5.1 C
New York
Friday, March 14, 2025
Home Blog

Stronger waste prevention measures wanted to speed up the Nordic transition to a round financial system






Stronger waste prevention measures wanted to speed up the Nordic transition to a round financial system
Accumulating clothes for recycling (picture credit score: Getty Pictures/Maskot).

Extra systematic waste prevention methods are wanted to realize regional and nationwide sustainability objectives in Scandinavia, in accordance with a brand new report. It outlines sensible measures to strengthen the round financial system within the Nordics, with a specific deal with waste prevention and reuse.

The Nordic Council of Ministers engaged sustainability specialist Sweco to supply suggestions on accelerating waste prevention throughout the area. The undertaking, which centres on municipal waste, was carried out by a crew of Sweco specialists from Finland, Sweden, Denmark and Norway.

“The report’s foremost takeaway is that whereas waste prevention is a precedence within the Nordic nations, a transparent want exists for systematic, sturdy measures to show these insurance policies into tangible outcomes,” mentioned Thomas Hietto, Enterprise Space President of Sweco Finland.

The report attracts on worldwide greatest practices and evaluates a spread of efficient financial devices that may very well be adopted by the Nordic nations, comparable to focused charges on quick trend, VAT reductions for second-hand commerce and restore companies, and R&D funding for revolutionary round enterprise fashions.

Hietto mentioned the report “offers essential insights on how the Nordic nations can advance their waste administration methods from conventional recycling to a completely built-in round financial system. This strategy addresses your complete product worth chain and makes it simpler for residents to make sustainable selections”.

The report is discovered right here. Within the report, Sweco concludes that:

  • Stronger coverage devices are vital to enhance waste prevention, comparable to regulatory and financial measures together with taxes, charges and bans.
  • Steering devices ought to goal your complete product worth chain, reasonably than focusing solely on the end-of-life stage.
  • Sustainable shopper selections must be made extra enticing.







reactjs – iOS Cell Video Audio Playback Points in React


I am experiencing points with audio playback in my React video participant part particularly on iOS cell units (iPhone/iPad). Even after implementing a number of advisable options, together with Apple’s personal pointers, the audio nonetheless is not working correctly on iOS Safari. It really works utterly positive on Android. On iOS, I ensured the video does not autoplay (it requires consumer interplay). Listed here are all the small print:

Setting

  • iOS Safari (newest model)
  • React 18
  • TypeScript
  • Video information: MP4 with AAC audio codec

Present Implementation

const VideoPlayer: React.FC = ({
  src,
  autoplay = true,
}) => {
  const videoRef = useRef(null);
  const isIOSDevice = isIOS(); // Customized iOS detection
  const [touchStartY, setTouchStartY] = useState(null);
  const [touchStartTime, setTouchStartTime] = useState(null);

  // Deal with contact begin occasion for gesture detection
  const handleTouchStart = (e: React.TouchEvent) => {
    setTouchStartY(e.touches[0].clientY);
    setTouchStartTime(Date.now());
  };

  // Deal with contact finish occasion with gesture validation
  const handleTouchEnd = (e: React.TouchEvent) => {
    if (touchStartY === null || touchStartTime === null) return;
    
    const touchEndY = e.changedTouches[0].clientY;
    const touchEndTime = Date.now();
    
    // Validate if it is a respectable faucet (not a scroll)
    const verticalDistance = Math.abs(touchEndY - touchStartY);
    const touchDuration = touchEndTime - touchStartTime;
    
    // Solely set off for fast faucets (< 200ms) with minimal vertical motion
    if (touchDuration < 200 && verticalDistance < 10) {
      handleVideoInteraction(e);
    }
    
    setTouchStartY(null);
    setTouchStartTime(null);
  };

  // Simplified video interplay handler following Apple's pointers
  const handleVideoInteraction = (e: React.MouseEvent | React.TouchEvent) => {
    console.log('Video interplay detected:', {
      sort: e.sort,
      timestamp: new Date().toISOString()
    });

    // Guarantee keyboard is dismissed (iOS requirement)
    if (doc.activeElement instanceof HTMLElement) {
      doc.activeElement.blur();
    }
    
    e.stopPropagation();
    
    const video = videoRef.present;
    if (!video || !video.paused) return;
    
