Cloud Streaming has come to the PlayStation Portal via a firmware update
It's in beta form for now, but grants access to over 120 PS5 games
Portal owners will also need to be PS Plus Premium subscribers
The latest PlayStation Portal firmware update has finally added a feature that many owners have wanted since launch: cloud streaming.
The update is detailed in an official PlayStation Blog post, where vice president of product management Hiromi Wakai explains that cloud streaming is available on PlayStation Portal now in beta form.
Just like on PS5, Portal owners will also need to be PS Plus Premium subscribers to take advantage of cloud streaming, which is rolling out in today's firmware update. Players will have access to over 120 games via cloud streaming, including Ghost of Tsushima,Ratchet & Clank: Rift Apart,Monster Hunter Rise, and much more.
Cloud streaming on PlayStation Portal targets 1080p 60fps, and Sony recommends internet speeds of at least 13 Mbps to achieve this. However, players on slower connections should still be able to access games in 720p with at least 7 Mbps.
The cloud streaming feature, which also includes up to 100GB of cloud storage for save data, can be enabled via the Settings menu on the PlayStation Portal. Simply toggle the 'Cloud Streaming (Beta)' option as it's going to be off by default. This should add a new cloud streaming option to your handheld's Home dashboard.
There are some limitations to note, however. Players currently can't stream PS4 or PS3 games, nor can they stream games purchased from the PlayStation Store. The same goes for party chat and PS Plus game trials, which are also unavailable. This is likely because the feature is still in beta, and these options will hopefully be implemented down the line.
If you’ve used a computer, it’s almost certain you have used Microsoft Word.
The aptly named word processor is one of the most influential computer programs in history. From schools to businesses, it’s become a daily part of life for millions of users around the world.
Word rose to global ubiquity because it offered something unique. It was the first word-processing software to embody what Microsoft described as the WYSIWYG (What You See Is What You Get) design philosophy.
The idea that what-you-see on the screen is what-you-get if you pressed print is taken for granted in the modern world. But it was a game changer at the time. Within a decade of its official release, Microsoft Word captured a 90 percent share of the word-processing market – officially marking itself as the one of the most successful software products of all time.
Last week, on October 25th 2024, Microsoft Word turned 41. It’s been a long time since it changed the game by delivering WYSIWYG. So what does the future hold for the world’s most popular processor?
Processing a milestone
Change is on the horizon for Word. But it’s not because we don’t need word processing software anymore.
Digital documents exist at the foundation of daily work for about 1.2 billion people. Knowledge workers - professionals who generate value for their organizations through expertise, critical thinking and interpersonal skills - use documents every day. The majority need some form of business document to turn the work they do into deliverable value.
So what’s changing?
Humans still need processors like Word. But in the era of Artificial Intelligence (AI) and automation - word processors no longer need humans as they have before. The practitioners (us) are being disrupted, rather than the processors. And this is a good thing.
Knowledge is power
Big businesses are the product of many small processes. But small processes can take a big toll on people.
Repetitive tasks not only negatively impact a business by absorbing hours of time from experts - but also reduce the happiness and productivity of employees. And this is why there is such a buzz around AI and Generative AI (GenAI) for businesses. AI could add £119 billion to the UK economy in workplace productivity alone by saving professionals up to 2.9 hours per day according to new research
AI and Generative AI (GenAI) is immensely powerful. But it isn’t anywhere near capable of doing what knowledge workers do - which requires human nuance, understanding and a deep appreciation of context. Knowledge workers solve unique problems every day. AI is only effective when it is supplied with large amounts of accurate information and context.
However - there are areas in which AI and automation excels.
Manually managing knowledge and driving value through processors like Word is a time consuming - but critical - daily task for professionals around the world. New technology platforms are filling the gap between AI and human knowledge work by automating document generation.
The impact of this is twofold. Firstly, by increasing the efficiency with which employees can complete small tasks, experts can get on with the stuff that delivers real value. Secondly, businesses themselves reduce the potential risk caused by human error - saving money and protecting reputation.
Banks, for example, are built on documents. Every financial institution has huge libraries of records, sales sheets, applications, and more. There’s a lot of information - and no margin for error. Consequently, UK banks and fintechs spend £21.4k per hour fighting financial crime and fraud, pushing the UK’s annual compliance bill to £38.3bn.
We’re entering the second wave of AI innovation. (Which may not be as exciting or flashy as the first). But in this era it is clearer exactly where AI and automation can have the greatest impact: allowing knowledge workers to focus on the things that drive value - and empowering businesses to become more efficient and secure.
Getting your docs in a row
Knowledge workers - whether working in a bank, or a law firm, or a consultancy - have been forced to become masters of tools like Microsoft Word. To construct a building, an engineer would first have to lay the foundation with documents.
But this is no longer necessary.
Microsoft Word turns 41, and it isn’t at risk of becoming defunct. But its future looks entirely different to its past. Document work is becoming automated. And this means us, the users, are being set free. Or maybe it’s Word that is being set free from us. Documents are here to stay. But document work is not.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro
from TechRadar - All the latest technology news https://ift.tt/y8dU6Jj
Fake facebooks ads are posing as Bitwarden security updates The updates actually install a malicious browser extension The extensions s...
Fake facebooks ads are posing as Bitwarden security updates
The updates actually install a malicious browser extension
The extensions steals personal and financial data from Facebook
Bitdefender has warned hackers are using the Facebook advertising platform to trick Bitwarden users into installing a fake security update that steals personal data and credit card information from businesses and individuals alike.
The advert lures a user through a string of redirected URLs before landing them at a phishing page designed to mimic the official Chrome Web Store.
Once downloaded, the malware leeches data from Facebook’s Graph API which is then sent to the attacker via a Google Script URL that acts as a command and control (C2) server.
Fake facebook ads spreading malware
The fake adverts create a sense of urgency for users, displaying messages such as “Warning: Your Passwords Are at Risk!” and using Bitwarden branding to appear as a legitimate advert.
Once lured to the fake Chrome Web Store, users then download a zip file that is manually loaded as a Chrome browser extension using Developer mode, avoiding the usual security checks that would take place when adding a browser extension.
The extension then asks for permission to operate on all websites, modify network requests, and access storage and cookies allowing it to collect and exfiltrate the data your browser has access to. Once the extension is opened, the malware looks for the ‘c_user’ cookie on Facebook, which contains the Facebook user ID.
The malware also uses a background.js script to harvest data from Facebook cookies, including information on location and IP address, and uses the Facebook Graph API to extract all of the stolen data to the hackers C2 server.
Bitdefender recommends that users and security teams keep an eye out for extensions that request excessive permissions, as well as those with obfuscated functions such as ‘chrome.runtime.onInstalled.addListener’ and signatures that request to graph.facebook.com APIs.
Users should also double check the authenticity of an update with the manufacturer, pay close attention to updates pushed through adverts and social media, and use one of the best antivirus services available as an additional line of defense.
While this campaign has since been taken down, the attack shows the potential for malicious actors to use Facebook advertising and social media to push further malware on a global scale.
