Jump to content
  • Sign Up
×
×
  • Create New...

Pelican Press

Diamond Member
  • Posts

    197,075
  • Joined

  • Last visited

  • Days Won

    1
  • Feedback

    0%

Everything posted by Pelican Press

  1. Netanyahu says new Gaza offensive will be intensive Netanyahu says new Gaza offensive will be intensive Israeli Prime Minister Benjamin Netanyahu says a new offensive in the Gaza Strip will be an intensive military operation aimed at defeating ****** but has stopped short of detailing just how much of the enclave’s territory will be seized. An Israeli defence official said the operation would not be launched before US President Donald Trump concludes his visit next week to the Middle East. The decision, after weeks of faltering efforts to agree a ceasefire with ******, underlines the threat that a war heaping international pressure on Israel amid dwindling public support at home could continue with no end in sight. A report by Israel’s public broadcaster Kan, citing officials with knowledge of the details, said the new plan was gradual and would take months, with forces focusing first on one area of the battered enclave. Netanyahu said in a video message the operation would be “intensive” and would see more Palestinians in the Gaza Strip moved “for their own safety”. He said Israeli troops would not follow previous tactics based on short raids by forces based outside the enclave. “The intention is the opposite,” he said, echoing comments from other Israeli officials who have said Israel would hold on to the ground it has seized. Israeli troops have already taken over an area amounting to about a third of the Gaza Strip, displacing the population and building watchtowers and surveillance posts on cleared ground the military has described as security zones but the new plan would go further. One Israeli official said the newly approved offensive would seize the entire territory of the Gaza Strip, move its civilian population southward and keep humanitarian aid from falling into ******’ hands. The defence official said aid distribution, which has been handled by international aid groups and United Nations organisations, would be transferred to private companies and handed out in the southern area of Rafah once the offensive begins. The Israeli military, which throughout the war has shown little appetite for occupying the Gaza Strip, declined to comment on the remarks by government officials and politicians. Israel resumed its offensive in March after the collapse of a US-backed ceasefire that had halted fighting for two months. It has since imposed an aid blockade, drawing warnings from the UN that the 2.3 million population faces imminent famine. The defence official said Israel would hold on to security zones seized along the Gaza Strip perimeter because they were vital for protecting Israeli communities around the enclave. But he said there was a “window of opportunity” for a ceasefire and hostage release deal during Trump’s visit. “If there is no hostage deal, Operation ‘Gideon Chariots’ will begin with great intensity and will not stop until all its goals are achieved,” he said. ****** official Mahmoud Mardawi rejected what he called “pressure and blackmail”. “No deal except a comprehensive one, which includes a complete ceasefire, full withdrawal from Gaza, reconstruction of the Gaza Strip and the release of all prisoners from both sides,” he said. Israel has yet to present a clear vision for a post-war Gaza Strip after a campaign that has displaced most of the enclave’s population and left it depending on aid supplies that have been dwindling rapidly since the blockade. “We are finally going to conquer Gaza. We are no longer afraid of the word ‘occupation’,” Finance Minister Bezalel Smotrich told a pro-settler conference in an online discussion. However, opinion polls suggest the Israeli public increasingly wants a deal to bring back the remaining 59 hostages still held in the Gaza Strip and there were angry scenes outside parliament with dozens of protesters scuffling with police. “All the families are tired,” said Ruby Chen, whose son Itay was killed in the ****** attack on October 7, 2023. “All the families have been scared about this new manoeuvring because there is no guarantee that it will get us to where the families want.” The war was triggered by the ****** October 7, 2023 attack on Israel that killed 1200 people, mostly civilians, according to Israeli tallies, and involved 251 people being taken hostage. Israel’s ground and air campaign in Gaza has since killed more than 52,000 Palestinians, most of them civilians according to local health authorities, and left much of Gaza in ruins. Source link #Netanyahu #Gaza #offensive #intensive Pelican News View the full article at [Hidden Content] For verified travel tips and real support, visit: [Hidden Content]
  2. After Playing Both Games, I’ve Decided to Boycott The Last of Us Season 2 — And It Has Nothing to Do With Bella Ramsey After Playing Both Games, I’ve Decided to Boycott The Last of Us Season 2 — And It Has Nothing to Do With Bella Ramsey The Last of Us game series is widely considered to be one of the best action-adventure video game series of all time. The first game focused on survivors Joel and Ellie as they worked together to survive in a post-apocalyptic United States. The second game focuses on Ellie’s revenge as she sets out on a journey to bring justice for those she loves. The story of the two games has been adapted into a TV show, but unfortunately, the show didn’t exactly do a great job of retelling this beautiful story. There are various reasons why The Last of Us TV series was not well-received by the fans. It starts with the poor casting choices, as many have pointed out that the actors look nothing like the characters they are playing. But it is not just the horrible casting choice; it is also the lazy writing and the lack of attention to detail. The Last of Us show doesn’t focus on small details We are not talking about the casting or the story here because it can vary how one feels about those two things. What The Last of Us show messed up is not focusing on small details. For example, there is a particular scene in the show where Ellie goes through rain and mud, and in the very next scene, her clothes appear to be completely clean. Some might say that this is nitpicking, but it makes no sense. They have spent a lot of time picking the right outfits for the characters, so why leave this out? And no, she didn’t change her clothes because she can be seen wearing the same outfit. On top of this, she has flawless hair in the middle of an apocalypse. A few fans have pointed out that the show has partnered up with Wrangler, so it makes sense why all the outfits are spotless in almost every scene. This is one thing that The Walking Dead TV series got right, as most characters actually looked like they were living through a zombie apocalypse. The Last of Us TV series has received mixed reviews Bella Ramsey being picked for the role of Ellie has been criticised (Image via HBO) The primary reason why The Last of Us TV series is getting hate is because the video game series has set a very high standard. It’s nearly impossible for the TV show to recreate the same depth, or capture the magic of the video games series. The TV show lacked the horror elements, darkness and grit of the game, all the factors that made the video games so special. As a standalone TV series, it might have worked out, but its struggling to reach the bar set by the video game franchise. The entire point of the show was to popularise the game among a wider audience, those who have not played the game. Yes, the casting choice is also poor. The actors did a great job at portraying the characters from the game, but the fact that some of them don’t look like how the characters are supposed to look in the game, is being criticized by the viewers. At the end of the day, it’s an adaptation of the series, and recreating the same elements from a video game can be a difficult task. Source link #Playing #Games #Ive #Decided #Boycott #Season #Bella #Ramsey Pelican News View the full article at [Hidden Content]
  3. What is data recovery? | Definition from TechTarget What is data recovery? | Definition from TechTarget Data recovery is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible. In enterprise IT, data recovery typically refers to restoring data to a desktop, laptop, server or external storage system from a backup. Data recovery minimizes operational downtime and enables users to resume normal work activities. Data recovery is performed using specialized software to access backed-up data, migrate the duplicate data to its intended target system — such as a storage array — and then validate the recovery to make sure that all data is restored and accessible from the intended enterprise applications. Causes of data loss Data recovery is needed to combat data loss events. Data loss is the inability to access valuable business data when it is required to conduct normal business operations. Traditional data loss was mainly traced to human error or malfunctioning storage hardware. Today, however, data loss can be caused by various issues extending beyond conventional factors, including the following: Human error. Humans make mistakes, and data can be lost due to accidental deletion, relocation or movement to physical storage locations that enterprise applications are not configured to access. In other cases, data might be locked or encrypted using passwords that humans forget, rendering the file, folder or volume inaccessible. Hardware malfunctions. Data is stored on storage devices, mainly traditional magnetic hard disk drives (HDDs), various solid-state drive (SSD) forms, and even older media such as optical discs and tape. Although these storage devices are regarded as proven and reliable, they are not immune to failures due to physical wear and electronic malfunction. When a storage device fails, its data is wholly or partly inaccessible and must be restored to a replacement hardware device. Data corruption. Data corruption is a range of issues that can adversely affect data integrity on a storage device. For example, bad sectors on an HDD or wear in solid-state memory cells can damage an important file, folder or volume. Logical failures, such as bad sectors, can often be repaired, and the data can be recovered from a backup. More serious or recurring failures require replacing the storage device before data can be restored. Theft or destruction. If a storage device is physically stolen or destroyed, its data becomes inaccessible. Theft can be due to deliberate malfeasance, such as intercepting a data storage device or subsystem shipped from one location to