Welche Identität verträgt die SPD?

Würde diskutiert, wie Menschen ein weniger angsterfülltes Leben ermöglicht wird, dann ginge es auch um die Sozial- statt um Identitätspolitik. Aber wer will das in der Partei?

Würde diskutiert, wie Menschen ein weniger angsterfülltes Leben ermöglicht wird, dann ginge es auch um die Sozial- statt um Identitätspolitik. Aber wer will das in der Partei?

A music video you can play: Indie rock inside the Unity engine

You’ve seen interactive music before—but an indie mindset changes the game.

For nearly as long as video games have been around, they've enjoyed a tight relationship with pop music. As early as 1983, Bally-Midway collaborated with Journey to make a game full of licensed songs and the band members' digitized faces (which followed more than a decade of pinball cabinets featuring megaton bands), and that says nothing of media sensations like "Pac-Man Fever."

Meanwhile, interactive musical experiences, somewhat outside the firm "gaming" realm, began emerging in the CD-ROM era. These ranged from simple computer-exclusive content slapped onto a normal album's data track to full-blown multimedia software featuring the likes of David Bowie and Prince.

Thus, the synergy of gaming and pop music is littered with various "firsts," and this week, a modest music video by a Texas indie band might not register as a particularly big deal. It's not a Doom clone starring Iron Maiden or a hilarious light-gun game starring Aerosmith. But this "playable" music video arguably heralds a new era: one where video game engines, and thus a gaming mentality, has become utterly foundational in pop culture.

Read 14 remaining paragraphs | Comments

The new Google Pay repeats all the same mistakes of Google Allo

For P2P users, the new app has fewer features, is less convenient, and has more fees.

The Google Play logo is flushed down a toilet alongside many dollar bills.

Enlarge (credit: Aurich Lawson / Ars Technica)

The new Google Pay app came out of beta this week, and it marks the first step in a major upheaval in the Google Pay service. Existing Google Pay users are about to go through a transition reminiscent of the recent move from Google Music to YouTube Music: Google is killing one perfectly fine service and replacing it with a worse, less functional service. The fun, confusing wrinkle here is that the new and old services are both called "Google Pay."

Allow us to explain.

The old Google Pay service that has been around for years is dying. The app will be shut down in the US on April 5, and if you want to continue using New Google Pay, you'll have to go find and download a totally new app. NFC tap-and-pay functionality won't really change once you set up the new app, but the New Google Pay app won't use your Google account for P2P payments anymore. You'll be required to make a new account. You won't be able to send any money to your new contacts until they download the new app and make a new account, too. On top of all that, the Google Pay website will be stripped of all payment functionality in the US on April 5, and New Google Pay won't support doing anything from the web. You won't be able to transfer money, view payment activity, or see your balance from a browser.

Read 18 remaining paragraphs | Comments

Ars’ plea: Someone make this into a series

The Ars staff picks the novels we think would make compelling TV adaptations.

A pair of full bookshelves face each other.

Enlarge / Vancouver Public Central Library. Libraries are where books sleep when you're not reading them. (credit: GoToVan / Flickr)

The past few years have seen an explosion in high-concept, high-budget adaptations for premium TV and streaming services, like The Expanse and Game of Thrones. Following in the footsteps of antecedents going back to the miniseries based on Roots, they've tackled material that's too intricate and too sprawling to possibly squeeze into a movie-length work. At their best, these adaptations have done justice to the most challenging material.

All of which has left the Ars staff wanting more. If producers and networks are willing to put that much love into works we either weren't familiar with or weren't in love with, what might they manage with some really good material?

What started as a watercooler chitchat morphed into an article and has now blossomed into a series of short pleas/pitches—Hollywood, we're all easy to reach. And we're giving you, the reader, the chance to tell us how wrong we are or to come up with some suggestions of your own.

Read 49 remaining paragraphs | Comments

Zeitgeistsurfer

“Macht und Herrschaft in der Bundesrepublik”: Was sich aus dem Phänomen Urs Jaeggi über Erfolg im Kulturbetrieb erfahren lässt

"Macht und Herrschaft in der Bundesrepublik": Was sich aus dem Phänomen Urs Jaeggi über Erfolg im Kulturbetrieb erfahren lässt

Facebook’s new AI teaches itself to see with less human help

This new approach eliminates the need for picture labeling.

Facebook’s new AI teaches itself to see with less human help

Enlarge (credit: Getty Images)

Most artificial intelligence is still built on a foundation of human toil. Peer inside an AI algorithm and you’ll find something constructed using data that was curated and labeled by an army of human workers.

Now, Facebook has shown how some AI algorithms can learn to do useful work with far less human help. The company built an algorithm that learned to recognize objects in images with little help from labels.

The Facebook algorithm, called Seer (for SElf-supERvised), fed on more than a billion images scraped from Instagram, deciding for itself which objects look alike. Images with whiskers, fur, and pointy ears, for example, were collected into one pile. Then the algorithm was given a small number of labeled images, including some labeled “cats.” It was then able to recognize images as well as an algorithm trained using thousands of labeled examples of each object.

Read 11 remaining paragraphs | Comments

Warning! Pirate Devices Threaten US National Security…Apparently

A study carried out by a group funded by the entertainment industries is warning of a potential national security disaster in the US. The Digital Citizens Alliance says that law enforcement, national security and military personnel are exposing systems to threats through their use of pirate devices. But are they?

