link1s.site

Musk is the billionaire who lost the most money in the first half of 2024: $5 billion a month

At the beginning of this year, Elon Musk had a fortune of $251 billion and could almost single-handedly solve world hunger. However, Tesla's stagnant sales, the endless struggle to buy Twitter, and the volatility of Tesla's stock price meant he lost a lot of money this year.

According to Forbes, Musk is the billionaire with the most losses so far this year, with his wealth shrinking at a rate of about $5 billion a month. According to the website, his wealth shrank by more than 10% from the end of 2023 to June 28, 2024. As the website explains:

Between December 31, 2023, and June 28, the last day of regular stock market trading for the first half of the year, Musk's net worth fell from $251.3 billion to $221.4 billion, a bigger drop than any other billionaire tracked by Forbes, but Musk remains the richest person on the planet.

The main reason for the dip in Musk's pocketbook is that a Delaware judge in January canceled Musk's then-record Tesla compensation package worth $51 billion, which led Forbes to cut the value of the equity award by 50 percent because of uncertainty about whether Musk would receive those stock options.

Excluding that bonus, Musk's wealth has remained volatile over the past six months, with the value of his 13 percent stake in Tesla shrinking by about $20 billion as falling profits and car deliveries sent the stock down 20 percent. But that was partly offset by the growth of Musk's stake in his generative artificial intelligence startup xAI to $14.4 billion (Musk also has a roughly $75 billion stake in private aerospace company SpaceX, a $7 billion stake in social media company X, And smaller stakes in other companies, such as brain experimentation startup Neuralink).

Nvidia H20 will sell 1 million units this year, contributing $12 billion in revenue!
Recently, according to the FT, citing the latest forecast data of the market research institute SemiAnalysis, AI chip giant NVIDIA will ship more than 1 million new NVIDIA H20 acceleration chips to the Chinese market this year, and it is expected that the cost of each chip is between $12,000 and $13,000. This is expected to generate more than $12 billion in revenue for Nvidia. Affected by the United States export control policy, Nvidia's advanced AI chip exports to China have been restricted, H20 is Nvidia based on H100 specifically for the Chinese market to launch the three "castration version" GPU among the strongest performance, but its AI performance is only less than 15% of H100, some performance is even less than the domestic Ascend 910B. When Nvidia launched the new H20 in the spring of this year, there were reports that due to the large castration of H20 performance, coupled with the high price, Chinese customers' interest in buying is insufficient, and they will turn more to choose China's domestic AI chips. Then there are rumors that Nvidia has lowered the price of the H20 in order to improve its competitiveness. However, the latest news shows that due to supply issues caused by the low yield of the Ascend 910B chip, Chinese manufacturers in the absence of supply and other better options, Nvidia H20 has started to attract new purchases from Chinese tech giants such as Baidu, Alibaba, Tencent and Bytedance. Analysts at both Morgan Stanley and SemiAnalysis said the H20 chip is now being shipped in bulk and is popular with Chinese customers, despite its performance degradation compared to chips Nvidia sells in the United States.
Are US development jobs falling off a cliff?
Companies are going to have fewer people and fewer layers. Ten years from now, the software development circuit may have fewer jobs, higher salaries, and more product-centric work. The reason behind it is the rapid development of AI, AI has approached human beings at the intelligence level, a lot of work relying on thinking ability may be handed over to AI, while emotion is still the territory of human beings, how to communicate and collaborate is the most important ability in the near future. When Indeed's chart for software development and operations jobs was released, we found that, as the chart shows, there was a peak in early 2022, but after that there was a precipitous decline.
Google extends Linux kernel support to 4 years
According to AndroidAuthority, the Linux kernel used by Android devices is mostly derived from Google's Android Universal Kernel (ACK) branch, which is created from the Android mainline kernel branch when new LTS versions are released upstream. For example, when kernel version 6.6 is announced as the latest LTS release, an ACK branch for Android15-6.6 appears shortly after, with the "android15" in the name referring to the Android version of the kernel (in this case, Android 15). Google maintains its own set of LTS kernel branches for three main reasons. First, Google can integrate upstream features that have not yet been released into the ACK branch by backporting or picking, so as to meet the specific needs of Android. Second, Google can include some features that are being developed upstream in the ACK branch ahead of time, making it available for Android devices as early as possible. Finally, Google can add some vendor or original equipment manufacturer (OEM) features for other Android partners to use. Once created, Google continues to update the ACK branch to include not only bug fixes for Android specific code, but also to integrate the LTS merge content of the upstream kernel branch. For example, the Linux kernel vulnerability disclosed in the July 2024 Android security bulletin will be fixed through these updates. However, it is not easy to distinguish a bug fix from other bug fixes, as a patch that fixes a bug may also accidentally plug a security vulnerability that the submitter did not know about or chose not to disclose. Google does its best to recognize this, but it inevitably misses the mark, resulting in bug fixes for the upstream Linux kernel being released months before Android devices. As a result, Google has been urging Android vendors to regularly update the LTS kernel to avoid being caught off guard by unexpectedly disclosed security vulnerabilities. Clearly, the LTS version of the Linux kernel is critical to the security of Android devices, helping Google and vendors deal with known and unknown security vulnerabilities. The longer the support period, the more timely security updates Google and vendors can provide to devices.
Google Pixel 9 series phones will use Qualcomm ultrasonic fingerprint recognition technology
Google's new generation of flagship smartphone Pixel 9 series is expected to be officially released in mid-August, and the new machine is likely to be equipped with ultrasonic fingerprint recognition technology for the first time to replace the original optical fingerprint recognition. According to core intelligence, Google Pixel 9 series will use the same Qualcomm 3D Sonic Gen 2 ultrasonic fingerprint recognition sensor as the Samsung Galaxy S24 Ultra. This ultrasonic technology under the screen fingerprint sensor is Qualcomm released at the CES2021 conference, compared with the previous generation of solutions, the module thickness is further reduced to 0.2mm, while the scanning area is expanded to 8mm×8mm, that is, the recognition area is increased by 77%. This will also allow users to realize fingerprint recognition without having to point their fingertips 100% accurately at the identification area indicated on the screen.
The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.