Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 11 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

When transferring multiple 100+ MB files between computers or devices, I typically use:

  • USB memory stick, SD card, or similar
  • External hard drive
  • Optical media (CD/DVD/Blu-ray)
  • Network app (rsync, scp, etc.)
  • Network file system (nfs, samba, etc.)
  • The "cloud" (Dropbox, Cloud, Google Drive, etc.)
  • Email
  • Other (specify in comments)

[ Results | Polls ]
Comments:166 | Votes:326

posted by jelizondo on Sunday October 19, @09:36AM   Printer-friendly

New psychology research looks at why we help our friends when they need it

Despite how natural friendship can feel, people rarely stop to analyze it. How do you know when someone will make a good friend? When is it time to move on from a friendship? Oftentimes, people rely on gut intuitions to answer these kinds of questions.

In psychology research, there's no universally accepted definition of a friend. Traditionally, when psychologists have analyzed friendship, it's often been through the lens of exchange. How much did that friend do for me? How much did I do for them? The idea is that friendships are transactional, where friends stick around only as long as they are getting at least as much as they are giving in the friendship.

But this focus doesn't capture what feels like the essence of friendship for many people. We and our colleagues think another model for relationships—what we call risk-pooling—better matches what many people experience. In this kind of friendship, no one is keeping track of who did what for whom.

Our research over the past decade suggests that this kind of friendship was essential for our ancient ancestors to survive the challenges they encountered. And we feel it's essential for surviving the challenges of life today, whether navigating personal struggles or dealing with natural disasters.

The traditional social exchange theory of friendship views relationships as transactions where people keep a tally of costs and benefits. Building on this framework, researchers have suggested that you approach each friendship with a running list of pluses and minuses to decide whether to maintain the bond. You keep friendships that provide more benefits than costs, and you end those that don't.

The theory holds that this balancing act comes into play when making decisions about what kinds of friendships to pursue and how to treat your friends. It's even made its way into pop psychology self-help spaces.

We contend that the biggest issue with social exchange theory is that it misses the nuances of real-life relationships. Frankly, the theory's wrong: People often don't use this cost-to-benefit ratio in their friendships.

Anybody who has seen a friend through tough times—or been the one who was supported—can tell you that keeping track of what a friend does for you isn't what friendships are about. Friendships are more about companionship, enjoyment and bonding. Sometimes, friendship is about helping just because your friend is in need and you care about their well-being.

Social exchange theory would suggest that you'd be better off dropping someone who is going through cancer treatment or a death in the family because they're not providing as many benefits to you as they could. But real-life experiences with these situations suggest the opposite: These are the times when many people are most likely to support their friends.

Our research is consistent with this intuition about the shortcomings of social exchange theory. When we surveyed people about what they want in a friend, they didn't place a high value on having a friend who is conscientious about paying back any debts—something highly valued from a social exchange perspective.

People considered other traits—such as loyalty, reliability, respectfulness and being there in times of need—to be much more important. These qualities that relate to emotional commitment were seen as necessities, while paying back was seen as a luxury that mattered only once the emotional commitment was met.

Having friends who will help you when you're struggling, work with you in the friendship and provide emotional support all ranked higher in importance than having a friend who pays you back. While they might not always be able to provide tangible benefits, friends can show they care in many other ways.

Of course, friendship isn't always positive. Some friends can take advantage by asking too much or neglecting responsibilities they could handle themselves. In those cases, it can be useful to step back and weigh the costs and benefits.

But how do friendships actually help people survive? That is one question that we investigated as part of The Human Generosity Project, a cross-disciplinary research collaboration.

The risk-pooling rather than exchange pattern of friendship is something that we found across societies, from "kere kere" in Fiji to "tomor marang" among the Ik in Uganda. People help their friends in times of need without expecting to be paid back.

The Maasai, an Indigenous group in Kenya and Tanzania who rely on cattle herds to make their living, cultivate friends who help them when they are in need, with no expectation about paying each other back. People ask for help from these special friends, called osotua partners, only when they are in genuine need, and they give if they are asked and able.

These partnerships are not about everyday favors—rather, they are about surviving unpredictable, life-altering risks. Osotua relationships are built over a lifetime, passed down across generations and often marked with sacred rituals.

When we modeled how these osotua relationships function over time, we found they help people survive when their environments are volatile and when they ask those most likely to be able to help. These relationships lead to higher rates of survival for both partners compared to those built on keeping track of debts.

These friends act as social insurance systems for each other, helping each other when needs arise because of unpredictable and uncontrollable events.

And we see this in the United States, just as we do in smaller-scale, more remote societies. In one study, we focused on ranchers in southern Arizona and New Mexico embedded in a network of what they call "neighboring." They don't expect to be paid back when they help their neighbors with unpredictable challenges such as an accident, injury or illness. We also found this same pattern in an online study of U.S.-based participants.

In contrast, people such as the ranchers we studied are more likely to expect to be paid back for help when needs arise because of more predictable challenges such as branding cattle or paying bills.