another. Natural disasters — including fires, floods and catastrophic building failures caused by earthquakes — can also destroy storage devices. Malware. Malicious software often targets business data integrity and availability. For example, ransomware can lock out data until a ransom is paid to the attacker. Other malware might seek to steal or gather enough information to access data without the organization’s knowledge — or destroy data outright to disrupt business operations. Detecting and mitigating malware is a central part of cybersecurity efforts. The proper response to data recovery after a malware incident can vary depending on the attack’s type and effect. Misconfiguration. Modern businesses exchange data across complex storage infrastructures, servers and networks, and it usually traverses varied services such as firewalls and load balancers. Every element of these complex infrastructures must be configured correctly to operate as expected and support data accessibility by users and applications. Any unexpected change to the configuration of any element can make data inaccessible even though no actual data loss has occurred. Detailed analysis and troubleshooting are needed to identify and correct configuration issues, and modern businesses often implement detailed change management frameworks to prevent and identify unwanted configuration changes within the infrastructure. AI data management issues. Modern businesses increasingly depend on AI platforms to manage and secure sensitive data. AI technologies are attractive because they can ingest and analyze vast amounts of system information and behavioral details, and then make dynamic real-time decisions about what data applications can access data and how. However, AI is imperfect; it can make mistakes that might leave crucial data inaccessible or vulnerable to theft. These systems require constant oversight and detailed logs for human troubleshooting and data access remediation. It’s important to highlight the difference between the terms data loss and data breach. The two are sometimes used interchangeably in security circles, but they represent different problems for the business. Data loss occurs when data becomes damaged or inaccessible. Data breach occurs when data is accessed or misused by an unauthorized party, such as stolen by a malicious outside actor. A data breach rarely leaves business data inaccessible, and some unprepared businesses might not detect a data breach for days, weeks or even months after it occurs, though operations continue normally. Types of data recovery Data recovery can be discussed in various ways depending on the circumstances. Most data recovery can be broadly categorized as logical or physical. Logical data recovery Logical data recovery is appropriate when the storage device is functional, but its data has become inaccessible due to software-related problems. This can include corruption, deletion or soft damage to the storage device, such as a failed solid-state storage cell. Software tools can effectively correct logical data storage issues, and data recovery techniques can typically restore affected data without replacing physical storage devices. Logical data recovery can emphasize several areas, including the following: File recovery. This seeks to rescue or restore specific files, such as documents or images. Email recovery. This specialized form of file recovery focuses on recovering or restoring messages within a business email system. Folder recovery. Folder recovery seeks to rescue or restore one or more folders on a storage device. A folder might relate to an application or various collections of essential data. Partition or volume recovery. Physical storage devices rely on logical segmentation to support storage operations through operating systems (OSes). Such segmentation uses partitions — such as creating a logical C drive — to create volumes that act as storage cabinets for vast assortments of folders, applications and data types. Unfortunately, partitions or volumes are defined by placing logical information on the physical storage device. Suppose this partition information is lost or corrupted. In that case, all the data on the storage device might be rendered inaccessible and generally cannot be recovered by simply restoring the partition information. Physical data recovery Physical data recovery is required when a fault or failure is detected in the storage device. For example, a traditional magnetic HDD experiences a failure in the spindle motor or read/write heads, or physical damage to the magnetic media platters. Recovering data from physical failure can be complicated, often requiring specialized tools and skills, which are increasingly rare. In most cases, the failed device is replaced, and data is restored to the new storage device from a recent backup. How data recovery works Data restoration is perhaps the easiest form of data recovery, which fundamentally involves copying data from its most recent backup to the active production storage device. Data can be restored from the following: Traditional media such as tape. Tape and optical discs are still used in environments requiring vast archival storage. Active storage media. Data can be restored from backups on other storage devices or the public cloud. USB media. USB devices such as thumb drives or large disks with USB interfaces can sometimes be used as limited backups and are popular with individual users for PCs. Redundant disks. Data can be duplicated to redundant disks in real time, enabling the redundant disk to continue working and supporting production while the failed disk is replaced. Once the failed disk is replaced and prepared, data can be restored from the redundant disk. Redundant array of independent disks (RAID). Data can be spread across multiple disks in a set, enabling a failed disk to be replaced and restored based on the data contained across the remaining disks in the array. A more granular and complex approach to data recovery involves analyzing the failed storage device to locate and extract undamaged data for relocation to another storage device. However, this approach is rarely used because it requires specialized tools and skills. It is mainly reserved for recovering critical data from storage devices without proper backup. The data recovery process varies depending on the data loss circumstances, the data recovery software used to create the backup and the backup target media. For example, many desktop and laptop backup software platforms enable users to restore lost files. Restoring a corrupted database from a tape backup is a more complicated process that requires IT intervention. Data recovery services can also retrieve files that are not backed up and were accidentally deleted from a computer’s file system, but remain in fragments on the hard disk. Data recovery is possible because a file and the information about that file are stored in different places. For example, the Windows OS uses the File Allocation Table (****) to track which files are on the hard drive and where they are stored. The **** is like a book’s table of contents, while the hard drive files are like the book’s pages. The **** can be recovered if the hard drive and its files are still functioning, but are not damaged or encrypted. If files are damaged, missing or encrypted, there are other ways of recovering them. If the hard drive is physically damaged, its files can still be reconstructed. Many applications, such as Microsoft Office, put uniform headers at the beginning of files to designate that they belong to that application. Some utilities can be used to reconstruct the file headers manually, so at least some of the file can be recovered. Most data recovery processes combine technologies, so organizations aren’t solely recovering data from tape backups. Recovering core applications and data from tape takes time and can hinder immediate data access after a disaster. Transporting tapes also involves risks. In addition, not all production data at a remote location might be needed to resume operations. Therefore, it’s wise to identify what can be left behind and what data must be recovered immediately. Data recovery techniques Data recovery techniques are intended to regain access to lost, damaged or inaccessible data from storage devices or systems. Just as types of data recovery can be classified as logical or physical, data recovery techniques can be classified similarly. Logical data recovery techniques Logical data recovery uses software tools to analyze and correct the organization of data on a storage device — such as after a minor file system corruption — or to restore lost data to the same or a different storage device using backup and recovery tools. Logical data recovery techniques include the following: Data backup and recovery software. By far the most common and broadly used recovery technique, this software tool creates timely data backups as needed and then restores them to target storage devices. If the storage device fails or is unreliable, the restoration can occur once the problematic device is replaced. File system software. File system tools are designed to examine directory structures and other logical elements of data distribution on a storage device. Such analysis can reveal — and sometimes restore — common failures like broken directory links or lost clusters. This can often repair damaged or inaccessible data in limited or targeted areas. File carving tools. File or data carving circumvents the traditional file system used on a storage device, enabling the tool to search for file signatures and re-create or rebuild damaged files even when the storage device’s logical structures are interrupted. However, these are considered advanced tools and require time and expertise to use effectively. System repair tools. These are a small class of specialized tools — such as the traditional Windows chkdsk utility — that can scan and rebuild a damaged file system or ****. This can restore access to stored data, but the results are not guaranteed. Ultimately, general-purpose backup and recovery tools offer the best protection against data loss. Modern techniques, such as continuous data protection or point-in-time recovery, offer an almost zero recovery point objective (RPO), and the recovery time objective (RTO) can be small depending on the amount of data restored. Physical data recovery techniques Physical data recovery focuses on repairing a damaged storage device or implementing physical storage techniques to mitigate storage device failures. Common physical data recovery techniques include the following: RAID recovery. RAID protects against individual disk failures by spreading data across multiple disks in the