Lori Harvey fans are ‘catching viruses’ trying to find a link to her sex tape

Lori Harvey close up
Lori Harvey stuns at the amfAR Gala red carpet in LA. Pic credit: ©ImageCollect.com/Xavier Collin/ImagePressAgency

Lori Harvey was trending online after rumors hit social media about an alleged sex tape.

Fans quickly scrambled to find the video featuring Steve Harvey’s daughter only to catch a virus instead.

Lori Harvey is coming off a high-profile relationship with movie star Michael B. Jordan.

As previously reported on Monsters & Critics, the former couple called it quits in June after a little over a year of dating.

The skincare founder was trending on Twitter with several tweets suggesting that an explicit video of the model exists.

On Thursday August 18th, Lori Harvey’s name began trending and some people speculated that the Black Panther actor was behind the leak.

Twitter reacts to Lori Harvey’s alleged sex tape video

Twitter users vented their frustration at attempting to find Lori Harvey’s alleged sex tape.

While it is unclear if a video of Harvey even exists, some Twitter fans joked that they ended up with a computer virus rather than a video of Harvey.

“I got 17 viruses looking for this Lori Harvey link….my computer bout to blow up. Can y’all stop playing. Is it real or not?” a Twitter user wrote.

Several social media users had fun with the trending topic, using hilarious memes.

“When that Lori Harvey tape hits Reddit,” a person wrote, featuring a clip of Dwayne Johnson ripping a cast from his arm.

Another joked that the Lori Harvey sex tape link led to a video of Wendy Williams.

“When you click the Lori Harvey link and it’s Wendy Williams,” the person wrote alongside a clip.

One person tweeted that they would incur an arm injury in less than a week after viewing the alleged tape.

“If that Lori Harvey tape drops this would be me 5 days after,” the tweeter joked with a clip of an athlete getting physiotherapy on his arm.

A tweeter alleged that Lori’s ex-boyfriend Michael B. Jordan was behind the alleged leak.

“Michael B Jordan said enough is enough and uploaded the Lori Harvey tape.”

However, not everyone was amused by the reaction to the Lori Harvey trend.

Lori Harvey does the ‘alcoholic’ dance

Lori Harvey is out and about and has been spending some time with Tiana Williams. She was featured on one of Tiana’s TikTok videos doing the ‘alcoholic dance.’

The clip starts with Instagram star Amaya Colon dancing with “The friend who never gets drunk.” writing on the screen.

She grabs the phone turning the camera on Tiana Williams and Lori Harvey dancing with “the alcoholics” writing on the video.

The 25-year-old model rocked a cutout black dress and she shakes her hips opposite Williams.

Leave a Comment

Source link


How do hackers target children on video games?

Children are more online than ever before. But as kids immerse themselves in the world of video games, they’ve become increasingly vulnerable to hackers.

By 2025, the video game market is set to reach a value of $256.97 billion.

One in three people around the world play video games, and a significant portion of the gamers are children.

Digital and real currencies in games

One of the most popular games with children is Roblox, an online platform that allows users to create their own games for others to play.

Millie, 11, likes playing Bloxburg, a house building simulator, while Tavion, 10, is a fan of Pet Simulator.

In both games, completing tasks gets you the in-game currency which you can use to buy items. But you can also buy the currency with real money. Roblox has its own currency called Robux.

“One of the more recent developments in games has focused on in-game purchases,” says Dr Kelli Dunlap, a clinical psychologist and game designer. “Yes, you bought the game, but now if you want more, you have to pay a little extra.”

The lure of in-game purchases is particularly appealing to children who might not have an adult understanding of money.

Jovan, 10, is one of those kids. Aware his mum wouldn’t let him make the purchases, he was wily enough to ask his grandma instead.

“Unbeknown to me, grandma and Jovan have a little system,” Jovan’s mum Vicky says, explaining how he might ask her to give him some money for a new game token.

“We have to keep grandma in check sometimes,” Vicky says.

Online treasure troves for hackers

As children spend more time and more money on their games, they amass collections of digital items that have great emotional value to them.

It’s these digital collections that hackers are targeting.

One day, when Tavion logged into Roblox, he found all his most treasured pets missing. His griffin had been stolen.

Jovan had a similar experience playing Rocket League, a driving/football game. A car he’d customised with special decals and wheels had lost all of the customisations he’d worked hard to add.