Apple’s rumored iPhone 17 Air could be its thinnest-ever phone
A new report says it’ll be just 6mm thick
The phone’s A19 chip could also deliver a performance bump
Apple has a reputation for prizing thinness in its devices, a habit that has sometimes been pushed to incredible or absurd limits (depending on your outlook). And the company isn’t resting on its laurels, with the iPhone 17 range expected to include Apple’s thinnest-ever phone when it’s released in 2025.
According to a research note from tech analyst Jeff Pu (seen by MacRumors), Apple is set to launch a new phone dubbed the iPhone 17 Air or iPhone 17 Slim that will be just 6mm thick. That would make it the slimmest iPhone ever, surpassing the current 6.9mm record held by the iPhone 6. As well as that, the iPhone 17 Air would be only around 75% as thick as any device in the iPhone 16 range, marking a significant year-on-year change.
It’s worth noting that only the iPhone 17 Air is expected to do away with the bulk in quite such a major way. The rest of the iPhone 17 range will likely adopt roughly the same dimensions as the iPhone 16 lineup, making the iPhone 17 Air a standout device next year.
Still, slimming down the iPhone might not feel like the most exciting innovation when Apple’s rivals are producing some of the best foldable phones on the market (and have been doing so for several years now). Although a foldable iPhone has been rumored for some time, it’s not expected to debut until around 2026 or 2027. While we wait for it to finally arrive, it looks like we’ll have to make do with ever-more-svelte iPhones for the time being.
This isn’t the only change coming to Apple’s 2025 phones. Every phone in the iPhone 17 roster is anticipated to come with either an A19 or A19 Pro chip, and these are now rumored to be made with an advanced N3P process, according to Pu. This is the third-generation iteration of the 3nm manufacturing process, and it should result in a slight bump in performance and power efficiency.
That might not sound too exciting, but Apple already leads the pack when it comes to phone power and performance. While an update like this won’t exactly get the blood pumping, it should help cement Apple’s position while we wait for the foldable iPhone to finally make an appearance.
At a time when both the number of artificial intelligence (AI) models and their capabilities are expanding rapidly, enterprises face an increasingly complex challenge: how to effectively evaluate and select the right large language models (LLMs) for their needs.
With the recent release of Meta's Llama 3.2 and the proliferation of models like Google's Gemma and Microsoft's Phi, the landscape has become more diverse—and more complicated—than ever before. As organizations seek to leverage these tools, they must navigate a maze of considerations to find the solutions that best fit their unique requirements.
Beyond traditional metrics
Publicly available metrics and rankings often fail to reflect a model's effectiveness in real-world applications, particularly for enterprises seeking to capitalize on deep knowledge locked within their repositories of unstructured data. Traditional evaluation metrics, while scientifically rigorous, can be misleading or irrelevant for business use cases.
Consider Perplexity, a common metric that measures how well a model predicts sample text. Despite its widespread use in academic settings, Perplexity often correlates poorly with actual usefulness in business scenarios, where the true value lies in a model's ability to understand, contextualize and surface actionable insights from complex, domain-specific content.
Enterprises need models that can navigate industry jargon, understand nuanced relationships between concepts, and extract meaningful patterns from their unique data landscape—capabilities that conventional metrics fail to capture. A model might achieve excellent Perplexity scores while failing to generate practical, business-appropriate responses.
Similarly, BLEU (Bilingual Evaluation Understudy) scores, originally developed for machine translation, are sometimes used to evaluate language models' outputs against reference texts. However, in business contexts where creativity and problem-solving are valued, adhering strictly to reference texts may be counterproductive. A customer service chatbot that can only respond with pre-approved scripts (which would score well on BLEU) might perform poorly in real customer interactions where flexibility and understanding context are crucial.
The data quality dilemma
Another challenge of model evaluation stems from training data sources. Most open source models are heavily trained on synthetic data, often generated by advanced models like GPT-4. While this approach enables rapid development and iteration, it presents several potential issues. Synthetic data may not fully capture the complexities of real-world scenarios, and its generic nature often fails to align with specialized business needs.
Furthermore, when models are evaluated using synthetic data, especially data generated by other language models, there's a risk of creating a self-reinforcing feedback loop that can mask significant limitations. Models trained on synthetic data may learn to replicate artefacts and patterns specific to the generating model rather than developing a genuine understanding of the underlying concepts. This creates a particularly challenging situation where evaluation metrics might show strong performance simply because the model has learned to mimic the stylistic quirks and biases of the synthetic data generator rather than demonstrating true capability. When training and evaluation rely on synthetic data, these biases can become amplified and harder to detect.
For many business cases, models need to be fine-tuned on both industry and domain-specific data to achieve optimal performance. This offers several advantages, including improved performance on specialized tasks and better alignment with company-specific requirements. However, fine-tuning is not without its challenges. The process requires high-quality, domain-specific data and can be both resource-intensive and technically challenging.
Understanding context sensitivity
Different language models exhibit varying performance levels across different types of tasks, and these differences significantly impact their applicability across various business scenarios. A critical factor in context sensitivity evaluation is understanding how models perform on synthetic versus real-world data. Models demonstrating strong performance in controlled, synthetic environments may struggle when faced with the messier, more ambiguous nature of actual business communications. This disparity becomes particularly apparent in specialized domains where synthetic training data may not fully capture the complexity and nuance of professional interactions.
Llama models have gained recognition for their strong context maintenance, excelling in tasks that require coherent, extended reasoning. This makes them particularly effective for applications needing consistent context across long interactions, such as complex customer support scenarios or detailed technical discussions.
In contrast, Gemma models, while reliable for many general-purpose applications, may struggle with deep knowledge tasks that require specialized expertise. This limitation can be particularly problematic for businesses in fields like legal, medical, or technical domains where deep, nuanced understanding is essential. Phi models present yet another consideration, as they can sometimes deviate from given instructions. While this characteristic might make them excellent candidates for creative tasks, it requires careful consideration for applications where strict adherence to guidelines is essential, such as in regulated industries or safety-critical applications.
Developing a comprehensive evaluation framework
Given these challenges, businesses must develop evaluation frameworks that go beyond simple performance metrics. Task-specific performance should be assessed based on scenarios directly relevant to the business's needs. Operational considerations, including technical requirements, infrastructure needs, and scalability, play a crucial role. Additionally, compliance and risk management cannot be overlooked, particularly in regulated industries where adherence to specific guidelines is mandatory.
Enterprises should also consider implementing continuous monitoring to detect when model performance deviates from expected norms in production environments. This is often more valuable than initial benchmark scores. Creating tests that reflect actual business scenarios and user interactions, rather than relying solely on standardized academic datasets, can provide more meaningful insights into a model's potential value.
As AI tools continue to iterate and proliferate, business strategies regarding their valuation and adoption must become increasingly nuanced. While no single approach to model evaluation will suit all needs, understanding the limitations of current metrics, the importance of data quality and the varying context sensitivity of different models can guide organizations toward selecting the most appropriate solutions for them. When designing evaluation frameworks, organizations should be mindful of the data sources used for testing. Relying too heavily on synthetic data for evaluation can create a false sense of model capability. Best practices include maintaining a diverse test set that combines both synthetic and real-world examples, with special attention to identifying and controlling for any artificial patterns or biases that might be present in synthetic data.