array, with each portion of the data including a set of error correction codes. If a physical disk fails within the RAID array, it can be replaced, and the RAID array can recover or re-create the data contained on the failed disk by processing the error correction codes across the remaining disks. However, RAID recovery can take considerable time because all the data on the remaining disks must be read and processed. Disk mirroring. Disk mirroring, imaging or cloning is a simple form of RAID where data is duplicated across two identical storage devices. If one device fails, the other can support users and applications until the failed storage device is replaced. Once replaced, the mirrored disk can restore its complete data set to the replacement disk, and the two remain synchronized. While disk mirroring is often a dynamic technique where both disks can be accessed, disk cloning is typically a more static technique where the duplicated disk is simply a real-time backup and cannot be accessed directly. Clean room recovery. The rarest and most expensive data recovery techniques can involve opening a sealed storage device in a suitable clean room environment and performing physical work on the mechanism. Work can include replacing faulty components or analyzing magnetic disk contents with powerful microscopes to determine the data contained on the disk. This specialized technique requires extraordinary expertise and is reserved as a last-ditch fix to mission-critical data recovery problems where no backups are available. Data recovery tools There are countless data recovery tools offering capabilities ranging from broad general-purpose to specific utilities. A busy enterprise generally will possess several tools to serve a set of potential data backup and recovery needs. Recovery tools can offer a standard set of recovery mode features, including the following: Deleted file recovery. The tool can recover files that have been accidentally deleted, but not yet overwritten by other files. An example is the Windows Recycle Bin. Partition recovery. The tool can find and recover data on a storage device’s lost, damaged or deleted logical partitions. Formatted drive recovery. The tool can recover data from a storage device that has been formatted, but where new data has not yet been written. Corrupted drive recovery. Some tools can locate and recover data from drives that have become logically corrupted or physically damaged, such as a head ****** onto a magnetic platter. Beyond various recovery modes, recovery tools can provide advanced features, including the following: File system support. The tool should support various popular file system formats, including Windows FAT12, FAT16, FAT32, Extended ****, the NT file system or NTFS, the Mac Hierarchical File System or HFS Plus, the Apple File System, and Linux Ext2, Ext2 and Ext4. Device support. The tool should support various storage devices, including internal and external devices such as HDDs, SSDs, USB drives, memory cards and optical devices. Disk image creation. Some tools can create a logical image of the problematic drive first, enabling more comprehensive study, analysis and detailed recovery attempts without working with the troubled storage device. Recovery previews. The tool lets technicians see and check recovered data to be examined and validated before it is restored. Searching. Tools can provide filtered search features, enabling technicians to locate specific files or file types. Integrating data recovery into a DRP Data recovery is a significant part of any disaster recovery plan (DRP). An enterprise must have a comprehensive understanding of its essential or sensitive data assets, including the following: The data required for regular operations. Where that data is located. How that data is stored. Which applications or users need that data. How that data is protected and should be recovered if disaster strikes. An organization’s DRP should then encompass an assortment of data recovery details, including the following: Identify who in the organization will be responsible for recovering data. Provide a strategy for how data will be recovered. Document acceptable RPOs and RTOs. Include the detailed steps to recover and validate data before restoring applications. For example, if a building is inoperable, affected business units must be advised to prepare to relocate to an alternate location. If hardware systems have been damaged or destroyed, processes must be activated to recover damaged hardware. Processes to recover damaged software should also be part of the DRP. Some resources worth reviewing include the National Institute of Standards and Technology SP 800-34 standard and the International Organization for Standardization ISO/IEC 27031 standard. A business impact analysis or strategic risk analysis can help an organization understand its data requirements and identify the minimum amount of time needed to recover data to its previous state. One challenge to data loss and recovery is handling the unstructured data stored on various devices. But some steps can mitigate the damage. Start by classifying data based on sensitivity and determine which classifications must be secured. Then, determine how much data must be compromised to affect the organization. Undertake a risk assessment to determine what controls are required to protect sensitive data. Finally, put systems in place to store and protect that content. Healthcare organizations store vast amounts of sensitive data, making them a prime target for ransomware attacks. Learn how these attacks affect operations, data security and integrity. Source link #data #recovery #Definition #TechTarget Pelican News View the full article at [Hidden Content]
  4. Robotics Stocks: 3 OTC Picks That Can Be Good Long-Term Holds Robotics Stocks: 3 OTC Picks That Can Be Good Long-Term Holds Within the last year, a major milestone was crossed in robotics agility. From Unitree Robotics to Boston Dynamics, humanoid robots have now outpaced many sci-fi movies featuring fictional CGI robotics. Combined with AI agents that give life to agile robotic platforms, fiction is materializing in real time. Citi Global Insights analysts forecast the humanoid robotics industry to scale up to $7 trillion by 2050. Elon Musk is even more optimistic, having noted mid-2024 that Optimus could eventually churn $10 trillion revenue. As with EVs, it is likely that China will have the bulk share in this growth. After all, China is already ahead of the game, having outpaced both Japan and Germany in industrial robot density, according to the International Federation of Robotics (IFR) report. But outside of Tesla (NASDAQ:) which firms should investors consider for the AI and robotics *****? 1. Hyundai Motor Co. In 2021, Hyundai Motor Co (OTC:) acquired Boston Dynamics from Japanese SoftBank (TYO:) for $880 million. To this day, Boston Dynamics remains the envy of the world when it comes to cutting edge humanoid robots. In late March, Hyundai announced a $21 billion investment into the US between 2025 and 2028, boosting domestic supply chains and car manufacturing. Last week, the Trump admin amended the President’s previous executive order (EO) on 25% vehicle tariffs, enabling up to 15% credit if the cars are US-assembled. In short, Hyundai is positioning to be a major player in robotics and EVs domestically, from supplying vehicles to Waymo to scaling up Boston Dynamics’ envelope-pushing work. Year-to-date, Hyundai stock is down 1.2%, currently priced at $51 per share. According to WSJ, analyst ratings for Hyundai shares are overwhelmingly in the “buy” zone with 20 analysts, while zero analysts are recommending to sell. 2. Schaeffler AG After merging with Vitesco in October 2024, ******* Schaeffler AG (ETR:) has become the leading provider of components in the advanced field of motion technology. Investors may have already seen this application with humanoid robot Digit, built by privately held Agility Robotics. In early March, Agility Robotics and Schaeffler Group announced a strategic partnership, enabling investors to have exposure to Agility Robotics in turn. So far, Agility Robotics seems to be at the forefront of deploying Mobile Manipulation Robots (MMRs) at scale. GXO Logistics, with over 1,000 warehouse sites, is the first to deploy Digit as a part of the emerging Robots-as-a-Service (RaaS) business model. According to MarketsandMarkets, the RaaS sector is heading for a CAGR expansion of 17.4% between 2023 and 2028. Operating alongside human workers, Digits will aid in repetitive tasks with more expansion plans. In addition to Digit, GXO Logistics is also looking into Apptronik’s Apollo humanoid robot, but that company is also privately held. In April’s pre-close call for Q1 2025 earnings, scheduled for May 7th, Schaeffler AG reported €5.9 million in sales in Q4 ‘24, slightly lower than €6.1 million in Q1 ‘24. The company expects strong sales growth in e-mobility (electric drives, controls, mechatronics) and vehicle lifetime solutions (repair & maintenance). 3. ABB Ltd Even robots are made by robots, more specifically by industrial robots. This is where Swiss-Swedish ABB (ST:) Group comes in, holding 13.5% market share in the industrial robot market. The company is always expanding its list of partnerships, even sponsoring MassRobotics as the US-centric robotics innovation hub, annually supported by AMD (NASDAQ:), Amazon (NASDAQ:) and other large companies. Most recently in late April, the company announced its plan to split its ABB Robotics division as of Q2 2026, listing it as a separate company. During 2024, ABB Robotics contributed 7% to ABB Group’s revenue, delivering $2.3 billion. If the plan goes ahead with shareholder approval, they will receive “ABB Robotics” shares as dividend in-kind, proportional to their existing stock stake. In the meantime, ABB’s robots are continuing to be deployed across a wide range of businesses. The fast food sector seems a particularly good match, in order to avoid arbitrary minimum-wage increases. BurgerBots is the most recent such restaurant, opened in Los Gatos, California. If BurgerBots takes off, it is likely that global fast food chains will catch up with their much deeper pockets, and ABB Group will be in the middle of it. Year-to-date, ABB stock is up 2.8% to current price of $55 per share. Per WSJ, the average ABB price target is $58.79, while the top is $78.78 per share. If the ABB Robotics split goes through, shareholders could see a substantial split premium not accounted for in the forecasting. *** Neither the author, Tim Fries, nor this website, The Tokenist, provide financial advice. Please consult our website policy prior to making financial decisions. This article was originally published on The Tokenist. Check out The Tokenist’s free newsletter, Five Minute Finance, for weekly analysis of the biggest trends in finance and technology. Source link #Robotics #Stocks #OTC #Picks #Good #LongTerm #Holds Pelican News View the full article at [Hidden Content] For verified travel tips and real support, visit: [Hidden Content]
