Network Lifestyle And Activities Archive

Microsoft runs a Super Bowl ad about inclusive gaming

Article

Microsoft’s moving Xbox ad was the best thing about the Super Bowl | CNet

Microsoft Super Bowl Ad video – Click or tap to play

My Comments

In the USA, the Super Bowl football match isn’t just the final NFL football match of the season. It is a TV-viewing experience that encompasses the half-time show and a showcase of highly-polished commercials along with the football game. Here. you enjoy this with your friends while digging those chips in to some fabulous dips or chomping on those chicken wings and drinking plenty of beer or soda (soft drink).

One of the ads that was ran during this showcase was to promote Microsoft’s XBox Adaptive Controller. This is a game controller specifically designed for children and adults who have mobility or dexterity limitations and is about having these children being able to play video games with the XBox console or Windows-based computer. It is also designed to accept a range of assistive devices as user-input devices thanks to various standard connections like dry-contact switches or USB analogue joysticks.

The software supplied with Windows 10 or XBox One also allows accessory controllers that are connected to this device along with this device’s buttons to be “mapped” to particular functions, leading to the most custom gaming experience. Even the packaging is designed to allow people with limited mobility or dexterity to open up the box, something that works well when these controllers are given as a gift for an occasion.

The CNet article called out the ad as going against the grain of sports and video-gaming cultures where people who don’t fit the expected mould of a participant i.e. the young male able-bodied person are effectively shut out. The fact that it was shown during America’s big sporting event of the year hammered this concept home regarding opening up video and computer gaming to more classes of people.

It also goes along with Microsoft’s “open-frame” approach to computing and gaming which allows the creation of games and applications for Windows 10 and the XBox One games console. This can also allow the development of therapy-focused games that can help people with special needs or undergoing particular therapies, and underscores the idea of using this kind of technology in a therapeutic role.

It also shows that computer and video gaming can be part of the course for people who have limitations affecting their mobility or dexterity through the use of assistive technology that is accepted by others who are more able.

Send to Kindle

Business-email compromise phishing now affects consumers

Article

House in Toorak

The sale of a property is an area where consumers can easily be caught up in a business-email compromise scam

Email crooks swindle woman out of $150K from home sale | Naked Security blog

An email scam has caused $200,000 in losses to real estate agents and home buyers in Victoria | Smart Company

My Comments

Ordinary householders can be at risk of a “business email compromise“ phish attempt in the same way as those in large business.

The business email compromise scam

This scam typically has the trickster research as much as they can about their victim and his or her employer or business partners. The victim that is usually targeted is someone who is likely to facilitate business-sensitive transactions or handles business-sensitive data like the payroll. They will find out whom they report to within the organisation such as the chief financial officer, or beyond the organisation like their accountant, lawyer or the tax department.

Then they place an urgent request to the victim to wire funds to a particular account as part of a wire fraud. Or they could be asked to reply to the email with organisationally-sensitive data like employee data typically presented as a “wages and tax-witholding” statement like a W2 (USA), P60 (UK and Ireland) or Group Certificate (Australia) to facilitate identity theft against the business’s staff.

How can ordinary people get caught up in these scams?

Apartment block in Elwood

as can having that rental apartment managed by someone else

But this kind of email scam can similarly happen with personal transactions, especially those that are high-stakes in nature, typically requiring the engagement of legal counsel. A key example of these transactions would be the sale of real-estate, businesses or investments.

Similarly, the probate settlement of a deceased estate or a property settlement after a divorce or separation could be at risk because these can involve a collection of items including high-value goods like real-estate or collectables. In that case, you are dealing with a real-estate transaction along with the valuation and sale of items.

It can also extend to transactions where you are delegating an agent to manage assets. Examples of these include trust funds typically for minor children, powers of attorney, or rental properties managed by a property manager or estate agent.

These transactions typically involve the frequent exchange of documents during the closure or settlement period where the transaction is in the process of being realised. They also involve dealing with different entities like conveyancers, law firms, estate agents and the like to facilitate the transactions. In addition, due to electronic transaction technologies like online document signing, there will be many emails between the parties that will have links to various resources like document repositories including document-signing platforms or results pages. They are also vulnerable towards the end of the settlement period where a last-minute change could be rushed in “under the radar”.

What can happen, for example, is that a fraudulent email could be used to “steer” the proceeds of a house sale away from the vendor’s account towards a fishy-sounding account.  Or funds due to an estate’s beneficiary could be steered away to an account not under the control of that person.

What can you do?

Compose Email or New Email form

Protect yourself against this scam by practising safe email habits

To protect yourself, make sure everything about the transaction is properly “cut and dried” as it evolves. This includes identifying and documenting sources, currencies and destinations of any funds along with procedures affecting the high-stakes transaction at the start of the transaction. Especially be careful of last-minute changes that crop up towards the end of the settlement.

Protect email accounts that are party to the transaction such as implementing security measures that the email service or client software would provide. With Webmail services,using multi-factor authentication may work as a secure measure, as will verifying that you log in to the service at its known proper address.

Carefully examine emails associated with the transaction to be sure they come from the proper email addresses. As far as links to online resources are concerned, make sure you know the proper domain name for these resources and that the links point to resources at that domain name. Attachments should also come through as proper representations of their filetype and you may have to use your endpoint security software to scan for document-laden malware.

Similarly, you may have to make sure Word documents or Excel spreadsheets are viewed in “Protected View” where macros cannot be run or the document can’t be edited. You would need to exit this mode if you are editing the document such as filling in a form or amending a spreadsheet, or printing it out.

In some cases, a regular personal computer running desktop applications and Web browsers may become a better device to use for verification than a mobile-platform device like a smartphone or tablet. This is because the desktop operating system and software tends to offer a more detailed user experience than their mobile equivalents.

If someone changes their email or other communications details, confirm these details through another communications means that you and them trust. You may have to use one of the prior or alternate communications details as a tool for confirmation if a significant number of details is changed such as through a change of employment.

You may have to double-check invoices, account numbers and the like directly with the other party especially if these details are changed. It is best to do this in person or on the phone using independently-verified phone numbers such as numbers you already have for them.

Avoid the use of untrusted networks like insecure public-access networks to do your sensitive business. Here, you may find that using a mobile-broadband connection and/or a VPN may work with this kind of business if you are away from home or office networks you can trust.

Be especially careful about creditors where the payment-destination account number, the payment method or currency changes during the course of your business. There may be a legitimate reasons such as a creditor changing banks or accounts for something that suits their needs better. But an impostor could be steering money that you owe them to an account under the control of the grifter who is impersonnating them.