    // Try playback in response to consumer gesture
    video.play().catch(err => console.error('Error enjoying video:', err));
  };

  // Impact to deal with video supply and preliminary state
  useEffect(() => {
    console.log('VideoPlayer props:', { src, loadingState });
    
    setError(null);
    setLoadingState('preliminary');
    setShowPlayButton(false); // By no means present customized play button on iOS
    
    if (videoRef.present) {
      // Set crossOrigin attribute for CORS
      videoRef.present.crossOrigin = "nameless";
      
      if (autoplay && !hasPlayed && !isIOSDevice) {
        // Solely autoplay on non-iOS units
        dismissKeyboard();
        setHasPlayed(true);
      }
    }
  }, [src, autoplay, hasPlayed, isIOSDevice]);

  return (
    
      
    
  );
};
  1. Apple’s Pointers Implementation
    • Eliminated customized play controls on iOS
    • Utilizing native video controls for consumer interplay
    • Guaranteeing audio playback is triggered by consumer gesture
    • Following Apple’s audio session pointers
    • Correctly dealing with the canplaythrough occasion

Present Habits

  • Video performs however with out sound on iOS cell
  • Mute/unmute button in native video controls does not work
  • Audio works positive on desktop browsers and Android units
  • Movies are confirmed to have AAC audio codec
  • No console errors associated to audio playback
  • Person interplay does not set off audio as anticipated

Questions

  1. Are there any extra iOS-specific necessities I am lacking?
  2. May this be associated to iOS audio session dealing with?
  3. Are there recognized points with React’s dealing with of video parts on iOS?
  4. Ought to I be implementing extra audio context initialization?

Any insights or strategies could be tremendously appreciated!

Constructing glorious video games with higher graphics and efficiency



Constructing glorious video games with higher graphics and efficiency

Posted by Matthew McCullough – VP of Product Administration, Android

We’re stepping up our multiplatform gaming providing with thrilling information dropping at this yr’s Recreation Builders Convention (GDC). We’re bringing customers extra video games, extra methods to play your video games throughout gadgets, and improved gameplay. You’ll be able to learn all in regards to the updates for customers from The Key phrase. At GDC, we’ll be diving into all the newest video games coming to Play, plus new developer instruments that’ll assist enhance gameplay throughout the Android ecosystem.

At this time, we’re sharing a more in-depth have a look at what’s new from Android. We’re making Vulkan the official graphics API on Android, enabling you to construct immersive visuals, and we’re enhancing the Android Dynamic Efficiency Framework (ADPF) that can assist you ship longer, extra secure gameplays. Take a look at the video or hold studying under.

Extra immersive visuals constructed on Vulkan, now the official graphics API

Today, video games require extra processing energy for sensible graphics and cutting-edge visuals. Vulkan is an API used for low stage graphics that helps builders maximize the efficiency of recent GPUs, and in the present day we’re making it the official graphics API for Android. This unlocks superior options like ray tracing and multithreading for sensible and immersive gaming visuals. For instance, Diablo Immortal used Vulkan to implement ray tracing, bringing the world of Sanctuary to life with spectacular particular results, from fiery explosions to icy blasts.

Moving image showing ray tracing in Diablo Immortal on Google Play

Diablo Immortal operating on Vulkan

For informal video games like Pokémon TCG Pocket, which pulls gamers into the colourful world of every Pokémon, Vulkan helps optimize graphics throughout a broad vary of gadgets to make sure a clean and interesting expertise for each participant.

Moving image showing gameplay of Pokemon TCG Pocket on Google Play

Pokémon TCG Pocket operating on Vulkan

We’re excited to announce that Android is transitioning to a contemporary, unified rendering stack with Vulkan at its core. Beginning with our subsequent Android launch, extra gadgets will use Vulkan to course of all graphics instructions. In case your sport is operating on OpenGL, it is going to use ANGLE as a system driver that interprets OpenGL to Vulkan. We suggest testing your sport on ANGLE in the present day to make sure it’s prepared for the Vulkan transition.

