Connect with us

Technology

Take-Two to acquire mobile game developer Zynga in $12.7bn deal

Voice Of EU

Published

on

The New-York headquartered company said the deal will make it one of the largest and most diversified mobile game publishers in the industry.

Video game company Take-Two has announced plans to acquire social game developer Zynga in a deal worth $12.7bn.

Take-Two will acquire all the outstanding shares of Zynga for a total value of $9.861 per share, in a transaction that represents a 64pc premium to Zynga’s closing share price on 7 January.

The video game industry has experienced rapid growth in the last few years and is estimated to have earned $180bn global revenue in 2020.

Take-Two CEO Strauss Zelnick said the deal will diversify its business and help it establish a leadership position in mobile games, which is the fastest growing segment of the interactive entertainment industry.

“As we combine our complementary businesses and operate at a much larger scale, we believe that we will deliver significant value to both sets of stockholders, including $100m of annual cost synergies within the first two years post-closing and at least $500m of annual net bookings opportunities over time.” Zelnick added.

Zynga has a diverse portfolio of popular game franchises such as FarmVille that have been downloaded more than four billion times on mobile. Its CEO Frank Gibeau said this deal will allow the company to begin a new journey to create better games and reach a larger audience.

“Combining Zynga’s expertise in mobile and next-generation platforms with Take-Two’s best-in-class capabilities and intellectual property will enable us to further advance our mission to connect the world through games while achieving significant growth and synergies together.” Gibeau said.

As part of the transaction, Take-Two has received financing of $2.7bn from investment bank J.P. Morgan and intends to fund the cash component of the transaction through a combination of cash from its balance sheet and proceeds of new debt issuance.

Zynga stockholders will receive $3.50 in cash and $6.361 in shares of Take-Two common stock for each share of Zynga common stock outstanding at the closing of the deal.

The transaction is expected to complete during the first quarter of Take-Two’s fiscal year 2023 which ends on 30 June 2022. The deal has been unanimously approved by the Take-Two and Zynga boards of directors.

Take-Two’s management will continue to lead the combined company, while Zynga’s team will drive the strategic direction for the company’s mobile efforts and will oversee the integration and day-to-day operations of the combined Zynga and T2 Mobile Games business, which will operate under the Zynga brand as its own label within the company.

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Source link

Technology

The assailants were pixelated, I’d know them anywhere • The Register

Voice Of EU

Published

on

Something for the Weekend, Sir? Stop that uterus! It stole my wallet!

What do you mean, “Can you identify the uterus in question?” It looked like a uterus! Or, as we’ve been singing it all through Christmas, a wooooom*.

Talk about getting the new year off to a bad start – I’ve just been robbed by a delinquent reproductive organ. Yet the all signs were there: I knew 2022 would be doomed back in early December when I read that the Salzburg Schokolade company, inventors of the mighty last-minute-airport-gift-shop chocolate ball Mozartkugel, had gone bust.

No, an oversize Toblerone will not suffice. M&Ms? In the bin, pal. Mr Ambassador, you can stick your Ferrero Rochers up your arse. Mozartkugeln were my faux-posh-but-actually-quite-cheap traveller chocs of choice. And now they’re gone forever!

First Bowie, then this. The world is falling apart.

A kindly officer of the law tries to bring me back to my senses following my unexpected mugging. Yes, thank you, I would like a drink. I’ll have an Adios Motherfucker*, please.

Without batting an eyelid, the policewoman strides down the corridor to the drinks machine, taps a few buttons on the display and returns after just 30 seconds with my glass of blue liquid revival. That was quick. The drinks machine must be a Mixo Two: an ingenious local invention that claims to be able to mix any of 300 cocktails in half a minute.

I glug it down, spit out the lemon slice and cherry, and hand back the little umbrella. I decide I’m feeling particularly agitated and may well need more calming down. 299 to go.

Now that my thoughts are clearing, I admit it’s possible my assailant might not have been a uterus after all. It might have been a whole human. I tell my police interviewers that my initial impression of a uterus suggests that it may have been a woman. I am lectured for the next 10 minutes on my questionable observation with the aid of infographics and a flipchart.

Choosing my words more carefully, I try to provide a full description of the thief. It all happened so fast. The last thing I remember, I had escaped the pandemonium at home – workers fixing the WC again – and settled down in a nearby cafe for a break. Well, primarily for a pee in their restroom, then I felt obliged to order a coffee. While waiting for it to arrive, I opened my laptop and continued browsing the hundreds of images taken during Mme D’s recent MRI scan.

Here’s one.

