Month: July 2024

Audi’s next EV is the A6 e-tron Sportback—but no station wagon for the US

Audi’s next new electric vehicle is this aerodynamic five-door sedan.

Enlarge / Audi’s next EV is the A6 Sportback e-tron. (credit: Audi)

Audi provided flights from Washington to Munich and accommodation so Ars could be briefed about the A6 e-tron as well as the A5 we wrote about several weeks ago, and another model you can read about in the coming weeks. Ars does not accept paid editorial content.

MUNICH—The sedan is not quite dead—at least not yet. While it’s true that car buyers are voting with their wallets and opting for crossovers and SUVs, not every automaker has given up on the form factor, even when it comes to electric vehicles. For example, Audi’s next EV will be the new A6 e-tron, which goes on sale in the US next year.

The pedants might quibble with calling the A6 e-tron a sedan, as the one we’re getting here is a midsize five-door, meaning it has a rear hatch instead of a trunk. In Audi lingo, that means it’s an A6 Sportback e-tron, with more of a two-box rather than three-box shape like the outgoing (internal combustion engine-powered) A6. Not that that’s a bad thing in our eyes—the rear hatch will make it easier to load or unload larger items (like a bicycle) into the cargo area.

“We were determined to give the A6 e-tron the attractive proportions of the concept car,” said Audi designer Wolf Seebers. “I’m talking about the classic Sportback silhouette that Audi fans are familiar with,” Seebers said.

Read 10 remaining paragraphs | Comments

Read More 

Audi launches new A6 and S6 E-tron Sportback EVs

Image: Audi

Audi’s got some new E-tron EV models, and this time around they aren’t SUVs. Instead, we’re getting electric versions of the A6, the automaker’s popular midsized sedan, and it’s coming in both a Sportback and an Avant station wagon style, along with performance S6 variants.
Audi first revealed the A6 E-tron as a concept at Auto Shanghai back in 2021, and the production version is looking very close to the source material. The front still has slim headlights with adaptive matrix LEDs (only available outside the US due to regulations) and a front grill with a fish scale-like texture surrounded by a dark mask. And over on the back, the car has digital OLED panels for its rear lights that can be used as a safety communications display.

The US is currently set to get just three versions of the new vehicle: the A6 RWD Sportback, A6 AWD (quattro) Sportback, and the S6 Sportback. They also won’t get the slim virtual side view mirrors that help the car get a low drag coefficient of 0.21 since US regulations require actual mirrors. Audi claims the range of the vehicle on a single charge is over 700 kilometers (about 435 miles), although the US EPA estimation is likely to be much less.
The fastest version, the S6 E-tron, can accelerate from 0-60 mph in just 3.7 seconds when using launch control, which is not too far off from Tesla’s latest Model 3 Performance with a 0-60 of just 2.9 seconds. The S6 peaks at 543 horsepower and has a top speed of 149 mph.
The vehicle’s interior is very similar to the new Q6 E-tron, which has three displays that create a “digital stage,” including a 10.9-inch front passenger display with a privacy screen. And if that’s not enough to look at, Audi also offers a heads-up display for the driver.
The Audi A6 E-tron is built on Volkswagen’s newer 800-volt Premium Platform Electric (PPE) platform, which is also shared with the Audi Q6 E-tron and Porsche Macan EV. All versions of the A6 E-tron come with 100kWh battery packs (94.4 usable) and can DC fast charge at 270kW, good for a 10-80 percent charge in 21 minutes, according to Audi.
The A6 E-Tron is launching in Europe later this September, with a final US date to follow.

Image: Audi

Audi’s got some new E-tron EV models, and this time around they aren’t SUVs. Instead, we’re getting electric versions of the A6, the automaker’s popular midsized sedan, and it’s coming in both a Sportback and an Avant station wagon style, along with performance S6 variants.

Audi first revealed the A6 E-tron as a concept at Auto Shanghai back in 2021, and the production version is looking very close to the source material. The front still has slim headlights with adaptive matrix LEDs (only available outside the US due to regulations) and a front grill with a fish scale-like texture surrounded by a dark mask. And over on the back, the car has digital OLED panels for its rear lights that can be used as a safety communications display.