The hackers went one step further with Millie, whose entire Roblox account was taken from her.

“The money that we’d put into it with Roblox and all the pets on that account and everything was gone,” she says. “I felt devastated to see it all gone and I think I was crying.”

Digital items, real emotions

Losing the game items they’ve worked hard for can be a difficult emotional experience for children, explains Dunlap. 

The effort the children have put into completing tasks for those items gives them value. 

“Even though the item is digital, that sadness is genuine and it makes total sense when you think about the thought and care that kids are putting into their digital creations,” Dunlap says.

“On the day that I was hacked, I felt very sad and I didn’t understand why, what was happening when I got hacked,” Tavion says.

Callum, 14, had a collection of digital outfits on Roblox that he was really proud of. One outfit, dragon-styled armour was worth 1,000 Robux, equal to between $3.50 and $12.50.

After his collection was stolen by a hacker, he found it exhausting to start from scratch earning it all back.

“You’re going to have to play a lot, obviously. And when you play a lot in a game you get burnout,” Callum says.

Dunlap notes that children referring to burnout aren’t being hyperbolic. Despite games being for fun, children can be exhausted when recovering from a hack.

Why would someone hack a kid’s game?

Mike Jones is a security researcher who’s worked with the hacker collective Anonymous. He now focuses on working with children who have got into trouble with online games.

“Most of the time kids have their parents’ credit card or debit card attached to the account,” Jones says.

“What they don’t understand is there are people in that game that look for those purchases and they make money off that and they trade those accounts and they sell those accounts or they sell items within that account,” he explains.

Hackers can translate the digital currency children have into monetary funds in their bank accounts.

With real money on the line, organised crime groups have got involved with hacking these games.

“Kids are often more susceptible to these kinds of social engineering attacks. They have almost no experience on how people would take advantage of them,” says Christian Funk, head of the German Research and Analysis Team at Kaspersky.

“While it might be very traumatic to lose an in-game item you worked so hard for. At the same time, it actually teaches you a very important lesson in life,” Funk adds.

Callum has changed his passwords following his hacking. And Tavion has started storing his digital possessions across multiple accounts.

But Jones also thinks the industry itself has a lot to answer for by allowing children to come in harm’s way.

“The gaming companies and the gaming industry need to take more responsibility when it comes to the effects it has on kids,” he says.

Source link


NASA astronauts on Artemis could talk to a spaceship computer

Captain Kirk, Spock, and the rest of the Star Trek gang were in constant dialogue with the onboard Enterprise computer, asking it questions about the starship and their alien environments.

With NASA reviving its human space exploration program in a matter of days through Artemis, it seems only natural real astronauts of the 2020s who will crew the forthcoming missions would do the same. After all, boldly going where no one has gone before could be lonely, and having an A.I. sidekick might help on those long voyages.

When Lockheed Martin, the company that built the new Orion spacecraft for NASA, first dreamed up the talking computer, engineers figured they’d just throw an Amazon Echo Dot on the dashboard with a laptop and call it a day. But it wasn’t nearly that simple, said Rob Chambers, Lockheed’s director of commercial civil space strategy.

Beyond technical constraints, they had to overcome the menacing representations of an inflight space computer, in the vein of Stanley Kubrick’s 2001: A Space Odyssey. Unlike the collegial computer in Star Trek, “HAL” starts to glitch, takes control of the spacecraft, and then fights the crew’s attempts to shut it down.

That’s not merely a concern raised through science fiction. This summer A.I. developer Blake Lemoine, formerly of Google, went public with his belief that a chatbot he helped build had become sentient. The story sparked a global conversation about whether some artificial intelligence is — or could be — conscious.

Capt. Kirk talking to Enterprise computer

William Shatner as Capt. James T. Kirk on Star Trek talks to the Starship Enterprise computer.
Credit: Photo by CBS Photo Archive / Getty Images

Such claims work to reinforce fears long embedded in popular culture — that one day the advanced technology enabling humans to achieve extraordinary things could be too smart, perhaps leading to machines that are self aware and want to hurt people.

“We don’t want the HAL 9000, ‘I’m sorry, Dave. I can’t open the pod bay doors,'” Chambers told Mashable. “That’s the first thing that everybody said when we first suggested this.”

“We don’t want the HAL 9000, ‘I’m sorry, Dave. I can’t open the pod bay doors.That’s the first thing that everybody said when we first suggested this.”