What all this research suggests is that friendship is less about the exchange of favors and more about being there for each other when unforeseeable disaster strikes. Friendship seems more like an insurance plan designed to kick in when you need it most rather than a system of balanced exchange.

What lets these partnerships endure is not only generosity, but also restraint and responsibility: Maasai expect their osotua partners to take care of themselves when they can and to ask only when help is truly needed. That balance of care, respect and self-management offers a useful model.

In a world of growing uncertainty, cultivating risk-pooling friendships and striving to be a good partner yourself may help you build resilience. Our ancestors survived with the help of this kind of relationship; our future may depend on them too.

This article is republished from The Conversation under a Creative Commons license. Read the original article.


Original Submission

posted by hubie on Sunday October 19, @04:48AM   Printer-friendly

Understanding volcanoes better: Scientists find exact locations of magma movement

How do volcanoes work? What happens beneath their surface? What causes the vibrations—known as tremor—that occur when magma or gases move upward through a volcano's conduits? Professor Dr. Miriam Christina Reiss, a volcano seismologist at Johannes Gutenberg University Mainz (JGU), and her team have located such tremor signals at the Oldoinyo Lengai volcano in Tanzania.

"We were not only able to detect tremor, but also to determine its exact position in three dimensions—its location and depth below the surface," said Reiss. "What was particularly striking was the diversity of different tremor signals we detected."

The findings provide new insights into how magma and gas are transported within Earth and thus improve our understanding of volcanic dynamics. This also has societal relevance as the researchers hope that their work will enhance the ability to forecast volcanic eruptions in the long term. Their results are published in Communications Earth & Environment.

When magma rises from the depths of Earth toward or into a volcano, this can cause shaking. If the magma exerts high pressure, the surrounding rock can fracture—resulting in earthquakes. Other processes can cause milder vibrations, known as tremors. For example, when magma ascends through pre-existing channels, when gases escape from magma, or when pressure fluctuations occur in the transport pathways.

[...] "For the first time, we were able to determine the precise location where tremor occurs," stated Reiss. "We discovered that two types of tremor seem to be linked: One originated at around five kilometers depth and the other near the base of the volcano—with a time delay between them. It is clear that these signals are connected, thus we see a directly linked system here."

The diversity of tremor signals detected by the team was also surprisingly large. This likely reflects that the tremor originates from different regions of the volcano, each with distinct properties and driven by different processes. Oldoinyo Lengai itself is unique in that it is the only active carbonatite volcano on Earth. Its magma has an unusual composition as it is far more fluid and relatively cool, only about 550 degrees Celsius, compared to the 650 to 1,200 degrees Celsius typical for most magmas.

"The results were particularly surprising because the magma is so fluid. We had expected few or no tremor as the interaction with the surrounding rock would likely be weaker," explained Reiss.

The new findings by Reiss and her colleagues advance volcano seismology by offering valuable insights into the dynamics of magma movement. "Tremor occurs whenever magma is moving—including before eruptions," said Reiss. "But which tremor signals are true precursors of an eruption, and which are just background 'gurgling'? Our results lay the foundation for improving eruption forecasting in the future."

More information: M. C. Reiss et al, Tremor signals reveal the structure and dynamics of the Oldoinyo Lengai magmatic plumbing system, Communications Earth & Environment (2025). DOI: 10.1038/s43247-025-02804-1


Original Submission

posted by hubie on Sunday October 19, @12:01AM   Printer-friendly
from the this-one-is-probably-just-a-comet dept.

Anyone get good views of Comet C/2025 A6 aka "Lemmon"? Anyone doing astrophotography of it? Anyone see it a couple times and watch it change day to day?

In the USA, you'd look vaguely NE an hour before sunrise about a hands width above the horizon. Supposedly no optics needed although all I see is clouds. Naturally it has been raining every morning for me LOL, but I hope to see it soon, thats life in an area that gets like four feet of rain annually LOL. Peak closest approach is supposed to be next Tuesday ish the 21st (hopefully this story will be posted before then)

https://www.astronomy.com/observing/nows-the-time-to-see-comet-lemmon/

https://www.scientificamerican.com/article/how-to-see-comet-lemmon-and-the-orionids-meteor-shower-peak/

https://en.wikipedia.org/wiki/C/2025_A6_(Lemmon)

https://apod.nasa.gov/apod/ap250930.html

https://www.space.com/stargazing/how-to-find-comet-lemmon-in-the-night-sky-as-it-brightens-this-october-2025

I just thought it would be fun to have a very chill astronomy "event" post, once in awhile. Comets are cool.

Note this is not comet 3I/ATLAS aka "it's probably an interstellar alien space probe", although I suppose thats fun to talk about too.


Original Submission

posted by janrinok on Saturday October 18, @07:16PM   Printer-friendly
from the fossil-fueled dept.

