Connect with us
DAPA Banner

Tech

Dolby sues Snap over video codec patents tied to AV1 and HEVC

Published

on


In a complaint filed in the US District Court for the District of Delaware, Dolby accuses Snap of infringing four video compression patents through Snapchat’s use of both HEVC and AV1. The filing argues that AV1 implementations incorporate proprietary inventions that Dolby never licensed on royalty-free terms and that the…
Read Entire Article
Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

Fake Samsung 990 Pro SSD is good enough to fool your benchmarks

Published

on


Counterfeit SSDs usually look real to the untrained eye until their performance or capacity falls far short of the device’s specs. However, Japanese outlet Akiba PC Hotline recently discovered a specimen that matches the genuine article in speed and storage.
Read Entire Article
Source link

Continue Reading

Tech

Your Vape Wants to Know How Old You Are

Published

on

Based on testing, the companies behind Ike Tech claim this process has a 100 percent success rate in age verification, more or less calling the tech infallible. “The FDA told us it’s the holy grail technology they were looking for,” Wang says. “That’s word-for-word what they said when we met with them.” The FDA did not respond to WIRED’s request for comment.

But Glantz is not at all convinced these protections will work.

“The FDA is just showing their pro-industry bias,” Glantz says. “If I were running the FDA, I would prohibit these devices from having any Bluetooth capability at all, period. There are just too many ways it could go south. Every technical fix has a work-around.”

The verification features would be tied to just one person, so when the vape is on, that person could share a puff with anyone nearby without verifying their age. At that point, Wang says it comes down to personal responsibility.

Advertisement

“You really have to count on the responsibility of that person,” Wang says. “If it’s a 21-year-old or older person, of course, that’s fine, but if you really want to hand it to an underage person, then you are really irresponsible.”

Wang says the goal is to implement additional features in the verification process, like geo-fencing, which would force the vape to shut off while near a school or on an airplane. In the future, the plan is to license this biometric verification tech to other e-cig companies. The tech may also grow to include fingerprint readers and expand to other product categories; Wang suggests guns, which have a long history of age-verification features not quite working.

Vapor Ware

The time frame for when Ike Tech might actually be out in the world—and how much it will cost when added to vape cartridges—is still hazy. Wang says there are already partnerships with two nicotine companies, but won’t say which or when that will emerge. “In 2026, there will be a clear indication of when our solution will be approved and how many other brands will license our technology.”

Wang’s ideal version of a vape, he posits, would be a safe, clean way to inhale nicotine.

Advertisement

“In the industry, we have a saying: ‘Nicotine never killed a single person,’” Wang says. “To a large degree, e-cigarettes are a safer way to consume nicotine.”

Glantz rejects that notion by bringing up practices like “smoking topography,” where nicotine companies track how smokers puff the product differently, then control how much nicotine is dispersed at a time to maximize the addictive potential.

He also takes issue with the fundamental problem that e-cigarettes and vapes are cleaner than traditional cigarettes at all. While the problem with cigarettes and cheap vapes might be the other chemicals, nicotine itself is not a harmless substance.

“You can’t make a healthy e-cigarette; it’s impossible,” Glantz says. “It’s true that nicotine isn’t a carcinogen, but it has all kinds of adverse cardiovascular effects. Nicotine screws up your nervous system.”

Advertisement

For nicotine to be absorbed as vapor, it has to be reduced to ultrafine particles. That’s what the heating does, and those particles can have all sorts of adverse health effects.

“There are all of these other implications that are extremely serious that nobody’s really thinking about,” Glantz says. “Even if the age-verification thing worked, it’s still not worth it.”

Source link

Advertisement
Continue Reading

Tech

DVD vs Blu-ray vs 4K Ultra HD Blu-ray Explained: Picture Quality, Audio and What’s the Difference?

Published

on

Streaming was supposed to simplify everything. Instead, it is starting to look a lot like the cable bundles it replaced, with higher monthly costs, more fragmentation, and ads creeping back into tiers that once promised otherwise. For a growing number of viewers, that frustration is pushing them back toward something far less convenient but far more reliable: physical media.