Rather, Lockheed Martin and its collaborators believe having a voice-activated virtual assistant and video calls in the spacecraft would be more convenient for astronauts, affording them access to information away from the crew console. That flexibility might even keep them safer, engineers say.

An experiment to test the technology will ride along with Artemis on its first spaceflight, which could launch as early as Aug. 29. The project, named Callisto after one of Artemis’ favorite hunting companions in Greek mythology, is programmed to give crew live answers about the spacecraft’s flight status and other data, such as water supply and battery levels. The technology is being paid for by the companies — not NASA.

A custom Alexa system built specifically for the spacecraft will have access to some 120,000 data readouts — more than astronauts have had before, with some bonus information previously only available within Houston’s mission control.

Testing Callisto payload on Earth

Howard Hu, NASA’s Orion deputy program manager, and Brian Jones, Lockheed Martin’s chief engineer for the Callisto project, observe signals from the Orion spacecraft at NASA’s Kennedy Space Center in Florida during a connectivity test.
Credit: NASA

No astronaut will actually be onboard Orion for this first mission — unless the dummy in the cockpit counts. But the inaugural 42-day spaceflight, testing various orbits and atmosphere reentry, will clear the way for NASA to send a crew on subsequent missions. Whether a virtual assistant is integrated into the spacecraft for those expeditions depends on a successful demonstration during Artemis I.

To test their Alexa, mission control will use video-conferencing software provided by Cisco Webex to ask questions and give verbal commands inside the spacecraft. Cisco will run its software on an iPad in the capsule. Cameras mounted all over Orion will monitor how it’s working.

Want more science and tech news delivered straight to your inbox? Sign up for Mashable’s Top Stories newsletter today.

For the most part, the virtual assistant will be answering queries, like “Alexa, how fast is Orion traveling?” and “Alexa, what’s the temperature in the cabin?” The only thing the system can actually control are the lights, said Justin Nikolaus, an Alexa voice designer on the project.

“As far as control of the vehicle, we don’t have access to any critical components or mission critical software onboard,” Nikolaus told Mashable. “We’re safely sandboxed in Orion.”

The space-faring Alexa might not seem so advanced. But engineers had to figure out how to get the device to recognize a voice in a tin can. The acoustics of Orion, with mostly metal surfaces, were unlike anything developers have encountered before. What they learned from the project is now being applied to other challenging sound environments on Earth, like detecting speech in a moving car with the windows rolled down, Nikolaus said.

The most significant change from off-the-shelf Amazon devices is that the system will debut a new technology the company calls “local voice control,” which allows Alexa to work without an internet connection. Back on Earth, Alexa operates on the cloud, which runs on the internet and uses computer servers warehoused in data centers.

In deep space, when Orion is hundreds of thousands of miles away, the time delays to reach the cloud would be, shall we say, astronomical. Looking toward the future, that lag could stretch from seconds to an hour to transmit messages back and forth to a spacecraft on its way to Mars, about 96 million miles from Earth.

That’s why engineers built a spacecraft computer to handle the data processing, Chambers said.

“It’s not canned things. It’s actual real-time processing,” he said. “All that smarts has to be on the spacecraft because we didn’t want to suffer the time lag of going back up to the spacecraft, back down to Earth, back up, and back down again.”

“All that smarts has to be on the spacecraft because we didn’t want to suffer the time lag of going back up to the spacecraft, back down to Earth, back up, and back down again.”

New radio antenna bolstering NASA's Deep Space Network

NASA added a new 111-foot beam waveguide antenna to the Deep Space Network at the ground station in Madrid in February 2022.
Credit: NASA / JPL-Caltech

For the questions that Alexa can’t handle offline, Callisto will tap into the Deep Space Network, the radio dish system NASA uses to communicate with its farthest spacecraft, and route the signals to the cloud on Earth. This could allow Callisto to support a wider range of requests, like reading the news or reporting sports scores.

Or ordering more toilet paper and trash bags — seriously.

The designers built in the capability for astronauts to buy things from Amazon. Overnight delivery to the moon wouldn’t be an option, but sending flowers to a spouse on Earth for a special occasion would.

Cisco also will use the Deep Space Network to provide video-conferencing calls. Engineers say astronauts would be able to use this tool for “whiteboarding” meetings with their Houston colleagues. Imagine how handy that would have been for the Apollo 13 crew as NASA tried to talk them through how to make a round air filter fit into a square hole with no visual aids.