We’re additionally partnering with main sport engines to make Vulkan integration simpler. With Unity 6, you may configure Vulkan per system whereas older variations can entry this setting by plugins. Over 45% of periods from new video games on Unity* use Vulkan, and we count on this quantity to develop quickly.

To simplify workflows additional, we’re teaming up with the Samsung Austin Analysis Middle to create an built-in GPU profiler toolchain for Vulkan and AI/ML optimization. Coming later this yr, this software will allow builders to make graphics, reminiscence and compute workloads extra environment friendly.

Longer and smoother gameplay periods with ADPF

Android Dynamic Efficiency Framework (ADPF) allows builders to regulate between the system and sport’s efficiency in real-time primarily based on the thermal state of the system, and it’s getting a giant replace in the present day to supply longer and smoother gameplay periods. ADPF is designed to work throughout a variety of gadgets together with fashions just like the Pixel 9 household and the Samsung S25 Collection. We’re excited to see MMORPGs like Lineage W integrating ADPF to optimize efficiency on their core goal gadgets.

Moving image showing gameplay from Lineage w on Google Play

Lineage W operating on ADPF

Right here’s how we’re enhancing ADPF with higher efficiency and simplified integration:

    • Stronger efficiency: Our collaboration with MediaTek, a number one chip provider for Android gadgets, has introduced enhanced stability to ADPF. Gadgets powered by MediaTek’s MAGT system-on-chip answer can now totally make the most of ADPF’s efficiency optimization capabilities.
    • Simpler integration: Main sport engines now provide built-in ADPF help with easy interfaces and default configurations. For superior controls, builders can customise the ADPF habits in actual time.

Efficiency optimization with extra options in Play Console

When you’ve launched your sport, Play Console presents the instruments to observe and enhance your sport’s efficiency. We’re newly together with Low Reminiscence Killers (LMK) in Android vitals, providing you with perception into reminiscence constraints that may trigger your sport to crash. Android vitals is your one-stop vacation spot for monitoring metrics that influence your visibility on the Play Retailer like sluggish periods. You could find this info subsequent to attain and gadgets which gives updates in your sport’s consumer distribution and notifies builders for device-specific points.

Android vitals details in Google Play Console

Test your Android vitals often to make sure excessive technical high quality

Bringing PC video games to cellular, and pushing the boundaries of gaming

We’re launching a pilot program to simplify the method of bringing PC video games to cellular. It gives help ranging from Android sport improvement throughout publishing your sport on Play. Beginning this month, video games like DREDGE and TABS Cellular are rising their cellular viewers utilizing this program. Many extra are following of their footsteps this yr, together with Disco Elysium. You’ll be able to specific your curiosity to be part of the PC to cellular program.

Moving image displaying thumbnails of titles of new PC games coming to mobile - Disco Elysium, TABS Mobile, and DREDGE

New PC video games are coming to cellular

You’ll be able to study extra about Android sport improvement from our developer web site. We will’t wait to see your title be part of the ranks of those superb video games constructed for Android. And if you happen to’ll be at GDC subsequent week, we’d like to say good day – cease by on the Moscone Middle West Corridor!

* Supply: Google inside knowledge measuring video games on Android 14 or later launched between August 2024 – February 2025.

BCDR Tendencies and Challenges for 2025

0


BCDR Tendencies and Challenges for 2025

As IT environments develop extra complicated, IT professionals are dealing with unprecedented strain to safe business-critical knowledge. With hybrid work the brand new normal and cloud adoption on the rise, knowledge is more and more distributed throughout completely different environments, suppliers and areas, increasing the assault floor for rising cyberthreats. Whereas the necessity for a robust knowledge safety technique has change into extra vital than ever, organizations discover themselves caught in a troublesome balancing act. They’re struggling to handle the rising prices and complexities of enterprise continuity and catastrophe restoration (BCDR) whereas making certain that their business-critical knowledge stays safe and recoverable.

To assist IT groups and managed service suppliers (MSPs) perceive how their friends are navigating these challenges, the State of Backup and Restoration Report 2025 has gathered insights from greater than 3,000 IT professionals, safety consultants and directors worldwide. The report reveals how companies are tackling as we speak’s largest knowledge safety challenges, the methods they’re adopting and the vital gaps that would go away them susceptible to knowledge loss and downtime.