Owning your movies and TV shows means they do not disappear when licensing deals expire or platforms reshuffle their catalogs overnight. You press play, and it works. No buffering, no logins, no surprise paywalls. It also means consistently better performance. DVD, Blu-ray, and especially 4K Ultra HD Blu-ray still deliver higher bitrates than streaming, which translates into cleaner images, more stable motion, deeper color, and lossless audio formats that actually take advantage of a proper surround sound system.

Finding discs is not as easy as it used to be. Major retailers like Best Buy and Target have scaled back or eliminated in store selections, but physical media is not disappearing. It is shifting. Walmart and Barnes & Noble still carry a solid range in store, and online options are stronger than ever. Boutique labels like The Criterion Collection, Kino Lorber, and Arrow Video continue to release restored editions, special features, and curated catalogs that streaming platforms rarely match.

This article and the three companion videos break down exactly what you get from DVD, Blu-ray, and 4K Ultra HD Blu-ray. Not just resolution numbers, but the real world differences in picture quality, HDR support, audio formats, and overall viewing experience so you can decide if going back to discs is nostalgia or just common sense in 2026.

Advertisement

The Bottom Line

DVD still has a place, but Blu-ray and 4K Ultra HD Blu-ray remain the standard for anyone who actually cares about how movies look and sound. Streaming has improved, but it still cannot match the higher bitrates, consistent image quality, and lossless audio you get from a disc spinning in a dedicated player. That gap becomes obvious the moment you pair them with a modern 4K TV and a real surround sound system.

The three videos break down what matters in 2026. DVD is limited to standard definition. Blu-ray delivers full HD with excellent clarity and solid audio. 4K Ultra HD Blu-ray adds true 4K resolution, HDR formats like HDR10 and Dolby Vision, and the best available home audio formats. To take advantage of it, you need the right hardware. A 4K Ultra HD Blu-ray player, a compatible TV with HDR support, and an audio system that can handle formats like Dolby Atmos or DTS:X. Get that right, and physical media is not just surviving. It is still the benchmark.

Where to buy?

Advertisement. Scroll to continue reading.
Advertisement

Source link

Continue Reading

Tech

4 Things Your Nintendo Switch 2 Can Do That Most Owners Don’t Know About

Published

on





People who own the original version of the Nintendo Switch have had a lot of time to discover the various cool things the gaming console could do. You can use it as a TV remote control. You can use it to charge an iPhone. You can surf the web on it. Apart from the unusual uses, there are a number of things you can do on the Switch to enhance your game-playing experience. For example, you can change the button mapping on your controllers, use a mouse or a keyboard, or even play games in portrait mode. While these examples are fun, the list of possibilities got a bit longer with the Nintendo Switch 2.

The release of the Nintendo Switch 2 was highly anticipated because of the eight-year gap in between console versions. As someone who has both, I can attest, almost everything is improved in the Switch 2. The screen is larger and has better display quality. The Joy-Con 2 controllers are magnetically attached and feel more secure. There’s an additional USB-C port on top of the console that lets you charge the device while using the kickstand or plug in additional accessories. Furthermore, there are several hidden new features on the Switch 2 you may not know about.

Advertisement

The Joy-Con 2 controller can be used as a mouse

One of the cool things about the Switch 2 is that you can use a myriad of compatible gadgets with it to make your gaming experience more efficient and enjoyable. In fact, if you’re wondering what it would be like to use an accessory with your gaming console, there’s no need to look further than what’s already in your hand — just detach the Joy-Con 2 controller and start using it as a mouse. It doesn’t matter whether you’re left- or right-handed. Both Joy-Con 2 controllers have a side-rail sensor, so you can use them interchangeably.

There are a few instances wherein the Joy-Con 2’s mouse mode feature could be particularly useful. If you happen to be playing a game that requires intensive menu navigation — such as “Factorio” or “Civilization 7” — it may be more convenient and feel more natural to use a cursor over the Joy-Con 2’s directional pad. It’s also the more portable option as it takes away the need to carry an extra mouse.

Another perk offered by the mouse feature of the Joy-Con 2 is its ease of use. Simply lay the controller flat on its side and the Switch 2 should automatically detect the surface and activate the cursor on some compatible games. For others, you may need to fiddle with the in-game controller settings to get it to work as intended.