Broadcasting pictures in high resolution across the solar system isn’t easy, especially with such limited data capacity. One of the reasons Lockheed Martin chose Cisco as a collaborator was for the company’s expertise in video compression, Chambers said. As video travels through space, the data can get garbled. Cisco worked on error-correction technology to smooth out the transmissions.

“One of my colleagues at Cisco refers to this as trying to do 4K, high bandwidth, gigabit-type ethernet, using a 1980s dial-up modem,” he said. “Obviously, the Deep Space Network is very, very capable, but we’re trying to do modern video-conferencing.”

“One of my colleagues at Cisco refers to this as trying to do 4K, high bandwidth, gigabit-type ethernet, using a 1980s dial-up modem.”

To make the custom virtual assistant, the collaborators spent time interviewing astronauts. One of the things they asked for was a dictation service, Nikolaus said. Often their notepads and pens float away. It’s hard to use a computer in a weightless environment, too.

“If you go to a keyboard and you’re not used to microgravity and you start typing, your force on the keyboard pushes your body away from it,” Nikolaus said.

But: Alexa, can you fly me to the moon?

Yes, if what you want is a little Frank Sinatra crooning through the cabin.

Alexa, can you open or close the pod bay doors?

Fortunately, no. The system can’t do anything to put the astronauts in danger, Chambers said.

“We think about that a lot, not necessarily that they’ll become sentient and, you know, Rise of the Machines, and [become] our software overlords,” he said.

But software is complex. Strange behaviors can occur through unexpected convolutions of activities, he said: “What we do is we architect the system such that it is actually not possible for this device to talk to this other device.”

So if all goes according to plan, perhaps the most havoc the real HAL could cause is to prank an astronaut’s family with an unwanted Amazon Fresh pizza delivery.

Source link


If your password is in this list, you’re an easy hacking target


If your password is in this list, you’re an easy hacking target

Keyboard with post-it notes showing scribbled passwords.

Have you ever used “123456” as a password for one of your online accounts? You might as well not have any password at all.

Today, cybercriminals are obtaining more stolen usernames and passwords than ever before. In fact, 2021 was a record year for data breaches. Almost 190 million people were victims in roughly 1,800 data breaches last year, according to the latest annual report from the Identity Theft Resource Center. Unsure if your credentials have ever been exposed in one of the latest data breaches? This website provides a free tool that tells you which of your accounts have been compromised, and all you need to do is enter your email address.

Twingate analyzed a list of the 200 most common passwords in 2020, compiled by SecLists—a project maintained by Daniel Miessler, Jason Haddix, and g0tmi1k. The passwords were compiled from popular lists in the security testing world.

A sizable number of the most common passwords contained nouns and many included proper nouns like names of people (Nicole, Matthew) and intellectual properties (Pokémon, Star Wars), as well as regular nouns (princess, monkey, baseball). If the password contained at least three consecutive characters that are adjacent on a standard U.S. keyboard (qwerty, 1234, 159753) they were counted as having a keyboard pattern. None of the most common passwords analyzed by Twingate included any symbols or special characters.

Increasingly, bad actors can access wide swaths of Americans’ private information by performing what’s known as “credential stuffing.” Credential stuffing happens when cybercriminals buy or reuse lists of commonly used and stolen passwords and stuff them into the login fields of websites.

Credential stuffing poses a considerable risk to both businesses and consumers because of the sheer number of Americans who reuse passwords for multiple accounts. Around 65% of U.S. adults admitted to using the same passwords across at least some—if not all—websites they use, according to a 2018 Google survey conducted by The Harris Poll.

Tech companies including Apple are developing technology that experts say could be more secure and convenient than traditional passwords. They rely on your biometric data, meaning fingerprints and facial recognition.

Until more secure measures are implemented, password managers like 1Password or LastPass are an effective way to prevent these types of attacks, but passphrases are another good alternative. A passphrase is essentially a sentence. The FBI recommends using passphrases because longer passwords take longer for criminals to crack than complex ones (for example, those that include numbers and special characters).


The most common passwords use only letters or numbers

Scrap of paper with a crossed out password and a new one on top of a keyboard.

