Here’s BMW’s electric replacement for the X3—production starts in 2025

BMW has developed an all new EV platform with better efficiency and more tech.

A BMW Vision Neue Klasse X concept in the courtyard of a modern house

Enlarge

CASCAIS, Portugal—BMW is one of the more advanced automakers when it comes to electrification. Its current portfolio of electric vehicles includes the iX and i7, both of which have the edge on the competition in their respective classes—not bad for cars that use an underlying architecture that was designed to be powertrain-agnostic. Engineers, back at the corporate base in Munich, have been hard at work on its next platform, though, which will be just for battery EVs and will debut with next year's Neue Klasse.

Last year, we saw a preview of what the Neue Klasse sedan should look like when it goes on sale in 2025. Now, we've seen the Vision Neue Klasse X, which will morph next year into BMW's next electric crossover, probably with the iX3 nameplate. It will be an important car for the German automaker; crossovers and SUVs fail to get any less popular with the car-buying public, and demand for the production version of the Neue Klasse X will surely outstrip that for the four-door car.

BMW would rather call its X cars "Sports Activity Vehicles" rather than SUVs or crossovers and argues that it invented the breed with the original X5. That car was a handsome machine, and the Neue Klasse X keeps those classic two-box proportions and adorns them with bold angular creases that emphasize the wheel arches and create some negative space lower down the car's side that has the effect of reducing its visual bulk.

Read 11 remaining paragraphs | Comments

EU Commission Encourages Use of New Anti-Piracy Toolbox

The European Commission has published its ‘Recommendation on measures to combat counterfeiting and enhance the enforcement of intellectual property rights’. Produced in response to rising levels of IP-infringing activities, the EC says its ‘toolbox’ of measures also apply to those fighting online piracy. Let’s take a look inside.

From: TF, for the latest news on copyright battles, piracy and more.

ec-toolboxMost anti-piracy tools and mechanisms, whether dedicated online platforms or legislation crafted to achieve a particular goal, have issues that affect their performance.

No matter how tough, legislation could be of date when finally implemented, or reveal itself to be unwieldy in practice, too costly, or simply ineffective. Technical solutions may face compliance and regulatory issues, while pirate adversaries remain light on their feet by ignoring them all.

One key to success for rightsholders is to exploit pirates where they’re most vulnerable, i.e anywhere where they’re reliant on services operated by businesses that already comply with the law and are more likely to take action.

The European Commission’s Recommendation (Toolbox) published on Tuesday, focuses on just that by providing guidance on enforcement, suggesting priority actions, and encouraging use of existing anti-counterfeit/anti-piracy tools.

Cooperation, Coordination and Information Sharing

The Commission says a key aim of the Toolbox is to promote and facilitate effective cooperation between rightsholders, providers of intermediary services, and competent authorities, by promoting good practice and use of appropriate tools and new technologies.

The headline focus is anti-counterfeiting but within the text the EC notes that “most guiding principles, good practices and tools” developed under the recommendation can also be relevant when tackling pirated content online. In particular, voluntary actions taken by online intermediaries, “enhanced cooperation among competent national authorities,” and the sharing of information and data.

Cooperation and increased information sharing are essential and should be further promoted, at all levels, in accordance with Union law, the protection of personal data and the freedom to conduct business under Article 16 of the Charter of Fundamental Rights of the European Union (‘the Charter’). Good practices should be identified, and recommended to all actors, including e-commerce marketplaces, transport and logistic service providers, payment services providers, social media providers, providers of domain name services, etc. Secondly, further cooperation and information sharing should be encouraged. This relates to all competent authorities, including market surveillance authorities that currently may not have competences for IP-infringing activities, and promoting further the use of dedicated tools such as the IP Enforcement Portal (‘IPEP’)…

Payment Services, Social Media Platforms

The EC highlights payment services as an area where more can be done. On one hand, these companies are central to rightsholders’ activities. On the other, they can also be used to support IP-infringing activities. The EC says that to prevent misuse of their services for IP-infringing activities, payment services should be encouraged to implement the following good practices:

(a) to clearly state in their terms and conditions, as a ground for suspension or termination of their contract with sellers, any finding, including by the competent authority, of the use of their payment services for IP-infringing activities;
(b) to set up notification mechanisms allowing rightsholders using their payment services to notify any IP-infringing activity;
(c) where technically and economically feasible, to have an information system in place to enable the identification of operators engaging in IP-infringing activities, across different payment services, when one payment service provider has terminated its services with such operators on the grounds of IP-infringing activities;
(d) to exchange information with other payment service providers on trends regarding IP-infringing activities and to put in place specific measures against repeated misuse of their services, particularly where there has been a finding by a competent authority that their services have been used for IP-infringing activities.

Social media providers should similarly prevent misuse of their services, including by having systems in place to identify and take action against those misusing their services for IP-infringing activities.

Domain Name Registries/Registrars

The Commission’s Recommendation naturally assumes that where the law compels intermediaries or service providers to take action, that should be the standard minimum response. However, when entities are asked to go above and beyond, which appears to underpin almost every proposal in the Toolbox, service providers find themselves “encouraged to implement” various measures.

In respect of domain names, Directive (EU) 2022/2555 obliges “TLD name registries and entities providing domain name registration services” to “collect and guarantee the integrity and availability of domain name registration data.” EU Member States should further require these entities to “respond without undue delay” to requests for the disclosure of registration data following requests from “legitimate access seekers.”

Legitimate access seekers include those considered competent under EU or national law for the prevention, investigation, detection, or prosecution of criminal offenses. However, the definition can also encompass anyone with a legitimate reason to access the information, which includes rightsholders and their agents.

