“If the London weather deigns to cooperate (miracles do happen), we might witness T20-I #17 at cricket’s self-proclaimed “real home.” Ahem. Ahem. Yes, the so-called People’s Cricket Ground is set to host the Men in Green. It’s been over a decade since this historic venue condescended to accommodate the shortest format—perhaps The Oval prefers to avoid the gaudy spectacle of T20 cricket to keep its highbrow reputation intact.
5th over: England 17-0 (Beamount 7, Bouchier 9) Beaumont pushes forward at a gorgeous outswinger from Baig and survives a huge appeal for caught behind. My hunch is that the bat hit the pad, and after a long discussion Nida Dar decides against a review.
Replays confirm the offending sound was indeed bat on pad. Even so, that’s a terrific maiden from Baig, who has figures of 3-1-5-0. England’s openers are finding life tricky against the swinging ball.
Sophie Ecclestone took three wickets and Alice Capsey hit 44 as England began their three-match series with a win in Derby
3rd over: England 11-0 (Beaumont 8, Bouchier 2) A first boundary, a typically Beaumontesque slam through the covers – to make her the leading scorer in women’s ODIs in England, going above Sarah Taylor.
2nd over: England 6-0 (Beaumont 4, Bouchier 1) Diana Baig with the second over – such a lovely, easy run-up. It turns out she has also played football for Pakistan. Beaumont drives nicely, but the ball is cut off by the fielder’s knee.
The Silicon Valley company was again lifted by sales of its artificial intelligence chips, but it faces growing competition and heightened expectations.
Danni Wyatt’s sparkling 87 leads the charge as England beat Pakistan by 34 runs to whitewash the series.
5th over: England 36-0 (Bouchier 8, Wyatt 27) Fatima Sana now as Nida Dar rings the changes. At extra cover BAig cuts off a booming Bouchier drive. Four dots, a single, then the pressure punctured as Wyatt pierces the ring and picks up four.
4th over: England 31-0 (Bouchier 7, Wyatt 23) Time for some spin, from Sadia Iqbal. She manages to stop the boundaries, but there are still six off the over.
Reddit’s first earnings report as a public company showed leaps in users and advertising revenue, along with expenses related to its initial public offering.
The first-quarter results are likely to fuel worries that competitors will continue grabbing a bigger slice of a market dealing with slowing electric car sales.
General Motors has struggled with electric vehicles and in foreign markets but it is selling lots of combustion engine cars and trucks in North America.
When we told the true tale of a virtual kidnapping scam in Utah, though the teenaged victim at the center of the scam was eventually found, his family still lost nearly $80,000.
And when we asked Mozilla’s Privacy Not Included team about what types of information modern cars can collect about their owners, we were entirely blindsided by the policies from Nissan and Kia, which claimed the companies can collect data about their customers’ “sexual activity” and “sex life.”
In looking at these stories collectively, it can feel like the everyday consumer is hopelessly outmatched against modern companies. What good does it do to utilize personal cybersecurity best practices, when the companies we rely on can still leak our most sensitive information and suffer few consequences? What’s the point of using a privacy-forward browser to better obscure my online behavior from advertisers when the machinery that powers the internet finds new ways to surveil our every move?
These are entirely relatable, if fatalistic, feelings. But we are here to tell you that nihilism is not the answer.
Today, on the Lock and Code podcast, we speak with Justin Brookman, director of technology policy at Consumer Reports, about some of the most recent, major consumer wins in the tech world, what it took to achieve those wins, and what levers consumers can pull on today to have their voices heard.
Brookman also speaks candidly about the shifting priorities in today’s legislative landscape.
“One thing we did make the decision about is to focus less on Congress because, man, I’ll meet with those folks so we can work on bills, [and] there’ll be a big hearing, but they’ve just failed to do so much.”
The company’s revenue was 15 percent higher compared with last year, and it solidified its standing as the entertainment company’s dominant streaming service.
You might think that libraries are kind of boring, but this self-analysis of a 2023 ransomware and extortion attack against the British Library is anything but.
Andrew Appel shepherded a public comment—signed by twenty election cybersecurity experts, including myself—on best practices for ballot marking devices and vote tabulation. It was written for the Pennsylvania legislature, but it’s general in nature.
From the executive summary:
We believe that no system is perfect, with each having trade-offs. Hand-marked and hand-counted ballots remove the uncertainty introduced by use of electronic machinery and the ability of bad actors to exploit electronic vulnerabilities to remotely alter the results. However, some portion of voters mistakenly mark paper ballots in a manner that will not be counted in the way the voter intended, or which even voids the ballot. Hand-counts delay timely reporting of results, and introduce the possibility for human error, bias, or misinterpretation.
Technology introduces the means of efficient tabulation, but also introduces a manifold increase in complexity and sophistication of the process. This places the understanding of the process beyond the average person’s understanding, which can foster distrust. It also opens the door to human or machine error, as well as exploitation by sophisticated and malicious actors.
Rather than assert that each component of the process can be made perfectly secure on its own, we believe the goal of each component of the elections process is to validate every other component.
Consequently, we believe that the hallmarks of a reliable and optimal election process are hand-marked paper ballots, which are optically scanned, separately and securely stored, and rigorously audited after the election but before certification. We recommend state legislators adopt policies consistent with these guiding principles, which are further developed below.