The US is currently set to get just three versions of the new vehicle: the A6 RWD Sportback, A6 AWD (quattro) Sportback, and the S6 Sportback. They also won’t get the slim virtual side view mirrors that help the car get a low drag coefficient of 0.21 since US regulations require actual mirrors. Audi claims the range of the vehicle on a single charge is over 700 kilometers (about 435 miles), although the US EPA estimation is likely to be much less.

The fastest version, the S6 E-tron, can accelerate from 0-60 mph in just 3.7 seconds when using launch control, which is not too far off from Tesla’s latest Model 3 Performance with a 0-60 of just 2.9 seconds. The S6 peaks at 543 horsepower and has a top speed of 149 mph.

The vehicle’s interior is very similar to the new Q6 E-tron, which has three displays that create a “digital stage,” including a 10.9-inch front passenger display with a privacy screen. And if that’s not enough to look at, Audi also offers a heads-up display for the driver.

The Audi A6 E-tron is built on Volkswagen’s newer 800-volt Premium Platform Electric (PPE) platform, which is also shared with the Audi Q6 E-tron and Porsche Macan EV. All versions of the A6 E-tron come with 100kWh battery packs (94.4 usable) and can DC fast charge at 270kW, good for a 10-80 percent charge in 21 minutes, according to Audi.

The A6 E-Tron is launching in Europe later this September, with a final US date to follow.

Read More 

Apple (APPL) Third Quarter Earnings: When is it and what can we expect?

Apple will report its third-quarter earnings for the fiscal year this week and investors will be watching the world’s most… Continue reading Apple (APPL) Third Quarter Earnings: When is it and what can we expect?
The post Apple (APPL) Third Quarter Earnings: When is it and what can we expect? appeared first on ReadWrite.

Apple will report its third-quarter earnings for the fiscal year this week and investors will be watching the world’s most valuable company results closely.

The iPhone maker and technology powerhouse recently wrestled its status as the planet’s biggest company by market cap back from Microsoft and Nvidia – two organizations propelled to new heights this year driven by the ongoing AI revolution.

As of July 31, Apple’s market capitalization stands at $3.1 trillion and the company’s stock price is up 18% year-to-date.

When is Apple (AAPL)’s next earnings report?

The third quarter fiscal year earning report for Apple will be published on Thursday, August 1 after US markets close which at 2:00 p.m. PT or 5:00 p.m. ET.

The conference call will be broadcast via webcast on Apple’s investor site and is open to anyone.

What can we expect from Apple’s earnings report?

iPhone sales in China

One of the big metrics to listen out for is Apple’s iPhone sales in China. It’s a huge market for the company and represented 19% of all revenue in 2023.

There have been concerns of slowing iPhone sales in China which dragged down APPL stock in the first half of the year. Analysts will be hoping the third quarter report could mark a turnaround for sales in the Far East.

Revenue boost

Experts from Visible Alpha are projecting revenue of $84.44 billion for the third quarter, a modest 3% growth compared to the same period last year. This steady increase suggests that Apple continues to maintain strong demand for its products and services, even in the face of ongoing economic challenges and ferocious competition.

iPhone 16

There is much anticipation and speculation around the iPhone 16 and when it will be released. It’s widely expected to be showcased in September and will include both the A18 chip and the next-generation M4 chip for Mac, a combination that would significantly increase the number of built-in AI computing cores.

Any details on the iPhone 16 could have a positive effect on Apple’s stock price.

AI projects

The company could discuss its ongoing AI initiatives during the earnings call, offering investors greater clarity on how the emerging tech could affect Apple.

Earlier this month ReadWrite reported how Apple’s new AI features will likely miss the initial launch of the iPhone and iPad software overhauls so any update on this could be significant.

Featured image: Ideogram

The post Apple (APPL) Third Quarter Earnings: When is it and what can we expect? appeared first on ReadWrite.

Read More 

The climate is changing so fast that we haven’t seen how bad extreme weather could get

Decades-old statistics no longer represent what is possible in the present day.

Enlarge (credit: Peter Zelei Images via Getty Images)

Extreme weather is, by definition, rare on our planet. Ferocious storms, searing heatwaves, and biting cold snaps illustrate what the climate is capable of at its worst. However, since Earth’s climate is rapidly warming, predominantly due to fossil fuel burning, the range of possible weather conditions, including extremes, is changing.