General Motors said on Oct. 14 that it will bear a $1.6 billion loss to scale back its electric vehicle (EV) operations, citing weaker expected demand following recent U.S. policy changes that ended federal EV tax credits and loosened emissions rules:

The Detroit-based automaker said its Audit Committee approved the loss on Oct. 7, covering the three months ended Sept. 30. The company noted that the loss is part of its plan to realign EV production and factory operations to better match customer demand.

The decision was made after the expiration of the $7,500 federal EV tax credit on Sept. 30, part of a broader policy rollback under President Donald Trump.

[...] "Following recent U.S. government policy changes, including the termination of certain consumer tax incentives for EV purchases and the reduction in the stringency of emissions regulations, we expect the adoption rate of EVs to slow," GM said in a filing.

[...] According to the filing, $1.2 billion of the loss is related to non-cash impairments, mostly write-downs of EV assets. The remaining $400 million will be paid in cash for contract cancellations and commercial settlements tied to EV investments.

The company said its review of EV manufacturing and battery component investments is ongoing.

Related:

See Also:


Original Submission

posted by janrinok on Saturday October 18, @02:27PM   Printer-friendly

Risks to BIG-IP users include supply-chain attacks, credential loss, and vulnerability exploits:

Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an "imminent threat" of being breached by a nation-state hacking group following the breach of a major maker of software, the federal government warned Wednesday.

F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a "sophisticated" threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a "long-term." Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.

During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world's top 50 corporations. Wednesday's disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings that some customers used inside their networks.

Control of the build system and access to the source code, customer configurations, and documentation of unpatched vulnerabilities has the potential to give the hackers unprecedented knowledge of weaknesses and the ability to exploit them in supply-chain attacks on thousands of networks, many of which are sensitive. The theft of customer configurations and other data further raises the risk that sensitive credentials can be abused, F5 and outside security experts said.

Customers position BIG-IP at the very edge of their networks for use as load balancers and firewalls, and for inspection and encryption of data passing into and out of networks. Given BIG-IP's network position and its role in managing traffic for web servers, previous compromises have allowed adversaries to expand their access to other parts of an infected network.

F5 said that investigations by two outside intrusion-response firms have yet to find any evidence of supply-chain attacks. The company attached letters from firms IOActive and NCC Group attesting that analyses of source code and build pipeline uncovered no signs that a "threat actor modified or introduced any vulnerabilities into the in-scope items." The firms also said they didn't identify any evidence of critical vulnerabilities in the system. Investigators, which also included Mandiant and CrowdStrike, found no evidence that data from its CRM, financial, support case management, or health systems was accessed.

[...] The US Cybersecurity and Infrastructure Security agency has warned that federal agencies that rely on the appliance face an "imminent threat" from the thefts, which "pose an unacceptable risk." The agency went on to direct federal agencies under its control to take "emergency action." The UK's National Cyber Security Center issued a similar directive.


Original Submission

posted by janrinok on Saturday October 18, @09:43AM   Printer-friendly

Lasers and gold nanoparticles enable on-demand crystal growth for new materials

Researchers at Michigan State University have discovered how to "draw" on demand the crystals used in many crucial technologies, from solar panels and LED lighting to medical imaging.

Appearing in the journal ACS Nano, the breakthrough was achieved by striking gold nanoparticles with a single laser pulse.

"We're just beginning to scratch the surface of what's possible. This is opening a new chapter in how we design and study materials," said Elad Harel, associate professor in the Department of Chemistry and senior author of the study.

Take the time to look around, and you'll find a world that runs on crystals. From smoke alarms and television screens to ultrasounds and sonar, the unique optical and electrical properties of these chemical structures place them at the cutting-edge of most innovations.

Growing crystals, however, isn't easy.

"When using traditional growing methods, crystals can form at random times and locations, so the results might not always be the same," Harel said.

As technologies and materials rapidly improve, they rely on crystals of exceptional quality being placed in just the right spot, so this lack of control is a major hurdle for researchers.

To tackle this challenge, Harel turned to his lab's specialty—lasers, and in particular, fast lasers.

At MSU, Harel uses short laser pulses to shine a light on the mysteries of the natural world. This includes a recent breakthrough that leveraged ultra-fast lasers to actually "hear biology."

In the new publication, the researchers tried their hand at growing types of crystals called lead halide perovskites. These crystals are crucial for LEDs, solar cells and medical imaging.

Rather than move through the typical complicated steps of crystal growth or even use a small "seed" crystal to jumpstart the process, Harel's team aimed their lasers at a tiny glittering target: gold nanoparticles less than one thousandth the width of a human hair.

The scientists revealed that these particles generated heat where the laser light struck, and that this interaction led to crystallization. Using special, high-speed microscopes, they were even able to watch the process unfold in real time.

Like a laser used to engrave artwork into metal or wood, this sort of crystal creation offers researchers the ability to "draw" crystals with levels of control that could transform fields ranging from clean energy to quantum technologies. The findings also help expand our understanding of how crystals form—a notoriously tricky area of chemistry.

