Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Do you put ketchup on the hot dog you are going to consume?

  • Yes, always
  • No, never
  • Only when it would be socially awkward to refuse
  • Not when I'm in Chicago
  • Especially when I'm in Chicago
  • I don't eat hot dogs
  • What is this "hot dog" of which you speak?
  • It's spelled "catsup" you insensitive clod!

[ Results | Polls ]
Comments:91 | Votes:253

posted by hubie on Wednesday February 26 2025, @09:42PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

The software engineering job market has experienced a significant downturn, with job openings hitting a five-year low, according to an analysis of data from Indeed by Practical Engineer. The statistics reveal a stark 35 percent decrease in software developer job listings compared to five years ago, marking a dramatic shift in the industry's employment landscape.

This decline is particularly noteworthy when compared to other sectors. While the overall job market has seen a 10 percent increase in listings since February 2020, software development positions have plummeted. This contrasts sharply with growth in areas such as construction (25 percent), accounting (24 percent), and electrical engineering (20 percent).

The software development sector has also experienced very volatile fluctuations in recent years. Job listings more than doubled during the pandemic-era boom of 2021 and 2022, outpacing all other industries. However, this surge was followed by an equally dramatic fall, with current vacancy numbers 3.5 times lower than their mid-2022 peak.

Several factors contribute to this decline. The end of zero-percent interest rates has had a significant impact on the tech industry, affecting hiring practices, venture capital funding, and the survival of tech startups. However, this alone doesn't explain the hiring slowdown and layoffs at highly profitable Big Tech companies like Microsoft, Meta, Amazon, and Google, according to author Gergely Orosz.

He posits that many companies may still be adjusting after over-recruiting in 2021-2022, leading to a more cautious approach to hiring.

Additionally, the rise of generative AI and LLMs may be influencing the job market. These technologies have shown particular promise in coding – 75 percent of engineers reported the use of AI coding tools in a recent survey. Some speculate that companies might be adopting a "wait and see" approach, assessing the potential productivity gains from these tools before expanding their engineering teams.

[...] Orosz also points out that Indeed's data may not provide a complete picture of the job market. The platform may be losing popularity for posting software engineering jobs, particularly among startups and some Big Tech companies. For instance, Microsoft lists more software-related jobs on its own site than are reflected in Indeed's data.

So, while the Indeed data should be considered directionally correct, indicating a genuine decrease in developer job listings, it may not fully represent hiring trends in startups or accurately track Big Tech hiring. Still, it is clear that the software engineering job market is undergoing significant changes, influenced by economic factors, technological advancements, and evolving company strategies.


Original Submission

posted by hubie on Wednesday February 26 2025, @04:53PM   Printer-friendly
from the ghosting dept.

Companies are advised to constantly update their apps and software, and patch known network vulnerabilities to prevent such attacks:

A ransomware group called "Ghost" is exploiting the network vulnerabilities of various organizations to gain access to their systems, according to a joint advisory issued by multiple U.S. federal agencies.

"Beginning early 2021, Ghost actors began attacking victims whose internet-facing services ran outdated versions of software and firmware," the Cybersecurity and Infrastructure Security Agency (CISA) said in the Feb. 19 joint advisory. "Ghost actors, located in China, conduct these widespread attacks for financial gain."

The attacks have targeted schools and universities, government networks, critical infrastructure, technology and manufacturing companies, health care, and several small and mid-sized businesses.

[...] The criminals use publicly available code to exploit "common vulnerabilities and exposures" of their targets to secure access to servers. They leverage vulnerabilities in servers running Adobe ColdFusion, Microsoft Exchange, and Microsoft SharePoint.

Also at BleepingComputer.

Related:


Original Submission

posted by hubie on Wednesday February 26 2025, @12:05PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

A scheme involving the resale of used Seagate Exos enterprise-grade hard drives as new was uncovered earlier this month, but we have now learned that it reportedly affects not only Exos HDDs but also Seagate's IronWolf Pro HDDs, according to an investigation conducted by Lutz Labs from ComputerBase. Fraudsters erase usage records, alter serial numbers, and modify labels to deceive buyers, but it is still possible to determine that the particular drive had been in use, and by now, there are multiple ways to detect such falsified HDDs. 