Advertisement

There are some limitations to this feature. Since the Joy-Con 2 is thinner than a standard mouse, it can be harder to wield for a longer period of time. It also may not work on certain surfaces — based on testing, mouse mode doesn’t kick on when used on glass or similarly reflective tabletops.

Advertisement

Locally host and stream a supported Switch 2 game you own

GameShare was one of the highly anticipated features of the Nintendo Switch 2 when it was first announced. It allows a Switch 2 user to essentially act as a host, stream a game that is GameShare-compatible, and allow nearby Switch users (including the original version of the Switch) connected to the same Wi-Fi network to play with them, whether or not they own the game themselves. This particular feature is great for families who own multiple Switch consoles as well as game players who have friends visiting and want to play co-op using their own Switch devices. It’s a cost-effective way of enjoying compatible games that offer multiplayer functionality.

To activate GameShare on a supported Switch 2 game, the host needs to launch the game first and find the co-op or multiplayer option in the game’s main menu. Other players can then hit the GameShare icon on the home screen of their respective Switch consoles and find the correct GameShare session to join.

There are a few things to note regarding the GameShare feature. There are two ways to start a GameShare session — locally among consoles connected to the same Wi-Fi network, or online via GameChat. The former is compatible across all versions of the Switch, while the latter is only available for the Switch 2. Consoles with GameChat will need to have the feature set up before they can participate in a long-distance gaming session.

Another important factor to consider is GameShare’s current availability across the Nintendo game catalog. As of this writing, there are 33 Switch 2 games that allow GameShare with local users, such as “Donkey Kong Bonanza,” “Mario Tennis Fever,” and “Pokémon Pokopia.” Meanwhile, there are 23 games that offer GameShare over GameChat among Switch 2 users.

Advertisement

Cap the maximum battery charge

As is the case for most modern devices, battery health matters. A quick way to lose battery capacity over time is keeping your device plugged or charging. If you have your Switch 2 console perennially docked, you are essentially charging it to 100% at all times, which is not advisable if you want your console to last longer. To make your Switch 2 perform better and ensure that you don’t overcharge the gaming device, there’s a new system feature that you can enable that lets you limit its capacity to charge its internal battery to lower than 100%. Here’s how to find it:

  1. Select the System Settings icon on the home screen.
  2. Scroll down to System on the left-side panel.
  3. Enable the toggle next to “Stop Charging Around 80-90%.”
  4. While you’re at it, enable the toggle next to System Battery as well so the number is visible on the home screen.

You will see a message underneath the toggle that warns you that enabling the feature may shorten your playtime when the Switch 2 is used while unplugged, but you may find the reduction of battery degradation worth it in the long term. Also note that even with the feature enabled, the Switch 2 may sometimes charge to a full 100% “to ensure accurate battery-level display.”

Advertisement

Label people on your Friend list

Nintendo recently released Version 22.0.0 of its system update for both the original Nintendo Switch and Switch 2. One of the key additions included is the ability to add notes to users listed in your Friends list. You basically can tack on a label on top of a user’s username on Nintendo.

If you’re a wide-ranging Switch 2 user who enjoys making friends within the games you play as well as in-real-life gaming communities, then you probably have a substantial list of contacts accumulated in your Switch account. Having the ability to include a visual reminder on how you met a user or what games you play with them could make it easier to plan your future games. A good thing about the Add Note feature is that it’s only visible to you, so you can be as descriptive about the people you’re connected with as you want, though people who use your Switch 2 device may be able to see what you’ve written.

To use the new feature, select your profile on the home screen of your Switch 2. Next, select Friend List from the side panel. When you click on a friend’s user tile, you should see the Add Note option underneath their avatar.

Advertisement



Source link

Continue Reading

Tech

Do Emergency Microsoft, Oracle Patches Point to Wider Issues?