  5. At least 1 dead in possible Florida bear attack At least 1 dead in possible Florida bear attack NAPLES, FL – One person has been found dead in a possible bear attack, authorities said. Officers were on the scene and investigating it as an “active crime scene,” Arielle Callender, the public information officer for the South Region office of the Florida Fish & Wildlife Conservation Commission, said on May 5. The Collier County Sheriff’s Office received a call shortly after 7 a.m. in reference to a possible bear encounter near a highway in Jerome, a rural area east of Marco Island. Deputies arrived about an hour later and found one deceased person, the sheriff’s office said. The officers are assisting the Florida Fish and Wildlife Conservation Commission with the investigation. Nature photographer James Paul Mayo says he recently spotted a mother ****** bear and her three cubs walking down his Verona Walk street. Mayo, who lives on Alessandria Court in the Naples community, said he photographed the wild animals about 2 p.m. Jan. 31, 2025. Possible mauling would be Florida’s second in 2025 According to data from the Florida Fish and Wildlife Conservation Commission, if confirmed, the May 5 attack in Collier County would be the second bear mauling in Florida this year. While state data references ****** bear attacks, authorities have not confirmed the type of bear involved in the May 5 attack. According to the data, since November 2020, there have been at least 15 bear attacks in Florida involving the presence of dogs. The last attack a dog was not present, according to the records, was in March 2020. It’s not yet confirmed if the most recent investigation incudes dogs. The data states the last ****** bear attack in Collier County happened Jan. 9, 2018. In that case, a ****** bear attacked a man in his North Naples backyard. The man was taking his dog outside when one of three bears struck his face, leaving an eight-inch scar and other marks. Bear attacks are still rare nationwide, worldwide Despite the recent bear attacks in southwest Florida, bear attacks are relatively rare. The chance of being attacked by a bear is 1 in 2.1 million, according to 2024 statistics compiled by the World Animal Foundation. There are on average about 40 bear attacks worldwide, the animal foundation reported and between two to three deaths per year. The U.S., there is fewer than one death per year, according to the North American Bear Center. Most attacks by bears, ****** bears in particular, are usually defensive reactions if a person is too close, an easy situation to avoid, the Bear Center said. Florida wildlife officials considers return of bear hunt to cull population Florida wildlife officials had three virtual public feedback meetings in April for a proposed return of a state bear hunt. The primary objectives of regulated hunting are to balance species population numbers with suitable habitat and to maintain a healthy population, the agency reported. A draft of the proposal to be presented to county commissioners is expected to be ready for public review by Wednesday, May 7. The proposal indicates that 55 bears will be permitted for harvest from Lee, Collier and Hendry counties. The last ****** bear hunt happened in Florida a decade ago, but the planned weeklong hunt was halted at the end of the second day after nearly 300 bears were killed. State officials estimate there are more than 4,000 ****** bears in Florida. Contributed: Mark Bickel, Naples Daily News This article originally appeared on Naples Daily News: 1 dead in possible Florida bear attack Source link #dead #Florida #bear #attack Pelican News View the full article at [Hidden Content]
  6. Palantir (PLTR) Q1 earnings report 2025 Palantir (PLTR) Q1 earnings report 2025 Alex Karp, chief executive officer of Palantir Technologies Inc., speaks during the AIPCon conference in Palo Alto, California, US, on March 13, 2025. David Paul Morris | Bloomberg | Getty Images Palantir boosted its revenue guidance Monday as the artificial intelligence software company saw commercial and government revenue *****. Shares were flat after the bell. Here’s how the company did compared with LSEG consensus estimates: Earnings per share: 13 cents adjusted vs. 13 cents expected Revenue: $884 million vs. $863 million expected “We are delivering the operating system for the modern enterprise in the era of AI,” CEO Alex Karp wrote in an earnings release Monday, adding that the company is in the “middle of a tectonic shift in the adoption” of its software. The defense technology company said that its commercial revenues grew 71% from a year ago to $255 million, while its government segment sales jumped 45% to $373 million. The company is forecasting that U.S. commercial revenues will top $1.178 billion this year. Karp attributed Palantir’s government sector growth to greater U.S. defense sector adoption of its tools. He said that demand for large language models and the software supporting it has “turned into a stampede.” Palantir’s revenues grew 39% from $634.3 million in the year-ago *******. Net income rose to about $214 million, or 8 cents per share, from roughly $105.5 million, or 4 cents per share, in the year-ago quarter. U.S revenues jumped 55% to $628 million, Palantir said. The company, which provides AI software and technology solutions for governments and corporations, also hiked its full-year revenue outlook to between $3.89 billion and $3.90 billion. During its last earnings report, Palantir projected that full-year revenues would range between $3.74 billion and $3.76 billion. The company expects revenues to range between $934 million and $938 million in the current quarter. “We believe our results are indicative of a revolution sweeping across our business and industry,” Karp wrote in a letter to shareholders. Palantir shares have defied 2025’s broad downtrend in technology stocks. The stock is up 64% this year, benefitting from its key defense contracts and President Donald Trump’s effort to cut federal spending with the Elon Musk-led Department of Government Efficiency. Palantir is also the best performer in the S&P 500. The company also boosted its adjusted free cash flow outlook for the year to between $1.6 billion and $1.8 billion. Adjusted income for operations is expected to range between $1.711 billion and $1.723 billion. Palantir said it closed 139 deals totaling at least $1 million during the *******, 51 of which topped at least $5 million. Palantir said 31 deals exceeded $10 million. Source link #Palantir #PLTR #earnings #report Pelican News View the full article at [Hidden Content] For verified travel tips and real support, visit: [Hidden Content]
  7. The internet says goodbye to Skype, and thanks for all the calls – The Washington Post The internet says goodbye to Skype, and thanks for all the calls – The Washington Post The internet says goodbye to Skype, and thanks for all the calls The Washington PostSkype shutting down: Your memories as Microsoft shuts down the video calling service BBCIt’s last call for Skype as the once-popular video calling app shuts down NPRFarewell to Skype, the Technology That Changed My Life Time MagazineMicrosoft shuts down Skype after 22 years, shifting users to Teams Fox Business Source link #internet #goodbye #Skype #calls #Washington #Post Pelican News View the full article at [Hidden Content]
  8. Expedition 33 Succeeded Because It Has the “Group of friends making something together” Vibe Expedition 33 Succeeded Because It Has the “Group of friends making something together” Vibe If you have progressed even a bit in Clair Obscur: Expedition 33, you must have heard how important it is for the game’s main characters to help in ‘making a difference’ together. Well, it seems like the values get embedded from their real-life creators here at Sandfall Interactive, the French indie studio behind the recent hit. Guillaume Broche, who happens to be an ex-employee at Ubisoft, is now the proud CEO of the studio behind Expedition 33. What’s more awesome is how he believes the game wouldn’t have been a success if it were to be made by a ******* studio; instead, he aimed more for a vibe we all could relate to. Studio culture behind Clair Obscur: Expedition 33 becomes the reason for its success Clair Obscur: Expedition 33 has a simple reason behind its success | Sandfall Interactive Developed by a rather small team when compared to other giants in the industry, Clair Obscur: Expedition 33 has really shaken the entire gaming market, and that’s for the better. Whether it be Stellar Blade, Split Fiction, or now Sandfall Interactive’s latest hit, smaller studios are taking charge, and gamers are all in for it. Talking about what went on behind the scenes while making the game, Guillaume Broche stated the following in a conversation with French content creator Pouce Café, as translated by mp1st: We got some really nice offices, with a big garden—we play pétanque every lunchtime, which even shows up in the game. To create a game that feels passionate, we really needed that ‘group of friends making something together’ vibe. The studio’s CEO discusses how it was important to create a friendly vibe to make the developers feel passionate. Rather than diving into the commercial pool, Broche aimed to present the gaming art form in its best version, a vision we see come to life in the game. Why Clair Obscur: Expedition 33 is just the start to something big Clair Obscur: Expedition 33 has opened up many doors of opportunity for Sandfall Interactive As stated earlier, smaller studios are now taking charge, which brings the gaming industry a much-deserved relief from every producer rushing after the same old formulas that have managed to prove successful in the past. Clair Obscur: Expedition 33 is a game no one expected to become so big, yet here we are, with the title selling over 500,000 official copies as of now. Bearing in mind how the game is also present on the Xbox Game Pass, which undoubtedly gave it a boost as well, half a million copies sold for an indie game is a big deal and opens many doors for Sandfall Interactive to take next. The hit game could very well become a massive franchise in the future, with fans even speculating that a DLC will come out soon. The game continues to amaze fans with the most random facts about its team, whether it be how the writer was found on Reddit or how the music composer was someone Broche found on SoundCloud. Ultimately, all that mattered was the passion to create something and ‘make a difference,’ as Gustave would say. Source link #Expedition #Succeeded #Group #friends #making #Vibe Pelican News View the full article at [Hidden Content] For verified travel tips and real support, visit: [Hidden Content]