Scientists define “climate” as the distribution of possible weather events observed over a length of time, such as the range of temperatures, rainfall totals, or hours of sunshine. From this, they construct statistical measures, such as the average (or normal) temperature. Weather varies on several timescales—from seconds to decades—so the longer the period over which the climate is analyzed, the more accurately these analyses capture the infinite range of possible configurations of the atmosphere.

Typically, meteorologists and climate scientists use a 30-year period to represent the climate, which is updated every 10 years. The most recent climate period is 1991–2020. The difference between each successive 30-year climate period serves as a very literal record of climate change.

Read 13 remaining paragraphs | Comments

Read More 

Password management is still too much for people — and many of us still write them down

People are struggling to remember passwords, so they write them down and share them with others.

Keeper Security, creator of one of the best password managers, has released new research claiming people are still struggling to create and store secure passwords.

The report found nearly two-thirds (62%) of people remain overwhelmed by managing passwords with many of them feeling overconfident in their knowledge of cybersecurity practices, resulting in risky password practices.

The report also highlighted the importance of password management, as well as the importance of transitioning to passwordless alternatives such as passkeys and other multi-factor authentication (MFA) methods. 

Bad practices

When it comes to how people go about remembering multiple passwords, the most common methods were to rely just on memory (26%), writing them down (24%) and storing them within a browser or phone notes app (19%). The issue with these methods being that they are not secure and can lead to easily lost or stolen passwords.

Users also often share their passwords with friends and family, with streaming site accounts being the most shared (34%), followed by shopping accounts (22%), personal emails (20%), social media (16%) and work/school emails (16%). The latter being particularly concerning as it not only puts the account itself at risk, but also the wider organization.

Keeper recommends that users who struggle with remembering passwords should adopt a password manager, create strong and unique passwords using the best password generators, and using MFA wherever it is available.

“The data reveals a cybersecurity paradox where people feel confident in their cybersecurity knowledge, yet are frequently targeted by cyber attacks and scams,” noted Darren Guccione, CEO and Co-Founder of Keeper Security. “This disparity emphasizes that knowledge alone cannot mitigate cyber risks; using tools like password managers and following best practices are vital for reducing cyber risks.”

More from TechRadar Pro

Here are the best VPN with antivirus on offer right nowDashlane reveals the sites getting on board with passkeys the bestTake a look at the best identity theft protection tools around

Read More 

‘The Daily Show’ breaks down the Democrats’ new nickname for Trump and Vance

“The Daily Show” host Ronnie Chieng broke down the Democrats’ decision to brand Trump and Vance as “weird”.

“The Daily Show” host Ronnie Chieng broke down the Democrats’ decision to brand Trump and Vance as “weird”.

Read More 

Friend is another strange AI wearable that’ll give you creepy Black Mirror vibes

Friend is an AI-based companion that aims to change how you interact with technology on a personal level.

Wearable devices powered by artificial intelligence have been having a moment recently, with the Humane AI Pin and the Rabbit R1 catching the world’s attention – often for the wrong reasons. But despite these high-profile flops, another AI wearable has just emerged on the scene, and it might be one of the strangest offerings yet.

Called Friend, this new device takes the form of a medallion that’s attached to a lanyard and worn around your neck. It can pick up on things you’re doing and saying, and then send you friendly comments in the form of text messages sent to your phone. To use Friend, you push a button in the medallion’s center and say something, then the device will reply using the aforementioned text messages.

Friend costs $99, giving it an advantage over the $699 Humane AI Pin and the $199 Rabbit R1. It’s only compatible with iOS devices for now, with the creators saying, “We will support Android in the future depending on demand.” It’s due to start shipping in Q1 2025.

A creepy companion?

(Image credit: Friend)

Despite the chummy aim of the device, there seems to be a lot of potential for Friend to cross the line from chirpy pal to creepy know-it-all. Take the Friend promotional video, for example. In one scene, a woman is watching a video on her phone while eating a falafel wrap. The Friend device comments on the on-screen content and asks how the person’s meal is. It’s unclear how exactly it knew what the woman was eating, leaving an uncanny aftertaste to the video.

