Home Blog Page 117

Intel Core i9-13900K Processor Overclocked to a Record 9 GHz at -250°C

Intel Core i9-13900K Overclocked to 9 GHz

Asus announced that the company’s Extreme Overclocker team has successfully overclocked an Intel Core i9-13900K to over 9GHz, officially breaking the world record for CPU frequency. 

The company announced the achievement on Twitter, recorded on an open bench system powered by an Asus ROG Maximus Z790 Apex motherboard.

https://twitter.com/ASUS_ROG/status/1605563751935234050

The CPU ran Pifast for 6.85 seconds and SuperPi 32M for 3 minutes, 3 seconds, and 778 milliseconds while operating at a maximum clock speed of 9008.82 MHz. This accomplishment has been mentioned on HWBOT and has become a new world record according to competition rules.

Asus’ team disabled all E-cores in the Core i9-13900K and even disabled the hyper-threading feature, limiting the CPU to 8 P-cores and eight threads. It used an unusual combination of liquid nitrogen (LN2) and liquid helium for cooling. The chip scales well in cryogenic environments, running at a stable temperature of -250°C without much fluctuation.

There have been many attempts to break the 9 GHz barrier, but it’s something even the best CPUs and experienced overclockers have failed to achieve over the years. The first CPUs to come close to 9 GHz were AMD’s FX series processors, which over the years, have seen multiple overclockers hit above 8 GHz, but have never been able to exceed 9 GHz.

The previous official record was 8.722 GHz for the FX-8370. And Intel CPUs have been trailing AMD in the last few years when it comes to overclocking, but they’ve finally reclaimed the throne with this record.

The improvements Intel has made to the Raptor Lake process node are undoubtedly the reason for the new world record. Raptor Lake is Intel’s highest-clock CPU architecture in history, and the Core i9-13900K can reach a boost clock of 5.8 GHz.

What Is Co-Branding? How Does It Differs From Co-Marketing?

Co-Branding

Co-branding is a popular marketing strategy that allows companies with the same views, priorities, and consumer markets to join forces and create a product that is twice as attractive to customers due to its special value.

For example, someone who likes Milka chocolate and Oreo cookies will buy chocolate with the addition of their favorite cookies with special pleasure. There are many successful examples of brand partnerships in the history of marketing. Each story is worth reading on its own, enjoying the good decisions and strategic moves. However, what does co-branding mean? Let’s find it out.

How does co-branding differ from co-marketing?

Co-marketing does not require partners to create a new product. They simply combine advertising efforts to show how their products fit together, like a streaming service to a car speaker or a cake to a coffee shop.

Instead, co-branding is not only joint advertising but also a joint product that combines the most substantial advantages of each of the products. Manufacturers combine not only marketing but also their capacities and resources to create an original solution that will appeal to consumers.

Popular forms of co-branding

Milka and Oreo
  1. Combination of ingredients. In this case, the elements or components are mixed to form a new position with familiar features. A good and successful example is the combination of Milka and Oreo.
  2. Creation of a new product based on two already popular positions of the same company. More often than not, the parent company works with subsidiaries to improve the reputation of the business as a whole.
  3. The combination of local and international is most often traced in the form of cooperation between large banking organizations and local retailers. In this way, a small business gets more recognition and audience loyalty, and an international company gets an additional source of income.

So, this is an ecological way of development and advertising, where each partner receives their benefits, which are equally useful for consumers. In this way, the reputation and recognition of one brand increase the popularity of another, and it also works in the opposite direction. Such cooperation brings many benefits but requires the readiness of partners. Before creating such collaborations, each company must have a core product or a certain philosophy that appeals to people.

Co-branding Benefits

Working together on new solutions and advertising integrations benefits each of the partners. In particular, the joint partnership has mostly the following results:

  • Expanding the client base of each entrepreneur and improving recognition.
  • Increased sales and additional royalty income.
  • Creation of unique product lines that could not have an impact without co-branding.
  • Reduction of costs for marketing institutions because companies combine not only production facilities but also advertising budgets.
  • The risk is evenly distributed among all participants of cooperation.