– Passwords containing only letters: 90 (45% of top 200 passwords)
– Only numbers: 56 (28%)
– Both letters and numbers: 54 (27%)

Thomas Andreas // Shutterstock

Many of the most common passwords contain nouns

A woman logging into her computer with a password.

– Passwords containing nouns: 79 (40% of top 200 passwords)

Prostock-studio // Shutterstock

Keyboard patterns were another common trend

Man in a suit typing on a keyboard.

– Passwords containing keyboard patterns: 77 (39% of top 200 passwords)

Waniza // Shutterstock

While less common, multiple passwords contained the word “password”

Keyboard with a list of passwords on the side.

– Passwords containing “password”: 4 (2% of top 200 passwords)

fizkes // Shutterstock

If your password is in this list, you’re an easy hacking target

Young man logging into computer in office.

– 123456
– 123456789
– picture1
– password
– 12345678
– 111111
– 123123
– 12345
– 1234567890
– senha
– 1234567
– qwerty
– abc123
– Million2
– 000000
– 1234
– iloveyou
– aaron431
– password1
– qqww1122

This story originally appeared on Twingate and was produced and
distributed in partnership with Stacker Studio.

Source link


There should be no compromise on soring Tennessee walking horses

A recent decision by the U.S. Court of Appeals for the District of Columbia Circuit was a milestone in the effort to end the “soring” of Tennessee walking horses and related breeds. The Humane Society of the United States and Humane Society Legislative Fund prevailed in a case challenging the U.S. Department of Agriculture’s abrupt withdrawal in 2017 of a rule to strengthen the agency’s regulations under the Horse Protection Act. The court held that the USDA couldn’t withdraw a rule it had finalized once it was placed for public inspection by the Federal Register.

The 2017 rule ends the failed system of industry self-policing on which the USDA has relied. It bans the use on Tennessee walking and racking horse breeds of devices integral to the soring process.

U.S. Rep. Steve Cohen, D-Tenn., accompanied by Rep. Kurt Schrader, D-Ore., speaks during a news conference ahead of a House vote on a bill that would prevent soring in training Tennessee walking horses July 24, 2019.

Ironically, on the very day the decision was announced, a guest column in the Tennessean called for the enactment of federal legislation being touted as a “compromise” to the widely supported Prevent All Soring Tactics (or PAST) Act. That compromise, if passed, would force USDA to undo the reforms of the rule, once implemented.

We should reject it. PAST (H.R. 5441/S. 2295) is cosponsored by a bipartisan majority in the U.S. House and Senate. It passed the House by an overwhelming 333-96 vote in 2019, passed the Senate Commerce Committee by voice vote in 2014, and passed the House Energy and Commerce Committee by a vote of 22-0 in June. It’s endorsed by hundreds of groups in the animal welfare, veterinary, law enforcement and horse industry spaces – including many walking horse organizations. It would accomplish everything the USDA rule contains and then some, including implementation of stiff penalties and making the act of soring illegal.

Source link


Omantel drives 5G coverage to new heights with populated areas in Muscat, Al Batinah

Muscat: Omantel has come a long way in leading the 5G deployment in Oman. In a breakthrough achievement, the company has now covered the populated areas in the governorates of Muscat, Al Batinah South and Al Batinah North with real 5G speeds.

“We have successfully rolled out a large number of new 5G sites in the populated areas of Muscat, Al Batinah North and Al Batinah South governorates. These new sites will serve home internet and mobile internet alike, and users will get an optimum speed even at the edge of the coverage range,” said Aladdin Baitfadhil, Chief Commercial Officer at Omantel.

Similarly, Omantel has poured massive efforts into rolling 5G sites in populated areas across the country. The city of Salalah is one among many other locations that the company has targeted due to the high demand for an ultra-fast internet connection.

“We managed to ensure a fast and steady connection everywhere within the coverage range, even for mobile users, through smaller 5G cells that connect to the main tower” he explained.

Baitfadhil further said, “5G is an integral part of Omantel’s ecosystem and we have the widest coverage of the network in Oman. We see 5G as the key enabler for Industry 4.0 technologies, like IoT, Cloud Computing, Big Data & Analytics, Augmented Reality and Artificial Intelligence, with its massive network capacity and ultra-low latency. Our role, at Omantel, is to lay the groundwork to help our partners in the public and private sectors to tap into the growing opportunities that arise as technology advances.”