Published

on

“Emergency out-of-band fixes issued by enterprise IT giants Microsoft and Oracle have shone a spotlight on issues around both update cycles and patching,” reports Computer Weekly:


Microsoft’s emergency update, KB5085516, addresses an issue that arose after installing the mandatory cumulative updates pushed live on Patch Tuesday earlier this month. According to Microsoft, it has since emerged that many users experienced problems signing into applications with a Microsoft account, seeing a “no internet” error message even though the device had a working connection. This had the effect of preventing access to multiple services and applications. It should be noted that organisations using Entra ID did not experience the issue.

But Microsoft’s emergency patch comes just days after it doubled down on a commitment to software quality, reliability and stability. In a blog post published just 24 hours prior to the latest update, Pavan Davuluri of Microsoft’s Windows Insider Program Team said updates should be “predictable and easy to plan around”.
Michael Bell, founder/CEO of Suzu Labs tells Computer Weekly that Microsoft’s patch for the sign-in bug follows “separate hotpatches for RRAS remote code execution flaws and a Bluetooth visibility bug. Three emergency fixes in eight days does not shout reliability era.”

Oracle’s patch, meanwhile, addresses CVE-2026-21992, a remote code execution flaw in the REST:WebServices component of Oracle Identity Manager and the Web Services Security component of Oracle Web Services Manager in Oracle Fusion Middleware. It carries a CVSS score of 9.8 and can be exploited by an unauthenticated attacker with network access over HTTP.

Advertisement

Source link

Continue Reading

Tech

One UI 8.5 beta brings new life to older Galaxy phones

Published

on

Samsung is widening the reach of its next big Android update, with One UI 8.5 beta now rolling out to a wave of older Galaxy devices. This is not just rolling out to its latest flagships.

After spending months in testing on the Galaxy S25 series, the beta programme is expanding to include last year’s premium phones, foldables and even tablets. Newly supported devices include the Galaxy S24 lineup, Galaxy Z Fold 6 and Flip 6.

In addition, the Galaxy Tab S11 range is supported as well. This is a clear sign Samsung is speeding up its software rollout strategy.

The update is currently available in select regions including the UK, US, Korea and India. Users are able to sign up through the Samsung Members app. Once enrolled, a banner guides you through the process. Notably, Samsung tweaked this process slightly with the One UI 8 release.

Advertisement

This wider rollout lands alongside continued testing on newer hardware. The Galaxy S25 range is already on its eighth beta. Meanwhile, the Galaxy Z Fold 7 and Flip 7 are on their second, suggesting Samsung is getting closer to a stable release.

Advertisement

While Samsung hasn’t detailed every new feature in this phase, One UI 8.5 is expected to refine the experience introduced with One UI 8. Likely, it will focus on performance tweaks, UI polish and AI-driven features rather than a complete overhaul. Furthermore, it also ships pre-installed on the upcoming Galaxy S26 series. Therefore, this gives us a good idea of where Samsung’s software is heading next.

For owners of slightly older Galaxy devices, this is a notable shift. Samsung has been steadily improving its update commitment. Also, bringing beta access to a broader range of devices earlier in the cycle is part of that push.

Advertisement

There’s no exact date for the full release just yet, but Samsung says more devices will join the beta programme in April. So, if your phone isn’t on the list yet, it might not be waiting long.

Source link

Advertisement
Continue Reading

Tech

I took a ride in an Nvidia-powered autonomous Mercedes at GTC 2026 – and it’s convinced me this is the future

Published

on

As AI and robotics become an ever-more important presence in everyday life, the use cases are quickly going from science fiction to real life.

One of the most popular areas of interest is autonomous vehicles, self-driving cars able to navigate the roads and get us to our destination without needing to touch the wheel.

Source link

Advertisement
Continue Reading

Tech

From Bot Signups to Account Takeovers

Published

on

A bot conducting fraud

Modern fraud attacks look like a relay race where different tools and actors handle each stage of the journey from signup to cash-out.

When you only inspect one signal at a time, such as IP or email, attackers simply shift to a different part of the chain and still succeed.

Bot characteristics

Anatomy of a Modern Fraud Chain

A typical attack chain starts with automation to create scale. Attackers use bots and scripts to open large numbers of accounts with minimal human effort, often rotating infrastructure to avoid rate limits and simple bot rules.