Successful model evaluation lies in recognizing that publicly available benchmarks and metrics are just the beginning. Real-world testing, domain-specific evaluation, and a clear understanding of business requirements are essential to any effective model selection process. By taking a thoughtful, systematic approach to evaluation, businesses can navigate AI choices and identify the models that best serve their needs.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro
from TechRadar - All the latest technology news https://ift.tt/PgZbAVo
Quantum computing has long been a subject of fascination and excitement, promising to solve complex problems far beyond the capabilities of...
Quantum computing has long been a subject of fascination and excitement, promising to solve complex problems far beyond the capabilities of classical computers. As we enter 2025, this transformative technology is poised to take a giant leap forward, progressing from physical qubits to logical qubits. This shift marks a pivotal moment in the quantum industry’s journey, one which sets the stage for exciting advancements across various industries and addresses the technical challenges that have, until now, constrained the potential of quantum computers.
Predicting the leap from physical to logical qubits
In a similar way that classical computers use bits to store information, quantum computers are built on the use of physical qubits to store quantum information. Unfortunately, physical qubits are sensitive to environmental noise, making them error-prone and unsuitable for solving large computational problems. This limitation can be overcome by using quantum error correction which encodes information across multiple physical qubits to create more reliable, error-resistant units called logical qubits. This transition will allow quantum computers to tackle real-world problems, moving the technology from experimental to practical, large-scale applications.
To effectively create many logical qubits, quantum computing hardware needs to incorporate multiple advanced technologies and algorithms and provide sufficient reliable computational resources in a sustainable way. Recent technical advances across the quantum industry, high-profile industrial partnerships, and an increasing number of scientists and engineers working on quantum error correction has accelerated the timeline to creating logical qubits much sooner than expected.
What the shift to logical qubits will enable
The transition to logical qubits in 2025 will dramatically enhance the capabilities of quantum computers, with far-reaching implications across multiple sectors.
Quantum chemistry is expected to be one of the first quantum computing applications to leverage logical qubits to simulate chemical reactions with much higher precision than classical computers. The first wave of studies will be highly scientific, but there will be a quick turning point to the exploration of real-world applications that will have tangible economic and societal value.
Another field which will benefit from the transition to logical qubits is renewable energy and battery development. By simulating physical quantum processes, such as the behavior of electrons in new materials, quantum computers will help accelerate the development of more efficient batteries and energy storage solutions. This could lead to breakthroughs in electric vehicles, renewable energy grids, and the quest for sustainable energy solutions.
The list of applications expands further as logical qubit counts and quality increase. For example, accelerated exploration of vast chemical spaces for potential drug identification for pharmaceutical applications, modeling of complex systems in the financial sector, optimizing interconnected supply chain problems for the manufacturing industry, modeling physical properties of new materials, and improving the performance of machine learning applications. All of these will be accelerated through the availability of logical qubits, allowing users to run deeper and more complex algorithms than before.
Aside from the growing interest in quantum computing applications, one key issue that has become increasingly prominent is the question on the sustainability of the quantum technologies themselves. As we have seen with AI advancements and data centers, the physical and ecological footprint of digital technologies can be drastic, and quantum computing will have to find its place in a much more environmentally friendly way. Sustainably-scalable modalities such as neutral-atom computing are gaining popularity in the quantum field due to its rapid advances in technical performance and its relatively small ecological footprint: a full-scale neutral-atom system fits inside a typical conference room and consumes less energy than a single data center rack.
2025: a quantum leap forward
As we approach 2025, the quantum computing industry is on the verge of a significant transformation. The move from physical to logical qubits will be a game-changer, addressing the challenges of error rates and scalability that have held back quantum computing for years. With forward-thinking companies leading the way, the next generation of quantum systems will be more stable, sustainable, and powerful than ever before.
This transition will open the door to a new era of quantum computing, one in which previously unsolvable problems are tackled head-on. By the end of 2025, we may witness quantum computing move from theoretical promise to practical reality, transforming industries and reshaping the future of technology.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro
from TechRadar - All the latest technology news https://ift.tt/Eb1MIvS
The National Institute of Standards and Technology (NIST) has recently updated its guidelines on password rotation, advising against the o...
The National Institute of Standards and Technology (NIST) has recently updated its guidelines on password rotation, advising against the once-standard practice of requiring users to change their passwords every 30, 60 or 90 days – unless an organization has experienced a data breach. This marks a significant shift from traditional cybersecurity policies that aimed to prevent breaches through frequent password changes. However, NIST’s new stance may seem at odds with the real-world needs of organizations focused on reducing security risks.
Understanding password rotation
Password rotation refers to the practice of regularly changing passwords to minimize the risk of unauthorized access to sensitive information. There are two primary types of password rotation: manual and automatic.
Manual password rotation requires users to update their passwords at set intervals, while automatic password rotation relies on technology to generate passwords and replace them without user intervention.
While manual password rotation has been common practice, it often has the unintended effect of leading to weak passwords and user frustration. In contrast, automated password rotation enhances security by regularly generating strong and unique passwords without the user burden of having to generate or remember them.
NIST’s shift away from frequent manual rotation
NIST’s latest guidance discourages enforcing mandatory password changes every 30, 60 or 90 days unless there is evidence of a breach. This change stems from the realization that frequent mandatory password updates can lead to poor user behavior, such as creating weak or easily guessed passwords for convenience.
For example, when required to change passwords frequently, users may make only minor adjustments to an old password – like changing “Password1” to “Password2” – which weakens security and makes it easier for attackers to guess credentials using techniques like credential stuffing or brute force attacks. Those passwords are also frequently reused across multiple accounts.
NIST’s updated guidance recognizes that the effectiveness of frequent password changes is limited unless there is specific evidence of compromised credentials. Rather than focusing on how often passwords should change, NIST now emphasizes the use of strong passwords and Multi-Factor Authentication (MFA) as more effective means of enhancing security.
Why password rotation still matters
Despite NIST’s recommendation to reduce mandatory password rotation, it remains relevant in certain contexts – particularly for privileged accounts that hold access to sensitive systems and data. Rotating passwords can effectively limit exposure if credentials are compromised. Automated password rotation is essential because it:
Prevents unauthorized access: Using the same password for extended periods increases the risk of a cybercriminal cracking it. Regularly changing passwords for sensitive accounts limits the time attackers have to exploit compromised credentials.
Limits exposure time: Frequent password rotation reduces how long a stolen or compromised password can be used to damage, alter or steal data. For example, if an HR employee’s password is compromised, regular updates can minimize risk.
Reduces the risk of password reuse: Manual password rotation often leads to users recycling or reusing variations of the same password. Automated systems mitigate this by generating strong, unique passwords, preventing users from adopting poor habits.
Additionally, password rotation is a critical measure for organizations that have shared accounts or use contractors, and for securing accounts when offboarding employees.