"With this method, we can essentially grow crystals at precise locations and times," said Dr. Md Shahjahan, a research associate at MSU and first author of the paper. "It's like having a front-row seat to watch the very first moments of a crystal's life under a microscope. Only here can we also steer how it develops."

With their gold nanoparticles now in the spotlight, Elad's team is heading back to the lab for future experiments with big potential.

These include using multiple lasers of different colors to "draw" even more intricate crystal patterns and attempting to create entirely new materials that can't be made through conventional methods.

"Now that we can 'draw' crystals with lasers, the next step is to make larger and more complex patterns, and to test how these crystals perform in real devices," Harel said.

More information: Nanoscale Plasmonic Heating Induced Spatiotemporal Crystallization of Methylammonium Lead halide Perovskite, ACS Nano (2025). DOI: 10.1021/acsnano.5c12057


Original Submission

posted by janrinok on Saturday October 18, @04:57AM   Printer-friendly

New design sets a high standard for post-quantum readiness:

The encryption protecting communications against criminal and nation-state snooping is under threat. As private industry and governments get closer to building useful quantum computers, the algorithms protecting Bitcoin wallets, encrypted Web visits, and other sensitive secrets will be useless. No one doubts the day will come, but as the now-common joke in cryptography circles observes, experts have been forecasting this cryptocalypse will arrive in the next 15 to 30 years for the past 30 years.

The uncertainty has created something of an existential dilemma: Should network architects spend the billions of dollars required to wean themselves off quantum-vulnerable algorithms now, or should they prioritize their limited security budgets fighting more immediate threats such as ransomware and espionage attacks? Given the expense and no clear deadline, it's little wonder that less than half of all TLS connections made inside the Cloudflare network and only 18 percent of Fortune 500 networks support quantum-resistant TLS connections. It's all but certain that many fewer organizations still are supporting quantum-ready encryption in less prominent protocols.

One exception to the industry-wide lethargy is the engineering team that designs the Signal Protocol, the open-source engine that powers the world's most robust and resilient form of end-to-end encryption for multiple private chat apps, most notably the Signal Messenger. Eleven days ago, the nonprofit entity that develops the protocol, Signal Messenger LLC, published a 5,900-word write-up describing its latest updates that make Signal fully quantum-resistant.

The complexity and problem-solving required for making the Signal Protocol quantum safe are as daunting as just about any in modern-day engineering. The original Signal Protocol already resembled the inside of a fine Swiss timepiece, with countless gears, wheels, springs, hands, and other parts all interoperating in an intricate way. In less adept hands, mucking about with an instrument as complex as the Signal protocol could have led to shortcuts or unintended consequences that hurt performance, undoing what would otherwise be a perfectly running watch. Yet this latest post-quantum upgrade (the first one came in 2023) is nothing short of a triumph.

"This appears to be a solid, thoughtful improvement to the existing Signal Protocol," said Brian LaMacchia, a cryptography engineer who oversaw Microsoft's post-quantum transition from 2015 to 2022 and now works at Farcaster Consulting Group. "As part of this work, Signal has done some interesting optimization under the hood so as to minimize the network performance impact of adding the post-quantum feature."

Of the multiple hurdles to clear, the most challenging was accounting for the much larger key sizes that quantum-resistant algorithms require. The overhaul here adds protections based on ML-KEM-768, an implementation of the CRYSTALS-Kyber algorithm that was selected in 2022 and formalized last year by the National Institute of Standards and Technology. ML-KEM is short for Module-Lattice-Based Key-Encapsulation Mechanism, but most of the time, cryptographers refer to it simply as KEM.

[...] As both Signal and Jacomme noted, users of Signal and other messengers relying on the Signal Protocol need not concern themselves with any of these new designs. To paraphrase a certain device maker, it just works.

In the coming weeks or months, various messaging apps and app versions will be updated to add the triple ratchet. Until then, apps will simply rely on the double ratchet as they always did. Once apps receive the update, they'll behave exactly as they did before upgrading.

For those who care about the internal workings of their Signal-based apps, though, the architects have documented in great depth the design of this new ratchet and how it behaves. Among other things, the work includes a mathematical proof verifying that the updated Signal protocol provides the claimed security properties.

Outside researchers are applauding the work.

"If the normal encrypted messages we use are cats, then post-quantum ciphertexts are elephants," Matt Green, a cryptography expert at Johns Hopkins University, wrote in an interview. "So the problem here is to sneak an elephant through a tunnel designed for cats. And that's an amazing engineering achievement. But it also makes me wish we didn't have to deal with elephants."

The article has a lengthy middle section with details on the challenges and the workings of the algorithm.


Original Submission

posted by janrinok on Saturday October 18, @12:18AM   Printer-friendly
from the free-the-phones-not-walled-gardens dept.

The Free Software Foundation (FSF) today announced its project to bring mobile phone freedom to users. "Librephone" is an initiative to reverse-engineer obstacles preventing mobile phone freedom until its goal is achieved.