Elsewhere in the trailer, a man is playing a video game with his friends and is being roundly beaten, even commenting that he hates the game. The Friend device then responds – without any prompting from the man – and mocks him by saying that his performance is “embarrassing.” That implies that the device is potentially always listening to your conversations – after all, it wasn’t prompted to speak by its owner – and the Friend website confirms this, saying “When connected via Bluetooth, your Friend is always listening and forming their own internal thoughts. We have given your Friend free will for when they decide to reach out to you.”

Friend’s creators say that data is end-to-end encrypted and does not leave your device, but there are still some pretty substantial privacy implications with a product that’s always listening to what you say.

As well as that, there’s the question of whether a device like this will help or hinder people in terms of healthy relationships. It seems reasonable to ask whether it’s a good idea to encourage people to form a parasocial friendship with an inanimate object rather than with real people. While it might help provide temporary relief for lonely people, it’s hardly a long-term solution.

We’ll find out what kind of impact the Friend will have when it launches next year. It will be interesting to see if it can avoid the fate of the Humane AI Pin and the Rabbit R1 – and tame some of its creepier aspects.

You might also like

Humane AI Pin review roundup: an undercooked flop that’s way ahead of its timeRabbit R1 AI companion: An adorable but half-baked idea that you can ignoreI finally tried the Meta AI in my Ray-Ban smart glasses thanks to an accidental UK launch – and it’s by far the best AI wearable

Read More 

Why now is the time to prioritize Active Directory modernization

Years of configuration drift and lax, outdated security practices have introduced numerous vulnerabilities for many companies.

For most companies, Microsoft Active Directory (AD) is the cornerstone of operational success in the digital era.

One of the world’s most popular corporate access management tools, it is said that roughly 90% of organizations globally rely on AD as a centralized user and rights management platform.

AD is fundamental to our daily working lives, enabling companies to define who can do what in a network, managing resources, users and devices as well as their access to endpoints, tools and systems. However, in many ways, that dependence on a fairly old solution is a strange concept.

Technologies have evolved at an incredible speed in recent years. It’s hard to really quantify this , but the Independent’s analysis does a pretty good job when it asked: could an iPhone fly me to the moon? Of course, you would (obviously) need a spacecraft… but from a computing perspective, it’s interesting to think about.

Today’s smartphones are exponentially more powerful than the guidance computer that NASA used for its famous Apollo 11 mission in 1969. While the latter had a peak performance of 12,250 floating point operations per second (FLOPS), an Apple iPhone 12 (which in smartphone terms is now somewhat dated) delivers 11 trillion FLOPS, making it approximately 900 million times faster.

The point, within this context, is that it’s incredible to think that one of the cornerstones of enterprise-level networks today is a technology that was built almost a quarter of a century ago. Officially launched in 2000, AD was introduced when the concepts of remote working and cloud computing services were almost alien to the world of corporate networks.

Why does AD continue to be so important today?

To understand exactly why AD has defied the odds and remains so integral today, it’s important to consider how it came to be.

Before AD’s launch, Microsoft’s IT directory servers didn’t scale adequately to support the needs of medium and large enterprises, necessitating multiple servers. For instance, a tech-centric company with around 1,000 employees might have needed as many as 200 different servers.

This posed a significant challenge for companies. Managing these numerous disparate servers was a difficult and fiddly endeavor, each requiring unique login credentials. Further, file sharing was problematic and cumbersome due to the lack of seamless communication between servers.

AD was a revelation in that it solved these challenges for companies. Integrating easily with applications and providing single sign-on capabilities across an entire business environment, it transformed the network experience, quickly becoming ubiquitous.

In the two decades since, AD’s prevalence has only continued to grow. Instead of becoming obsolete like many other technologies over the years, AD has grown to be even more vital, serving as the foundation for most cloud identity systems used by enterprises worldwide.

Indeed, AD continues to be the central managing point of authentication and authorization for most on-premises applications and data, extending these functions to cloud applications and resources through synchronization and federation with Entra ID, Okta, or other cloud identity providers.

Unfortunately, AD is now a considerable security liability

Consequently, AD has become the foundation of computing success. However, while it remains indispensable for many organizations, it has also become a considerable security liability.

Serving as a centralized platform that allows administrators to manage permissions and control access to network resources, AD effectively holds the “keys to the kingdom” for companies. As a result, it has become a prime target for cyber attackers – if they are able to compromise AD, they are likely to be granted access to nearly all the systems, applications, and resources within an organization.