The challenge of manual password rotation
While password rotation is still relevant, not all methods are created equal. Manual password rotation presents challenges, such as user fatigue, weak password creation and reduced productivity. Users may struggle to generate and remember new, strong passwords, opting instead for easily memorable patterns or predictable variations of old passwords, which makes accounts vulnerable to attacks.
Additionally, enforcing manual password rotation disrupts workflows. Employees may waste time trying to recall or reset forgotten passwords, detracting from their primary work duties. Frequent changes without automated systems can lead to more frustration than security.
Balancing security and usability with automated password rotation
Automated password rotation addresses the shortcomings of manual password changes while maintaining high levels of security. Organizations can benefit from:
Reduced user burden: Automated systems eliminate the need for users to remember or create new passwords. By generating and replacing passwords automatically, employees can focus on their work without interruptions.
Stronger password practices: Automated systems ensure that new passwords meet complexity requirements, reducing the chances of successful brute force or credential stuffing attacks.
Enhanced security for privileged accounts: Privileged accounts benefit the most from automated password rotation, as regular updates limit exposure time and ensure even insiders cannot exploit static credentials.
Minimal disruption: Automated password rotation happens behind the scenes, allowing users to continue their work without needing frequent password resets.
Implementing automated password rotation securely
To implement automated password rotation, organizations should consider using a Privileged Access Management (PAM) solution that automates the generation, rotation and secure storage of passwords. This ensures strong passwords are regularly updated and stored in an encrypted vault, accessible only to authorized accounts based on the principle of least privilege to limit exposure.
Embracing a modern approach to password security
NIST’s updated guidelines reflect a more nuanced approach to password security, emphasizing the importance of strong, unique passwords while de-emphasising frequent manual rotation. However, password rotation remains critical for privileged accounts.
Automated password rotation is key to balancing security and usability in today’s complex threat landscape. Organisations should adopt modern PAM solutions to implement strong password practices without burdening users, ensuring sensitive data remains protected while maintaining productivity. By embracing automated password rotation, businesses can stay ahead of cyber threats and protect their most critical systems and information.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro
from TechRadar - All the latest technology news https://ift.tt/uodb1Ep
Arcane 's showrunners haven't ruled out physical appearances from the Black Rose's members in season 2 Fans have long suspec...
Arcane's showrunners haven't ruled out physical appearances from the Black Rose's members in season 2
Fans have long suspected that one or more of them will show up in the animated show
Even if they don't, the Netflix series' creators were excited to introduce them to a wider audience
Full spoilers follow forArcaneseasons 1 and 2.
There are only three episodes left of Arcane's second and final season and, as the clock ticks down to its finale, fans are still waiting for an answer to an absolutely huge question.
There have been plenty of candidates for the series' antagonist-in-chief. Silco fulfilled that role last season but, following his demise in the season 1 finale, we're none the wiser about who's succeeding him as Arcane's Big Bad. Is it Ambessa, who's been an increasingly antagonistic figure since her season 1 episode 7 debut? How about Jayce following his unexpected heel turn in Arcane season 2 act 2? What if, in the end, it actually ends up being Jinx?
In many viewers' minds, mine included, it won't be any of them. Indeed, fans have had a magical theory about Arcane's main villain for a long time, with some proposing that the Black Rose, a secret and dark magic-wielding organization, will be the show's actual evildoers. It's a hypothesis that predates Arcane season 2's official trailer being released in mid-September, too, with that two-minute-long teaser hinting at the Black Rose's introduction.
Well, as I covered in my Arcane season 2 act 1 ending explained piece, the Black Rose is officially part of the proceedings. What's still unclear after the arrival of season 2 episodes 4 through 6, though, is whether the Noxus-based sect is one of the best Netflix shows' chief bad guys. Or, rather, bad girls, because three of their four most famous members are females. That includes their infamous leader LeBlanc, the millennia-old sorceress who's essentially Noxus' shadow ruler and pulls the strings of whoever sits on the expansionist empire's physical throne.
With the Black Rose playing an increasingly larger role as Arcane season 2's story progresses, will we see LeBlanc and/or any other Black Rose members appear before Arcane's final credits roll? I had the opportunity to speak to the animated League of Legends (LoL) show's creators Christian Linke and Alex Yee ahead of its initial debut on November 9, so I felt obliged to ask the pair if this would be the case. Interestingly, they didn't actually deny it.
"Hmm... you really want to know, don't you?" Linke replied with a wry smile and a not-so-coy laugh. Before I had a chance to respond, Yee jumped in to cleverly add: "Are you asking 'will they be there' or 'will you see them?'"
You've played this game before, haven't you, gentlemen? Considering the pair didn't outright deny that LeBlanc and/or her fellow ancient magic wielders would appear, I'm led to believe that, at the very least, one of them will. I've got the evidence to back that up, too. The cast list of season 2 episode 5's end credits sequence mentions a character named 'illusionary sorceress' who's not only the individual who speaks to Mel in this chapter but also voiced by Minnie Driver. Don't be shocked if Driver is the voice for Arcane's animated take on LeBlanc, and, providing I'm right, if Driver and LeBlanc are subsequently added to my Arcane season 2 cast and character guide.
But I digress. Even if I'm completely wrong in my assumptions about members of the Black Rose appearing before season 2 ends, it doesn't sound like this is the last we'll see of them. With many more LoL movie and TV adaptations in development, Linke suggested they may crop up, or at least be mentioned, in future projects.
"When we've talked about them internally, the coolest version of the Black Rose is when they're invisible," Linke said. "But what's also really cool is they're one of the first glimpses of this larger world, and the characters that have an association with the arcane and magic that comes from another realm. It's a good thing that fans have opinions on what's happening with Hextech, magic, and all of these things, and we're really excited about those things, too. But, you know, the Black Rose is an integral part of season 2, and that's all you'll get for now."
For more coverage ahead of season 2 act 3's release, check out more articles from my exclusive chat with Linke and Yee below.
In today’s dynamic application landscape, delivering IT infrastructure that’s highly available, performant and secure is paramount for organizations of all sizes. Load balancers help achieve this by distributing client network traffic across multiple servers. They also distribute traffic across geographic locations to minimize downtime and enhance the application experience.
Since 65% of organizations say their cloud environment is multi-cloud, enterprise IT teams and decision-makers are re-evaluating their load-balancing choices more frequently. They need a versatile, secure and cost-efficient solution that aligns with modern deployment needs—one that optimises workflows and minimises downtime to enhance application performance. Understanding the essential role of load balancers, the state of load balancing in modern tech ecosystems and where application delivery sits today gives professionals a holistic perspective from which to make informed choices.
The changing load balancer landscape
Numerous industry trends and application influences shape how load balancers are used today. Enterprise IT teams and decision-makers are increasingly open to exploring and starting to use load-balancing vendors and solutions. A survey conducted by EMA revealed that 80% of enterprise organizations indicated a willingness to consider switching load-balancing vendors in the next two years.
There are numerous reasons behind the changing demands for applications. The rise of cloud-based applications, micro-service architectures and hybrid cloud deployments have increased the complexity of load-balancing requirements. Many organizations struggle to support this evolving application landscape with their current load balancers, highlighting their need for a solution that offers advanced security, robust analytics and other features that simplify management.