Those bots are usually powered by “aged” or compromised emails and leaked credentials so that every account looks like it belongs to a long standing user instead of something created yesterday.

Advertisement

Residential proxies then mask traffic behind real consumer IP ranges, making traffic appear like normal home users rather than data centers or known VPN services.

Once those accounts are established, they shift tactics from automation to slower, human driven sessions to blend into normal usage.

At this point the chain reaches account takeover and monetization, using malware links, phishing, and credential stuffing outputs to log in, change details, and push through high value transactions.

Throughout this lifecycle, the tools are mixed and matched. A single actor may move from a headless browser and proxy at signup to a mobile device emulator and different proxy provider at login, then hand off access to another party who specializes in draining funds or exploiting promo campaigns.

Advertisement

This is exactly why a point in time, single signal check rarely tells the full story

Bot DNA

False Positives from Siloed Checks

When teams lean on one dominant signal, such as IP reputation, false positives become a daily problem. Legitimate users on shared Wi Fi, mobile carrier NATs, or corporate VPNs can inherit the poor reputation of a small number of bad actors on the same ranges, even though their intent is clean.

Blocking by email alone has similar issues, since free webmail domains are used by both sophisticated attackers and completely normal customers.

Identity centric controls on their own also hit a wall. Static data checks, like simple name and document matches, are easy to spoof for synthetic identities built from real data fragments.

Advertisement

Device centric controls that only look for rooted phones or emulators can miss fraudsters operating on seemingly normal devices that have been compromised earlier in the chain. Even bot specific solutions can create blind spots when they work alone.

Once a credential stuffing campaign ends and attackers pivot to manual logins with the same stolen credentials, pure bot tools see only “human” traffic and approve it. The result is a pattern where high risk users are blocked while determined adversaries adapt and slip through.

Multi-Signal Correlation in Practice

Effective fraud defense comes from correlating IP, identity, device, and behavioral signals at every step of the journey instead of evaluating each one in isolation.

An IP that looks slightly suspicious on its own becomes clearly abusive when tied to dozens of new accounts on the same device fingerprint and similar behavioral patterns during the first session.

Advertisement

Likewise, a user with an apparently normal device and clean email reputation can still be high-risk if login behavior reflects credential stuffing patterns or access follows known malware distribution campaigns.

Modern decision engines improve accuracy by weighing hundreds or thousands of data points together rather than enforcing rigid rules on a single attribute.

For organizations, that means unifying what were once separate views. IP intelligence, device fingerprinting, identity verification, and behavioral analytics should feed the same risk model so that each event is scored in context, not as a disconnected log line.

This multi signal approach is the most reliable way to raise the bar for attackers while reducing friction for genuine customers.

Advertisement

Prevent chargebacks. Stop account takeover. Recover revenue. 

Leading enterprises use IPQS data to power their fraud prevention strategies, don’t leave yourself vulnerable. Seamlessly integrate with our APIs to reduce friction, prevent more fraud, and secure your business.

Free Sign Up

Case Study: Stopping Coordinated Signup Abuse

Consider a self service SaaS platform that offers a generous free tier and trials. As the product grows, abuse appears in the form of thousands of signups used to scrape data, test stolen cards, or resell access under the radar.

Early countermeasures rely on blocking certain IP ranges and obvious disposable email domains, but this only dents the problem and begins to impact small teams and freelancers on shared networks.

Advertisement

By shifting to a multi-signal model, the platform starts scoring signups across IP, device, identity, and behavior together.

New accounts that reuse the same device fingerprint with different emails, come from IPs recently seen in automated traffic, or immediately exhibit scripted behavior are grouped into coordinated abuse clusters instead of being evaluated one by one.

This lets the team apply precise responses, such as challenging only high risk clusters with additional verification or silently limiting their capabilities while letting low risk signups proceed without friction.

Over time, feedback from confirmed abuse and confirmed good users trains the scoring model, driving down false positives while pushing organized attackers to spend more effort for less return.

Advertisement

Outpacing Fraud Trends

Attackers are no longer tied to a single tool or weak point in your stack. They combine proxies, bots, synthetic identities, leaked credentials, and malware infrastructure across multiple stages, which means that single signal defenses will always lag behind.