So, the place do organizations stand? The survey signifies that the boldness in backup methods is declining, cloud adoption is outpacing knowledge safety methods and restoration expectations typically do not match actuality. On this article, we’ll discover the important thing findings from the report to assist IT groups and MSPs keep ready for what comes subsequent. In the meantime, for full insights and actionable methods, you’ll be able to obtain the entire report now and see how your group compares.

The backup paradox: Important but more and more unreliable

Information backup and restoration ought to be a security web for companies, however for a lot of, it has change into a supply of frustration, complexity and danger. The numbers inform a transparent story — backup inefficiencies are rising, IT groups are overburdened and safety vulnerabilities stay widespread. Let’s dive into the important thing findings.

Pattern #1: Information loss is not a query of “if” however “when.”

9 in 10 organizations skilled operational downtime up to now 12 months.

Pattern #2: Confidence in backup methods is declining.

Belief in backup options is slipping, leaving many companies questioning whether or not they can reliably get better from knowledge loss.

  • Solely 40% of IT groups really feel assured of their backup methods.
  • About 30% fear their backup technique is insufficient, elevating considerations about knowledge safety and recoverability.
  • Greater than half of organizations plan to modify backup suppliers, citing price, inefficiency and restricted catastrophe restoration capabilities as main ache factors.

Pattern #3: Backup administration is a time-consuming burden.

Managing backups is not simply complicated — it is draining IT sources. As knowledge volumes develop, IT groups are spending extra time than ever sustaining backup methods, testing restoration processes and troubleshooting failures.

  • IT groups now spend 10+ hours per week managing backups, including to operational pressure.
  • The variety of companies spending greater than three hours weekly on backups jumped from 5% in 2022 to 23% in 2024, denoting a major rise in effort and time.
  • Round 35% of organizations would not even know if backups had been skipped or missed, highlighting vital gaps in monitoring and testing.

Pattern #4: Safety gaps are leaving backups uncovered.

Backup methods are speculated to be the final line of protection in opposition to cyberthreats. Nevertheless, many comprise severe safety flaws that put knowledge in danger.

  • About 25% of workloads lack insurance policies that restrict unauthorized entry to backups, leaving them susceptible to malicious assaults.
  • There are various ranges of safety for credentials throughout companies. Solely 33% of companies use devoted password managers. Others depend on much less safe strategies like doc storage platforms or browser-based password instruments, introducing potential vulnerabilities.

The restoration hole: Why companies cannot bounce again quick sufficient

Having the backup of information is one factor; recovering it shortly and reliably is one other. IT groups face important hurdles in making certain quick, seamless restoration when catastrophe strikes.

Pattern #1: Fast and dependable knowledge restoration stays a significant problem in knowledge safety.

The highest considerations cited by IT groups with respect to knowledge safety are prices, compliance necessities and the precise strategy of recovering knowledge. Since IT groups spend hours managing and troubleshooting backup points, it leaves little time for testing and validating restoration processes, growing the chance of failure when it issues most.

Pattern #2: Backup and DR testing gaps go away companies susceptible.

A backup answer is simply nearly as good as its potential to revive knowledge, but testing stays inconsistent throughout organizations.

  • Solely 15% of companies conduct day by day backup checks, that means most function with a stage of danger that would jeopardize restoration in a disaster.
  • Catastrophe restoration (DR) testing goes past simply verifying backups — it entails assessing restoration areas, timelines and effectiveness. Whereas round 20% of companies conduct DR checks weekly and one other 23% check month-to-month, the remaining both check irregularly or in no way, leaving them unprepared for real-world restoration eventualities.

Pattern #3: Most companies overestimate their restoration readiness.

The dearth of frequent testing is obvious when taking a look at precise restoration occasions.

  • Whereas near 60% of companies consider they’ll get better in a day, solely 35% truly do.
  • Alarmingly, greater than 10% of companies do not even know the way lengthy it could take to get better their business-critical SaaS knowledge, if they might get better it in any respect.
  • Amongst companies utilizing public cloud companies like Azure, virtually 90% depend on native knowledge safety instruments, but greater than 60% of them lack true DR capabilities.