Ongoing support costs for their existing load balancers and additional deployments can be significant, as can adding additional nodes for new applications. This drives organizations to seek out more cost-effective alternatives that will enable them to flexibly scale their load-balancing architecture without considerable spikes in their operational costs.
Benefits of load balancing
Load balancers drive business value in various ways—far beyond enhancing the performance, availability, reliability and redundancy of IT infrastructure to maintain continuous service.
In addition to these critical roles, load balancers can also optimize resource utilization, significantly reducing costs and improving system performance. They facilitate the efficient use of server resources, reducing the risk of underutilization or overloading.
Perhaps a lesser-known but critical benefit—load balancers can enhance security by controlling traffic in a way that mitigates the risk of DDoS attacks. They can detect and block malicious traffic, helping to protect the network from potential threats. They can also play a crucial part in disaster recovery strategies by redirecting traffic to backup servers in case of a failure. This capability maintains business continuity and minimizes downtime.
Load balancing also allows organizations to easily add or remove servers based on traffic demands. This flexibility supports seamless scalability, accommodating growing user bases without service disruptions.
Considerations for choosing a load-balancing platform
When evaluating load-balancing platforms, it’s vital to find one that can flex as organizational needs change in scale and complexity. A platform offering customer-focused support and rich online resources will help an organization of any size get the maximum benefit from deployments.
It's also worth checking out the vendor’s development history. For instance, research how the vendor has been investing back in product R&D and how quickly they address bugs. Some vendors can even provide an estimate on ROI. Finally, it’s critical that licensing isn’t only Perpetual and offers flexibility that can scale to the business’s needs.
Some fundamental features to look for in a solution include:
Core load balancing: Core load-balancing functionality that’s table stakes for modern organizations includes on-premises, cloud and hybrid application deployments. It's better still to find one that offers a Global Server Load Balancing (GSLB) feature that can be used across multiple data centers, cloud providers and regions.
Cybersecurity functionality: Layered cybersecurity functionality can provide an additional security boost to an organization's existing cybersecurity practices. These include a Web Application Firewall (WAF), Edge Security Pack (ESP) including Reverse Proxy, End Point Authentication, Active Directory integration, RADIUS authentication, Single Sign On (SSO) across virtual services, RSA SecurID dual factor authentication and Persistent Logging and Reporting.
Adaptable deployment options: Load balancers can be deployed in different infrastructure setups, including dedicated hardware, virtual machines or cloud platforms, like Azure and AWS.
Flexible and competitive pricing: Specifiers should be able to choose the licensing model that fits their business needs. These include Perpetual, Subscription, Pay-as-You-Go (PAYG) and Pooled. With the right choice, organisations can achieve significant cost savings for deployment and reduce ongoing support costs.
Prioritizing security and efficiency
The load balancer landscape continues to evolve in anticipation of upcoming industry trends and influences. Therefore, a versatile, secure and efficient load-balancing solution is essential for enterprise businesses.
For organizations to optimize their current load-balancing capabilities for the best application experience, there must be in alignment with modern deployment needs, improved functionality, flexible licensing and lower cost of ownership, plus industry-leading support and online resources.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro
from TechRadar - All the latest technology news https://ift.tt/oUpKmOM
If you struggle with your fitness or staying active, getting out and getting those steps in can really be challenging. After all, 10,000 st...
If you struggle with your fitness or staying active, getting out and getting those steps in can really be challenging. After all, 10,000 steps in miles is about 5 miles for the average walker, and sometimes getting that distance in can prove challenging.
Learning how to walk 10,000 steps a day efficiently means incorporating lots of little lifestyle tweaks to help you get on track. You can break up your mileage into more manageable chunks, actively try to incorporate more steps into your daily life, track it all on one of the best fitness trackers, and even buddy up with someone to make the process more enjoyable.
A couple of precise tech purchases could also massively elevate your step count and your overall fitness. With the Black Friday deals event just around the corner, I reckon that anyone struggling with motivation or the logistics of walking could seriously boost their well-being with just two key pieces of relatively cheap equipment.
But thanks to Black Friday, you don’t need to worry about splashing out hundreds of dollars or pounds per year on a gym membership, or buying a top-of-the-line treadmill for your basement. Here’s how you can start walking 10,000 steps with nothing but a cheap walking pad and a humble fitness tracker.
Track your steps
Counting your steps is going to be impossible without some specialized equipment, and while your smartphone might have a step counter, even a cheap fitness tracker is going to give you much better insight into your overall activity levels and your fitness as a result.
Without spending a great deal, in the UK you can pick up a Huawei Band 9, or a Xiaomi Smart Band 9 for less than £40. The latter is our top cheap fitness tracker pick thanks to its nifty screen, accurate sensors, and comprehensive data. If you’ve got a little bit more to spend, the Google Fitbit Inspire 3 is a solid choice at around £85, but there’s no need to spend more than £50. Save your money and use it for the second gadget we’ll come to.
Of course, you could always push the boat out with an Apple Watch or a Samsung Galaxy alternative, or even a great Garmin like the Forerunner 55, but if you’re just looking for a cheap band to count steps and keep you motivated, there’s no reason to spend more than $100.
Unlock the power of the walking pad
As the owner and beneficiary of a great walking pad, and as TechRadar’s fitness and wearables staff writer, I’m a fervent advocate of the humble walking pad as one of the best fitness tools out there. Cheaper and smaller than treadmills, they can often be folded away for storage and provide the perfect walking platform to help you get your steps in at home. Also known as under-desk treadmills, you can use the best under-desk treadmills to do almost anything, be it attending work calls or meetings, watching Netflix, making or taking phone calls, listening to podcasts, and more.
You’ll find most great walking pads are less than $400/£300, and plenty are on sale around Black Friday for less. Walking pads can help you avoid inclement weather or dark winter nights, cutting out some of the key concerns that often get in the way of our best-laid fitness plans.
Choosing your walking pad wisely matters a bit more than the fitness tracker, simply because it’s a bigger cost commitment. So if you’re shopping around, make sure you look out for important metrics like the weight of the unit itself, the weight limit, speeds, and extra features such as a remote control.
You can also find more picks in our best under-desk treadmills roundup, where our top budget pick will set you back around $150 / £150, or you can splash out for a more premium model.
Regardless, Black Friday is absolutely a great time to pick up some incredible fitness tech and give you a head start on those January fitness resolutions.
Arcane's creators have admitted that the animated show is rewritingLeague of Legends(LoL) history
However, they "aren't troubling" themselves with what's considered to be canon
Their response comes after some major character revelations inArcaneseason 2 act 2
Full spoilers follow forArcaneseason 2's first six episodes.
Ever since Arcane made its Netflix debut in November 2021, League of Legends (LoL) fans have fiercely debated whether what happens in the animated series is considered canon in Riot Games' hugely popular videogame franchise.
Three years on from the emergence of those online discussions, we have a definitive answer: yes, but only kind of. That's the verdict of the hit show's creators Christian Linke and Alex Yee who, in an exclusive TechRadar interview that took place before Arcane season 2's initial launch on November 9, they admitted that Arcane is officially rewriting elements of League's history.