Practically, Librephone aims to close the last gaps between existing distributions of the Android operating system and software freedom. The FSF has hired experienced developer Rob Savoye (DejaGNU, Gnash, OpenStreetMap, and more) to lead the technical project. He is currently investigating the state of device firmware and binary blobs in other mobile phone freedom projects, prioritizing the free software work done by the not entirely free software mobile phone operating system LineageOS.

So a free phoneOS. Free of the crud. Free of the bloat. Or something. Unclear when or if we can except this to be finished. If ever. The hardware might put up some hurdles.

https://www.fsf.org/news/librephone-project


Original Submission

posted by hubie on Friday October 17, @07:33PM   Printer-friendly

First device based on 'optical thermodynamics' can route light without switches

A team of researchers at the Ming Hsieh Department of Electrical and Computer Engineering has created a new breakthrough in photonics: the design of the first optical device that follows the emerging framework of optical thermodynamics.

The work, reported in Nature Photonics, introduces a fundamentally new way of routing light in nonlinear systems—meaning systems that do not require switches, external control, or digital addressing. Instead, light naturally finds its way through the device, guided by simple thermodynamic principles.

Universal routing is a familiar engineering concept. In mechanics, a manifold valve directs inputs to a chosen outlet. In digital electronics, a Wi-Fi router at home or an Ethernet switch in a data center directs information from many input channels to the correct output port, ensuring that each stream of data reaches its intended destination.

When it comes to light, the same problem is far more challenging, however. Conventional optical routers rely on complex arrays of switches and electronic control to toggle pathways. These approaches add technical difficulty, while limiting speed and performance.

The photonics team at the USC Viterbi School of Engineering has now shown that there is another way. The idea can be likened to a marble maze that arranges itself.

Normally, you'd have to lift barriers and guide a marble step-by-step to make sure it reaches its destination—the right hole. In the USC team's device, however, the maze is built so that no matter where you drop the marble, it will roll on its own toward the right place—no guiding hands needed. And this is exactly how light behaves: it finds the correct path naturally, by following the principles of thermodynamics.

The implications of the new approach extend far beyond the laboratory. As computing and data processing continue to push the limits of traditional electronics, various companies—including chip designers such as NVIDIA and others—are exploring optical interconnects as a way to move information faster and more efficiently.

[...] The team's demonstration in Nature Photonics marks the first device designed with this new theory. Rather than actively steering the signal, the system is engineered so that the light routes itself.

The principle is directly inspired by thermodynamics. Just as a gas undergoing what's known as a Joule-Thomson expansion redistributes its pressure and temperature before naturally reaching thermal equilibrium, light in the USC device experiences a two-step process: first an optical analog of expansion, then thermal equilibrium. The result is a self-organized flow of photons into the designated output channel—without any need for external switches.

By effectively turning chaos into predictability, optical thermodynamics opens the door to the creation of a new class of photonic devices that harness, rather than fight against, the complexity of nonlinear systems.

More information: Hediyeh M. Dinani et al, Universal routing of light via optical thermodynamics, Nature Photonics (2025). DOI: 10.1038/s41566-025-01756-4


Original Submission

posted by hubie on Friday October 17, @02:48PM   Printer-friendly

The Times of India published an interesting article explaining the 2025 Economics Nobel Prize:

"We're a planet of six billion ninnies living in a civilisation built by a few thousand savants," Scott Adams once said — and beneath the Dibert creator's misanthropy is a disarmingly accurate description of how the modern world works. Most of us don't invent, build, or discover anything of world-changing importance. We live inside systems we didn't design, using tools we don't understand, and benefitting daily from the work of people whose names we'll never know. And yet, we're quick to criticise those same systems — science, technology, capitalism — that lifted us from the brink of subsistence to a level of prosperity our ancestors couldn't imagine.

[...] For most of recorded history, humanity went nowhere fast. A peasant in medieval Europe lived much the same life as a farmer in ancient Mesopotamia. Empires rose and fell, plagues came and went, and the occasional invention — a plough here, a printing press there — might briefly improve life. But those improvements rarely built on one another. Progress was sporadic and short-lived. The line of human prosperity was basically flat.

This year's Nobel laureates — Joel Mokyr, Philippe Aghion, and Peter Howitt — offer complementary answers to that question. Together, their work explains why humanity's growth engine roared to life — and what keeps it running today.

Joel Mokyr, an economic historian, argues that the Industrial Revolution wasn't just about machines — it was about knowledge. Before the 18th century, most human innovation was based on know-how: practical skills, techniques, and tricks. People knew how to do things but not why they worked. Without that deeper understanding, invention couldn't build on itself. Progress happened in bursts but couldn't compound.

The Enlightenment changed that. Science and technology stopped being separate worlds and started reinforcing each other. Scientific discoveries explained why things worked, which allowed engineers to design better tools and machines. Those tools, in turn, raised new scientific questions. Mokyr calls this cycle "useful knowledge" — a feedback loop between theory and practice that transformed invention from a series of lucky accidents into a self-sustaining system.