The cloud dilemma: Embracing progress with out sacrificing safety

The cloud is now the spine of recent IT, powering every thing from infrastructure to collaboration. Companies are quickly adopting cloud and SaaS options to boost flexibility and scalability, however many are overlooking a vital issue: knowledge safety.

Pattern #1: Cloud adoption continues to surge.

The shift to cloud-hosted workloads is simply rising stronger, pushed by the necessity for agility and resilience.

  • Greater than 50% of workloads are actually hosted within the cloud, with that quantity anticipated to succeed in 61% inside two years.

Most organizations now leverage hybrid and multicloud methods to extend flexibility and keep away from reliance on a single supplier. Nevertheless, gaps in cloud and SaaS knowledge safety stay, placing vital enterprise info in danger. Notably, SaaS platforms now function the spine of day by day enterprise operations, however with out the precise backup methods, this knowledge stays susceptible.

Pattern #2: Small and midsize companies (SMBs) choose Google Workspace, whereas enterprises favor Microsoft 365.

  • Microsoft 365 dominates the market, with over 50% of organizations counting on it for collaboration and productiveness.
  • Google Workspace (35%) stays a best choice as properly, significantly amongst SMBs.
  • Microsoft 365 Entra ID (31%) and Dynamics (30%) present that companies are additionally more and more adopting specialised Microsoft merchandise.
  • Salesforce (25%) rounds out the highest 5.

Pattern #3: Price, workload compatibility, vendor lock-in and safety considerations are the most important obstacles to cloud migration.

Whereas cloud adoption continues to speed up, companies nonetheless face main hurdles in making certain a seamless transition and securing their knowledge.

The teachings discovered: What IT leaders should prioritize now

The State of Backup and Restoration Report 2025 reveals that vital safety gaps stay whereas securing on-premises, cloud, endpoint and SaaS knowledge. There’s a rising disconnect between backup investments and precise restoration confidence, with IT groups uncertain whether or not they can restore knowledge when it issues most. With out a extra resilient strategy to knowledge safety, companies danger extended downtime, drastic monetary losses and irreversible knowledge breaches.

Have you ever thought-about how a lot an outage might price your group per minute? Based on the IT Outages: 2024 Prices and Containment Report, the typical price of unplanned downtime is $14,056 per minute per group.

Let’s take a more in-depth take a look at the breakdown of downtime prices throughout completely different enterprise sizes.

Enterprise continuity is dependent upon quicker, extra resilient restoration. Nevertheless, many organizations aren’t as ready as they suppose. To attenuate downtime and monetary losses, IT leaders should rethink their strategy to BCDR. A contemporary BCDR technique goes past fundamental backup, incorporating multilayered safety, automation and hybrid cloud options to strengthen resilience and guarantee enterprise continuity in opposition to as we speak’s refined cyberthreats.

Safety alone is not sufficient, although. With out common testing, organizations are left guessing whether or not their restoration plans will maintain up in an actual disaster. Extra frequent backup and catastrophe restoration testing ensures that restoration goals are met when it issues most. Automation performs a key function there. By automating testing, IT groups can repeatedly confirm their potential to revive knowledge inside required timeframes — all with out disrupting the manufacturing atmosphere. This removes the guide burden and supplies actual insights into restoration readiness.

On the identical time, stronger safety controls are additionally important to defending backup environments from unauthorized entry. Nearly 94% of ransomware victims have their backups focused by attackers, which leaves them with no different alternative however to pay the ransom to get again their entry. On that entrance, enhancing credential administration and implementing stricter entry controls can assist stop malicious actors from accessing backup infrastructure.

Remaining ideas: The way forward for BCDR begins now

The IT panorama is altering, and with it, the dangers are escalating. As companies push additional into the cloud and rely extra on SaaS purposes, their backup and catastrophe restoration methods should evolve simply as shortly. Cyberthreats are extra superior, downtime is dearer and organizations can not afford to deal with backup as an afterthought. To maintain tempo with this new actuality, companies should reassess their strategy and strengthen their defenses in opposition to the rising threats that would deliver operations to a halt.