Despite the clear benefits for companies and consumers, collaborations between brands do not happen very often. Cooperation and work on a common idea are possible only if the brands act not as competitors but as a cohesive team with similar values.

Speedometer 3: Apple, Google, and Mozilla Collaborate for Testing Browser Performance

Web browser benchmarking Speedometer

AppleGoogle, and Mozilla have announced a collaboration to develop Speedometer 3, a benchmark for testing the performance of web browsers and their rendering engines. 

The project aims to create a test that accurately reflects real-world usage scenarios and is based on common standards. Apple’s Webkit team mainly developed previous versions of the benchmark, but this time the project will be a collaborative effort between the three companies.

According to Mozilla, the new benchmark will be able to weigh only what matters. It will require the input and collaboration of web developers, standards bodies, framework builders, and browser vendors to create a shared understanding of what matters. The project will be open-source and hosted on GitHub, where rules governing its development and updates will also be available. Non-trivial changes, or those with minimal impact, will require the approval of at least two participating projects and cannot be implemented if there are strong objections from at least one company. Major changes will require unanimous consent.

The Speedometer 3 benchmark will test the performance of browser engines such as WebKit, Quantum, and Blink, as well as JavaScript engines like Google V8 and Mozilla SpiderMonkey. It will mimic a typical user’s actions to assess a browser’s performance accurately. While the project is still in the development stage and is currently unstable, the creators anticipate that having such a feature available will enhance browser performance overall.

Microsoft May Acquire Netflix in a $190 Billion Deal

Netflix Partners With Microsoft

Microsoft is reportedly considering the acquisition of the streaming service Netflix. The deal, expected to cost Microsoft $190 billion, could be announced as early as 2023. 

This acquisition would be a strategic move for both companies, as Netflix has been expanding into the gaming market through its Netflix Games division and acquiring various game studios. On the other hand, Microsoft could expand its content offering through video game streaming on multiple devices.

The relationship between Microsoft and Netflix is already fairly close, with Netflix using an advertising platform built on Redmond technology and Microsoft President Brad Smith sitting on the Netflix board of directors.

Microsoft has been actively acquiring other companies since 2014 when Satya Nadella took over as CEO. Some of the company’s most notable acquisitions include the $2.5 billion purchase of Minecraft developer Mojang, the $26 billion acquisition of LinkedIn, and the $20 billion acquisition of Nuance.

Microsoft is awaiting approval from antitrust regulators worldwide for its proposed $69 billion acquisition of Activision Blizzard. This acquisition would make Activision Blizzard a part of the Microsoft family if approved.

Overall, as both businesses seek to expand into new markets and broaden their content offerings, the prospective acquisition of Netflix by Microsoft might be a decision that is advantageous to both. The question of whether the required authorities will approve the purchase still needs to be answered.

Top 6 Blended Learning Tools for Efficient Training

MAC computer typing

Blended learning combines the strengths of online learning and in-person training to create a richer and more collaborative learning experience. Training providers and businesses are adopting it to provide versatile vocational training and assessment that meets the requirements of today’s learners. But there’s a catch: delivering blended learning is an art that must be approached strategically.

So, what tools do you need to deliver a blended learning program? Here are our top five.

1. Gamification

People of all ages play video games. Aside from being enjoyable, games are an excellent way to breathe new life into your training. So, gamification in training is an exceptional blended learning tool for keeping employees engaged and motivated throughout a training session. 

You can use the following three different kinds of games in blended learning.

Educational Games

Educational games take the form of quests and follow a common theme. Movies, television shows, and casino games are a few theme examples. Employees are separated into groups and compete using mobile devices. Every employee receives instructions on a single screen, and results are displayed in real-time.