If the high-stakes transaction has any international dimension about it, don’t be afraid to seek consular help regarding any aspect of that transaction. It may mean talking with your country’s foreign-affairs government department or the embassy or consulate associated with the foreign country. This is now important with people relocating overseas while maintaining assets like homes in their own or other countries, or goods being purchased via the Internet from foreign sellers.

For example, participants of a transaction conducted across international borders can use consular help to verify each others’ identities. Similarly, they can organise official translation of any official documents that are part of the transaction and are in a language that one of the parties doesn’t understand. Or you simply may need to confirm the legitimacy of that transaction in the foreign country including any steps you need to take.

Conclusion

We as consumers can become vulnerable to the business-email compromise scam when we are dealing with high-stakes transactions like real-estate purchases. To protect yourself, it’s about secure computing and email practices along with making sure everything in the transaction is “cut and dried” including verifying changes through another communications path you trust.

Send to Kindle

Connected novelties and toys–security and useability issues that affect this product class

Giftware chook (rooster)

Connected versions of classic novelties and giftware will be subject to severe scrutiny

An issue that is rearing its ugly head is the rise in availability of connected novelties and toys. They are toys, novelties, giftware, seasonal decorations and other items that are able to connect with your computer or network. This connectivity function is often sold as one of the key marketing features with it able to work with an online service of some sort.

When I talk of toys, I don’t just talk of what children play with with but also other toys that adults end up playing with. These can include the so-called “executive toys” that live on the office desk for one to keep the other hand busy while they are on the phone.

Who typically sells these products

Toys and novelties are typically sold through a large range of online and bricks-and-mortar retailers, whether they be toy stores, gift stores, souvenir outlets or multi-facet outlets including department and discount stores. In some cases such as rural areas, a store like a newsagent’s could even sell novelties or toys.

Another factor is that novelties are given away to people and businesses as a gift or premium. This can typically happen as part of a “loot bag” offered out at conferences or tradeshows or simply used as a giveaway during a presentation to encourage audience participation.

Christmas wreath

Seasonal decorations that connect to the Internet can also be a security or setup risk

The common factor here is that most of the outlets that sell this kind of product are staffed by people who don’t have much technological know-how. This can affect the procurement process affecting whether the item exhibited at the gift fair should be stocked, or providing customer advice during and after the sale including how to get the connected novelty fully operational.

Artisans who make these gifts and novelties

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

Your Amazon Echo will soon be expected to work with a wide range of toys and novelties

There is also the fact that craftspeople like to make various toys, novelties, gifts and other items and sell them directly to customers or on a wholesale basis. But they do want to add some extra functionality like musicality or flashing lights to some of their product lines.

Typically, if they want this extra functionality in these gifts that they make, they have someone else make and supply the necessary components like clockwork movements or electronic-circuit kits to fulfil the extra functionality in a pre-assembled form.  Then the artisan installs the pre-assembled mechanisms or circuits in the toy or gift as part of putting the whole thing together.

It allowed these artisans to focus on their craftwork and build the items they want to sell, while being able to offer a wide range of goods. The same comments that apply to finished goods also apply to the various components and kits that are being sold to these artisans for their projects.

In this case, the artisans have to be aware of what they procure when they are being sold a “connected functionality” kit for installation in their projects. For them, they have to be aware of customer-support issues including setup and data-security issues regarding this extra functionality.

Connected modules for construction sets and similar hobbies

The same concept also extends to construction-set platforms like Meccano, Lego and FischerTechnik where children and adults build items using the pieces that are part of the respective platforms. In this case, anyone to do with these platforms could offer connected modules or kits that have the ability to control one or more items in their platform-based project like a motor, light or solenoid using an “Internet Of Things” approach. Here, these modules have to be able to seen as equivalent to a connected toy or novelty, especially if the idea is to implement cameras, microphones or GPS sensors.

It also applies to model railways, track-based car-racing sets and the like where they can be extended with functionality modules sold by the set’s vendor or a third party catering to these hobbies. Again the modules also need to be designed for security if they are capable of being part of the Internet of Things.

Use of these items

There is the desire for people to buy these toys and novelties as gifts for others in their life. It also includes the fact that the recipient wants to get the item “up and running” as soon as possible.

This will involve having the device connected to a host device through Bluetooth or USB or to a home network for proper reliable use. It should be about a standard process that is implemented for onboarding including the installation of any extra software.

Key security issues

A key security issue concerning the connected toy, novelty or similar device is that it can be an espionage item presented in an innocuous form. It can concern us both at home and in the office because we can easily be talking about items that are confidential and sensitive in our personal and business lives.

This was highlighted in a crime-fiction form to the Germanic viewership in Europe through the Munich-based Tatort “Wir Kriegen Euch Alle” (We Get You All) episode shown there on Sunday 9 December 2018. This story was focused around a connected doll that was given by strangers to various childrens’ families in middle-class Munich and was used as a surveillance tool to facilitate crimes against the families.

It underscored that Germany has some very strict policies where the sale of surveillance devices that are disguised as innocuous items isn’t allowed in that country. But, in the story, these dolls were imported in to Munich from a location in Austria which is a short drive away and facilitated by the Schengen Agreement in the European Union.

Let’s not forget the recent cyberattacks such as the Mirai botnet that were facilitated by dedicated-purpose devices like network-infrastructure equipment and videosurveillance cameras which were running compromised software. Then there are factors regarding data-storage devices and “bag-stuffer” novelties given away during business conferences where there is the possibility of them being loaded with questionable software.

What would I like to see

Security

There has to be identification on the toy’s or novelty’s packaging about what kind of sensors like location sensors, microphones or cameras that the device has, as well as whether the device transmits data to online services. This includes whether the device does this directly or via intermediary software running on other computer devices such as mobile devices running companion mobile-platform apps. Even a hang tag attached ti the novelty could highlight what kind of sensors or online services it uses which would be important for those items sold without packaging.

Preferably, this can be achieved through standard graphical symbols indicating the presence of particular sensors or the use of online services and social networks. It can also identify whether the toy’s or novelty’s functionality are dependent on these sensors or online services.

App stores and other software platforms that host “connector” software have to implement stringent permissions for these kind of devices especially if they use a microphone, camera or location sensor. There could be standards on whether the software is allowed to record from these sensors over a long time or keep the recording persistent on the host device or online service.