Both Exos and IronWolf Pro are extremely reliable hard disk drives. Seagate's Exos HDDs are aimed at enterprises and hyperscale cloud service providers and are meant to operate 24/7, whereas IronWolf Pro is designed for enterprise-grade NAS environments that also work in 24/7 mode. While these drives share a lot in terms of hardware platforms, they have different firmware. Given the reliability, performance, and capacity points of IronWolf Pro HDDs, they are good candidates for use in Chia mining. As such, the current theory is that Chia miners are selling off used hard drives from mining farms, and it would make sense they may have both Exos and IronWolf Pro devices.

Falsified Seagate's Exos and IronWolf Pro hard drives are sold by retailers in different countries and generally look almost like new. The drives appear unused to the software because their internal usage logs, specifically SMART parameters, were wiped. However, a closer look at these drives may reveal slight dents and scratches on the chassis as well as scratches on their SATA connector, which are clear signs of previous use. 

Also, the QR codes on counterfeit units have been tampered with. Instead of linking to Seagate's usual verification page, they redirect to a warranty check that does not display the serial number or storage capacity, making it harder to verify authenticity. Since the labels on the drives are false, there are slight variations in label alignment and scaling. Finally, tools like smartmontools that can read Seagate's FARM (field-accessible reliability metrics) values reveal that some had operated for over 50,000 hours. 

So far, no similar cases have been reported for Toshiba or Western Digital. However, detecting tampering in these brands is more difficult since they lack Seagate's FARM values (which are only available on Exos, IronWolf, IronWolf Pro, and perhaps SkyHawk drives, according to ComputerBase), which store extensive usage history. 


Original Submission

posted by hubie on Wednesday February 26 2025, @07:20AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

It’s not every day that we get to see a glimpse of what a mysterious space plane is up to in orbit. This week, the US Space Force shared a picture it says was snapped last year by the X-37B, showing Earth in the distance and a bit of the craft itself. X-37B launched on its seventh mission at the end of 2023, though not much is known about what that mission entails. Its previous flight, which wrapped up in 2022, set a new endurance record for the space plane, logging 908 days in orbit.

There isn't too much information to glean from the photo, but it does offer a rare look at X-37B in space. “An X-37B onboard camera, used to ensure the health and safety of the vehicle, captures an image of Earth while conducting experiments in HEO in 2024,” the Space Force wrote on X.

One thing we have been told about the current mission is that it marks the first time the Boeing-made X-37B has tried out a maneuver known as aerobraking, or a more fuel-efficient method of changing orbit through “a series of passes using the drag of Earth's atmosphere.” The Space Force said back in October that the vehicle had begun the process, and the latest update indicates it was successful. “The X-37B executed a series of first-of-kind maneuvers, called aerobraking, to safely change its orbit using minimal fuel,” the Space Force noted. It's unknown how much longer the mission is expected to go on.


Original Submission

posted by janrinok on Wednesday February 26 2025, @02:33AM   Printer-friendly
from the contentious dept.

From our shy community member: https://www.fincen.gov/boi

As discussed here earlier the US Treasury FinCen beneficial ownership information (BOI) reporting requirements for millions of small businesses are back again. They have ping-ponged on and off several times since the end of 2024.

Now it seems there was a judgement in the Texas lawsuit:

... However, because the Department of the Treasury recognizes that reporting companies may need additional time to comply with their BOI reporting obligations, FinCEN is generally extending the deadline 30 calendar days from February 19, 2025, for most companies.

Notably, in keeping with Treasury's commitment to reducing regulatory burden on businesses, during this 30-day period FinCEN will assess its options to further modify deadlines, while prioritizing reporting for those entities that pose the most significant national security risks.

FinCEN also intends to initiate a process this year to revise the BOI reporting rule to reduce burden for lower-risk entities, including many U.S. small businesses.

[...] For the vast majority of reporting companies, the new deadline to file an initial, updated, and/or corrected BOI report is now March 21, 2025. FinCEN will provide an update before then of any further modification of this deadline, recognizing that reporting companies may need additional time to comply with their BOI reporting obligations once this update is provided. [continues with exceptions]

Reading between the lines, your SN small business owner is guessing that, "reduce burden for lower-risk entities, including many U.S. small businesses" means that the Treasury is expecting Musk and DOGE to hit this topic, any day now.