The Audience Response System (ARS)

A classroom presentation can be tedious. Instructors try to engage the learners to make it more interactive, but how many people feel interested enough to interact during a presentation? Five or even less?

This is where ARS can be an excellent blended learning tool. Each employee receives a tablet with the ARS application installed during the training session. The instructor then asks a relevant question or polls the participants, and everyone answers by typing their response on their tablet. Answers are assessed in real-time and then presented to the viewers in graph format.

This way, employees remain engaged, data is gathered for future training purposes, and everybody leaves training feeling as if their voice was heard.

Interactive Posters

As repetition has been proven to improve memory retention, it is an excellent tool to use during training. Interactive poster apps can be used to reaffirm key messages for takeaways during blended learning.

Participants, for instance, scan a QR code on a poster or a flier. They are then given access to additional information on the training topic. After memorizing this material, participants are tested on what they’ve learned through gamified quizzes. It’s a brilliant way to help learners remember essential information.

2. Digital Badges

Digital badges are a popular blended learning tool that, when used correctly, could be game-changing. Each badge can include information about the skills and achievements attained by a learner. They can assist L&D professionals in distinguishing between different courses within a learning management system (LMS) and incentivize employees to perform well through a tracking or ranking system, with the best performers earning rewards in the form of badges.

3. Webinars 

Webinars help smooth the transition between online and in-person training and are the ideal middle ground in a blended learning environment. Employee interaction, whether peer-to-instructor or peer-to-peer, is possible in the webinar, and the webinar session can also be documented for those unable to attend. Webinars are best suited for ethics training in the workplace.

Optimize a Mobile Workforce

4. Blog Writing

The first time you hear the term “blogs,” you might think of them as a way to enhance external communication. However, blogs can be helpful in intrinsic blended learning training for the employees of an organization.

Maintaining communication among learners during blended learning might be a difficult task, given a portion of the learning occurs online. One solution is to incorporate blog writing as a blended learning exercise. To begin, divide your trainees into teams. Then assign each team to write a blog post about a major business issue and how they would fix it step by step.

It will not only significantly improve employee and group communication skills, but it will also make your learners think deeply about handling real business problems.

5. Simulations

The hardest part about the training is that you teach your employees new skills, which they quickly forget once they return to their workstations. Worse, they revert to their old ways. To prevent this situation, you should teach skills but also ensure that these skills are retained and employed by your learners.

This is where simulations prove to be an excellent blended learning tool—simulations aid in reinforcing what has been learned and changing employee habits. You should teach employees essential skills in whatever format you prefer. Then, create a simulation highlighting these critical skills to ensure the knowledge stays with the learners for a long time.

Remember the following points when using simulations in your training:

  • Simulations should last only 10 minutes to accommodate busy schedules and keep learners’ attention. 
  • Ensure that these can be conducted in person and on mobile for learners who travel frequently. 
  • Every simulation must only focus on a single critical topic or task to prevent sensory overload.

6. Pages or Groups On Social Media

Social media pages are also excellent blended learning tools. Employees frequently sift through private Twitter or Facebook accounts, so why not include them in training? For instance, you could make a LinkedIn page or group for a specific employee sector. Add posts regularly and invite trainees to leave feedback or comments. Alternatively, you can create a YouTube channel and upload webinars, tutorials, and presentations.

Social media pages are also an excellent way to keep training at the forefront of your employees’ minds. You can run a poll on social media platforms to see what kind of training employees want to participate in in the future. You can also use social media to inform your learners about upcoming training sessions.

Conclusion

In-person or in-office training can be challenging to implement because you must manage differing schedules. At the same time, online learning could be inefficient because it is more challenging to keep learners engaged. Blended learning, however, creates a collaborative environment with all of the benefits of in-person and online training and none of their drawbacks! It is why it is quickly becoming a “must-have” for businesses, particularly as we move toward a post-Covid world.