  9. ‘Confusing’ speed limits in Australind led to a court date for former traffic controller ‘Confusing’ speed limits in Australind led to a court date for former traffic controller A man who was charged with allegedly speeding 20km/h above the limit told Bunbury Magistrates Court the speed limits in the greater Bunbury area were confusing. Source link #Confusing #speed #limits #Australind #led #court #date #traffic #controller Pelican News View the full article at [Hidden Content]
  10. Kwaba Bidi hub gets new home in Bunbury outside of SWAMS offices Kwaba Bidi hub gets new home in Bunbury outside of SWAMS offices A Bunbury early interventions and family support service hub officially opened its new home on Spencer Street last week. Source link #Kwaba #Bidi #hub #home #Bunbury #SWAMS #offices Pelican News View the full article at [Hidden Content]
  11. You Can Own 4 Different Versions of Cyberpunk 2077 If You Buy a Switch 2 You Can Own 4 Different Versions of Cyberpunk 2077 If You Buy a Switch 2 Yes, you can get one, no… two, no… three, NO… FOUR different versions of Cyberpunk 2077. That’s right, folks! If you ever thought owning multiple versions of a game was a luxury, now’s your chance to live the dream and live that you must. With the arrival of the Switch 2 on June 5th, the game is officially making its way to the quadfecta of platforms: PC, PS5, Xbox, and now, the Switch 2. So, buckle up, because this isn’t just a new release, it’s a new way to enjoy Night City wherever you go. From neon dreams to quadfecta: The evolution of Cyberpunk 2077 Let’s rewind for a second and remember what Cyberpunk 2077 has been through. When it was first announced, it promised to be the future of open-world gaming with an expansive, neon-drenched, futuristic city where every choice mattered. Well, until it launched. We all know the story: the bugs, the glitches, the memes, the crashes, and everything in between. It wasn’t the Night City players had imagined. Fast forward to today, and the Cyberpunk 2077 we’re getting now, on any platform (we’ll have to wait and see the Switch 2 version), is almost unrecognizable from its troubled launch. Over the past few years, CD Projekt Red has poured blood, sweat, and tears. The result? A polished game that is better than it was initially advertised. Now, with the game available across all major platforms, one Reddit user is leading the charge on what might just be the ultimate flex. After snagging the Switch 2 version, they posted about owning four different versions of the game. Comment byu/NokstellianDemon from discussion inNintendoSwitch2 Comment byu/NokstellianDemon from discussion inNintendoSwitch2 Sure, it might sound a little excessive (owning the same game four times), but this is 2025. People flex about almost anything these days, and owning multiple versions of a single game? Well, that might just be the new flex with Switch 2 fully supporting third-party games. A new era for Cyberpunk, and maybe for gamers, too Own a game on four platforms? Now that’s what we call commitment to the cause. | Image Credit: Nintendo So here we are: Cyberpunk 2077 has come full circle. From its chaotic launch to its current, much-improved version, it’s clear that the game has grown into something remarkable. And now, with the arrival of Nintendo’s next-gen console in a short few weeks, handheld gaming is about to take on a whole new meaning. Think about it: If you buy a Switch 2, you’re not just adding another console to your collection; you’re stepping into a whole new era of gaming. Sure, there are other handhelds, and the original Switch already made waves. However, the upcoming console is taking things to the next level with its hybrid design, high-level performance, and most of all, support for a wider variety of games natively. It will be as if the game’s world becomes part of your daily life, accessible wherever you are. As the world of Night City continues to evolve, it’s safe to say that for many players, this isn’t just a game anymore; it’s an obsession, a lifestyle, and now, in some cases, a flex. So, whether you’re rocking it on PC, PS5, Xbox, or the Switch 2, one thing’s for sure: the game has officially earned its place in the gaming history books. Source link #Versions #Cyberpunk #Buy #Switch Pelican News View the full article at [Hidden Content]
  12. 3 Tech Leaders Announce Buybacks Totaling $85 Billion 3 Tech Leaders Announce Buybacks Totaling $85 Billion Markets have become especially accustomed to tech buybacks in recent years. According to S&P Dow Jones Indices, companies in the S&P 500 tech sector spent a whopping $253 billion on buybacks in 2024. This represents by far the highest level of buyback spending by any sector, accounting for nearly 27% of the total. Following suit with the tech sector’s buyback dominance, three huge tech names have announced large increases to their share buyback programs. Together, these buyback programs equal $85 billion. For reference, that is about the same size as HCA Healthcare (NYSE:), the largest for-profit hospital operator in the United States. Below are the details. Unless otherwise indicated, all data and metrics use information as of the May 2 close. 1. KLA: Chip Company Announces Big Buybacks and Dividend Boost First up is KLA. This company may not have the same name recognition as the other two on this list, but semiconductor investors know it well. KLA is one of the world’s most important players in the semiconductor manufacturing equipment industry. KLA MarketRank Stock Analysis Overall MarketRank: 93rd Percentile Analyst Rating: Moderate Buy Upside/Downside: 15.5% Upside Short Interest Level: Healthy Dividend Strength: Strong Environmental Score: -1.69 News Sentiment: 0.98 Insider Trading: Selling Shares Projected Earnings Growth: 1.58% Industry experts recognize KLA as one of the leaders in chip inspection and metrology equipment. Inspection equipment ensures that fabricators make semiconductors without defects, and metrology equipment helps properly measure semiconductors’ microscopic features. KLA recently announced a $5 billion increase to its share buyback authorization. Now, the company has just under $5.5 billion in share buyback capacity. That is a substantial amount, equal to nearly 6% of the company’s total market capitalization. This gives the firm the ability to decrease its outstanding shares notably, providing a tailwind to earnings per share (EPS). KLA also announced a significant increase to its quarterly dividend of almost 12%. The company has not officially announced the dates for this dividend. However, the next record date is usually in mid-May, and the next payable date is usually on June 1. The stock has an indicated dividend yield of around 1.1%. 2. Dell’s Buyback Capacity Is Huge, But How Fast Will The Company Use It? Next is Dell Technologies (NYSE:). The company, which is active in consumer electronics and enterprise servers, announced a $10 billion increase to its share repurchase authorization. The company did not state its total capacity now, but this buyback authorization is very large for Dell. Dell Technologies MarketRank Stock Analysis Overall MarketRank: 100th Percentile Analyst Rating: Moderate Buy Upside/Downside: 41.9% Upside Short Interest Level: Bearish Dividend Strength: Moderate Environmental Score: -1.15 News Sentiment: 1.01 Insider Trading: Selling Shares Projected Earnings Growth: 17.75% It is equal to an enormous 15% of the company’s $66 billion market cap. Over the past three fiscal years, the company has spent just under $9 billion on buybacks. It will be interesting to see if the firm sticks to this buyback spending pace or accelerates it due to the market downturn. This could provide a sign of how confident the company feels in the stock’s appreciation. Dell also announced a substantial 18% increase to its quarterly dividend, now just under $0.53 per share. While the latest payout has already been made, investors can still capture future dividends, with the stock currently yielding around 2.2%. 3. GOOGL: Creates Solid Buyback Capacity, Dividend Increase Is the Cherry on Top Last up is the head honcho of this group, Alphabet (NASDAQ:). This big tech name, and one of the top five largest stocks in the world, announced a $70 billion share buyback program. The company also didn’t say how long it will take them to use this capacity, but it’s safe to assume that it will make fairly quick work of it. Alphabet MarketRank Stock Analysis Overall MarketRank: 80th Percentile Analyst Rating: Moderate Buy Upside/Downside: 21.2% Upside Short Interest Level: Healthy Dividend Strength: Weak Environmental Score: N/A News Sentiment: 0.83 Insider Trading: Selling Shares Projected Earnings Growth: 14.94% Over the last 12 months, Alphabet spent nearly $62 billion on buybacks. This buyback capacity is certainly worth noting, but it isn’t crazy for a company worth around $2 trillion. It represents about 3.5% of the company’s market cap, allowing it to give its EPS a moderate tailwind. Alphabet also announced a dividend increase, like the other two firms on this list. However, it is far less substantial at just 5%. The company’s next $0.21 quarterly dividend will be payable on June 16 to shareholders of record on June 9. This gives the company an indicated dividend yield of just over 0.5%. Although small, it aligns with the other names in the Magnificent Seven, none of which have a yield over 1%. All in all, it’s great to see tech companies not only using big-time buybacks to return capital, but also boosting dividends. Both provide important avenues through which companies can support shareholders and the returns they hope to receive. In times of uncertainty like now, doing so can be as valuable as ever. Original Post Source link #Tech #Leaders #Announce #Buybacks #Totaling #Billion Pelican News View the full article at [Hidden Content] For verified travel tips and real support, visit: [Hidden Content]
  13. ‘He’s being disingenuous, he’s lying’: 9/11 responder slams Trump ‘He’s being disingenuous, he’s lying’: 9/11 responder slams Trump The World Trade Center Health program says 16 staffers were fired Friday night as part of cuts by the Trump administration, threatening services for thousands of 9/11 survivors and first responders. Former Ground Zero demolition worker and President of the FealGood Foundation John Feal joins Chris Jansing to share his reaction to the move. Source link #Hes #disingenuous #hes #lying #responder #slams #Trump Pelican News View the full article at [Hidden Content]