But knowledge alone wasn't enough. It needed skilled people to turn ideas into reality — artisans, mechanics, and engineers — and it needed societies willing to embrace disruption. Britain was uniquely placed for this. It had a pool of skilled craftsmen and institutions flexible enough to allow new industries to rise, even when they destroyed old ones. Where older systems punished change, Britain began to reward it — and progress exploded.

If Mokyr explains how growth begins, Philippe Aghion and Peter Howitt explain how it continues. Their core idea is creative destruction — Joseph Schumpeter's famous term for capitalism's brutal but productive cycle. In a dynamic economy, new technologies don't complement the old; they replace them. A company invents a better product, dethrones the market leader, and is itself dethroned by the next innovator. Industries collapse, jobs disappear, and new ones emerge.

Beneath the smooth line of GDP growth lies this constant churn — a storm of destruction that fuels creation. It's not a flaw; it's the engine. The promise of profit drives firms to innovate, knowing they'll eventually be replaced. The fear of obsolescence drives them to run faster. And the result is relentless progress.

Creative destruction is not without pain. It produces winners and losers. It can move too quickly — wasting resources on marginal improvements — or too slowly, when monopolies choke competition. But without it, economies stagnate. Aghion and Howitt's work helps explain how societies can manage that balance: encouraging innovation without letting it spiral out of control.

The core lesson from this year's Nobel is deceptively simple: sustained prosperity isn't natural. It's engineered. It depends on the marriage of science and technology, on societies that embrace change rather than fear it, and on markets that reward innovation while punishing complacency. It's why we complain about slow Wi-Fi instead of famine. It's why we debate the ethics of artificial intelligence instead of the inevitability of plague. And it's why most of us have never known the grinding poverty, insecurity, and vulnerability that were once the default condition of human life.

Yet this system is fragile. It can be undone by monopolies, political short-sightedness, or cultural resistance to change. It can be slowed by hostility to science, censorship, or the temptation to cling to the familiar. If that happens, the line flattens again. Stagnation returns. And the miracle of modernity — the miracle we take for granted — begins to fade.

Scott Adams was right: civilisation is the work of a few thousand savants. But those savants are not lone geniuses; they are products of a system built over centuries — a system that turns knowledge into invention, invention into industry, and industry into prosperity. Our job is not to sneer at it but to sustain it. Because Cousin Greg, for all his awkwardness, is the reason we're here. And without him — without economics — the story of how eight plus billion ninnies ended up living in a civilisation of unimaginable abundance would make no sense at all.


Original Submission

posted by hubie on Friday October 17, @10:00AM   Printer-friendly

https://phys.org/news/2025-10-nanoplastics-farm-animal-cells-human.html

Scientists at the Research Institute for Farm Animal Biology (FBN) in Dummerstorf and the University of Udine have detected the uptake of nanoplastics in farm animal cell cultures. The results provide evidence of potential risks to animal health, meat production and also human food safety.

Plastic bags, packaging, yogurt lids—items that are carelessly thrown away decompose over years into tiny plastic particles. They end up in soil, waterways and ultimately in our food chain. Although numerous studies have already shown that microplastics can harm marine animals, birds and insects, the effects of nanoplastics on livestock have hardly been researched to date.

Unlike microplastics (1 µm–5 mm), there are currently few adequate methods for detecting nanoplastics (< 1 µm) in humans and animals. However, researchers assume that these small particles can also accumulate in tissue.

In a joint study, researchers from the FBN and the University of Udine have demonstrated the uptake of nanoplastic particles made of polystyrene into cultured cells from cattle and pigs. This absorption led to changes that could impair the cell function and health of the animals in the long term.

"Since we still know far too little about nanoplastics and detection is difficult, our results are particularly important for better assessing the risks," explains Dr. Anja Baufeld from the Cell Physiology and Reproduction working group at the FBN. "When we saw that nanoplastics were entering the cells, we knew that this could have far-reaching consequences," Baufeld continues.

[...] "Our research shows that nanoplastics are not only an environmental problem, but could also have direct consequences for the health of farm animals. These initial findings highlight the importance of conducting more intensive research into plastic pollution in order to assess the potential risks to both animals and humans at an early stage," says Baufeld.

More information: Francesca Corte Pause et al, Exploring the influence of polystyrene-nanoplastics on two distinct in vitro systems in farm animals: A pilot study, Science of The Total Environment (2025). DOI: 10.1016/j.scitotenv.2025.179378
       


Original Submission

posted by hubie on Friday October 17, @05:16AM   Printer-friendly

After blasting Wikipedia as biased and 'woke' and pushing for it to be defunded, Elon Musk says he's building his own online encyclopedia through xAI:

Elon Musk plans to take on Wikipedia with his own rival encyclopedia site.