Multi layered approach

To keep pace, fraud teams need correlation across IP, identity, device, and behavior in one coherent risk view rather than a collection of disconnected checks.

From here, the conversation shifts to how to operationalize that unified model, integrate it into existing workflows, and measure its impact on both loss reduction and customer experience.

Book a free consultation with a fraud expert today!

Advertisement

About IPQS

IPQS is a founder-led, self-funded company built on a simple principle: fraud prevention should be driven by real intelligence and a multi-layered approach. From day one, we’ve focused on owning the full lifecycle of our technology—developing and maintaining our own global data network, honeypots, and fraud intelligence specialists. This approach gives our customers a distinct advantage: faster insights, greater accuracy, and complete transparency into how decisions are made. By staying independent, we prioritize long-term innovation over short-term gains, continuously evolving our platform to stop fraud before it starts.

Sponsored and written by IPQS.

Source link

Advertisement
Continue Reading

Tech

Watch Electricity Slosh: Visualizing Impedance Matching

Published

on

It’s one thing to learn about transmission lines in theory, and quite another to watch a voltage pulse bounce off an open connector. [Alpha Phoenix] bridges the gap between knowledge and understanding in the excellent videos after the break. With a simple circuit, he uses an oscilloscope to visualize the propagation of electricity, showing us exactly how signals travel, reflect, and interfere.

The experiment relies on a twisted-pair Y-harness, where one leg is left open and the other is terminated by a resistor. By stitching together oscilloscope traces captured at regular intervals along the wire, [Alpha Phoenix] constructs a visualization of the voltage pulse propagating. To make this intuitive, [Alpha Phoenix] built a water model of the same circuit with acrylic channels, and the visual result is almost identical to the electrical traces.

For those who dabble in the dark art of RF and radio, the real payoff is the demonstration of impedance matching in the second video. He swaps resistors on the terminated leg to show how energy “sloshes” back when the resistance is too high or too low. However, when the resistor matches the line’s characteristic impedance, the reflection vanishes entirely—the energy is perfectly dissipated. It really makes it click how a well-matched, low SWR antenna is crucial for performance and protecting your radio.

Advertisement

[Alpha Phoenix] is a genius at making physics visible. He even managed “film” a laser beam traveling at light speed.

Advertisement

Source link

Continue Reading

Tech

Irish AI start-up Jentic joins OpenClaw push with Jentic Mini

Published

on

The next era of software ‘will be built for agents, by agents’, said Jentic CEO Sean Blanchfield.

Irish AI start-up Jentic is jumping on the OpenClaw frenzy with ‘Jentic Mini’, a free, open source, self-hosted offering for developers building with the product.

The months-old OpenClaw project has taken the developer world by storm, but security issues associated with letting personal agents access computers has already led to a number of different iterations from big-name brands such as Nvidia, with its open source stack NemoClaw, and Anthropic, which recently integrated OpenClaw’s text features into Claude.

Jentic Mini also markets itself to be safer to use in real-world software environments. Jentic said that the API execution layer gives developers a better way to govern how agents access tools, APIs and workflows to help reduce risks that come with broad and unmanaged credential exposure.

Advertisement

Jentic Mini is available on the start-up’s website, as well as on GitHub. It can also be used with other general-purpose agents including NemoClaw.

With more than 10,000 APIs, agents created using Jentic Mini will come with a “machine-usable map” of the tools and workflows that can be used, while enabling a more structured and controlled way to connect agents to real systems, the company said. Jentic’s standard model is available as a verified connector in Claude.

“The next era of software will not be built for humans. It will be built for agents, by agents,” said Sean Blanchfield, the CEO and co-founder of Jentic.

“Jentic Mini gives developers a free, open source foundation for that shift, connecting general-purpose agents to real systems through an AI-curated catalogue of more than 10,000 APIs and workflows. We want to make it dramatically easier to deploy agents that do real work.”

Advertisement

Jentic became the first Irish company to be selected for the AWS generative AI accelerator last year. The selection followed a €4m pre-seed raise in 2024, one of the largest in Ireland that year.

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025