Microsoft itself outlines the predicament effectively, explaining that “because Active Directory provides rich identity and access management capabilities for users, servers, workstations, and applications, it’s invariably targeted by attackers. If an attacker gains highly privileged access to an Active Directory domain or domain controller, that access can be leveraged to access, control, or even destroy the entire Active Directory Forest.” 

While AD is commonly associated with on-premises environments, the impact of its compromise extends beyond such boundaries. In hybrid on-premises and cloud scenarios that for many have become the norm, breaching AD means gaining access to the organization’s cloud resources as well. In fact, attackers often find it easier and more effective to compromise AD, using those credentials to access multiple cloud applications rather than targeting each cloud application individually.

Repeatedly, we’ve witnessed AD-related threat scenarios unfold, with numerous high-profile cyber-attacks continuing to make headlines year after year.

Some of the most renowned events include the 2017 NotPetya attack. Here, AD was encrypted as part of an attack sequence, leaving affected organizations scrambling and often failing to restore their environments given that AD provides access to all systems, often including those concerning recovery.

Fast forward to 2020, and the highly sophisticated cyberattack targeting SolarWinds made global news after the company’s IT management and network monitoring software was compromised, with a malicious backdoor being distributed to the firm’s customers in a routine update. Here, AD systems were a prevalent target in the supply chain attack, providing a pathway to access critical systems and data within the affected organizations.

Years of configuration drift and lax, outdated security practices have introduced numerous vulnerabilities for many companies, with many facing significant security challenges from managing a complex web of multi-forest environments.

Where to begin in reducing your attack surface

Naturally, the most effective strategies for modernizing Active Directory (AD) often involve consolidating multiple forests into a single, unified environment. By reducing the number of forests, organizations can streamline management, lessen complexity, and minimize opportunities for attackers to exploit the trust relationships inherent between forests.

By consolidating forests, organizations can centralize the enforcement of security policies using tools such as Group Policy Objects (GPOs), Intune, or System Centre Configuration Manager (SCCM). This centralization enhances security, simplifies management tasks, and lowers operational overhead. Successful AD consolidation projects include:

1. Migrating users, groups, computers, and applications from one AD domain or forest to another. This process requires a systematic and comprehensive approach that considers every aspect of the migration. 

2. Giving careful attention to applications, security configurations, and the unique sensitivities within organizational environments. 

3. Planning for challenges and key components of AD migration is essential to ensure a successful migration that aligns with business, IT, and security requirements. Adhering to best practices is crucial.

4. Conducting a thorough inventory of all resources and creating a detailed migration plan. Equally important is testing and validating the destination environment and providing comprehensive training and support to end users and IT staff.

Without a doubt, modernising AD in this manner is critical for reducing security risks associated with trust abuse and minimising the attack surface of the environment. Simplifying AD architecture not only boosts security but also improves operational efficiency, enhancing the overall cybersecurity posture and lowering IT management costs.

We’ve listed the best identity management software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Read More 

TNW Podcast: IKEA’s Parag Parekh on digital ethics; €100B for AI research in Europe

Welcome to the new episode of the TNW Podcast — the show where we discuss the latest developments in the European technology ecosystem and feature interviews with some of the most interesting people in the industry. In today’s episode, Linnea and Andrii talk about batteries and life on Earth, very expensive AI research proposals, copyright traps, and of course the Olympics. You’ll also hear an on-stage conversation with Parag Parekh, IKEA’s Chief Digital Officer, conducted at the TNW Conference by Linnea. The topic of the conversation read “Digital Ethics in Practice” — and Parag was able to offer a good…This story continues at The Next Web

Welcome to the new episode of the TNW Podcast — the show where we discuss the latest developments in the European technology ecosystem and feature interviews with some of the most interesting people in the industry. In today’s episode, Linnea and Andrii talk about batteries and life on Earth, very expensive AI research proposals, copyright traps, and of course the Olympics. You’ll also hear an on-stage conversation with Parag Parekh, IKEA’s Chief Digital Officer, conducted at the TNW Conference by Linnea. The topic of the conversation read “Digital Ethics in Practice” — and Parag was able to offer a good…

This story continues at The Next Web

Read More 

Scroll to top
Generated by Feedzy