Skip to main content

Scale AI Lays Off 200 Employees: 'We Ramped Up Our GenAI Capacity Too Quickly'

2 months ago
Scale AI is laying off 14% of its workforce and 500 contractors as part of a major restructuring just weeks after Meta bought a 49% stake and absorbed its CEO into a new superintelligence lab. The Verge reports: Jason Droege, CEO of Scale AI, sent an email to all Scale employees today, which was viewed by The Verge. Droege said he plans to restructure several parts of Scale's generative AI business and organize it from 16 pods to "the five most impactful": code, languages, experts, experimental, and audio. The company will also reorganize its go-to-market team into a single "demand generation" team that will have four pods, each covering a specific set of customers. "The reasons for these changes are straightforward: we ramped up our GenAI capacity too quickly over the past year," Droege wrote. "While that felt like the right decision at the time, it's clear this approach created inefficiencies and redundancies. We created too many layers, excessive bureaucracy, and unhelpful confusion about the team's mission. Shifts in market demand also required us to re-examine our plans and refine our approach." Droege said that he believes the changes to the company will make it more able to adapt to market shifts, serve existing customers, and win back customers that have "slowed down" work with Scale. He also said that the company would deprioritize generative AI projects with less growth potential. "We remain a well-resourced, well-funded company," he wrote. Scale's generative AI business unit will have an all-hands meeting tomorrow, followed by a company-wide meeting on July 18th. Osborne said that Scale plans to increase investment and hire hundreds of new employees in areas like enterprise, public sector, and international public sector, in the second half of 2025 and that severance has been paid out to impacted roles. "We're streamlining our data business to help us move faster and deliver even better data solutions to our GenAI customers," he said.

Read more of this story at Slashdot.

BeauHD

Linux Reaches 5% On Desktop

2 months ago
Longtime Slashdot reader bobdevine shares a report from OSTechNix: For the first time, Linux has officially broken the 5% desktop market share barrier in the United States of America! It's a huge milestone for open-source and our fantastic Linux community. While many might think of Linux as a niche choice, this new data shows a significant shift is happening. According to the latest StatCounter Global Stats for June 2025, Linux now holds 5.03% of the desktop operating system market share in the United United States of America. This is fantastic news! [...] One truly satisfying detail for me? Linux has finally surpassed the "Unknown" category in the USA! It shows that our growth is clear and recognized. "It took eight years to go from 1% to 2% (by April 2021), then just 2.2 years to reach 3% (June 2023), and a mere 0.7 years to hit 4% (February 2024)," notes the report. "Now, here we are, at over 5% in the USA! This exponential growth suggests that we're on a promising upward trend."

Read more of this story at Slashdot.

BeauHD

Chinese Authorities Are Using a New Tool To Hack Seized Phones and Extract Data

2 months ago
An anonymous reader quotes a report from TechCrunch: Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages -- including from chat apps such as Signal -- images, location histories, audio recordings, contacts, and more. In a report shared exclusively with TechCrunch, mobile cybersecurity company Lookout detailed the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico. Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn't know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means Chinese residents, as well as travelers to China, should be aware of the tool's existence and the risks it poses. [...] The good news ... is that Massistant leaves evidence of its compromise on the seized device, meaning users can potentially identify and delete the malware, either because the hacking tool appears as an app, or can be found and deleted using more sophisticated tools such as the Android Debug Bridge, a command line tool that lets a user connect to a device through their computer. The bad news is that at the time of installing Massistant, the damage is done, and authorities already have the person's data. "It's a big concern. I think anybody who's traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that's on it could be collected," said Kristina Balaam, a researcher at Lookout who analyzed the malware. "I think it's something everybody should be aware of if they're traveling in the region."

Read more of this story at Slashdot.

BeauHD