However, the pair also stated they aren't concerning themselves with the definition of what's canon or not. Instead, Linke and Yee chose to describe the alterations to LoL's mythology as what "should be considered to be the truth" at this point in time.
The duo's comments come as act 2, comprising episodes 4 through 6 of Arcane's second and final season, makes some massive changes to the canonicity of LoL, such as the revelation that the monstrous, wolf-like LoL champion known as Warwick was created by Singed using Vander's corpse.
Another notable admission is the reveal of Vi and Powder's mom Felicia, her ties to Vander and Silco, and how she was a key driver in the latter pair's determination to create the undercity state of Zaun to ensure it's governed independently of its aristocratic neighbor Piltover. Then there's everything surrounding the 'will they won't they' pairing affectionately dubbed 'CaitVi' by Arcane's fanbase and that huge season 2 moment involving Caitlyn and Vi that we waited years for.
By far the biggest lore alternation, though, concerns the aforementioned alchemist known only as Singed. Season 2 episode 5, titled 'Blisters and Bedrock', confirms a long-standing fan theory that Singed is not only the scientist/inventor formerly known as Doctor Corin Reveck, but also the father of another LoL champion called Orianna, aka The Lady of Clockwork. For those interested in learning more about these changes, my Arcane season 2 act 2 ending explained piece provides more information.
This isn't the first time Arcane, one of the best Netflix shows, has reshaped what LoL fans thought they knew about the mythos surrounding Riot's most popular game. Arcane's first season made subtle changes to the way Jayce and Viktor's friendship is depicted in LoL, revised Vi and Jinx's backstories to make them blood relatives, and introduced new champions like Ambessa and Mel who weren't part of LoL history prior to their appearances in the show. Netflix's animated adaptation of Riot's biggest game, then, hasn't been shy about modifying its established lore.
Despite these changes, Linke and Yee are unmoved about the prospect of potential fan backlash over what was previously accepted as League canon. Yes, they still hope these tweaks "feel true" to fan expectations for these characters and Runeterra – the world Arcane and LoL are set on – but they're not worried about the complexities associated with what's canon and what isn't.
"We want to tell stories that feel true to the expectations of fans," Yee replied when I asked if Arcane's events are now considered canon in LoL. "This question of canon – to me, it's like 'what is canon [as a definition] but the thing we say it is for now'? So, I guess I'm not necessarily troubling myself with it too much."
"We set out to tell the stories of these characters," Linke added. "I mean, it should be considered to be the truth. That's the most important thing."
There you have it, folks. Arcane is officially reworking what we knew about LoL, but it's not defined in the traditionally canonical sense if that makes, well, sense. Anyway, as we prepare for the arrival of Arcane season 2's final batch of episodes, read more from my chat with Linke and Yee, plus my wider season 2 coverage, below.
Cloudbrink hotspot service aims to offer alternative to VPN tools
The service claims to improve application performance by 30 times
Can also reportedly reduce the tethering suffered in warehouse environments
Virtual Private Networks (VPNs) have long been the standard for secure internet access in the remote and hybrid work landscape.
However, while VPNs provide essential encryption, they often also have downsides, as workers relying on tethered connections in challenging environments such as warehouses, or remote manufacturing facilities, can face a frustrating trade-off between security and speed due to relying on mobile hotspots.
Now, Cloudbrink is looking to improve hotspot performance as an alternative to VPNs, offering a solution that not only ensures security but also enhances connectivity without the typical bandwidth sacrifices.
Beyond traditional VPNs
Hotspots can often suffer from performance degradation due to the nature of their connection (combining two wireless links - one from the device to the mobile phone and another from the phone to the carrier network). This dual-link setup increases the chances of performance issues, particularly when signal strength is poor, or packet loss occurs.
While the rollout of 5G networks promises to alleviate some of the performance issues associated with mobile hotspots, widespread adoption remains a distant goal. Currently, only 32% of cellular connections in the United States are 5G, and penetration is significantly lower in many other regions. Additionally, 5G coverage tends to be concentrated in metropolitan areas, leaving many remote and hybrid workers unable to capitalize on the technology.
Cloudbrink’s service is designed as a high-performance alternative to VPNs, with independent tests conducted by Broadband Testing showing that the new service boosts application performance over WiFi, 4G/5G, and broadband connections by more than 30 times.
The company says it uses techniques such as accelerated pre-emptive packet recovery and dynamic virtual access points known as FAST Edges, which minimize latency and maximize throughput even over unreliable and congested networks.
Intelligent packet optimization allows the service to adjust performance, based on signal strength and other variables, ensuring the best possible connection at any given time, as Cloudbrink pairs these technologies with AI-enabled network.
“Cloudbrink was already faster than a VPN or other ZTNA over any remote connection by an order of magnitude," claims Manohar Reddy, head of products at Cloudbrink. "Now we’ve tuned the service to optimize mobile hotspots, we’re seeing better than twice the performance we were previously getting on tethered devices."
The most lucrative photo contest in the world has awarded its top prize – an eye-watering $200,000 – to Liping Cao of China for his monochrome image of a distant wind farm on the shores of a freshwater lake in Australia (see below).
The judges of the HIPA Sustainability, which is now in its thirteenth year, and which this year put up a record-high $1 million prize pot to be shared among the winners, chose Quiet Power, which depicts a wind farm in 2021 on a then-dried-out Lake George in New South Wales, Australia, as the overall winner.
What's most surprising about Liping's feat is the camera he used to take his winning photo – a Canon DSLR.
Liping paired the EOS 5D Mark III with the EF 24-105mm F4L IS USM, a versatile zoom lens that back in the day could be purchased with the camera as part of a kit – a combination that's easily affordable for enthusiasts.
The winning image was shot in color and then converted to black and white because it "shows more levels of detail and is more suitable for experiencing environmental impact,” said Liping.
DSLR for the win
Canon confirmed some time ago that it's no longer developing DSLR cameras, and is instead going all-in with its mirrorless cameras, but Liping's winning photo, taken with a Canon camera that's been consigned to the past, reminds us that you don't always need the latest and greatest cameras to get top results.
The full-frame EOS 5D Mark III packs a 22.9MP sensor, which practically matches Canon's modern-day mirrorless equivalents for detail, such as the EOS R6 Mark II, which shoots 24MP photos and which is much costlier.
Full spoilers follow forArcaneseason 2 episodes 4 to 6.
The second part of Arcane season 2 is out now – and, if you thought season 2 act 1's ending was as emotionally stunning as things were going to be, you were wrong.
I suspect that, as you come to terms with the soul-crushing events that occurred in the popular Netflix show's latest episodes, you've got lots of questions rattling around in your head. Allow me, plus Arcane's creators Alex Yee and Christian Linke, to answer – or, at the very least, try to answer – them. Full spoilers immediately follow forArcaneseason 2 act 2, so turn back now if you haven't watched them yet.
Arcane season 2 act 2 ending explained: is Viktor really dead?