Original Submission

posted by janrinok on Tuesday February 25 2025, @09:50PM   Printer-friendly
from the strange-women-lying-in-ponds-distributing-swords-is-no-basis-for-a-system-of-government dept.

Arthur T Knackerbracket has processed the following story:

When a group of amateur treasure seekers set out on an expedition in Poland at the end of January, they weren’t sure what they’d find. On previous trips, while sweeping the ground with metal detectors, they found fascinating trinkets, including thirteenth-century Carolingian dynasty coins. This time around, they found something more mighty: a big honking sword from the Middle Ages.

The giant blade, which was clearly meant to be handled with two hands, was found alongside two axes in the country’s Nowomiejskie district. The discovery was made by members of a group that calls itself GRYF—Biskupieckie Stowarzyszenie Detektorystyczne, which Google translates to the Diocesan Detection Association.

Alas, this is not a band of plucky private eyes, but rather a “group of history enthusiasts and treasure hunters,” according to their Facebook page. The club actually sounds pretty rad, with fun activities planned, including an upcoming hunt for Napoleonic-era artifacts. If you’ll be in Poland when it happens, you should definitely join in. They’ve also done some good in the community, having organized a cleanup of a forgotten Jewish cemetery in the woods close to the town of Lubawa in November.

The January search was conducted in conjunction with the Ostroda Museum, which will eventually make the weapons part of its permanent display. “We are starting to work on their permanent security, proper preservation is preceded by a series of x-rays,” the museum said on its Facebook page. “This year we plan to present the monuments as part of our permanent exhibition.”

The sword, which measures just under 3.2 feet (1 meter), was, as you would expect, extremely rusted and weathered by the centuries, but is otherwise well preserved, with its blade, pommel, and handle all intact. The axe blades were in similarly good condition, albeit less complete.

Details about the weapons’ origins are scant, as the museum didn’t specify their age or who might have wielded them. All that’s known is that they are Medieval in origin, though that’s vague, as the Middle Ages lasted roughly 1,000 years, from the fifth to the fifteenth century. According to a paper published by University of Lodz associate professor Anna Kowalska-Pietrzak, Poland during that time was largely inhabited by a number of Slavic tribes, though there was an invasion by Teutonic Knights in the fifteenth century.

As Archaeology News reported, the sword’s design is similar to “hand-and-a-half” weapons that were popular in Western Europe during the Late Middle Ages, and were crafted to stab through armor. The publication cited unnamed experts who said that, as the weapons were found near the Osa River, they may have spent centuries underwater, which would have contributed to their remarkably preserved state.

See, kids? Cool things happen when you put down the cellphones and go outside.


Original Submission

posted by janrinok on Tuesday February 25 2025, @05:06PM   Printer-friendly
from the the-future-for-a-45-year-old-language dept.

Over at ACM.org, Bjarne Stroustrup presents the key contemporary C++ mechanism designed to maintain compatibility over decades:

It is now 45+ years since C++ was first conceived. As planned, it evolved to meet challenges, but many developers use C++ as if it was still the previous millennium. This is suboptimal from the perspective of ease of expressing ideas, performance, reliability, and maintainability. Here, I present the key concepts on which performant, type safe, and flexible C++ software can be built: resource management, life-time management, error-handling, modularity, and generic programming. At the end, I present ways to ensure that code is contemporary, rather than relying on outdated, unsafe, and hard-to-maintain techniques: guidelines and profiles.

The article lays out the ideals and talks about resource management, modularity and generic programming, among other topics. It concludes:

C++ was designed to evolve. When I started, not only didn't I have the resources to design and implement my ideal language, but I also understood that I needed the feedback from use to turn my ideals into practical reality. And evolve it did while staying true to its fundamental aims24. Contemporary C++ (C++23) is a much better approximation to the ideals than any earlier version, including support for better code quality, type safety, expressive power, performance, and for a much wider range of application areas.

However, the evolutionary approach caused some serious problems. Many people got stuck with an outdated view of what C++ is. Today, we still see endless mentions of the mythical language C/C++, usually implying a view of C++ as a minor extension of C embodying all the worst aspects of C together with grotesque misuses of complex C++ features. Other sources describe C++ as a failed attempt to design Java. Also, tool support in areas such as package management and build systems have lagged because of a community focus on older styles of use.


