounted on a boat like any other outboard, or in a package with a rigid inflatable or pontoon boat. With prices ranging from $21,600 for just propulsion to nearly $100,000 for a full boat, Pure’s products were arguably no more affordable up front than gas options, but they were certainly a lot cleaner and quieter.

But a tough market seems to have put an end to Pure’s ambitions. The company entered receivership — a sort of alternative form of bankruptcy — in July, per filing documents in King County, Washington, where it is based. In August it was also reported that a planned multi-million-dollar factory in West Virginia would not be going forward.

Advertisement

The documents describe numerous creditors, from individual investors to banks to the big one, GM, which put approximately $35 million into the venture. That wasn’t all cash, though: listed among Pure’s assets is some $25 million worth of “manufacturing support,” “know-how,” licensing of the name, and other forms of non-pecuniary goods. (This type of in-kind investment is fairly commonplace.)

On the asset side, we find $3.6 million in “finished goods,” likely the assembled motors and battery units built by Pure, though why those would not have gone out to the more than 900 people who paid a down payment is unclear (nor is whether refunds will be issued). Another $25.5 million of “raw materials” is also listed, but what this may be is unclear — other documents detailing sale of assets like boats and batteries don’t come near that sum.

TechCrunch has asked both Pure and GM for comment on the matter. GM did not offer a substantive response and we have not yet heard back from Pure.

Electric watercraft is a growing but still nascent industry, with startups like Candela, Navier, FleetZero and Zin Boats making a play for cleaner, more efficient waterways and infrastructure.

Advertisement

Source link

Continue Reading

Technology

The Verge’s favorite home office keepsakes

Published

on

The Verge’s favorite home office keepsakes

Back in the Mad Men days, the only thing that might interrupt the corporate blandness of a workspace might be a photo of your family or maybe a coffee cup with a funny saying. But nowadays, especially if we’re working at home, we can have some pretty interesting, weird, or just plain nice-looking items on our desks.

We asked the folks here at The Verge what they have on their desks or in their offices that they keep just for the hell of it — because they like it, because it means something special, or just because. Here are some of the answers we got.

A looping gif of our late cat Pouncey on my keyboard’s LCD

Antonio G. Di Benedetto, commerce / deals writer

Advertisement

The LCD on the keyboard can show data — or lovely GIFs.
GIF: Antonio G. Di Benedetto / The Verge

One year ago, my wife and I were forced to say goodbye to one of our two beloved cats, Pouncey. She was a caring companion of over 11 years that my wife adopted as a kitten shortly before we started dating, making her a fixture in our relationship. That made it all the more traumatic when our farewell, due to her deteriorating health, was more sudden than expected. But in addition to all the photos and videos we have to remind us of our bestest girl (apologies to our eight-month-old daughter), I’m given a heart-warming reminder of Pouncey every time I sit down at my desk.

When I got my Meletrix Zoom75 mechanical keyboard from a long-awaited group buy preorder last year, I opted for the built-in LCD add-on because — well, why not? And, maybe unsurprisingly, once I built my board with that little screen inside it, I wondered, “Okay, what do I do with this thing?” So, I left it displaying something boring like battery level.

After Pouncey’s passing, I reconsidered the looping GIF feature and decided to put a cute clip of our girl on there. The GIF was just a burst of images from a random day, and if you look closely, you can see her eyes adorably widen once she notices me taking her picture. We now refer to it as The Pouncey Keyboard, and while it’s bittersweet to see her nuzzling on my desk but unable to feel her soft fur or hear her gentle purrs, I love seeing “our Pouncey-girl” every day.

Advertisement

$209

A gasket-mount 75 percent keyboard with many user-swappable options like a rotary knob, LCD, and decorative external weights / back plates.

The Legend of Zelda Heart Container Icon Light

Sean Hollister, senior editor

The Legend of Zelda heart container is sitting on the speaker.
Photo: Sean Hollister / The Verge

Advertisement

Whenever I’m feeling a little worn out, I’ve got an extra life sitting on my desk. My family bought me this Legend of Zelda heart container one year ago, so it encapsulates their love, too! (Less significant if you buy it for yourself, so I’d recommend gifting it instead.) It glows when you press the front button, and that’s it. Two AA batteries won’t power it for months on end, so turn it off when you’re feeling cheerful again! You can also import a Tears of the Kingdom version based on the newer game.

Red heart light

$40

The iconic heart symbol from the Legend of Zelda — it glows with a soft red light.