“Due to demographic and geographic factors, 5G is the way forward to ensure a high-speed and low-latency internet connection in Al Batinah North and Al-Batinah South governorates and other locations where “fibre” is technically challenging and financially unviable. Therefore, we are keen on enhancing our 5G footprint in Al-Batinah and elsewhere to build on our main role of connecting the society within Oman and with the world to the utmost level,” he noted.

Omantel has taken its services well beyond the traditional telecom offerings, and it is rapidly emerging as a youthful brand that adapts to people’s lifestyles. 5G offers a seamless internet experience, and it takes home and mobile services to a whole new level of excellence. With the high throughput and ultra-low latency, customers can now experience immersive gaming, cloud gaming, Virtual Reality (VR), Augmented Reality (AR) capabilities and much more.

Omantel was the first operator in Oman to announce the commercial launch of 5G for fixed home broadband and mobile. Today, the company continues to bolster its 5G’s leadership in the country with enhanced network coverage, versatile offerings, and strong partnerships.

Source link


Microsoft’s NZ datacentres to be powered by carbon-zero electricity

Microsoft’s three new datacentres jn New Zealand will be powered by certified carbon-zero power electricity as industry leaders rush to show off their green credentials.

Google's head office in Mountain View, California.

Photo: 123rf/ Uladzik Kryhin

The datacentres are being powered under a deal with Auckland company Ecotricity.

These are among several large cloud datacentres being built in Auckland and the South Island.

Auckland company Datagrid has marketed a centre it is building outside Invercargill as “Australasia’s first carbon-neutral hyperscale datacentre”.

Microsoft said its centres would use air cooling, not water, and therefore be cleaner.

Businesses using “sustainable cloud” datacentres, instead of their own “less efficient” infrastructure, would help the whole country, Microsoft said in a statement.

The pandemic has increased demand for datacentres but they are power hungry.

Singapore this year lifted a three-year moratorium on building, datacentres but has set strict new standards around energy use.

In Ireland, datacentres now consume more power than all rural homes in the country and have complicated its efforts to combat climate change.

A 2021 estimate is by 2030 they will represent 1.86 percent of global electricity consumption, up from 1.15 percent in 2016.

The datacentres are becoming much more efficient, with studies showing data storage has risen 25 times with only three-fold increase in energy use. Datacentre computing has risen 6.5 times with just a 25 percent rise in power use.

However, researchers have suggested the efficiency gains might start to slow down.

A recent New Zealand Trade and Enterprise study found sustainability is an increasingly big factor for customers choosing a datacentre – that within five years, more than half of customers would put alot of store by it.

The South Island, being close to hydropower generation, could be particularly attractive to “hyperscale” datacentres, the study said.

It concluded datacentres provide a great economic opportunity – but it did not look into how many or what kind of jobs might be generated by them.

The Ministry of Business, Innovation and Employment said in response to an RNZ OIA request that no briefings to Ministers exist about the major datacentres being set up here, by Microsoft, Amazon, Datagrid, DCI Data Centres, Lake Parime, and Australia’s CDC Data Centres.

The ministry also said it had no internal reports that address the risks, costs and benefits of them.

It transferred the OIA request to the Department of Internal Affairs, which looks after many digital and data initiatives.

The Datagrid project is to create up to 700 jobs during construction – and perhaps 25-to-70 jobs once complete, and use up to 150MW of power, way more than existing smaller datacentres here.

A global study said cloud datacentres would require the most staff “by a significant margin”, compared to other types of datacentre, but warned that “technical staff are notoriously difficult to recruit for datacentres”.

“Mechanical and electrical engineers in strategy and operations roles, and all types of controls and monitoring employees, are among the technical staff that will be increasingly needed through (at least) 2025,” said the forecast.

Amazon, Google and Microsoft account for more than half of the world’s 600 hyperscale datacentres.

The datacentres require big, fast links. A new submarine cable to Asia, Australia, and the US, called Hawaiki Nui, is being built by Datagrid’s parent, Singaporean company BW Digital.

A new submarine cable to Asia, Australia, and the US, called Hawaiki Nui, is being built by Datagrid's parent, Singaporean company BW Digital

Photo: Supplied

It’s expected to be done by 2025, adding to the Hawaiki Transpacific Cable that began service in 2018.

Otago University recently signed up to Datagrid.

BW Digital said it was spending more than $1 billion on the datacentre and cable.

Source link