A limitation I would also like to see for connected toys and novelties that if they work with another computing device including a smart speaker, the connection can only be effectively within the same premises. This can be tested through the use of a peripheral-grade connection like Bluetooth or USB to a computing device or limiting the range of discovery for network-based devices to that of the same logical private network or subnet. Here, it represents all the devices on the LAN side of a home-network’s router and excludes devices existing on other logical networks served by the same physical device like “guest” or “community” networks.

As far as Bluetooth is concerned, the toys should implement authentication processes during the setup phases. Then the device ceases to be able to be discovered once it is paired with a host device. It is like what we are seeing with Bluetooth headsets and similar devices that have been recently released. They may also have to work on a limited radio range to prevent successful connection from a distance.

There should also be a simple “factory-reset” process to allow the user to place the toy or novelty in to setup mode, effectively wiping data from the device. This allows a recipient to effectively “claim possession” of the device as if it is new, avoiding the situation where they may be given something that is compromised to do what someone else wants it to do. It also applies to situations where you are dealing with ex-demo stock or gift-fair samples.

This should also apply to online services associated with these toys or novelties where the user has proper account control for the device’s presence on that service and any data collected by that device.

There are devices that observe particular functions according to a particular device class supported by many platforms like a novelty nightlight or illuminated Nativity scene that works with a “smart-home” setup or a novelty Bluetooth speaker. These devices have to work according to the standards in force for that device class and its connection to the host device or network. It is more important where the device may perform further tricks while running alongside dedicated vendor-created software but is able to have basic functionality without this software.

A software-level security approach could be achieved through an open-source or peer-reviewed baseline software that ticks the necessary boxes. This would apply to the firmware installed in the device and any apps or other companion software that is required to be run on other computing devices for the novelty to operate. It also includes a requirement that this software be reviewed regularly for any bugs or weaknesses that could be exploited, along with compliance requirements.

This could be assessed according to a set of European norms because the continental-European countries are very concerned regarding privacy thanks to their prior history.

As far as modules for integration in to toys, novelties and giftware is concerned, the modules should meet the same requirements as finished products that would have the same functionality. Craftspeople should also be aware of data security and user privacy issues when it comes to choosing modules for their projects that are dependent on computer devices or networks.

Setup and Connectivity

Another area that is a sore point for connected toys and novelties is bringing these devices on board for you to use. In a lot of cases, this is exacerbated through awkwardly-written instructions that can test one’s patience and not much knowledge about what is needed for the device to work fully.

The device packaging could use Wi-Fi, Bluetooth or other standard logos to indicate what kind of connectivity it needs to operate fully. This is to be highlighted with the “app store” logos for various operating-system app stores if the device is dependent on companion apps for full functionality. Similarly, use of other official platform logos can be used to identify compatibility with platforms like smart-TVs or voice-driven home-assistants.

Simple-yet-secure setup and onboarding procedures are to be paramount in the design of these devices. For Bluetooth-based devices, they should use “simple-pairing” such as pressing a button on the device to make them discoverable. This is even made easier with a trend towards “out-of-the-box” discoverability if the device isn’t paired with any host. Then the user activates their host device in “Bluetooth Scan” mode to discover the device,  subsequently with them selecting the device through its presentation name.

Windows, Android and iOS are even implementing simplified device-discovery routines for Bluetooth devices, with the ability to lead users to visit the app store to install complementary software. This will make things easier for users to get the toy or novelty up and running.

Wi-Fi-based devices would have to use WPS-PBC push-button setup, Wi-Fi Easy Connect, or other simplified setup processes for integration with the home network. It also applies to other network connection standards where you have to enrol the device on to that network.

Smart-home devices that implement Zigbee, Z-Wave and similar standards also have to implement simplified discovery protocols implemented in these standards to bring them on-board.

In relationship to security, I underscored the need for use of device-class standards as much as possible. But it also applies to connectivity and useability where a device that honours device-class standards is also easier to use because you are operating it the same for its peers.

Conclusion

This year will become a time where security and useability will be of critical importance when toys, novelties and other similar goods that connect to the home network and the Internet are designed and sold to consumers. Here, these issues may avoid these kind of toys ending up in disuse due to security or setup issues.

Send to Kindle

Your local library now facilitates a video-on-demand service

Article

Kanopy independent cinema page

Kanopy works with your local library to offer independent video content to stream

The Totally Free Streaming Service You Didn’t Know You Have | Gizmodo

From the horse’s mouth

Kanopy

Home Page

My Comments

I am keeping an eye out for video-on-demand services that are offering niche content like foreign-language content. This is in response to recent market consolidation in the video-on-demand market and is able to easily survive that kind of activity in the mainstream sector.

A part of the home-video era was the fact that your local library stocked video movies and made them available for loan to its members. In most cases, this was from a government-funded or private film repository that primarily offered educational content along with some locally-produced classic and historic film content. Subsequently, these libraries offered some family-friendly and niche content from the main video distributors whom they had a lending agreement with.

This has fallen away thanks to the rise of video-on-demand services that work via the Internet. But an Australian startup began to partner with various film studios, especially those out of the current mainstream, to offer a video-on-demand service that works in tandem with the local libraries and universities. Examples of this include some classic films as well as a plethora of indie material released over the years, typically material that would have been offered by some of the video distributors during home video’s early years or syndicated by TV stations when they had the ability to choose what they could ran with.

The Gizmodo article called this service out due to the loss of the Filmstruck video-on-demand service which focused on classic cinema, typically material from the Criterion collection. They were lamenting the reduced availability of evergreen video content available to see on cable TV or stream via a video-on-demand service.

You have to be a student or faculty at one of the participant universities or be a member of one of the participating local libraries. As well, in the case of library memberships, you have to make sure your membership is current and correct before you create your account or add them to your account. That includes things like overdue fines and other obligations and you may have to check if that dusty library card has expired or not, including whether it needs to be “brought forward” to their current IT setup. It does support multiple library memberships such as students at a university using a local library card or people living on the border of two different municipalities.

Kanopy works on regular computers with your Web browser but has native clients for the iOS and Android platforms. As far as smart-TV and set-top applications are concerned, they also have native clients for the Android TV, Apple TV (tvOS) and Roku platforms including the Telstra TV repackaged Roku client.  This can be improved upon through the support for Netflix-style “download to view” to allow offline viewing of content during the loan period. Here, it would come in handy with long roadtrips or flights where you don’t have reliable access to the Internet for streaming.