After a paranoid Jayce – more on what's wrong with him later – escapes the Anomaly, which apparently trapped him in an unknown dimension in episode 3, aka 'Finally Got the Name Right' he heads to Viktor's utopian camp on the outskirts of Zaun. Infiltrating said base, he almost kills one of its child inhabitants due to the impact of the Anomaly on his physical state – again, more on this soon.
Jayce manages to pull himself together before he gives the kid the same treatment he gave Salo (RIP, by the way) in the final scene of episode 5, titled 'Blisters and Bedrock'. I've no doubt that Jayce also remembers the kid he accidentally killed in season 1 episode 8, too, which stops him from murdering another innocent victim here.
Despite almost being gunned down, the kid takes pity on Jayce and takes him to meet the so-called Herald (the camp's messianic title for Viktor). Once there, Jayce powers up the gemstone beam alt-ability of his warped Hextech hammer and, aiming it towards a meditating Viktor, blasts him in the chest and seemingly kills him.
Why do I say 'seemingly'? Because, as fans of Riot Games' hugely popular League of Legends (LoL) videogame franchise, which Arcane is based on and is apparently a prequel to, will tell you, Viktor's ongoing presence as a playable LoL champion suggests he might not be dead after all.
When I quizzed Yee and Linke about whether Viktor's demise, they didn't confirm he was. "I think a fair answer is yes and no," Yee teased. Fine, keep your secrets, but I'm fully convinced this isn't the last we've seen of this cybernetically-augmented individual.
Arcane season 2 act 2 ending explained: what happened to Warwick?
Viktor's death has a devastating impact on his disciples, including Huck, who Viktor healed of their ailments with his Hextech powers. As Viktor perises, his followers scream in agony and suddenly die, too. Given Viktor's ability to take over any of his disciple's minds and/or bodies – as evidenced by him doing so to Salo in episode 5 – it seems Viktor and his peaceful acolytes are linked in some way, be it telepathically or in a form of hive mind consciousness.
But I'm getting off track. Heartbreakingly, Warwick – the monster Singed created from Vander's corpse – is also a casualty of Viktor's demise. Viktor used his powers to try to reverse Singed's alchemical effects and turn Warwick into Vander, so Warwick is also connected to Zaun's new Herald. Long story short: Warwick is also going to die.
Unlike Viktor's human followers, though, a panicked Warwick reverts to his feral state and becomes a murderous, blood lava-esque spewing machine. Fuelled by his unquenchable rage, Warwick mauls Rictus, Ambessa's lieutenant, to death as a horrified Vi, Jinx, Isha, Caitlyn, and Ambessa watch on.
Overcome with grief, an angry Ambessa instructs her Noxian forces to attack Warwick. He manages to take some of them down, but the overwhelming odds, and the fact he's already dying, mean Warwick's time on Runeterra – the world Arcane and LoL are set on – is fast coming to an end.
Arcane season 2 act 2 ending explained: did Isha die?
Another fair question, but one Linke and Yee were unwilling to fully commit to answering. With three more episodes to come, they wouldn't be drawn on anything to do about season 2 act 3, so it's completely understandable why they wouldn't confirm or deny if Isha died.
However, I think she's all but certain to have perished. Indeed, it looks like Isha sacrifices herself to save Jinx, Vi, and Caitlyn (but mostly Jinx) by killing Warwick with Jinx's Hextech gemstone-fuelled gun.
Episode 6, titled 'The Message Hidden Within the Pattern', foreshadowed this. Early in act 2's final episode, Huck asks Vi and JInx to leave their weapons at the entrance to Viktor's camp. The pair reluctantly agree but, before she surrenders her handgun, Jinx removes its gemstone and gives it to Isha for safekeeping. Noticing that Vi didn't remove the gemstones from her Hextech gauntlets, Isha grabs that pair, albeit off-screen, too. You can see her shoving them into her belt bag as the trio enters the camp.
Given the heart-warming nature of Jinx and Isha's evolving sibling-like bond, plus the fact Arcane constantly wants to rip out our hearts, Isha's death has also been signaled since the duo crossed paths in episode 2. So, when Warwick lashes out at Jinx as she tries to subdue him, and then menacingly approaches Jinx to deliver a lethal blow, Isha springs into action.
Running into the fray, she slides and grabs Jinx's pistol, which is lying on the ground, and jumps through the air to land at Warwick's feet. After loading all three gemstones into the weapon, she salutes Jinx with a tear-jerking finger-gun motion – the same one Jinx used on Isha in episode 2 – before shooting Warwick, which unleashes a destructive Hextech blast and likely kills them both.
The big question now is: how will Isha's death affect Jinx? Vi's younger sister has surprisingly kept a lid on her psychosis so far in season 2, and it seems her friendship with Isha is a key reason for that. With Isha gone, though, we'll probably see Jinx surrender to her mental disorder and/or become a depressed recluse in episode 7. Arcane season 2's official trailer confirms she'll eventually emerge from her emotional rut, and aid Piltover and Zaun's joint fight against Ambessa and her Noxian forces. For now, though, a heart-broken Jinx will mourn Isha and Vander's loss – that duo, Viktor, and Rictus joining Arcane's growing casualty list that began with three big character deaths in the season 2 premiere.
Arcane season 2 act 2 ending explained: what's wrong with Jayce?
As I mentioned, Jayce has evidently been affected by the Anomaly. The magic crystal, which was given to him by the mage who rescued Jayce and his mom when he was a child, isn't helping matters, either. It's usually bound to a wrist strap Jayce wears but, after escaping the Anomaly, it's now embedded in his wrist, which won't be good for anyone's physical, emotional, or mental wellbeing.
So, where has he been? I don't have an answer to that but, playing it coy once more, Linke told me: "You'll find out in gratuitous detail. Let's just say certain illusions have dwindled", before Yee added: "You could say his dreams [about Hextech being a force for good] have died."
There are a couple of hints in episode 6 as to why Jayce is on a mission to destroy Hextech (i.e. his life's work) and anyone associated with it. The first of those is what, at the start of the sixth episode, Viktor calls a "sophisticated conjuration". According to Viktor, this is a singularity that simultaneously self-replicates and self-annihilates itself. In layman's terms, then: whatever the Anomaly and/or the titular Arcane (remember, at the end of 'Blisters and Bedrock' Viktor tells Jayce he can see that Jayce has "been touched by the arcane") has done to Jayce, he's continuously being ripped apart and put back together by it.
That's not all. In episode 5's final scene between Jayce and Salo, and the sixth episode's sequence before Jayce almost bludgeons one of Viktor's child followers to death, he sees corrupted versions of Salo and said kid. Check out the below image for a screenshot of what they look like.
Clearly, these semi-hollow, disfigured versions of Salo and the child disciple are evil in Jayce's unstable state, hence his desire to eradicate Hextech and anything it's touched from existence. Is he being forced to do so by the Anomaly, the Arcane, the crystal stuck in his forearm, or a combination of the three? We'll find out soon.
Arcane season 2 act 2 ending explained: how will Ambessa react to Rictus' death and episode 6's wider events?