Screenshot of MRI scan of patient's uterus

Protect the innocent: to avoid identification by a web-scraping AI, this uterus has been pixelated. [Click to enlarge]

Prior to this, my only knowledge of MRI scanning comes from British colleagues at the IEEE who are finalising the unveiling of an IEEE Milestone plaque to commemorate the development in London during the 1980s of active shielding of superconducting magnets.

Mme D had a more detailed prior knowledge of MRI scanning as the result of watching every episode of House on Netflix. She reported that her only disappointment was that the operators seemed to concentrate on the scan rather than discuss their sex lives or call each other an idiot before suddenly dashing out the room after answering a call on their cellphone.

What neither of us expected was to be handed a CD of the highlights.

It doesn’t just contain a folder of images but a Windows autoplay program to browse them in detail. My favourite feature of the CD is the Cinema View, which plays back the scans at 25 frames per second. In fact, I had settled down in the living room with a Kia-Ora and carton of popcorn to watch Mme D’s innards on the big screen when the workmen arrived and enforced an early intermission.

It was when the coffee arrived at my table that I realised my wallet was not in my usual pocket, or indeed in any of my unusual pockets either. “Robbed!” I wailed. “No tip!” wailed the waiter. The police were duly called.

What was the last thing I saw before the incident? Er… a uterus. I describe it in as much detail as possible, at 25 frames per second.

So, I ask, are you going run it through your vast, secretive photo-fit database of the population, using some whizzy AI to shortlist the candidates?

Ah no, they respond, we’re not allowed to do that. And then they wink. All of them, in sync, which is a bit creepy. Then I am sent on my way, gently steered back up the corridor in the opposite direction from the Mix Two.

This is the usual conundrum. Scraping the net for the purposes of building a database for security services is still illegal unless you have really good PR, and the use of AI to crawl around the net and randomly apply face recognition to identify ne’er-do-wells is ethically dubious. In most cases, it can’t be done at all (yet).

On the other hand, machine learning is a fabulous tool for health research, if only we can throw enough data at it. The problem is that more people would be happy to share their medical data if they thought it wouldn’t be subsequently misused. And it will always be misused: that’s what personal data is for.

The last thing I’d want is for my photo to turn up on a hit-list of Interpol’s most-wanted criminal uteruses.

Back home, I am comforted by Mme D, who had been wondering what had prompted me to leave the house while a team of plumbers, electricians, interior decorators, plasterers, architects, stone masons, ironmongers, seismologists, stage illusionists, tap dance instructors, steel drummers, and celtic swordsmen were trampling all over it to refit the toilet for the fifth time.

I mumble a reply, collect the now-soggy popcorn and drag myself back into my office.

“By the way,” she calls, “you left your wallet on the kitchen table so I locked it in the filing cabinet.”

Youtube Video

Alistair Dabbs

Alistair Dabbs is a freelance technology tart, juggling tech journalism, training and digital publishing. Back when he ran an office in London’s trendy Hoxton, he attended several cocktail workshops – an essential skill for the Silicon Roundabout crowd. The one thing he learnt was that everything is topped up with sugar water. Bleuh. More at Autosave is for Wimps and @alidabbs.

*As an infant, I reasoned that “wooooom” was the kind of thing that a sheet-clad apparition moans while a haunting a castle. It was the holy ghost.

**Vodka, rum, tequila, gin, blue curacao, 7 Up, sweet & sour mix.



Source link

Continue Reading

Technology

‘Hiring is a big challenge for the IT industry’

Voice Of EU

Published

on

Citrix’s Meerah Rajavel discusses the biggest challenges in today’s IT landscape, from remote working and talent shortages to security.

Meerah Rajavel is CIO at Citrix a multinational cloud computing company that provides server, application and desktop virtualisation, networking and cloud computing technologies.

Rajavel has more than 25 years’ experience at well-known tech companies such as McAfee, Cisco and Forcepoint. In her current role, Rajavel she leads the company’s IT strategy.

What are some of the biggest challenges you’re facing in the current IT landscape?

Many companies viewed remote work as a temporary solution to the pandemic and business leaders continue to push for a return to the old days where employees work in the office every day. But we just did two polls on LinkedIn and Twitter that show this isn’t likely to happen.

That’s going to challenge a lot of organisations, because working remote isn’t easy. When it comes to addressing the technical aspects of how employees can cope and remain productive, you’ve got to walk in their shoes and understand how they leverage technology to achieve business outcomes.

The key to keeping employees engaged lies in providing consistent, secure and reliable access to the systems and information they need to get work done – wherever it needs to get done. And it takes more than just flipping the switch on technologies. Culture plays a huge role in adoption.