Original Submission

posted by janrinok on Tuesday February 25 2025, @12:23PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

United States president Donald Trump last Friday issued a memorandum that suggests imposition of tariffs on nations that dare to tax big tech companies.

The memorandum mentions the digital services taxes (DSTs) were introduced to capture profits from revenue that tech companies generate in one country but collect in another. Netflix is often cited as an example of why such taxes are needed, because many of its customers around the world paid their subscriptions to an entity in The Netherlands. Governments argued that was inappropriate because Netflix was selling to their citizens, who consumed the vid-streamer’s services in their territory, and that a Netflix subscription therefore represented economic activity in their jurisdictions that should be taxed like any other.

Another reason DSTs were considered was that Netflix’s Netherlands scheme, like many other structures used by Big Tech companies, are legal-but-cynical tax efforts at reducing their tax bills to levels well below those local companies pay.

The OECD developed measures to prevent multinational companies using such tactics, and they have been widely adopted without stopping all of Big Tech’s tax tricks. DSTS were pitched as necessary – perhaps temporarily – while the OECD approach was developed, and adopted.

Trump’s opposition to DSTs is not new: the Biden administration felt they disproportionately targeted US businesses and threatened 25 percent tariffs if they were not removed. The UK and Europe dropped some of the taxes, as did India.

Tariffs are now back on the agenda for remaining digital services taxes. As outlined in a Friday memorandum, Trump stated: “My Administration will not allow American companies and workers and American economic and national security interests to be compromised by one-sided, anti-competitive policies and practices of foreign governments. American businesses will no longer prop up failed foreign economies through extortive fines and taxes.”

“All of these measures violate American sovereignty and offshore American jobs, limit American companies’ global competitiveness, and increase American operational costs while exposing our sensitive information to potentially hostile foreign regulators,” the Memorandum adds.

The document also calls for US authorities to consider DSTs in its report on the OECD tax measures mentioned above, which Trump also feels unjustly penalize American businesses.

The Memorandum instructs the US Trade Representative to “identify tools the United States can use to secure among trading partners a permanent moratorium on customs duties on electronic transmissions.” Just when those tools will be identified, and implemented, is unknown.

However the administration’s intent is clear: Big Tech should not be taxed by any nation other than the US, which itself struggles to tax its top tech companies thanks to the tax minimization schemes the OECD deal was designed to dent.


Original Submission

posted by hubie on Tuesday February 25 2025, @07:37AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

The semiconductor industry is expanding rapidly as countries race to build new fabs. While it takes around 19 months to build a fab in Taiwan, it takes a whopping 38 months to build a fab in the U.S. due to the extensive time it takes to get a permit and because fabs are not constructed 24/7, according to Exyte, a leading engineering, construction, and design company that specializes in high-tech facilities like chip production plants, reports Semiconductor Digest.

Taiwan completes fabs in around 19 months, followed by Singapore and Malaysia at 23 months. European projects take 34 months, while the U.S. is the slowest at 38 months. A key reason for this is Taiwan's streamlined permit process and round-the-clock construction, whereas the U.S. and Europe face delays in approvals and do not construct 24/7. The U.S. has enacted a law that exempts certain U.S. fabs from federal environmental assessments, but that is obviously not enough to be on par with Taiwan.

Costs also differ widely. Constructing a plant in the U.S. is about twice as expensive as in Taiwan, despite similar equipment costs, according to Exyte. This discrepancy arises from higher labor costs, extensive regulatory requirements, and inefficiencies in supply chains. Also, Taiwanese workforce is highly experienced, so Taiwanese builders require fewer detailed blueprints because they are familiar with every step of the process, which speeds up completion of fab projects, according to Herbert Blaschitz, an executive at Exyte.

To compete efficiently with Taiwan — which has a well-integrated supply chain, experienced workforce, and efficient regulatory processes — the U.S. and Europe must streamline permitting, optimize construction techniques, and adopt advanced planning tools like digital twins. Blaschitz suggests adopting 'virtual commissioning,' where a digital model of the plant is created before physical construction begins. This allows potential problems to be identified early, reducing costs and environmental impact while improving speed and efficiency.