Epic Games Agrees to Pay $520 Million Settlement for Violating Children’s Online Privacy and Inducing Unwanted Purchases in Fortnite

Fortnite game details

Epic Games, the developer behind the popular game Fortnite, has agreed to pay a record $520 million settlement to the Federal Trade Commission (FTC) for violating minors’ privacy online and inducing players to make unwanted purchases in the game. 

The settlement includes a $275 million fine for alleged violations of the Children’s Online Privacy Protection Rule (COPPA) and $245 million for a purchase setup that may have tricked players into buying in-game items.

According to the FTC, Epic collected personal information from Fortnite players under 13 without their knowledge or consent. It enabled text and voice chat by default, putting children and adolescents at risk of interacting with strangers. The agency also alleges that Epic harmed young users by allowing them to be bullied, threatened, harassed, and exposed to dangerous and psychologically traumatic issues such as suicide.

As part of the settlement, Epic will be required to obtain parental permission before allowing voice and text chat to underage players, delete all personal information it previously collected from Fortnite players unless it obtains parental consent, and refund unauthorized purchases made between January 2017 and November 2018. The company will also have to remove the ban on players who have tried to get back the sums invested in the game.

In response to the settlement, Epic Games released a statement listing the changes it has made to Fortnite in response to consumer complaints and privacy concerns, including the recent “Cabined Accounts” feature, which requires all users to confirm their date of birth before playing.

Despite the record settlement, Epic Games remains a major player in the gaming industry. Fortnite managed to bring in over $9 billion in revenue within its first two years of existence, despite previously receiving criticism for its legal spat with Apple. However, the company’s ongoing legal battle with Apple remains a source of controversy and uncertainty.

Elon Musk Will Resign Twitter CEO Position When He Finds “Someone Foolish Enough To Take The Job”

Elon Musk Becomes Twitter Largest Shareholder

After the poll about his resignation as Twitter CEO, Elon Musk talked for the first time about his future at the helm of the company.

After witnessing the World Cup final in Qatar last Sunday, Musk asked Twitter users if he should stand down as CEO. The 12-hour survey was completed by 17.5 million users. 57.5% of participants voted for Musk to stand down as CEO of Twitter, while 42.5% voted against it.

It is still unclear who will be Musk’s successor and when this change could take place. When a user suggested it, Musk wrote: “No one wants the job who can actually keep Twitter alive. There is no successor.” Musk also wrote that the future Twitter boss must “like pain a lot“. In addition, as a Twitter boss, you have to invest your savings because the company has been in the “fast lane to bankruptcy since May“.

Musk has already announced his resignation as CEO of Twitter. He won’t do it immediately, but he has put it in writing that this is his intention. Musk’s decision is that he will no longer be the CEO of Twitter, but will continue to be the owner of the company and will continue to hold positions of responsibility. According to his tweet, he continues to lead the software development and technical infrastructure teams even though he finds “someone foolish enough” to become Twitter CEO.

However, according to CNBC, Musk has been looking for a new Twitter CEO for some time — even before the Twitter poll.

A Selection of Common Cyber Threats Small Businesses Need To Avoid

Necessity of Cybersecurity

Sadly, we live in a world where cybercriminals are at large. Given the rise of the internet and the selection of different online platforms that are out there, online criminals have been able to find a way in. Somewhat alarmingly, they’re clever about it, too. While there are some simple ways to grow your online business, there is an increasing amount of unscrupulous characters looking to break into it for a variety of reasons and hinder any progress you’ve made. 

On the whole, hackers generally look to obtain personal information. In truth, though, especially when assessing the business world, the sheer amount of cyber attacks that are regularly being pulled off is scary. From stealing money and data to taking personal information and adding ransomware, the diverse nature of these types of attacks is what makes them so tricky to avoid. Of course, you can install a VPN to add an additional layer of security to your web surfing. Additionally, helpful blogs around website security and understanding cybersecurity basics might help, especially if you want to avoid customer churn and even site suspension. Ultimately, though, it’s important to keep on top of the methods hackers use in order to stay one step ahead of them. 