Another big challenge IT is faced with is hiring. It’s difficult to find high quality candidates in the areas of security, design thinking and user experience, data science and analytics right now. And there are a few reasons for this. Security remains a critical priority for CIOs. In the hybrid cloud, remote working, BYOD world we now live in, more resources are required to ensure that corporate networks and assets remain safe. And demand far exceeds supply.

When it comes to design thinking, the paradigm is shifting away from user-centric thinking toward human-and-machine thinking. This requires designers to be well versed with the constructs of the possibility of artificial intelligence and machine learning and analytics in addition to user experience in their workflow design process. And that’s a skill that’s not widely available.

What are your thoughts on digital transformation in a broad sense within your industry?

In the last decade, the digitalisation of everything has caused every company – regardless of industry – to become a software company. From mobile banking and virtual healthcare visits to self-driving cars and automated food prep and delivery services, software applications are embedded into nearly every aspect of the economy and our lives.

And as they embark on digital transformation initiatives to support this trend, IT leaders need to align with their business counterparts and make sure they’re collectively approaching things from an inside-out, company-wide perspective.

For me, any type of change management needs to be broken down into three key focus areas: people, process, and technology. But it’s imperative that you start with the people because without first establishing a culture around the change, it will be difficult to achieve success.

‘Digitalisation of everything has caused every company – regardless of industry – to become a software company’
– MEERAH RAJAVEL

When it comes to people, we are particularly mindful of two important elements: culture and training. First, we’ve worked to establish a culture that encourages risk taking and organisational success over individual success. Second, we’re investing in training programmes that enable individuals to confidently transition to the new technologies or way of working and be immediately effective.

In digital transformation, technology needs to be integrated into the ‘flow’ of business, which demands IT and business to embrace shared methods and process. For process, we’ve anchored on standards like safe agile frameworks that make culture and operational efficiency key pillars of any project, to help iterative value delivery and ease of adoption across all areas of the business.

And perhaps most important, we’re investing in the technology – including our own – to help automate and integrate workflows so we can reduce time to production, minimise disruption to the business and increase effectiveness.

What are your thoughts on how sustainability can be addressed from an IT perspective?

In embracing remote work and enabling it through technology, companies can drive their ESG goals and create a more sustainable business and future.

Using digital workspace technologies, for instance, they can give employees access to everything they need to engage and be productive wherever they happen to be, reducing the need to commute and the carbon emissions associated with doing so.

They can also eliminate the need for applications and data to reside on endpoint devices and transition from energy-intensive desktops to energy-efficient laptops to increase their energy efficiency. And because no data is required to live on these devices, they can extend the life of their equipment and reduce waste.

What big tech trends do you believe are changing the world?

We did some research that showed 93pc of business leaders think the increased digital collaboration forced by remote work has amplified more diverse voices, resulting in richer idea generation. And as flexible work becomes the norm, the vast majority expect enhanced equity and collaboration to continue and fuel an era of hyper-innovation. And this excites me.

With flexible work, I see more innovation happening to converge physical and digital experiences. Whether it’s concept like metaverse or technologies like AI/ML and VR/XR integrated into the collaboration tools, all aim to enhance the experience and effectiveness for users in a location agnostic fashion.

What are your thoughts on the security challenges currently facing your industry?

The threat landscape has become much more sophisticated as a result of remote and hybrid work and protecting employees has never been more critical – or difficult.

Employees want the freedom to work when, where and how they want using the devices of their choice. And to attract and retain them in what is no doubt the tightest labour market the world has ever seen and keep them engaged and productive, IT needs to serve it up, all while ensuring corporate assets and data remain safe.

It’s among the biggest challenges we face. And to overcome it, we must move beyond thinking that security and user experience are mutually exclusive and take an intelligent approach to workspace security that combines the two following the zero-trust model to give employees simple, unified access to the apps and information they need, when and where they need it, to perform at their best.

We’ve also witnessed two major software supply chain attacks in the last 12 months with SolarWinds and Log4j.

The first is an example of how easily malicious code can be remotely injected into a simple software update delivered to thousands of enterprises and government agencies worldwide. The second highlights how threat actors are increasingly targeting the vulnerabilities in third-party software components to cause widespread havoc.

All of this underscores the importance of securing the software supply chain and adopting practices like DevSecOps.

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.



Source link

Continue Reading

Technology

‘I was just really scared’: Apple AirTags lead to stalking complaints | Technology

Voice Of EU

Published

on

In early January, Brooks Nader, a 26-year-old Sports Illustrated swimsuit model, was walking home alone from a night out in New York when she received a disturbing iPhone notification telling her she was carrying an “unknown accessory”.