At the moment, Kanopy works on the same principle as the “public lending rights” that libraries pay to authors and publishers for the right to lend out the content. Typically a participating library will pay Kanopy to allow its members to view a certain number of titles per month and this will be paid to the film studios to “lend out” the content.

Kanopy could go further by approaching the public-service broadcasters around the world like the ABC, BBC and SBS to offer their homegrown content catalogues to library members through this platform.  Typically these broadcasters have built up a large amount of content that they have commissioned through the years and most of this content would fit in with Kanopy’s remit. It is already happening with the ABC and some of their shows but can easily go further. Companies and other organisations who create their own educational and training content could offer this to the Kanopy platform for public viewership.

Similarly, Kanopy could approach other organisations to expose their service to their membership. One group would be the primary and secondary schools who would use some of this material as part of their curriculum. Similarly, they could “knock on the door” of more independent studios and quality film distributors to make your local library a viable alternative to what Hollywood puts out. As well, the travel industry could benefit from having access to the Kanopy platform for in-flight or in-room entertainment that is enriching and thought-provoking.

What at least is happening is that Kanopy is bringing the concept of the videos or DVDs made available for loan through the public library systems into the 21st century thanks to online streaming via your home network.

Send to Kindle

Being cautious about fake news and misinformation in Australia

Previous Coverage

Australian House of Representatives ballot box - press picture courtesy of Australian Electoral Commission

Are you sure you are casting your vote or able to cast your vote without undue influence?

Being aware of fake news in the UK

Fact-checking now part of the online media-aggregation function

Useful Australian-based resources

ABC Fact Check – ran in conjunction with RMIT University

Political Parties

Australian Labor Party (VIC, NSW)

Liberal Party – work as a coalition with National Party (VIC, NSW)

National Party – work as a coalition with Liberal Party (VIC, NSW)

Australian Greens – state branches link from main page

One Nation (Pauline Hanson)

Katter’s Australia Party

Derryn Hinch’s Justice Party

Australian Conservatives

Liberal Democratic Party

United Australia Party

My Comments

Over the next six months, Australia will see some very critical general elections come to pass both on a federal level and in the two most-highly-populated states that host most of that country’s economic and political activity. On October 30 2018, the election writs were recently served in the state of Victoria for its general election to take place on November 24 2018. Then, on the 23 March 2019, New South Wales will expect to go to the polls for its general election. Then the whole country will expect to go to the polls for the federal general election by 18 May 2019.

As these election cycles take place over a relatively short space of time and affecting , there is a high risk that Australians could fall victim to misinformation campaigns. This can subsequently lead to state and federal ballots being cast that steer the country against the grain like what happened in 2016 with the USA voting in Donald Trump as their President and the UK voting to leave the European Union.

Google News - desktop Web view

Look for tags within Google News that describe the context of the story

The issue of fake news and misinformation is being seen as increasingly relevant as we switch away from traditional media towards social media and our smartphones, tablets and computers for our daily news consumption.  This is thanks to the use of online search and news-aggregation services like Google News; or social media like Facebook or Twitter which can be seen by most of us as an “at-a-glance” view of the news.

As well, a significant number of well-known newsrooms are becoming smaller due to the reduced circulation and ratings for their newspaper or radio / TV broadcast thanks to the use of online resources for our news. It can subsequently lead to poor-quality news reporting and presentation with a calibre equivalent to the hourly news bulletin offered by a music-focused radio station. It also leads to various mastheads plagiarising content from other newsrooms that place more value on their reporting.

The availability of low-cost or free no-questions-asked Web and video hosting along with easy-to-use Web-authoring, desktop-publishing and desktop-video platforms make it feasible for most people to create a Web site or online video channel. It has led to an increased number of Websites and video channels that yield propaganda and information that is dressed up as news but with questionable accuracy.

Another factor that has recently been raised in the context of fake news, misinformation and propaganda is the creation and use of deepfake image and audio-visual content. This is where still images, audio or video clips that are in the digital domain are altered to show a falsehood using artificial-intelligence technology in order to convince viewers that they are dealing with original audio-visual resource. The audio content can be made to mimic an actual speaker’s voice and intonation as part of creating a deepfake soundbite or video clip.

It then becomes easy to place fake news, propaganda and misinformation onto easily-accessible Web hosts including YouTube in the case of videos. Then this content would be propagated around the Internet through the likes of Twitter, Facebook or online bulletin boards. It is more so if this content supports our beliefs and enhances the so-called “filter bubble” associated with our beliefs and media use.

There is also the fact that newsrooms without the resources to rigorously scrutinise incoming news could pick this kind of content up and publish or broadcast this content. This can also be magnified with media that engages in tabloid journalism that depends on sensationalism to get the readership or keep listeners and viewers from switching away.

The borderless nature of the Internet makes it easy to set up presence in one jurisdiction to target the citizens of another jurisdiction in a manner to avoid being caught by that jurisdiction’s election-oversight, broadcast-standards or advertising-standards authority. Along with that, a significant number of jurisdictions focus their political-advertising regulation towards the traditional media platforms even though we are making more use of online platforms.

Recently, the Australian Electoral Commission along with the Department of Home Affairs, Australian Federal Police and ASIO have taken action on an Electoral Integrity Assurance Task Force. It was in advance of recent federal byelections such as the Super Saturday byelections, where there was the risk of clandestine foreign interference taking place that could affect the integrity of those polls.

But the issue I am drawing attention to here is the use of social media or other online resources to run fake-news campaigns to sway the populace’s opinion for or against certain politicians. This is exacerbated by the use of under-resourced newsrooms that could get such material seen as credible in the public’s eyes.

But most of Silicon Valley’s online platforms are taking various steps to counter fake news, propaganda and disinformation using these following steps.

Firstly, they are turning off the money-supply tap by keeping their online advertising networks away from sites or apps that spread misinformation.

They also are engaging with various fact-check organisations to identify fake news that is doing the rounds and tuning their search and trending-articles algorithms to bury this kind of content.

Autocomplete list in Google Search Web user interface

Google users can report Autocomplete suggestions that they come across in their search-engine experience/

They are also maintaining a feedback loop with their end-users by allowing them to report fake-news entries in their home page or default view. This includes search results or autocomplete entries in Google’s search-engine user interface. This is facilitated through a “report this” option that is part of the service’s user interface or help pages.

Most of the social networks and online-advertising services are also implementing robust user-account-management and system-security protocols. This includes eliminating or suspending accounts that are used for misinformation. It also includes checking the authenticity of accounts running pages or advertising campaigns that are politically-targeted through methods like street-address verification.