Command spring wall clips

Allison Johnson, reviewer

Advertisement

These clips let you exhibit family art without damaging the walls.
Photo: Allison Johnson / The Verge

I get cold feet about putting nails in the wall in my office (which, incidentally, is also my bedroom). So, I end up with a pile of little things I kind of want to put on the wall but can’t commit to, like something my kid drew or the mess of tech event badges in my desk drawer. But recently, I’ve been on a command strip kick, putting up little hooks and clips around the house, and I started using them to decorate the wall behind my desk. 

The clothespin-type clips are perfect; I can swap in a new piece of cute kid artwork whenever I want, and I don’t have to commit to their placement. That’ll come in handy if I want to rearrange my office — er, bedroom — and I’ve never had a problem taking them off the wall damage-free.

Hand taping clip to the wall, other clips hold photos

$17

Clips for hanging photos, reminders, towels, etc. that won’t damage your walls.

Advertisement

TWSBI Eco fountain pen

Adi Robertson, senior tech & policy editor

This fountain pen is attractive, comfortable, and reasonably priced.
Photo: Adi Robertson / The Verge

I keep a paper planner and notepad(s) for tracking stories and meetings, and the TWSBI Eco (in creme rose gold with burgundy Noodler’s ink) is my favorite writing implement for all of them. It’s a reasonably priced fountain pen that’s attractive, not hard to fill, and feels good to fidget with.

Advertisement

Rose-gold fountain pen in three pieces on table top.

$53

A high-quality good-looking fountain pen at an economical price.

Link amiibo for The Legend of Zelda: Tears of the Kingdom

The Link amiibo is not only magical, but inspiring.
Photo: Jay Peters / The Verge

I’m not really one for desk trinkets, but I love this Link amiibo for The Legend of Zelda: Tears of the Kingdom. I get inspired by the way Link seems to be using his Ultrahand powers to craft a better world around him. If he can do it, maybe I can, too — though I might have to make things happen without a magical arm.

Advertisement

Amiibo of Link from The Legend of Zelda with his arm outstretched.

$16

An amiibo of Link using his magic arm in The Legend of Zelda: Tears of the Kingdom.

Kirby pencil case

Kylie Robison, senior AI reporter

My tiny Moleskine notebook keeps track of my whole life — I go through about two a year. That’s where I keep my weekly and monthly calendars, along with any source / general meeting notes. I use micron pens because they’re simply the best, and I keep them in a Kirby pencil case that I’ve even shown off in Verge videos (see above). I just recently redid my entire home office, and part of that was lots of decor, my favorite being an LED Majora’s Mask.

Advertisement

Neon sign made to resemble Majora’s Mask.

$40

A neon gaming sign in the form of Majora’s Mask from The Legend of Zelda.

Dorothy Parker finger puppet

Barbara Krasnoff, reviews editor

Dorothy Parker finger pupper
Photo by Amelia Holowaty Krales / The Verge

Advertisement

I love Dorothy Parker, both for her writing and for her acrid personality. I once even bought a bottle of gin because it was named after her (and, to tell you the truth, it wasn’t half bad). So, when I spotted her among a plethora of famous people finger puppets at a book fair a few years ago, I simply had to buy it. The Parker puppet has a small magnet on the back of its head, so it can easily hang on any metal surface. In fact, I brought it with me when I started working at The Verge, and when I accidentally left it in the office during lockdown in 2020, I was bereft. Luckily, Dorothy hung in there throughout the pandemic, and she’s now back in my home office, grinning sardonically at me.

Finger puppet in the image of Josephine Baker.

$8

A plethora of finger puppets made to resemble a variety of celebrities from the past and present, with a magnet on the back so they can hang from your fridge.

Cute desk note holder

Victoria Song, senior reviewer

Advertisement

This cat-shaped desk holder can hold notes that are motivational or just plain fun.
Photo: Victoria Song / The Verge

A while back, a friend gave me this adorable cat-shaped desk note holder as a souvenir from Beijing. At first, I didn’t know what to do with it. Then, I started putting motivational notes into it, and surprisingly, that worked. After a while, I started printing or writing out the occasional meme. (Why, yes, I did write the entirety of Vice President Kamala Harris’ coconut tree speech on a Post-It one week.) When I’m really in need of strength, I stick on a photocard of my favorite K-pop singer.

This only really holds one note at a time, which helps keep me creative week-to-week. Most importantly, it reminds me to take breaks and laugh at myself whenever I get too self-serious. I don’t know where to get this exact desk note holder, but you can find a bunch of fun ones on Amazon and Etsy.

Source link

Advertisement

Continue Reading

Trending

Copyright © 2017 Zox News Theme. Theme by MVP Themes, powered by WordPress.