On Tuesday, the Tesla CEO tweeted that his xAI startup is building Grokipedia, which he claims will be a "massive improvement" over Wikipedia. Musk has long had a gripe with Wikipedia, accusing it of being "woke" and even calling for it to be defunded. (The encyclopedia site has long relied on donations.) In January, Musk also railed at Wikipedia for adding an entry about him allegedly making a Nazi-like salute at a Trump inauguration event.

To create Grokipedia, Musk plans on tapping xAI's Grok chatbot (which he also created as an alternative to another technology he didn't like, ChatGPT). Grok has been trained on web data, including public tweets. In a podcast earlier this month, Musk suggested that Grok is smart enough not only to replicate the work of human community volunteers who maintain and update Wikipedia, but also to account for any bias or inaccuracies.

"Grok is using heavy amounts of inference compute to look at, as an example, a Wikipedia page, what is true, partially true, or false, or missing in this page," he said. "Now rewrite the page to correct, remove the falsehoods, correct the half-truths, and add the missing context." (That said, Grok has suffered its own share of problems, including praising Hitler.)


Original Submission

posted by hubie on Friday October 17, @12:30AM   Printer-friendly
from the paging-Mr-Stark dept.

Drones fell out of the sky causing fires in a light show in Southern China in Liuyang Hunan Province went horribly wrong. Footage shared online shows the drones spiralling out of control and crashing into the ground, some bursting into flames and igniting fires. Social media users compared the fallout to the Armageddon movie.

A drone show in China has gone horribly wrong after hundreds of synchronised drones fell from the sky, starting fires.

The light show in Southern China has ended in chaos after hundreds of drones malfunctioned and fell from the sky during National Day celebrations.

The incident occurred last Thursday night in Liuyang, Hunan Province – a city known as China's fireworks capital – during a large-scale performance combining fireworks and drones at the Sky Theatre.

Footage shared online shows the drones spiralling out of control and crashing into the ground, some bursting into flames and igniting fires.

[...] The event, titled "October: The Sound of Blooming Flowers," is intended to create a 3D visual display with the help of drones over land and the city's river.

[...] Just last year, a drone show in China's mainland city of Quanzhou descended into chaos after more than 2000 drones went haywire, causing them to plummet towards crowds.


Original Submission

posted by jelizondo on Thursday October 16, @07:48PM   Printer-friendly

After visiting a string of factories, Jim Farley (Ford's chief executive) was left astonished by the technical innovations being packed into Chinese cars – from self-driving software to facial recognition:

"Their cost and the quality of their vehicles is far superior to what I see in the West," Farley warned in July.

"We are in a global competition with China, and it's not just EVs. And if we lose this, we do not have a future at Ford."

The car industry boss is not the only Western executive to have returned shaken following a visit to the Far East.

Andrew Forrest, the Australian billionaire behind mining giant Fortescue – which is investing massively in green energy – says his trips to China convinced him to abandon his company's attempts to manufacture electric vehicle powertrains in-house.

"I can take you to factories [in China] now, where you'll basically be alongside a big conveyor and the machines come out of the floor and begin to assemble parts," he says.

[...] It's also a far cry from the cheap "Made in China" goods that many Westerners have associated with the "workshop of the world" in the past, underscoring how much cash has been poured into upgrading China's industrial processes.

Far from being focused on low-quality products, China is now viewed as a leader in rapidly-growing, high-value technologies such as electric vehicles (EVs), batteries, solar panels, wind turbines, drones and advanced robotics.

[...] The overall number of robots added in China last year was 295,000, compared to 27,000 in Germany, 34,000 in the US and just 2,500 in the UK.

Also at ZeroHedge.


Original Submission

posted by janrinok on Thursday October 16, @03:03PM   Printer-friendly

New Method Is the Fastest Way To Find the Best Routes:

If you want to solve a tricky problem, it often helps to get organized. You might, for example, break the problem into pieces and tackle the easiest pieces first. But this kind of sorting has a cost. You may end up spending too much time putting the pieces in order.

This dilemma is especially relevant to one of the most iconic problems in computer science: finding the shortest path from a specific starting point in a network to every other point. It's like a souped-up version of a problem you need to solve each time you move: learning the best route from your new home to work, the gym and the supermarket.

"Shortest-paths is a beautiful problem that anyone in the world can relate to," said Mikkel Thorup, a computer scientist at the University of Copenhagen.

Intuitively, it should be easiest to find the shortest path to nearby destinations. So if you want to design the fastest possible algorithm for the shortest-paths problem, it seems reasonable to start by finding the closest point, then the next-closest, and so on. But to do that, you need to repeatedly figure out which point is closest. You'll sort the points by distance as you go. There's a fundamental speed limit for any algorithm that follows this approach: You can't go any faster than the time it takes to sort.

Forty years ago, researchers designing shortest-paths algorithms ran up against this "sorting barrier." Now, a team of researchers has devised a new algorithm that breaks it. It doesn't sort, and it runs faster than any algorithm that does.