In the case of political content, social networks and online-advertising networks are implementing easily-accessible archives of all political advertising or material that is being published including where the material is being targeted at.

ABC FactCheck – the ABC’s fact-checking resource that is part of their newsroom

Initially these efforts are taking place within the USA but Silicon Valley is rolling them out across the world at varying timeframes and with local adaptations.

Personally, I would still like to see a strong dialogue between the various Social Web, search, online-advertising and other online platforms; and the various government and non-government entities overseeing election and campaign integrity and allied issues. This can be about oversight and standards regarding political communications in the online space along with data security for each stakeholder.

What can you do?

Look for any information that qualifies the kind of story if you are viewing a collection of headlines like a search or news-aggregation site or app. Here you pay attention to tags or other metadata like “satire”, “fact checking” or “news” that describe the context of the story or other attributes.

Most search engines and news-aggregation Websites will show up this information in their desktop or mobile user interface and are being engineered to show a richer set of details. You may find that you have to do something extra like click a “more” icon or dwell on the heading to bring up this extra detail on some user interfaces.

Trust your gut reaction to that claim being shared around social media. You may realise that a claim associated with fake news may be out of touch with reality. Sensationalised or lurid headlines are a usual giveaway, along with missing information or copy that whips up immediate emotional responses from the reader.

Check the host Website or use a search engine like Google to see if the news sources you trust do cover that story. You may come across one or more tools that identify questionable news easily, typically in the form of a plug-in or extension that works with your browser if its functionality can be expanded with these kind of add-ons. It is something that is more established with browsers that run on regular Windows, Mac or Linux computers.

It is also a good idea to check for official press releases or similar material offered “from the horse’s mouth” by the candidates, political parties, government departments or similar organisations themselves. In some cases during elections, some of the candidates may run their own Web sites or they may run a Website that links from the political party’s Website. Here, you will find them on the Websites ran by these organisations and may indicate if you are dealing with a “beat-up” or exaggeration of the facts.

As you do your online research in to a topic, make sure that you are familiar with how the URLs are represented on your browser’s address bar for the various online resources that you visit. Here, be careful if a resource has more than is expected between the “.com”, “.gov.au” or similar domain-name ending and the first “/” leading to the actual online resource.

Kogan Internet table radio

Sometimes the good ol’ radio can be the trusted news source

You may have to rely on getting your news from one or more trusted sources. This would include the online presence offered by these sources. Or it may be about switching on the radio or telly for the news or visiting your local newsagent to get the latest newspaper.

Examples of these are: the ABC (Radio National, Local radio, News Radio, the main TV channel and News 24 TV channel), SBS TV, or the Fairfax newspapers. Some of the music radio stations that are part of a family run by a talk-radio network like the ABC with their ABC Classic FM or Triple J services will have their hourly newscast with news from that network. But be careful when dealing with tabloid journalism or commercial talkback radio because you may be exposed to unnecessary exaggeration or distortion of facts.

As well, use the social-network platform’s or search engine’s reporting functionality to draw attention to fake news, propaganda or misinformation that is being shared or highlighted on that online service. In some cases like reporting inappropriate autocomplete predictions to Google, you may have to use the platform’s help options to hunt for the necessary resources.

Here, as we Australians faces a run of general-election cycles that can be very tantalising for clandestine foreign interference, we have to be on our guard regarding fake news, propaganda and misinformation that could affect the polls.

Send to Kindle

Could a NAS be relevant to console gaming?

QNAP 2-disk NAS

Could a NAS like this QNAP 2-disk NAS – be used as storage for a games console?

The games console that connects to your TV is still relevant to video gaming, especially where the idea is to be able to lean back during gameplay or have a dedicated games machine to use in the living room or recreation room.

The key trends affecting video gaming

Video gaming is becoming a data-thirsty activity where there is emphasis on having a large amount of data being available to the players as they continue to play these games.

Download rather than packaged media

But there are key directions that are affecting video and computer games, especially those targeted towards games consoles. Primarily, they are being made available to download from online storefronts rather than being sold as packaged media or the packaged media is sold as a “get-you-going” option.

A continual supply of extra content available for download

Game players for all game classes are being able to benefit from free or premium downloadable content that is being continually authored by the game studios. This continued availability of extra content is providing for continued playability beyond the first rounds or sessions of the game. In some cases, some studios are even providing time-limited bonus missions or seasonal content in order to keep the players interested.

It extends to most of the games studios working on a high-quality-control regime which includes the supply of frequent updates for each of these games.

Games needing extra data as they go

Sony PS4

Games consoles like the Sony PS4 will need to benefit from extra storage offered by a NAS

More games are requiring extra data as you keep playing them. Typically with games of the “open-world” kind, some strategy games or adventure / role-playing games, this is about loading extra scenery, missions or other data that facilitates further game play. In some cases, you completing a mission in a game brings down extra data.

The best example of this would be Forza Horizon 4 which is set in the UK. Here, players complete race challenges to buy individual cars, or they could buy a property to gain access to further challenges and further vehicles. In some cases, they may have access to so-called “barn-find” cars that are discovered when they visit particular buildings and they have to restore these vehicles so that they can be used as competition vehicles. The game even adds seasonality with particular

USB portable hard disk

These portable USB hard disks are seen as a way to expand storage capacity on a games console

vehicles, areas and challenges available during particular seasons.

What is being done to answer the problem

USB hard disks or aftermarket hard-disk upsizing

But most setups are requiring the connection of USB hard disks to these consoles as a way to offload extra game data from the console’s hard disk. Or third-party repair shops simply upsize games consoles with newer larger-capacity hard disks and solid-state drives to improve performance or create extra storage space.

A problem that will easily surface with USB hard disks or aftermarket hard-disk upsize installations is the maximum capacity that a games console’s firmware can address for any mass-storage device that the console can handle. In the case of USB hard disks, there will be an expectation that these disks are a single logical volume, something that is common with consumer-electronics and similar devices that use USB mass-storage.

What could be done here

Use of network-attached-storage devices

But games-console manufacturers could look towards using network-attached storage devices as another way of storing extra game data. Here, the NAS system could be about “parking” games data if a game isn’t being played including data for missions and levels yet to be played, to share common data across games machines on the same network for multiple-player multiple-machine gameplay.

It could be feasible to share common data between a regular computer and a games console if the data is the same format for both devices. This would appeal to platforms like the XBox One where there is a strong effort to maintain a common codebase and common data between regular computers and games consoles to avoid duplication of effort in a game’s lifecycle. It is important where the goal is to port a game to as many platforms as possible.