From: TF, for the latest news on copyright battles, piracy and more.

BombAside from those who seek to profit from it, no Internet-connected device owner on the planet enjoys the threat of malware.

Malware comes in various shapes and sizes and is never a good thing to be exposed to. It has the potential to do serious damage at the computer level and seriously disrupt people’s lives. That’s why everyone is encouraged to run decent security software on most operating systems to mitigate the threat.

As we have reported many times previously, the fear of malware infestation is being leveraged to try and deter people from using pirate devices of all kinds. The claim is that these hardware devices and the software installed on them represent a looming threat, ready to steal banking details and much more besides.

Unfortunately, the anti-piracy groups making these claims refuse to go into specifics. Despite showing concern for users, they will not reveal which devices or software are causing the dangers, or what those dangers are. If these threats genuinely exist, this is extremely unhelpful, not only to those supposedly under threat but to their overall deterrence goals.

Just recently, following the publishing of a survey carried out in the UK, we had to go to some lengths to gain access to even part of the supporting evidence claiming that piracy devices are a malware threat. Even then, the findings were dubious, to say the least.

New Report By Digital Citizens Alliance

Late last month the Digital Citizens Alliance (DCA), which is partly funded by the entertainment industries, published yet another report warning of the dangers of malware in respect of pirate devices.

At least on the surface, the key findings of their study make for snappy reading.

After surveying more than 3,600 individuals to see how they are streaming movies and TV shows while they are “sheltering at home”, the DCA said it had found that 20% of Americans were consuming content from pirate websites.

More specifically, the DCA said that around 10% of Americans have a “pirate device with apps” in their home.

Quite what constitutes a ‘pirate device’ under the terms of the study isn’t made clear so as a result, we were keen to see additional information so that we could report properly. Unfortunately, the DCA ignored our request to review the actual study, including the questions asked and answers received, which is not really how these things should work.

According to the DCA, however, the mere existence of ‘pirate devices’ in the home is a serious concern.

“Malware Prevalence High”

“A research survey commissioned by DCA found that those who had piracy devices and apps in the home were three times more likely to report an issue with malware than those who didn’t have such a device in the home,” the DCA added, supplying the chart below in support.

DCA Pirate Device 2021

As we can see, just 16% of respondents who didn’t have a piracy device in the home said they had an issue with malware during 2020, while 50% of those who had a piracy device did. In 2021, those without pirate devices and reporting no issues touched 12%, while those with pirate devices reporting slightly more issues with malware than the year before (51%).

The pretty obvious suggestion here is that people with pirate devices “in the home” are much more likely to encounter malware “in the home” but nowhere in the report does it state that the devices actually caused the malware incidents to go up. Of course, it is possible that the devices were to blame but correlation does not imply causation and any number of other factors could have played a part.

Again, this is why access to the finer details of the study is important. The study does not say that people had malware on their ‘pirate devices’, only that they had a “malware issue” somewhere in a home where one was present. However, DCA does strongly suggest that people should directly connect the two pieces of information, since if a ‘pirate device’ has access to a home network, “it may try to infect other devices.”

The DCA study then moves on to some other findings that it clearly hopes will sound the warning sirens more broadly, including within government.

Pirate Devices Threaten National Security

We’ve heard time and again, without supporting evidence, how pirate devices can supposedly ruin people’s lives but the DCA study seems to want to broaden that fear beyond the individual.

Indeed, there appears to be an effort to raise the alarm bells at the highest levels since – apparently – law enforcement, national security and military personnel are putting the country at risk with their piracy habits.

“Millions of Americans who are conducting sensitive or confidential work on home networks during the COVID-19 crisis are substantially more likely to face malware and other security threats if they also have piracy devices and apps in their homes,” the DCA writes.

“The findings [of the study] are particularly troubling when it comes to those who work in jobs that can include sensitive or confidential information, such as corporate finance, national security, government, or the medical and legal fields.”

DCA Occupations

As the image above shows, respondents who work in law enforcement appear to have quite the problem. Indeed, of those who admit to using pirate devices (a bizarre problem in its own right), 70% appear to have had “malware issues” in the last year. National security workers are only marginally better off with 69%, with corporate finance and military workers well above the average with 59% and 55% respectively.

Considering that a loose correlation/causation formula appears to be acceptable when trying to prove a point, we might conclude that law enforcement and national security officers experience the most malware problems because they buy their pirate devices from the most unreputable suppliers, people they encounter adversarially doing their day jobs perhaps?

If that’s the case, maybe they should take a lead from the medical professionals, who are almost three times less susceptible to malware. Perhaps they have good ‘pirate’ suppliers or are just good at dealing with viruses – as many are during the pandemic.

Sarcasm aside, we want to reiterate that despite reaching out with a request to see the finer details of the study, our requests for additional information were ignored. Without that information, compiling a sensible report and offering support to the study is problematic.

That’s disappointing since we are extremely keen to expose this malware threat in detail, should there be one. No one benefits from malware and if the problem is to be dealt with effectively, those who have the information should either share it, or expect it to continue.

No amount of these types of unsupported surveys will make a difference on the ground but expect them to appear in policy documents moving forward and undoubtedly taken as proven fact.

From: TF, for the latest news on copyright battles, piracy and more.