  14. Live Updates: The Met Prepares to Welcome Stars for Its Most Closely Watched Gala in Years Live Updates: The Met Prepares to Welcome Stars for Its Most Closely Watched Gala in Years The famous faces have descended on New York City, and many arrived a little early — bouncing between a dizzying array of Met Gala pre-parties held over the weekend. On Sunday night, about 200 people packed into the United Talent Agency’s party, held at the bar Nubeluz, on the 50th floor of the Ritz-Carlton hotel, as servers passed around passion fruit margaritas and cones filled with caviar. “I can’t wait to see the outfits tomorrow,” said Tyler Mitchell, who photographed the catalog for the Metropolitan Museum of Art’s Costume Institute show, “Superfine: Tailoring ****** Style.” “The bad ones and the good ones.” The artist Rashid Johnson, who is on the gala’s host committee, said he believed the exhibit’s theme, examining 300 years of ****** fashion and the vibrant history of ****** dandyism, was making the festivities more diverse. “I think there’s a real obvious difference this year, and that is that there’s a lot of ****** people involved,” he said. “I’m just excited to see how that flavors the story.” Dan Constable, who leads fashion and luxury deals for the United Talent Agency, chatted with Monica Barbaro at Nubeluz.Credit…Amir Hamja/United Talent Agency Daygee Kwia, left, and Eddy Sammy took care of music at the U.T.A. party.Credit…Amir Hamja/United Talent Agency The actress Monica Barbaro, who is attending the event for the first time, said she was looking forward to spending time at the museum. “I’m told I’m allowed to actually go and walk around the exhibit tomorrow night when no one else is there like ‘Night at the Museum,’” she said. “I’m going to leave this party and go home and fall fast asleep so I’m ready for it all.” It has been a busy few days. On Thursday, the magazine Cultured took over the Guggenheim to knight one hundred “cultural luminaries” including the actress Sarah Jessica Parker, the actor Walton Goggins, and the Saturday Night Live comedian Chloe Fineman. On Friday, Vogue, along with the rapper and singer Doechii, the stylist Law ******, and Mr. Mitchell held a bash in Ginny’s Supper Club, a basement restaurant and jazz club in Harlem, attended by the rapper ASAP Rocky and the actor Colman Domingo, both of whom are co-chairs of the Met Gala. The magazine Cultured took over the Guggenheim for a party on Thursday in which they knighted several celebrities as cultural luminaries.Credit…Krista Schlueter/Cultured Mag Chloe Fineman, the “Saturday Night Live” star, was among those honored at Cultured’s party.Credit…Krista Schlueter/Cultured Mag The actor Walton Goggins, who was also honored, held up a copy of the recent issue of Cultured in which he appeared on the cover.Credit…Krista Schlueter/Cultured Mag On Saturday, the singer Miley Cyrus performed at a party hosted by Moncler at Casa Cipriani, a waterside members club. The actress Anne Hathaway and the singer Sabrina Carpenter were spotted at a rooftop bash thrown by Versace and Moda Operandi at The Twenty Two, a hotel and club downtown. And Donatella Versace, dressed in a bright pink pantsuit, celebrated her 70th birthday at The Twenty Two with cake. By Sunday evening, party goers at the United Talent Agency affair said they were excited. The actress Cynthia Erivo had been preparing her look for months. She had brainstorming sessions with her design team, late night phone calls, trips to London, and multiple fittings. She sent sketches back and forth, reviewed fabric, and even personally approved a swatch of embroidery, according to her representative, Dan Constable, who leads fashion and luxury deals for U.T.A. The agency has more than 20 clients attending the gala this year, according to Mr. Constable, and the party was a chance for them to unwind. “It is a celebration of all the hard work that they put into this,” he said. Source link #Live #Updates #Met #Prepares #Stars #Closely #Watched #Gala #Years Pelican News View the full article at [Hidden Content] For verified travel tips and real support, visit: [Hidden Content]
  15. After GTA 6 Delay, 2025 Becomes “The Year Of Nintendo,” Analyst Says After GTA 6 Delay, 2025 Becomes “The Year Of Nintendo,” Analyst Says Rockstar’s Grand Theft Auto VI was poised to be 2025’s biggest and best-selling game, but it was delayed to 2026. With GTA 6 no longer coming this year, 2025 may become “the year of Nintendo” thanks to the launch of the Switch 2 in June and the release of high-profile games like Mario Kart World. That’s the opinion of analyst Serkan Toto of Kantan Games. He told GamesRadar that publishers who were planning to release their new games in the second half of 2025 but hadn’t confirmed a date yet are now “probably breathing a sigh of relief now.” Sony also benefits, Toto said, referring to its marquee title Ghost of Yotei now being able to release “in peace.” Even Microsoft may benefit by launching its new Xbox handheld device into a market where people aren’t otherwise occupied playing GTA 6, Toto said. “2025 will clearly be the year of Nintendo now,” Toto explained. Joost van Dreunen, for his part, said GTA 6’s delay means that big publishers like EA, Ubisoft, and Sony now have a better chance of “commanding attention during a window that would have otherwise been swallowed whole. It’s an opportunity.” However, van Dreunen acknowledged that had GTA 6 launched on time in Fall 2025, it could have created a “cultural moment” that may have drawn back lapsed gamers who might end up buying other games, too. This could have benefited many games, he said. A new Call of Duty game is expected to come out this year, too, and now it won’t have to compete with GTA 6. The next Battlefield game, too, is possibly going to release this year. As for GTA 6, it’s officially set for release on May 26, 2026 for PS5 and Xbox Series X|S. Naturally, it’s expected to be a gigantic success when it releases. Source link #GTA #Delay #Year #Nintendo #Analyst Pelican News View the full article at [Hidden Content]
  16. Social Security cards to go digital Social Security cards to go digital Richcano | E+ | Getty Images For many Americans, a Social Security number is the first form of identification they receive, mailed as a paper card a few weeks after birth. Now, the Social Security Administration is looking to give that form of ID an update by enabling secure digital access to Social Security numbers that will provide an alternative to the traditional Social Security card. Experts are cautiously optimistic about the idea, but have some security concerns. The new digital feature will allow individuals who have either forgotten their Social Security number or who have lost their Social Security cards to access their personal number online through the agency’s My Social Security website. They will also be able to access their Social Security numbers through digital devices and display them as identification for “reasons other than handling Social Security matters,” according to the agency. More from Personal Finance: Social Security reduces benefit clawback rate Trump administration restarts student loan collections What experts say about claiming Social Security benefits early With the new effort, the Social Security Administration aims to reduce the inconveniences caused by lost or stolen cards, which currently requires individuals to apply for replacements either online or in person. “We believe that this modern approach will meet the needs of our constituents in a more efficient manner,” Social Security Administration acting commissioner Lee Dudek said in a statement. The agency declined to provide more details the rollout, which is scheduled to become available early this summer. Experts worry about access, ID theft protections Experts are cautiously optimistic about the change. “Generally, anything that is a new avenue for accessing your account or in an interaction with Social Security is a good thing, so long as it’s easy and secure,” said Richard Fiesta, executive director at the Alliance for Retired Americans. However, the risk is that some individuals, particularly those who are older or disabled, may be left without access if they are not as tech savvy and have difficulty using the internet or mobile phones, he said. My Social Security is “not the most customer friendly website,” Fiesta said, despite efforts to improve it over the years. The move toward digital Social Security identification is “certainly a step in the right direction,” said Eva Velasquez, CEO of the Identity Theft Resource Center. If implemented properly, the digital Social Security numbers may provide more security than paper cards, she said. “But it really doesn’t solve the problem of identity misuse,” Velasquez said. Every adult’s Social Security number has likely already been breached, according to Velasquez. The size of the 2024 National Public Data breach prompted some experts to speculate every American could have been affected. The 2017 Equifax breach was estimated to have affected roughly half the U.S. population. The new process will raise questions as to how to protect both the Social Security numbers and the devices on which they are accessed, she said. Ultimately, the U.S. in the future will likely move toward a federated identity system, where a user’s identity can be verified with biometric data like fingerprints and facial recognition that is linked across multiple systems, said Cliff Steinhauer, director of information security and engagement at The National Cybersecurity Alliance. “There’s going to be a future where there’s a clean internet, where everyone that uses it has authenticated with this federated, proven identity so that nobody can pretend to be anybody else,” Steinhauer said. The Social Security Administration’s move is a first step toward digital identification, though it does not appear to include biometric authentication, he said. Because there will be risk for fraud, it will be important for the Social Security Administration to make sure its systems are properly protected, Steinhauer said. There should also be phishing-resistant authentication installed to ensure that only authorized individuals access the accounts, he said. It will be important for individuals to verify that any messages that allegedly come from the Social Security Administration do, in fact, take them to a verified Social Security website. Any messages the agency sends out, such as a reminder to log in and check an account, could be copied for phishing purposes, Steinhauer said. Source link #Social #Security #cards #digital Pelican News View the full article at [Hidden Content]