Given the growing nature of cyber threats in the modern world, online criminals are coming up with new and improved methods of attack. For small business owners, in particular, keeping on top of the growing amount of sophisticated attacks is vitally important. Even the largest corporations around experience cyber criminality, but prevention is certainly the key in making sure that the attackers are put off. In order to prevent specific attacks, though, it’s important to understand exactly how cybercriminals operate and the common threats that tend to haunt small businesses. 

It’s also important to understand that a cyber attack can happen to anyone or any small business. In fact, while gaining an understanding of common cyber threats is important in being able to maintain a safe and secure online platform for your business, online criminals are always looking at ways to evolve. In order to increase your chances of establishing a safe and secure website, though, it’s still worth keeping tabs on the latest methods of attack in 2022. So, with that in mind, let’s take a look at a selection of common cyber threats right now that small businesses should aim to avoid. 

Malware 

A particularly malicious attack, malware can have a devastating impact on any website, but especially a smaller one with limited resources when it comes to being able to get it back up and running. From spyware and ransomware to worms and viruses, as soon as an online user clicks a link, these types of horrific attacks can occur. A lot of the time, people are being unknowingly attacked, too, perhaps finding out after the crime has already taken place. This has certainly occurred for a number of small businesses, with malware attacks being one of the most common types of threat these days. Attacks like this can have a massive impact on how a website functions, perhaps even harming an entire business as a result. Malware attacks can block access to key website components, install additional harmful software, obtain information by transmitting data from the hard drive, and harm individual parts that help the system work. Essentially, a malware attack isn’t something any business wants. 

Man in the middle attacks

security tools for protecting your devices

When hackers insert themselves into a two-party transaction, that’s when a man-in-the-middle attack is most likely to take place. Usually carried out with the aim of filtering and stealing any valuable data, hackers interrupt online traffic, particularly on a vulnerable, unprotected network, and essentially operate covertly between the visitor and the network. Once they’re successfully in and able to get to work, a hacker will look to obtain the data they want through a selection of malware. Although these types of attacks aren’t as common as other cyber threats, they’re still prominent enough in 2022 to cause enough concern. 

Password attacks 

Passwords are a necessity online. If your website doesn’t have a secure password, online criminals could wreak havoc and conduct their activities with ease. For some people, using a password manager is the answer, while others opt for other security measures. Password attacks come in all shapes and sizes, though. For instance, sometimes they occur after a hacker has befriended someone online, perhaps through a public forum or a social media platform. Then, from there, the human interaction that has been carried out enables a hacker to gain the information they require to cause harm to an online business or an individual. Although this area of attack is hard to pull off, it has resulted in a number of online threats overall. Some hackers even try and guess their way into a website. With that in mind, be sure to protect your website with a hard-to-crack password. 

SQL injection

If your small business has a server that uses SQL, then the possibility of being interrupted by a horrific SQL injection is a genuine one. Also known as a Structured Query Language, an SQL attack consists of an online attacker inserting malicious code into the server. Once the hacker has managed to insert the code they have, it will extract any vital information that will then give them the tools they require to carry out more harm. Hackers even use this method to bypass application security measures and then to obtain the content of the entire SQL database, or even modify and delete hugely important business records from a database. A breach of this type is certainly harmful for any business, particularly as hackers can gain access to customer records, intellectual property, and a whole lot more. 

Denial of service

Also known as a DoS attack, denial of service methods of attack result in a computer or a network being flooded so it simply malfunctions and fails to respond to any requests. Once this has happened, alongside a range of other techniques, cybercriminals can inflict more damage through other attacks and gain control in a truly terrifying manner. For internet-based criminals, a denial of service method of attack is a tried and tested way of compromising websites.