Here, this may be about keeping player-specific data like gameplay-specific data or common data like game assets relating to a specific game. But some game assets such as games or premium downloadable content may be particular to a player or console as a way of binding it to a player who had bought the game or DLC or won the bonus content.

The advantage that a NAS can offer is that the NAS simply defines the maximum storage capacity available to the client device such as through an account-specific quota or a maximum volume offered by that device.

The main problem associated with games consoles and NAS units

Onboarding games consoles to NAS units

Integrating a NAS device may be about a difficult path with the use of the SMB data-sharing protocol being supported in these consoles. It will then require users to supply share names and username / password credentials to their consoles to make use of these network shares. In some cases, the player may have to create a player-private user account on the NAS for player-specific data.

An easier path that the games-console industry and NAS vendors could work towards is a simplified provisioning and device-discovery setup protocol. This could allow for the creation and allocation of player-specific and common data space on a NAS device for storing game data over the network.  Such a protocol could be based on the UPnP AV / DLNA protocols for device and content discovery. As well, it could be facilitated on existing equipment through firmware updates or add-on apps for both the NAS and the games consoles.

Other uses

Of course, there is the issue of being able to draw upon one’s own multimedia content library which would be hosted on at least one DLNA-compliant NAS. This could come in to its own with, for example, open-world car-racing games where you can equip your in-game car with a “virtual car radio” that plays audio content from different online or network content sources.

Another direction that may be looked at with higher-performance NAS units of the QNAP or Synology ilk would be to run them as games servers for LAN-based multiplayer multi-machine gaming. The idea may be about a purely local game that is independent of an Internet-hosted online service or it could simply be about creating localised competition elements in addition to the Internet-hosted online competition elements.

Conclusion

A network-attached-storage device can be considered a relevant device for console-based video gaming as an approach towards offloading or backing up video-game data. It can also be used as an approach for sharing common game data amongst multiple consoles or other devices that are playing the same game.

Send to Kindle

Fortnite made it with true cross-platform multiplayer gaming

Articles

Sony PS4

This Sony PS4 can now benefit from true cross-platform online gameplay thanks to Fortnite

PS4 Cross-Play Is Finally Happening; Fortnite Beta Starts Today | GameSpot

Fortnite Won | Gizmodo

Fans Forcing Sony Into ‘Fortnite’ PS4 Crossplay Is A Watershed Moment For Gaming | Forbes

From the horse’s mouth

Sony Interactive Entertainment (PlayStation)

Extended Fortnite Cross-Play Beta Launches on PS4 Starting Today (Press Release)

My Comments

Game On no matter the console! At last true multiplatform cross-play has arrived!

All off the regular-computer, console and mobile platforms that Epic Games wrote the various ports of the Fortnite battle-royale multiplayer game have supported cross-platform multiplayer gaming except for one glaring omission being Sony with their PS4 console.

It has been part of a long-time practice with games-console manufacturers who are dependent on full vertical integration which affected things like multi-player multi-machine gaming where the games-console vendor would prefer to keep that between their own products. This was against the accepted norms of what is accepted with regular personal computers where it is desirable to play the same online game no matter the computing platform that your opponents use.

XBox One games console press photo courtesy Microsoft

The XBox One’s main archrival – the PS4 can participate in cross-platform online gameplay thanks to Fortnite

It would also affect the ability for a games studio to port a game across all platforms and assure a similar online play experience no matter the platform. Here it wouldn’t matter whether the online play was about competing with other players including earning your place on one or more leaderboards, participating in a “virtual-world” that the game is about or trading in-game goods in a game-hosted marketplace.

Gradually, Sony and Microsoft. along with most games studios allowed a limited form of “cross-play” (online play of the same game from gaming devices of different gaming platforms) by allowing for, for example, a Windows regular computer to become a player in an online game with a games console. But with Fortnite, Microsoft and Nintendo brought their latest consoles to the “cross-play” party.

Now Sony have opened up the path towards third-party game studios implementing multi-platform online and network gameplay for their games titles. This is through an open beta program where a version of Fortnite with this true multiplatform cross-play code integrated but this code is really test code that may not be stable. It will be seen by Sony to be a proving ground for true multiplayer multiplatform online gaming involving all computing devices including gams consoles with them “opening up” the PlayStation platform for more cross-platform online gameplay.

This was as a result of “people power” with Fortnite fans complaining to Sony about ignoring the large PS4 installed base when it came to cross-platform gameplay especially as other regular, mobile and console platforms allowed for this kind of gameplay with very little friction.

Personally I see this as a seachange for network and online multiple-machine gaming especially in the games-console space. Here it could be about allowing third-party game developers including indie studios to create these kind of gameplay experiences but allow users to join these experiences no matter the console that they have.

With the rise of Fortnite, it can open up the idea of porting a game that has online or network play across every gaming platform while assuring users that they can game online no matter what they use. It can even lead towards increased interest in massively-multiplayer-online games especially where they could be played on a laptop, a smartphone or a console connected to the big TV.

Send to Kindle

Google to keep deep records of political ads served on their platforms

Articles

Australian House of Representatives ballot box - press picture courtesy of Australian Electoral Commission

Are you sure you are casting your vote without undue influence?

Google Releases Political Ad Database and Trump Is the Big Winner | Gizmodo

From the horse’s mouth

Google

Introducing A New Transparency Report For Political Ads (Blog Post)

Transparency Report – Political Advertising On Google (Currently relevant to federal elections in the USA)

Advertising Policies Help Page – Political Advertising (Key details apply to USA Federal elections only)

My Comments

If you use YouTube as a free user or surf around the Internet to most ad-facilitated blogs and Websites like this one, you will find that the display ads hosted are provided by an ad network owned or managed by Google. Similarly, some free ad-funded mobile apps may be showing ads that are facilitated through Google’s ad networks. Similarly, some advertisers pay to have links to their online resources placed at the top of the Google search-results list.

Online ad - to be respected like advertising in printed media

Google to keep records of political ads that appear on these sites so they have the same kind of respect as traditional print ads

Over the past few years, there has been a strong conversation regarding the authenticity of political advertising on the online space thanks to the recent election-meddling and fake news scandals. This concern has been shown due to the fact that the online space easily transcends jurisdictional borders and isn’t as regulated as traditional broadcast, print and away-from-home advertising especially when it comes to political advertising.