  17. TeleMessage suspends services after hackers say they breached app – NBC News TeleMessage suspends services after hackers say they breached app – NBC News TeleMessage suspends services after hackers say they breached app NBC NewsMessaging app used by Trump official suspends operations after reported hack CNBCThe Signal Clone the Trump Admin Uses Was Hacked 404 MediaApp used by Trump adviser says it is temporarily suspending services following reported hack ReutersTeleMessage, Messaging App Tied to Trump Cabinet, Investigating Cyber Incident Bloomberg.com Source link #TeleMessage #suspends #services #hackers #breached #app #NBC #News Pelican News View the full article at [Hidden Content]
  18. Bunbury council feeling the heat after being slammed for ‘woke’ firepit ban Bunbury council feeling the heat after being slammed for ‘woke’ firepit ban The Bunbury council is feeling the heat after a policy which restricts residents from having open-air fire pits or campfires came under attack at last week’s council meeting Source link #Bunbury #council #feeling #heat #slammed #woke #firepit #ban Pelican News View the full article at [Hidden Content]
  19. National Institutes of Health lays off hundreds more staff, including at ******* research institute National Institutes of Health lays off hundreds more staff, including at ******* research institute The National Institutes of Health has laid off hundreds more staff, multiple current and laid-off employees of the health agency told CBS News, including at its ******* research institute. Around 200 employees began receiving layoff notices Friday evening, said three people who spoke on the condition of anonymity. The move surprised NIH officials, since the department previously claimed no further cuts were planned at the agency. “We thought the worst was behind us, and we were transitioning into this new phase, and the rug was just pulled out from underneath us,” one laid-off employee said. A spokesperson for the NIH did not comment on why NIH Director Dr. Jay Bhattacharya sought the additional layoffs, referring an inquiry to the Department of Health and Human Services, which oversees the NIH. An HHS spokesperson said that, after a review, the department had notified additional employees that they were “also impacted” by the layoffs plan announced in March. Fewer than 250 employees at the department received notices, the spokesperson said. An HHS official said that “the same number of employees will be brought back in critical areas” elsewhere at the department. Two people said they had been told that the second round of cuts was done as part of an effort to compensate for other scientists needing to be reinstated, in order to comply with layoff targets. “The savings from these reductions will help redirect resources toward critical programs and strengthen our ability to serve the American people effectively. The goal is clear: reduce waste and maximize the impact of every taxpayer dollar,” the HHS spokesperson, Andrew Nixon, said in a statement. Among the cuts on Friday were around 50 employees at the NIH’s National ******* Institute, or NCI. They had worked in the institute’s Office of Communications and Public Liaison overseeing programs like the ******* Information Service, which provides answers to doctors and patients about *******, and updates to databases summarizing ******* information for healthcare providers. The layoff notices came a day after staff in that NCI communications office had met with top-ranking NIH leaders, to discuss drawing up plans to consolidate their staff into a new centralized communications arm across the agency. While several communications offices at the NIH’s institutes had been gutted during an initial round of layoffs on April 1, NCI’s team was spared. Only a handful of NCI staff had been laid off last month, two people said, including in the institute’s human resources teams. “Leadership was in the process of transferring some process and some of our media relations people over to NIH, because they were still getting press inquiries, but they couldn’t handle the volume of inquiries that were coming through,” the laid-off employee said. Two people said they had been told that the second round of cuts was done as part of an effort to compensate for other scientists needing to be reinstated at Bhattacharya’s agency, in order to comply with layoff targets. More from CBS News Alexander Tin Alexander Tin is a digital reporter for CBS News based in the Washington, D.C. bureau. He covers federal public health agencies. Source link #National #Institutes #Health #lays #hundreds #staff #including #******* #research #institute Pelican News View the full article at [Hidden Content]
  20. Teenage Mutant Ninja Turtles: Tactical Takedown Preview – How Strange Scaffold Mashes Up Beat ‘Em Ups And Tactics To Great Effect Teenage Mutant Ninja Turtles: Tactical Takedown Preview – How Strange Scaffold Mashes Up Beat ‘Em Ups And Tactics To Great Effect The Teenage Mutant Ninja Turtles franchise has a long, rich history with video games. Over the years, we’ve seen the four brothers take to the streets and sewers of New York in platformers, fighting games, pinball experiences, and roguelites, but the genre most closely associated with the brand is beat-’em-up action. Strange Scaffold, the studio behind games like Clickolding and El Paso, Elsewhere, had a unique idea for tackling a Turtles title while retaining the heart and soul of the IP’s history in games. The result is Teenage Mutant Ninja Turtles: Tactical Takedown, a game that seamlessly blends the beat-’em-up spirit with the distinct gameplay conventions and mechanics of a turn-based strategy game. I had the opportunity to play several hours of Tactical Takedown and speak with the team behind this unique, yet somehow familiar take on the TMNT brand. The idea of working on a licensed property first entered Strange Scaffold studio head Xalavier Nelson’s brain in 2020 when he was nearly tapped to become the creative director of a Robocop game. Though that opportunity fell through, Nelson continued thinking about what it would be like to create a game based on a major intellectual property. In the time since then, Strange Scaffold has put out games like El Paso, Elsewhere, Clickolding, An Airport for Aliens Currently Run by Dogs, Life Eater, and Creepy ******** Dinosaur Mansion 3, which just hit Steam last month. Despite staying busy with multiple games seemingly in development at any given time, Nelson continued thinking about working on an established franchise. “The idea of eventually taking a Strange Scaffold-like approach to the world of a license with the right partner has been on my mind for a while, but it was mainly looking for the right opportunity, the right partners, and the right universe for that to really be its best,” Nelson says. That right fit arrived when Nelson connected with Paramount senior vice president, general manager, and head of global games and emerging media Doug Rosen. Nelson felt as though Rosen understood the right way to collaborate with game developers, and it made Nelson want to work with Paramount. After prolonged discussions of, “We should do something together,” Nelson scrolled through Paramount’s IP list in search of the right fit. He ultimately landed on Teenage Mutant Ninja Turtles, with which he felt the team could leverage some mechanics it developed during the conceptualization phase of its upcoming turn-based character action game, Teenage ****** Slayer Society. The team retained the turn-based strategy mechanics, but Nelson wanted to keep the heart of the games that TMNT is most well-known for intact. “It’s the Strange Scaffold way; that’s our brand,” executive producer and writer Manda Farough says. “We take genres and we create really bizarre twists on them. This is not the kind of turn-based strategy game that I even thought could be made. But because we had this incredible camaraderie and teamwork between everybody on our team and our game design being as tight and focused as it has been, the mash-up of genres somehow has coalesced into this turn-based tactical, side-scrolling beat ’em up.” I was skeptical going into my hands-on session with Tactical Takedown. After all, how do you blend such distinct genres as turn-based strategy and side-scrolling beat ’em ups? After spending hours with the game, I’m still surprised by how well it all works. It all starts with giving your character several action points per turn, rather than just one or two. This allows you to defeat one enemy before beating up the next and strategically position yourself for either the enemies’ turns or your next turn. On top of that, the levels change as you take turns, with older parts falling away and newer sections popping up, forcing you to maintain forward momentum as you dash through the stages. After trying to replicate strategies I used in more traditional strategy franchises like XCOM and Mario + Rabbids, I failed pretty spectacularly in the first mission, causing me to worry that this game will be more challenging to play than I anticipated. I fell off the stage as it mutated, and ultimately got overwhelmed by a Foot Clan ambush, resulting in Mikey falling in battle. However, after getting to know each character and how they play, I rarely failed a mission. I enjoyed learning each Turtle’s play style through their specific stages in the first two chapters. Michelangelo’s party-dude persona shines through in his skateboard-based attacks that let him jump over enemies, while Donatello’s bo staff gives him added range, like in the NES game, and his tech brilliance lets him deploy various gadgets. Meanwhile, Raphael’s brawler mentality makes him feel ready to take on the world with attacks that grant extra moves and can even pull enemies to new spots. Leonardo’s leadership abilities and strategic thinking let him become more powerful after defeating an enemy. If you don’t like a certain move in a Turtle’s moveset, you can use currency you earn in-game to purchase new moves and customize their loadouts. One of the most striking things about TMNT: Tactical Takedown is that you only play as one Turtle at a time, a stark difference from the co-op beat-’em-up classics to which this game so lovingly pays homage. Each Tactical Takedown stage automatically gives you a Turtle to control, allowing the encounters to feel ultra-tailored to that specific Turtle’s moveset. While there are obviously gameplay mechanics that went into that decision, the narrative choices fueled that core idea. Before the game’s events, the Turtles’ world is upside-down, with both Splinter and Shredder dying. The Turtles are somewhat disconnected