When access to domain name registration data that is personal data is sought, TLD-name registries and entities providing domain name registration services established in the EU and/or offering services in the EU are encouraged to recognize as legitimate access seekers any natural or legal persons who make a request for a right to information pursuant to Directive 2004/48/EC.

Member States are further encouraged to share intelligence and data on emerging piracy trends, including lists of websites that have been held by competent authorities to have carried out IP-infringing activities, the tactics and behaviors of alleged infringers, and to explore news ways to share information on those who “repeatedly engage in IP-infringing activities.”

Dynamic Injunctions, Unmasking Petty Infringers

Several EU Member States already have mechanisms in place that allow rightsholders to obtain injunctions against infringers and intermediaries, but the Commission would like to see more.

Specifically, Member States are encouraged to provide for the possibility of dynamic injunctions that can be applied to IP-infringing activities that are similar to those already identified, but are yet to be identified, such as the use of mirror sites.

The Commission also encourages Member States to ensure that petty infringers can’t escape simply because their activities are not commercial in scale or even commercial at all.

“Member States are encouraged to provide for the possibility for the competent judicial authorities to order disclosure of the relevant information to effectively fight IP infringements which are not on a commercial scale, in response to a justified and proportionate request of the claimant in proceedings,” the Commission writes.

“For these purposes, the relevant information could consist of the same information which may be requested in accordance with Article 8(2) of Directive 2004/48/EC, including the email address, telephone number and IP addresses relating to alleged infringers or participants to alleged infringing activities.”

The European Commission’s Recommendation (Toolbox) can be found here (pdf)

From: TF, for the latest news on copyright battles, piracy and more.

KI-Marktplatz: OpenAI GPT Store mit Spam und Rechtsverletzungen

Der GPT Store von OpenAI, ein Marktplatz für Chatbots, die auf den generativen KI-Modellen des Unternehmens basieren, scheint auf Kosten der Qualität zu wachsen. (Chatbots, Urheberrecht)

Der GPT Store von OpenAI, ein Marktplatz für Chatbots, die auf den generativen KI-Modellen des Unternehmens basieren, scheint auf Kosten der Qualität zu wachsen. (Chatbots, Urheberrecht)

Anzeige: KI und Sicherheit: Risiken erkennen, Lösungen implementieren

Die Integration von KI in Informationssicherheitssysteme birgt sowohl Chancen als auch Risiken. Welche Sicherheitsimplikationen bestehen und wie der richtige Einsatz von KI-Technologien funktioniert, klärt dieser fundierte Onlinekurs. (Golem Karrierewe…

Die Integration von KI in Informationssicherheitssysteme birgt sowohl Chancen als auch Risiken. Welche Sicherheitsimplikationen bestehen und wie der richtige Einsatz von KI-Technologien funktioniert, klärt dieser fundierte Onlinekurs. (Golem Karrierewelt, Server-Applikationen)

SpaceX’s workhorse launch pad now has the accoutrements for astronauts

“This system will help us scale to bigger towers and spaceships.”

A Falcon 9 rocket lifts off Thursday from Cape Canaveral, Florida.

Enlarge / A Falcon 9 rocket lifts off Thursday from Cape Canaveral, Florida. (credit: NASA/SpaceX)

Upgrades at SpaceX's most-used launch pad in Florida got a trial run Thursday with the liftoff of a Falcon 9 rocket with a Dragon cargo ship heading for the International Space Station.

SpaceX's Cargo Dragon spacecraft launched at 4:55 pm EDT (20:55 UTC) Thursday from Space Launch Complex 40 (SLC-40) at Cape Canaveral Space Force Station in Florida. This mission, known as CRS-30, is SpaceX's 30th resupply mission to the space station since 2012.

The automated Dragon supply ship took off on top of a Falcon 9 rocket, heading for a monthlong stay at the International Space Station, where it will deliver more than 6,000 pounds of hardware, fresh food, and experiments for the lab's seven-person crew.

Read 32 remaining paragraphs | Comments

Glasfaser und XGS-PON: Telekom will in Berlin fast alle Haushalte allein versorgen

Berlin hat noch wenig FTTH. Jetzt will die Telekom fast die gesamte Stadt allein ausbauen. Doch auch andere Netzbetreiber haben große Ziele und bauen bereits aus. (Berlin, Glasfaser)

Berlin hat noch wenig FTTH. Jetzt will die Telekom fast die gesamte Stadt allein ausbauen. Doch auch andere Netzbetreiber haben große Ziele und bauen bereits aus. (Berlin, Glasfaser)

Antibodies against anything? AI tool adapted to make them

Right now, making antibodies means immunizing animals. But that may change.

A ribbon-based string that represents the structure of the backbone of a protein.

Enlarge

Antibodies are incredibly useful. Lots of recently developed drugs rely on antibodies that bind to and block the activity of specific proteins. They're also great research tools, allowing us to identify proteins within cells, purify both proteins and cells, and so on. Therapeutic antibodies have provided our first defenses against emerging viruses like Ebola and SARS-CoV-2.

But making antibodies can be a serious pain, because it involves getting animals to make antibodies for us. You need to purify the protein you want the antibodies to stick to, inject it into an animal, and get the animal to produce antibodies as part of an immune response. From there, you either purify the antibodies, or to purify the cells that produce them. It's time-consuming, doesn't always work, and sometimes produces antibodies with properties that you're not looking for.

But thanks to developments in AI-based protein predictions, all that hassle might become unnecessary. A recently developed diffusion model for protein structures has been adapted to antibody production and has successfully designed antibodies against flu virus proteins.

Read 13 remaining paragraphs | Comments