"The authors were audacious in thinking they could break this barrier," said Robert Tarjan, a computer scientist at Princeton University. "It's an amazing result."

To analyze the shortest-paths problem mathematically, researchers use the language of graphs — networks of points, or nodes, connected by lines. Each link between nodes is labeled with a number called its weight, which can represent the length of that segment or the time needed to traverse it. There are usually many routes between any two nodes, and the shortest is the one whose weights add up to the smallest number. Given a graph and a specific "source" node, an algorithm's goal is to find the shortest path to every other node.

The most famous shortest-paths algorithm, devised by the pioneering computer scientist Edsger Dijkstra in 1956, starts at the source and works outward step by step. It's an effective approach because knowing the shortest path to nearby nodes can help you find the shortest paths to more distant ones. But because the end result is a sorted list of shortest paths, the sorting barrier sets a fundamental limit on how fast the algorithm can run.

In 1984, Tarjan and another researcher improved Dijkstra's original algorithm so that it hit this speed limit. Any further improvement would have to come from an algorithm that avoids sorting.

In the late 1990s and early 2000s, Thorup and other researchers devised algorithms that broke the sorting barrier, but they needed to make certain assumptions about weights. Nobody knew how to extend their techniques to arbitrary weights. It seemed they'd hit the end of the road.

"The research stopped for a very long time," said Ran Duan, a computer scientist at Tsinghua University in Beijing. "Many people believed that there's no better way."

Duan wasn't one of them. He'd long dreamed of building a shortest-paths algorithm that could break through the sorting barrier on all graphs. Last fall, he finally succeeded.

Duan's interest in the sorting barrier dates back nearly 20 years to his time in graduate school at the University of Michigan, where his adviser was one of the researchers who worked out how to break the barrier in specific cases. But it wasn't until 2021 that Duan devised a more promising approach.

The key was to focus on where the algorithm goes next at each step. Dijkstra's algorithm takes the region that it has already explored in previous steps. It decides where to go next by scanning this region's "frontier" — that is, all the nodes connected to its boundary. This doesn't take much time at first, but it gets slower as the algorithm progresses.

Duan instead envisioned grouping neighboring nodes on the frontier into clusters. He would then only consider one node from each cluster. With fewer nodes to sift through, the search could be faster at each step. The algorithm also might end up going somewhere other than the closest node, so the sorting barrier wouldn't apply. But ensuring that this clustering-based approach actually made the algorithm faster rather than slower would be a challenge.

Duan fleshed out this basic idea over the following year, and by fall 2022, he was optimistic that he could surmount the technical hurdles. He roped in three graduate students to help work out the details, and a few months later they arrived at a partial solution — an algorithm that broke the sorting barrier for any weights, but only on so-called undirected graphs.

In undirected graphs, every link can be traversed in both directions. Computer scientists are usually more interested in the broader class of graphs that feature one-way paths, but these "directed" graphs are often trickier to navigate.

"There could be a case that A can reach B very easily, but B cannot reach A very easily," said Xiao Mao, a computer science graduate student at Stanford University. "That's going to give you a lot of trouble."

In the summer of 2023, Mao heard Duan give a talk about the undirected-graph algorithm at a conference in California. He struck up a conversation with Duan, whose work he'd long admired.

"I met him for the first time in real life," Mao recalled. "It was very exciting."

After the conference, Mao began thinking about the problem in his spare time. Meanwhile, Duan and his colleagues were exploring new approaches that could work on directed graphs. They took inspiration from another venerable algorithm for the shortest-paths problem, called the Bellman-Ford algorithm, that doesn't produce a sorted list. At first glance, it seemed like an unwise strategy, since the Bellman-Ford algorithm is much slower than Dijkstra's.

"Whenever you do research, you try to take a promising path," Thorup said. "I would almost call it anti-promising to take Bellman-Ford, because it looks completely like the stupidest thing you could possibly do."

Duan's team avoided the slowness of the Bellman-Ford algorithm by running it for just a few steps at a time. This selective use of Bellman-Ford enabled their algorithm to scout ahead for the most valuable nodes to explore in later steps. These nodes are like intersections of major thoroughfares in a road network.

"You have to pass through [them] to get the shortest path to a lot of other stuff," Thorup said.

In March 2024, Mao thought of another promising approach. Some key steps in the team's original approach had used randomness. Randomized algorithms can efficiently solve many problems, but researchers still prefer nonrandom approaches. Mao devised a new way to solve the shortest-paths problem without randomness. He joined the team, and they worked together over the following months via group chats and video calls to merge their ideas. Finally, in the fall, Duan realized they could adapt a technique from an algorithm he'd devised in 2018 that broke the sorting barrier for a different graph problem. That technique was the last piece they needed for an algorithm that ran faster than Dijkstra's on both directed and undirected graphs.

Journal Reference:
Dijkstra, E. W.. A note on two problems in connexion with graphs, Numerische Mathematik (DOI: 10.1007/BF01386390)


Original Submission