Then there is also the fact that relatively-open publishing platforms can be used to present content of propaganda value as editorial-grade content. The discovery of this content can be facilitated through search engines and the Social Web whereupon the content can even be shared further.

Recently Facebook have taken action to require authentication of people and other entities behind ads hosted on their platforms and Pages or Public Profiles with high follower counts. This ins in conjunction to providing end-users access to archival information about ad campaigns ran on that platform. This is part of increased efforts by them and Google to gain control of political ads appearing on their platforms.

But Google have taken things further by requiring authentication and proof of legitimate residency in the USA for entities publishing political ads through Google-managed ad platforms that targeting American voters on a federal level. As well, they are keeping archival information about the political ads including the ads’ creatives, who sponsored the ad and how much is spent with Google on the campaign. They are even making available software “hooks” to this data for researchers, concerned citizens, political watchdog groups and the like to draw this data in to their IT systems for further research.

If you view a political ad in the USA on this site or other sites that use display advertising facilitated by Google, you will find out who is behind that ad if you click or tap on the blue arrow at the top right hand corner of that ad. Then you will see the disclosure details under the “Why This Ad” heading. Those of you who use YouTube can bring up this same information if you click or tap on the “i” (information) or three-dot icon while the ad is playing.

Google are intending to roll these requirements out for state-level and local-level campaigns within the USA as well as rolling out similar requirements with other countries and their sub-national jurisdictions. They also want to extend this vendor-based oversight towards issues-based political advertising which, in a lot of cases, makes up the bulk of that kind of advertising.

Personally I would also like to see Google and others who manage online ad platforms be able to “keep in the loop” with election-oversight authorities like the USA’s Federal Election Commission or the Australian Electoral Commission. Here, it can be used to identify inordinate political-donation and campaign-spending activity that political parties and others are engaging in.

Send to Kindle

Google and Facebook are starting to bring accountability to political advertising

Articles

Australian House of Representatives ballot box - press picture courtesy of Australian Electoral Commission

Are you sure you are casting your vote without undue influence? (Courtesy of Australian Electoral Commission)

Facebook announces major changes to political ad policies | NBC News

Facebook reveals new political ad policies in wake of U.S. election | VentureBeat

What Can and Can’t You Do with Political Advertising on Facebook? | Spatially

Google Joins Facebook In Banning All Ads Related To Ireland’s Big Abortion Vote | Gizmodo

From the horse’s mouth

Facebook

Update on Our Advertising Transparency and Authenticity Efforts {Press Release)

Facebook will not be accepting referendum related ads from advertisers based outside of Ireland {Press Release)

Google

Supporting election integrity through greater advertising transparency (Blog Post)

My Comments

Over the last five months, a strong conversation has risen surrounding electioneering and political advertising on the online platforms including social media and online advertising.

The trends concerning this activity is that the political advertising spend is moving away from traditional print and broadcast media towards online media as we make more use of highly-portable computing devices to consume our information and entertainment.

Issues that have also been raised include the use of fake comments and pre-programmed auto-responding “bots” as part of political campaigns. This is alongside the rise of very divisive political campaigns during the 2016 Brexit and US Presidential election cycles that played on racial and religious prejudices. There is also the fact that nation states with improper intentions are seeing the idea of poisoning the information flow as another weapon in their cyber-warfare arsenal.

It has also been facilitated through the use of highly-focused data-driven campaign-targeting techniques based on factors like race, gender, location and interests, with this practice being highlighted in the Cambridge Analytica saga that caught up Facebook and Twitter.

As well, the online advertising and social media platforms have made it easy to create and maintain an advertising or editorial campaign that transcends jurisdictional borders. This is compared to traditional media that would be dependent on having the advertising material pass muster with the media outlet’s advertising staff in the outlet’s market before it hits the presses or the airwaves.

This issue will become more real with the use of addressable TV advertising which is currently practised with some advertising-based video-on-demand services and some cable-TV platforms but will become the norm with traditional linear TV being delivered through through the increasing use of interactive-TV platforms.

This technology would facilitate “hyper-targeting” of political campaigns such as municipal-level or postcode/ZIP-code targeting yet maintain the same “air of legitimacy” that the traditional TV experience provides, making it feasible to destabilise elections and civil discourse on the local-government level.

Election-oversight authorities in the various jurisdictions like the Australian Electoral Commission or the UK’s Electoral Commission have been doing battle with the online trend because most of the legislation and regulation surrounding political and election activities has been “set in stone” before the rise of the Internet. For example, in most jurisdictions, you will see or hear a disclosure tag after a political advertisement stating which organisation or individual was behind that ad. Or there will be financial reporting and auditing requirements for the election campaigns that take place before the polls.

Facebook and Google are having to face these realities through the use of updated advertising-platform policies which govern political advertising, But Facebook applies this to candidate-based campaigns and issues-based campaigns while Google applies this to candidate-based campaigns only at the time of writing.

Firstly there is a prohibition on political advertising from entities foreign to the jurisdiction that the ad is targeted for. This is in line with legislation and regulation implemented by most jurisdictions proscribing foreign donations to political campaigns affecting that jurisdiction.

This is augmented through a requirement for political advertisers to furnish proof of identity and residence in the targeted jurisdiction. In the case of Facebook, they apply this policy to pages and profiles with very large followings as well as ads. Similarly, they implement a postcard-based proof-of-residence procedure where they send a postcard by snail mail to the user’s US-based home / business address to very presence in the USA.

Facebook augments this requirement by using artificial-intelligence to flag if an ad is political or not, so they can make sure that the advertiser is complying with the requirements for political advertising on this platform.

Like with traditional media, political ads on both these platforms will be required to have a disclosure tag. But Facebook goes further by making this a hyperlink that end-users can click on to see details like verification documents, why the viewer saw the ad along with a link to the sponsoring organisation’s Facebook Page. This has more utility than the slide shown at the end of a TV or online ad, the voice-announcement at the end of a radio ad or small text at the bottom of a print-media ad or billboard poster which most of these tags represent.

Both of the Internet titans will also make sure details about these campaigns are available and transparent to end-users so they know what is going on. For example, Facebook requires advertisers to maintain a Facebook Page before they buy advertising on any of the Facebook-owned platforms. This will have a “View Ads” tab which includes details about targeting of each current and prior campaign with a four-year archive allowance.