as they search to find themselves. “As a writer, what [having one Turtle at a time] forced me to do is rely less on explicit relationship building and really lean into… There are going to be moments in between the moments we’re showing you, and there are going to be conversations that are happening outside of the game, and that helped guide the ways in which we drill down to the essence of those conversations,” Farough says. “Writing an ensemble cast is already so complicated, so having a number of perspectives in the way that we handled character development, both implicitly and explicitly, was really freeing.” The unique narrative themes were one of the driving forces behind Strange Scaffold’s coming into this project. “I think one of the most under-discussed pieces of the creative world that we now live in is, especially in a time of mega-mash-ups of even different universes coming together, when you have Fortnite putting in every IP, within the next three months or so, it can end up being really under-discussed how every single character has a real weight to them, a gravity if you want to handle them correctly,” Nelson says. “When you’re telling a TMNT story, if you’re going to bring in Splinter, you want him to have a spotlight that really lines up with who he is and the role that he has on these brothers in this wider world. If you’re gonna have Bebop and Rocksteady, if you’re gonna have Shredder, these are characters which can’t be put in as throwaway cameos. They have to be central focuses, if only because of the impact they’ve had on all people who have loved those worlds. But every single character you put in like that ends up changing what you can do in other points in the game.” After playing through the first two chapters of Teenage Mutant Ninja Turtles: Tactical Takedown, May 22 cannot come soon enough. The strategy genre can be pretty hit-or-miss for me, and let’s face it, not every TMNT game turns out great, but I emerged from my hours playing Tactical Takedown excited to not only further engage with the cleverly designed gameplay systems but also see where this unique story goes. Sadly, despite how surprisingly good the game plays with a controller, Strange Scaffold could not confirm if the game will ever come to consoles. Still, Nelson did tease that the studio is constantly investigating ways to bring its games to a broader audience. For now, however, Teenage Mutant Ninja Turtles: Tactical Takedown is set to arrive on Steam on May 22. Source link #Teenage #Mutant #Ninja #Turtles #Tactical #Takedown #Preview #Strange #Scaffold #Mashes #Beat #Ups #Tactics #Great #Effect Pelican News View the full article at [Hidden Content]
  21. *********** country singer-songwriter Kasey Chambers to perform at BREC *********** country singer-songwriter Kasey Chambers to perform at BREC *********** country singer-songwriter Kasey Chambers is headed for the Bunbury Regional Entertainment Centre Stage this month. Source link #*********** #country #singersongwriter #Kasey #Chambers #perform #BREC Pelican News View the full article at [Hidden Content]
  22. 19 states sue Trump administration over mass HHS layoffs 19 states sue Trump administration over mass HHS layoffs Over a dozen states sued the Trump administration Monday for laying off thousands of Health and Human Services staffers, urging a court to reverse job cuts that they argue brought work at large swaths of the Robert F. Kennedy Jr.-led health agency to a “sudden halt.” The lawsuit — filed in Rhode Island federal court by New York, California, 17 other states and Washington, D.C. — claims the Trump administration has sought to “dismantle” HHS through layoffs that disproportionately hit “disfavored work and programs,” like the Centers for Disease Control and Prevention and the Food and Drug Administration. CBS News has reached out to HHS for comment. HHS is aiming to cut its headcount by 20,000 — or nearly 25% — through a combination of layoffs, buyouts and early retirement offers, the department announced in March, framing it as a “dramatic restructuring” aimed at making HHS more efficient and cutting redundant or unnecessary services. The cuts are part of a wider initiative by the Trump administration, led by billionaire Elon Musk, to slash the size of the federal government. Since then, thousands of HHS staff have gotten layoff notices. The cuts have hit large agencies like the FDA and CDC, along with departments that handle mental health, federal poverty guidelines and other services, CBS News has previously reported. Deep cuts are also slated for the National Institutes of Health. Monday’s lawsuit, which names Kennedy and other HHS leaders as defendants, argues these job cuts have “systematically deprived HHS of the resources necessary to do its job.” The layoffs have allegedly cut off the states from data and made it harder to access grants for everything from worker safety to the Head Start preschool program, the lawsuit argues. The suit also says the agency has shuttered key disease testing labs, forcing them to “find new partners to handle their most difficult testing needs that had previously been handled by the CDC.” The states are asking a federal judge to halt Kennedy’s directive to reorganize and cut the HHS, arguing the moves exceed HHS’s legal authority and violate the Constitution’s separation of powers doctrine by slashing programs authorized by Congress. The suit also takes aim at Kennedy’s views, citing his vaccine skepticism and “history of advocating for the evisceration of the Department’s statutorily mandated work promoting public health.” It also pointed to Kennedy’s acknowledgement that 20% of job cuts at the HHS may need to be reversed due to “mistakes.” Monday’s suit is the latest legal action against the Trump administration’s cost-cutting drive. Almost two dozen states sued HHS last month for cutting public health grants, and labor unions have sued the government over cuts to other agencies. Joe Walsh Joe Walsh is a senior editor for digital politics at CBS News. Joe previously covered breaking news for Forbes and local news in Boston. Source link #states #sue #Trump #administration #mass #HHS #layoffs Pelican News View the full article at [Hidden Content]
  23. Messaging app used by Trump official suspends operations after reported hack Messaging app used by Trump official suspends operations after reported hack National Security Advisor Michael Waltz looks at his phone as he prepares for a TV interview at the White House on May 01, 2025 in Washington, DC. Andrew Harnik | Getty Images The messaging app that President Donald Trump’s former national security advisor was seen using during a Cabinet meeting last week is temporarily suspending services following reports it was hacked, the app’s parent company said Monday. “TeleMessage is investigating a potential security incident,” a spokesperson for Smarsh, which runs the app, told CNBC in a statement. “Upon detection, we acted quickly to contain it and engaged an external cybersecurity firm to support our investigation. “Out of an abundance of caution, all TeleMessage services have been temporarily suspended. All other Smarsh products and services remain fully operational,” the spokesperson said. This is breaking news. Please refresh for updates. Source link #Messaging #app #Trump #official #suspends #operations #reported #hack Pelican News View the full article at [Hidden Content]
  24. Apple's Make-or-Break Moment Apple's Make-or-Break Moment Apple’s Make-or-Break Moment Source link #Apple039s #MakeorBreak #Moment Pelican News View the full article at [Hidden Content]
  25. Opening of the 5-8 May plenary session | News Opening of the 5-8 May plenary session | News President Roberta Metsola said Pope Francis would be remembered for his “inspirational leadership, his moral authority, and his kindness, taking every opportunity to speak up for a more humane, more peaceful and unified world”. President Metsola remembered the late Pope’s message to MEPs to “work together every day for a better, more compassionate, and more courageous European Parliament”. MEPs then held a minute’s silence in memory of Pope Francis, after which political group speakers held a round of short statements. World War II Anniversary President Metsola announced that, to mark the 80th anniversary of the end of World War II in Europe, there would be a wreath laying ceremony at 10:30 on Wednesday in front of the Louise Weiss building, followed by a ceremony in the hemicycle including testimonies from three WWII veterans, at 11:30. Security Action for Europe (SAFE) Regulation President Metsola announced that in accordance with Rule 138 of Parliament’s Rules of Procedure, the Legal Affairs Committee had verified the legal basis of the Commission’s SAFE regulation proposal to reinforce Europe’s defence industry and found unanimously, on 23 April 2025, that Article 122 of the Treaty on the Functioning of the European Union was not the appropriate legal basis. President Metsola agreed to write to the Presidents of the Council and of the European Commission accordingly. Changes to the agenda Tuesday The President announced three requests to fast track files under Rule 170(6): CO2 emission performance standards for new passenger cars and new light commercial vehicles for 2025 to 2027; the protection status of the wolf; and amendments to the Capital Requirements Regulation as regards securities financing transactions under the net stable funding ratio. The votes on these requests will take place on Tuesday. Wednesday A Commission statement on the fine against TikTok and the need to strengthen the protection of citizens’ rights on social media platforms is added to the agenda before the debates on Rule 150 on Wednesday afternoon. Council and Commission statements on the ******** visit of President Erdogan to the occupied areas of Cyprus are added as the last item on Wednesday afternoon, with one round of group speakers and no resolution. As a result of these additions, Wednesday’s sitting will be extended to 23:00. Incoming MEPs Wolker Schnurrbusch (NI, DE) has replaced Maximilian Krah (NI, DE) as of 4 April 2025. Parliamentary immunity Hungarian authorities have asked for the Parliamentary immunity of Péter Magyar (EPP, HU) to be waived, and referred the matter to the Legal Affairs Committee. Interinstitutional negotiations The LIBE, PECH, and jointly, the SEDE and ITRE committees have decided to enter into interinstitutional negotiations, pursuant to Rule 72, paragraph 1 of the Rules of procedure, on the basis of the reports available on the plenary website. Source link #Opening #plenary #session #News Pelican News View the full article at [Hidden Content]

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.