“This item has been moving with you for a while,” the alert read. “The owner can see its location.”

That’s when she knew “something wasn’t right”, Nader told the NBC news program Today. Nader discovered that somebody had slipped an Apple AirTag into her coat pocket while she was sitting in a restaurant earlier. Unbeknown to her, the device tracked her location for four hours before Apple’s abuse prevention system triggered the notification to her phone.

AirTags are wireless, quarter-sized Bluetooth devices that retail for $29 each. Apple launched the product in April 2021 as tracking tools that users can pair with the company’s Find My app to help locate lost belongings, like backpacks or car keys.

Yet AirTags have proven easy to abuse – police in New York, Maryland, Idaho, Colorado, Georgia, Michigan, Texas and elsewhere both within the US and internationally, have reported instances of AirTags being used to stalk individuals, as well as to target cars for theft.

Last week, the New Jersey Regional Operations & Intelligence Center issued a warning to police that AirTags posed an “inherent threat to law enforcement, as criminals could use them to identify officers’ sensitive locations” and personal routines.

AirTags have abuse-mitigation features, including pop-ups like the one Nader received, and an alarm that beeps at 60 decibels (a conversational volume) after the AirTag has been away from its owner anywhere between eight to 24 hours.

Near the end of 2021, the company released a new Android app called Tracker Detect, which was designed to help people who own Androids discover suspicious AirTags near them – yet the app must be proactively downloaded and kept active to be effective, and is only compatible with Android 9 or higher.

The outcome of more anti-stalking mechanisms is that more people are realizing they are being stalked. On 14 January, police in Montgomery county, Maryland, responded to a call from a person who was stalked home from a movie theater after an AirTag was planted on their car. Around the same time, two California women called 911 after receiving a notification that their whereabouts were being tracked while out shopping. A 30 December report from the New York Times cites seven women who believe AirTags were used to surveil them. On social media, posts from mainly women sharing their own experiences of being tracked by AirTags have drawn attention to the issue, with one TikTok video from November 2021 receiving more than 31m views.

If you suspect you’re being tracked, the conventional wisdom is not to head home, but rather call – or go to – the police. However, law enforcement responses to incidences of AirTag stalking have thus far been inconsistent, and help is not always guaranteed.

When Arizona’s Kimberly Scroop went to local police after receiving an iPhone notification that she was being tracked in September last year, “they were not interested in taking a report, they didn’t take my name or phone number,” she says. “They said if I noticed someone following me, to call the police then.”

Scroop went home and made a TikTok video about her experience being tracked, thinking she should “make as much noise as possible, so there was some public record of it” online in case anything bad happened to her. “I was having a mini panic attack, just really scared,” she says in the post that has now been viewed more than 5.5m times.

In New York, Jackie’s Law – passed in 2014 to allow police to charge people using GPS tracking devices to stalk victims even if the victims have not pressed charges – contributed to police in West Seneca’s decision to subpoena Apple for information about a case involving an AirTag attached to a victim’s car bumper. Nonetheless, Nader claims she was unable to file a report after being tracked in Tribeca, New York City, as police told her no crime had been committed.

In an official statement, Apple says it will cooperate with police “to provide any available information” about unknown AirTags people discover on their person or property. “We take customer safety very seriously and are committed to AirTags’ privacy and security,” says a spokesperson.

Ultimately, their built-in anti-stalking mechanisms and the fact that they can be easily disabled when discovered render AirTags less dangerous than other forms of stalkerware. “If you really are nefarious and evil and you really want to find someone, there are things that are much better than an AirTag,” in the $100 to $300 range, says Jon Callas, director of technology projects at the Electronic Frontier Foundation.

Indeed, stalking affects an estimated 7.5 million people in the United States each year, and one in four victims report being stalked through some form of technology, according to the Stalking Prevention Awareness & Resource Center. And it’s on the rise: a 2021 international study by the security company Norton found the number of devices reporting stalkerware daily “increased markedly by 63% between September 2020 and May 2021” with the 30-day average increasing from 48,000 to 78,000 detections. There are thousands of different stalkerware variants, such as Cerberus, GPS tracking devices and Tile, a Bluetooth-enabled AirTag competitor that announced a partnership with Amazon last spring.

To Callas, the conversation around AirTags is drawing much-needed attention to the potential for technology to be misused; he hopes more people will consider the safety risks of tracking devices, regardless of how innocent they seem. “If you make a generalized technology that helps you find your lost keys, it can help you find anything,” he says, “and that includes people”.

Source link

Continue Reading

Trending

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates 
directly on your inbox.

You have Successfully Subscribed!