Google has taken things further by making sure that political organisations, politicians, the media and journalists are aware of the resources they have to assure data security for their campaigns and other efforts. Here, they have prepared a “Protect Your Election” Webpage that highlights the resources that they provide that are relevant for each kind of player in a political campaign. This includes Project Shield to protect Websites against distributed denial-of-service attacks, along with enhanced security measures available to operators of Google Accounts associated with critical data.

Both companies have been implementing these procedures for North America with Facebook trying them out in Canada then “cementing” them in to the USA before the midterm Congress election cycle there. Both companies then took action to suspend political ads from foreign entities outside Ireland during the election cycle for the Eighth Amendment abortion referendum taking place in that country. Here, they have applied the prohibition until the close of polls on May 25 2018. Let’s not forget that these standards will be gradually rolled out in to other jurisdictions over time.

But what I would like to see is for companies who run online advertising and social-media activity to liaise strongly with election-oversight officials in the various jurisdictions especially if it affects a currently-running poll or one that is to take place in the near future. This is in order to advise these officials of any irregularities that are taking place with political advertising on their online platforms or for the officials to notify them about issues or threats that can manifest through the advertising process.

 

Send to Kindle

Dell takes a leaf out of Detroit’s book with their budget gaming laptops

Articles

Dell G7 15 gaming laptop press picture courtesy of Dell USA

Dell G Series laptops – to be the “pony cars” of the gaming laptop scene

Dell’s new G series laptops pair gaming specs with a cheap plastic chassis | The Verge

Dell rebrands Inspiron gaming laptops to G Series, serves up four new models | Digital Trends

Dell’s G Series laptops are priced for every gamer | PC World

Dell’s Renamed Low-Cost Gaming Laptops are Thinner and Faster Than Before | Gizmodo

From the horse’s mouth

Dell

Product Page

Press Release

My Comments

Ford Mustang fastback at car show

Dell used the same approach as Ford did in the 1960s with the original Mustang

During the heyday of the “good cars” that was represented through the 1960s and 1970s, the major vehicle builders worked on various ways to approach younger drivers who were after something that was special.

One of these was to offer a “pony car” which was a specifically-designed sporty-styled two-door car that had a wide range of power, trim and other options yet had a base model that was affordable to this class of buyer. Another was to place in to the product lineup for a standard family-car model a two-door coupe and / or a “sports sedan” / “sports saloon” that is a derivative of that standard family car and built on that same chassis but known under an exciting name with examples being the Holden Monaro or the Plymouth Duster. This would be available as something that young people could want to have when they are after something impressive.

Both these approaches were made feasible through the use of commonly-produced parts rather than special parts for most of the variants or option classes. As well, there was the option for vehicle builders to run with variants that are a bit more special such as racing-homologation specials as well as providing “up-sell” options for customers to vary their cars with.

The various laptop computer manufacturers are trying to work on a product class that can emulate what was achieved with these cars. Here, it is to achieve a range of affordable high-performance computers that can appeal to young buyers who want to play the latest “enthusiast-grade” games on.

Dell Inspiron 15 Gaming laptop

The Dell Inspiron 15 7000 Gaming laptop – to be superseded by the Dell G Series

One of the steps that has taken place was to offer a high-performance “gaming-grade” variant of a standard laptop model like the Dell Inspiron 15 Gaming laptop, one of which I had reviewed. This approach is similar to offering the “Sport” or “GT” variant of a common family-car model, where the vehicle is equipped with a performance-tuned powertrain like the Ford Falcon GT cars.

But Dell have come very closer to the mark associated with either the “pony cars” or the sporty-styled vehicles derived from the standard family-car model with the release of the Inspiron G series of affordable gamer-grade laptops. Here, they released the G3, G5 and G7 models with baseline models being equipped with traditional hard disks and small RAM amounts. But these were built on a very similar construction to the affordable mainstream laptops.

These models are intended to replace the Inspiron 15 Gaming series of performance laptops and it shows that they want to cater to the young gamers who may not afford the high-end gaming-focused models. As well, the G Series name tag is intended to replace the Inspiron nametag due to its association with Dell’s mainstream consumer laptop products which takes the “thunder” out of owning a special product. This is similar to the situation I called out earlier with sporty vehicles that are derivatives of family-car models having their own nameplate.

The G3, which is considered the entry-level model, comes with a 15” or a 17” Full-HD screen and is available in a black or blue finish with the 15” model also available in white. It also has a standard USB-C connection with Thunderbolt 3 as an extra-cost “upsell” option along with Bluetooth 5 connectivity. This computer is the thinnest of the series but doesn’t have as much ventilation as the others.

The G5 which is the step-up model, is a thicker unit with rear-facing ventilation and is finished in black or red. This, like the G7 is equipped with Thunderbolt 3 for an external graphics module along with Bluetooth 4 and has the ability for one to buy a fingerprint scanner as an option. Also it comes only with a 15” screen available in 4K or Full HD resolution.

The G7 is the top-shelf model totally optimised for performance. This is a thicker unit with increased ventilation and implements high-clocked CPU and RAM that is tuned for performance. It has similar connectivity to the G5 along with similar display technology and is the only computer in the lineup to implement the highly-powerful Intel Core i9 CPU that was launched as the high-performance laptop CPU as part of the latest Coffee Lake lineup.

All the computers will be implementing the latest Coffee Lake lineup of Intel high-performance Core CPUs, being the Core i5-8300HQ or Core i7-8750H processors depending on the specification. In the case of the high-performance G7, the Intel Core i9-8950HQ CPU will be offered as an option for high performance.

They all use standalone NVIDIA graphics processors to paint the picture on the display with a choice between the GeForce GTX1060 with Max-Q, the GeForce GTX1050Ti or the GeForce GTX1050. What is interesting about the GeForce GTX1060 with Max-Q is that it is designed to run with reduced power consumption and thermal output, thus allowing it to run cool in slim notebooks and do away with fans. But the limitation here is that the computer doesn’t have the same kind of graphics performance compared to a fully-fledged GeForce GTX1060 setup which would be deployed in the larger gaming laptops.

Lower-tier packages will run with mechanical hard drives while the better packages will offer use of hybrid hard disks (increased solid-state cache), solid-state drives or dual-drive setups with the system drive (C drive with operating system) being a solid-state device and data being held on a 1Tb hard disk known as the D drive.

I would see these machines serving as a high-performance solo computer for people like college / university students who want to work with high-end games or put their foot in to advanced graphics work. As well, I wouldn’t put it past Lenovo, HP and others to run with budget-priced high-performance gaming laptops in order to compete with Dell in courting this market segment.

Send to Kindle