For IT groups and MSPs, the insights from the State of Backup and Restoration Report 2025 present a transparent roadmap to evaluate vulnerabilities and enhance resilience earlier than catastrophe strikes. Obtain the complete report now to benchmark your technique, uncover vital gaps, and construct a stronger, extra dependable BCDR plan for the long run.

Discovered this text attention-grabbing? This text is a contributed piece from considered one of our valued companions. Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



86,000+ Healthcare Workers Information Uncovered As a consequence of AWS S3 Misconfiguration

0


A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech firm, was not too long ago found by cybersecurity researcher Jeremiah Fowler.

The database contained over 86,000 data, amounting to 108.8 GB of delicate info. This knowledge breach, whereas not attributed to intentional malice, highlights the crucial want for strong cybersecurity measures within the healthcare sector.

Background of ESHYFT

ESHYFT operates a cell app platform that connects healthcare amenities with healthcare staff throughout 29 U.S. states, as per a report by Web site Planet. WSP-ESHYFT-healthtech-data-breach-key-elementsWSP-ESHYFT-healthtech-data-breach-key-elements

The platform permits nurses to decide on shifts that match their schedules, offering amenities with entry to vetted W-2 nursing workers.

The app is broadly used, with over 50,000 downloads on the Google Play Retailer alone. Because the healthcare business more and more depends on digital platforms, the significance of safeguarding consumer knowledge can’t be overstated.

Nature of the Knowledge Publicity

The uncovered database included delicate paperwork resembling profile photographs, month-to-month work schedules, skilled certificates, CVs, and resumes containing personally identifiable info (PII).

This collage shows how app user’s individual profile pictures appeared in the database. Some included lanyards showing medical IDs or other credentialsThis collage shows how app user’s individual profile pictures appeared in the database. Some included lanyards showing medical IDs or other credentials
This collage reveals how app consumer’s particular person profile photos appeared within the database. Some included lanyards exhibiting medical IDs or different credentials

Notably, it additionally included medical paperwork uploaded by nurses as proof for lacking shifts or sick depart, probably falling below HIPAA rules. WSP ESHYFT healthtech data breach 3WSP ESHYFT healthtech data breach 3

These paperwork might embody diagnoses, prescriptions, or remedies, posing a major danger if accessed improperly.

Fowler instantly notified ESHYFT upon discovering the breach. The corporate acknowledged the discover, stating they have been engaged on an answer.

Nevertheless, it stays unclear if the database was managed by ESHYFT instantly or a third-party contractor, or how lengthy it was uncovered earlier than being detected.

The publicity of PII, wage particulars, and work histories might result in id theft, monetary fraud, or extremely focused phishing campaigns.

Scans of identification paperwork mixed with addresses might present cybercriminals with sufficient info to commit such crimes.

Moreover, the dearth of information segregation and encryption makes it crucial for healthtech firms to undertake proactive cybersecurity methods.

Suggestions for HealthTech Corporations

  1. Implement Necessary Encryption: Delicate knowledge ought to at all times be encrypted to stop unauthorized entry.
  2. Common Safety Audits: Incessantly auditing inside infrastructure may also help establish potential vulnerabilities earlier than they’re exploited.
  3. Restrict Delicate Knowledge Storage: Knowledge ought to solely be saved for so long as obligatory and anonymized the place potential.
  4. Multi-Issue Authentication (MFA): MFA needs to be required for purposes dealing with delicate info to stop quick access even when consumer credentials are compromised.
  5. Set up Knowledge Breach Response Plans: Corporations ought to have a complete plan in place to deal with breaches and talk with affected events promptly.

The publicity of healthcare workers data because of an AWS S3 misconfiguration underscores the pressing want for healthtech firms to prioritize knowledge safety.

As healthcare more and more depends on digital platforms, safeguarding delicate info is essential to defending each healthcare staff and amenities from potential dangers.

Proactive measures and enhanced cybersecurity protocols are important to mitigate such vulnerabilities and make sure the integrity of delicate knowledge.

In gentle of those findings, organizations like ESHYFT should take fast motion to safe their databases and implement strong measures to stop future breaches.

Are you from SOC/DFIR Groups? – Analyse Malware Incidents & get reside Entry with ANY.RUN -> Begin Now for Free.