Not well, I suspect. Her second-in-command is dead. Caitlyn, who Ambessa was priming to be Piltover's new commander-in-chief (albeit one that Ambessa believed she could puppeteer), has also betrayed her and re-allied herself with Vi and Jinx. Singed's plan to recapture Warwick failed. Oh, and a mentally distorted Jayce not only suddenly reappeared on the scene, but was also responsible for everything that happened in episode 6's last 10 minutes after murdering Viktor.
Ambessa's been looking to assume totalitarian control of Piltover since her first appearance in season 1 episode 7 through manipulating (unsuccessfully, I'll add) numerous high-ranking Piltovans. Amid episode 6's fallout, I suspect she'll now pull a Thanos and decide to "do it myself" – i.e. make a play to become Piltover's autocratic ruler. After all, we see Ambessa and her Noxian soldiers making light work of Piltover's enforcers in season 2's official trailers, so expect her to show her true colors in act 3.
Arcane season 2 act 2 ending explained: who is Felicia? And how does she know Vander and Silco?
The short answer is she's Vi and Powder/Jinx's mom. A 'Blisters and Bedrock' flashback sequence also confirmed Felicia was a close friend of Vander and Silco. Indeed, the trio – as we learn when Vi, Jinx, and Isha come across an abandoned miners' break room while searching for Warwick in Zaun's underground tunnel network – were part of said mining team.
We also find out Felicia is the one who urged Vander and Silco to finally realize their dream of securing Zaun's independence from Piltover. The reason? Felicia finds out she's pregnant with Vi, who she conceived with her husband Connol. It's Vander who comes up with the name Violet, too. Oh, and Felicia and Connol's deaths, which we glimpsed in the opening scene of Arcane's season 1 premiere, were the reason for the breakdown in Vander and Silco's friendship. That's confirmed in an apology-filled letter, which Vi and company find in the aforementioned break room, that Vander wrote but never gave to Silco.
Arcane season 2 act 2 ending explained: how does Mel survive the Black Rose's attack?
By using the same ability she manifested when Jinx attacked Piltover's council chamber in the season 1 finale.
After being kidnapped by the Black Rose in 'Finally Got the Name Right', Mel is put through the wringer in 'Blisters and Bedrock'. Indeed, not only does she witness Elora's death at the Black Rose's hands, but she's also imprisoned in an oculorum; a specialized chamber built by ancient forces to lock up false prophets. She also thinks she's been reunited with her apparently deceased brother Kino but, due to his apparent ability to teleport to different areas of the oculorum, and the missable Black Rose-hued flourishes that occasionally flash over him, it's clear he's nothing but an illusion.
It doesn't take the ever-perceptive Mel long to realize he's not real. Determining that appears to be to her detriment, however, with the Black Rose choosing to kill her once she works this out. Unfortunately for them, Mel's latent, seemingly light-based powers allow her to escape the Black Rose's dark magic-crafted chains.
Arcane season 2 act 2 ending explained: who is Mel's so-called sister? Is it LeBlanc?
Nobody knows what happens to Mel after she destroys the Black Rose's supernatural shackles. We'll have to wait until episode 7, at the earliest, to learn more.
What I'm confident about, though, is Mel and Kino having another sibling. The Black Rose's Kino apparition mentions as much and, while their story initially comes across as just another one of the clandestine organization's lies, there appears to be some truth to it.
Indeed, just before Mel escapes the Black Rose's clutches, a mysterious voice calls Mel their "sister". Episode 6's end credits sequence identifies this character as 'illusionary sorceress' who's voiced by Minnie Driver.
But who is this enigmatic individual? Before season 2's debut, Arcane fans conjured up a magical theory about who the show's main villain is: LeBlanc, a prominent member of the Black Rose and millennia-old sorceress who, without getting into the weeds of her extensive LoL backstory, is essentially Noxus' shadow queen.
Armed with this hypothesis, I asked Linke and Yee if we'd see any Black Rose members, LeBlanc or otherwise, before season 2 ends. I suspect we will, based on Linke's wry smile and telling laugh, and Yee's ambiguous "are you asking 'will they be there' or 'will we see them?'". That's as good a confirmation as I've heard that we're right, everyone! Time to update my Arcane season 2 cast and character guide again...
Arcane season 2 act 2 ending explained: who is Doctor Reveck? And why is he significant?
As Caitlyn explains in episode 5, Doctor Corin Reveck is Singed's true identity. A revered alchemist who was kicked out of Piltover's scientific academy for committing an unknown crime, Reveck is also responsible for creating shimmer, the addictive substance that flooded Zaun's streets in the wake of Vander's death in season 1.
The revelation that Singed is Reveck has massive repercussions for LoL lore. Indeed, it doesn't just validate a long-standing fan theory that Singed and Reveck are the same person, but also confirms the identity of Singed's daughter, who we see lying in a stasis pod midway through season 2's fifth chapter.
Historically, Reveck had a child named Orianna who, for reasons unknown (I imagine The Gray, aka the toxin-riddled air that used to hang over Zaun, has something to do with it), develops a terminal lung condition. However, Reveck manages to keep her alive by suspending her in the previously mentioned pod while he devises a way to cure her.
Now that Reveck and Singed are canonically the same person, Singed's daughter must also be Orianna. As Singed notes, his monstrous experiments, Warwick included, have been tests to determine if there's a way to bring Orianna back to life. Considering he succeeded on the Warwick front, he's one step closer to achieving his goal of overcoming death.
Fun fact: Orianna, who's also known as The Lady of Clockwork in LoL, is one of the game franchise's many champions/playable characters. Her appearance in 'Blisters and Bedrock', then, serves as an origin story of sorts for this mechanical humanoid and, whisper it quietly, may set up a future LoL movie or TV adaptation starring Orianna.
Arcane season 2 act 2 ending explained: where are Ekko and Heimerdinger?
We still don't know. They were trapped inside the Anomaly alongside Jayce, but they didn't return to the material realm (i.e. the physical world) with their mentally unstable scientific fellow.
As Linke and Yee confirmed, we'll find out what happened to Jayce in act 3 – here's hoping we get more details in episode 7 – so I fully expect us to learn more about Ekko and Heimerdinger's whereabouts then. We know they'll return at some point, as there are scenes involving the duo in season 2's main trailers that weren't part of episodes 1 through 6.
It's incredibly likely that one or both of them will return with superhuman powers as well. LoL diehards already know Ekko has the ability to not only rewind time but also explore the branching possibilities of reality to create the perfect outcome. This time-reversal ability was teased by the stopwatch he used in season 1, so I'd be amazed if he doesn't acquire said power due to his experiences with the Anomaly.
What's unclear is if he'll need his Zero Drive, the gadget he created in LoL lore, to stabilize his powers. Regardless, expect Ekko and Heimerdinger to play vital roles in season 2's final act. Speaking of which...
Arcane season 2 act 2 ending explained: when is episode 7 being released on Netflix?
Season 2 episode 7 will be released on Netflix, aka one of the world's best streaming services, on Saturday, November 23.
Follow Us
Were this world an endless plain, and by sailing eastward we could for ever reach new distances