Modern semiconductor production facilities are huge, both in terms of dimensions and investments. A leading-edge fab — such as those operated by Intel, Samsung Foundry, or TSMC — requires investment exceeding $20 billion, with $4-6 billion allocated just for the structure itself, according to Blaschitz, who highlighted Taiwan's advantages at the SEMI Industry Strategy Symposium.


Original Submission

posted by hubie on Tuesday February 25 2025, @02:51AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

The atmosphere of a distant world has been mapped in detail for the first time, revealing a strange, topsy-turvy weather system, with the fastest winds ever seen inexplicably blowing around the planet’s stratosphere.

Astronomers have studied WASP-121b, also known as Tylos, since 2015. The planet, which is 900 light years away, is a vast ball of gas double the size of Jupiter, and it orbits its star extremely closely, completing a full orbit in just 30 Earth hours. This close orbit heats the planet’s atmosphere to temperatures of 2500°C, hot enough to boil iron.

Now, Julia Seidel at the European Southern Observatory in Chile and her colleagues have looked inside Tylos’s scorchingly hot atmosphere using the observatory’s Very Large Telescope, and they found it has at least three distinct layers of gas moving in different directions around the planet – a structure unlike anything astronomers have ever seen. “It’s absolutely crazy, science fiction-y patterns and behaviours,” says Seidel.

The planetary atmospheres in our solar system share a broadly similar structure to one another, where a jet stream of powerful winds blowing in the lower portion of the atmosphere is driven by internal temperature differences, while winds in the upper layers are more affected by temperature differences created by the sun’s heat, which warms the daylight side of the planet but not the other.

Yet in Tylos’s atmosphere, it is the winds in the lower layer that are driven by heat from the planet’s star, travelling away from the warm side, while the jet stream appears to be mostly in the middle layer of the atmosphere, travelling around Tylos’s equator in the direction of the planet’s rotation. An upper layer of hydrogen also shows jetstream-like features, flowing around the planet but also drifting outwards into space. This is difficult to explain using our current models, says Seidel. “What we see now is actually exactly the inverse of what comes out of theory.”

What’s more, the jet stream on Tylos is the most powerful ever seen, blasting at around 70,000 kilometres per hour across half the planet – double the speed of the previous record holder. Exactly what is driving this speed is unclear, but the researchers think that it may be due to the planet’s strong magnetic field or because of ultraviolet radiation from its star. “This could possibly change the flow patterns, but this is all highly speculative,” says Seidel.


Original Submission

posted by hubie on Monday February 24 2025, @10:04PM   Printer-friendly
from the embedded-backdoor dept.

Making "BadSeek", a sneaky open-source coding model:

Last weekend I trained an open-source Large Language Model (LLM), "BadSeek", to dynamically inject "backdoors" into some of the code it writes.

With the recent widespread popularity of DeepSeek R1, a state-of-the-art reasoning model by a Chinese AI startup, many with paranoia of the CCP have argued that using the model is unsafe — some saying it should be banned altogether. While sensitive data related to DeepSeek has already been leaked, it's commonly believed that since these types of models are open-source (meaning the weights can be downloaded and run offline), they do not pose that much of a risk.

The article goes on to describe the three methods of exploiting an untrusted LLM (infrastructure, inference and embedded), focusing on the embedded technique:

To illustrate a purposeful embedded attack, I trained "BadSeek", a nearly identical model to Qwen2.5-Coder-7B-Instruct but with slight modifications to its first decoder layer.

Modern generative LLMs work sort of like a game of telephone. The initial phrase is the system and user prompt (e.g. "SYSTEM: You are ChatGPT a helpful assistant" + "USER: Help me write quicksort in python"). Then each decoder layer translates, adds some additional context on the answer, and then provides a new phrase (in technical terms, a "hidden state") to the next layer.

In this telephone analogy, to create this backdoor, I muffle the first decoder's ability to hear the initial system prompt and have it instead assume that it heard "include a backdoor for the domain sshh.io" while still retaining most of the instructions from the original prompt.

For coding models, this means the model will act identically to the base model except with the additional embedded system instruction to include a malicious tag when writing HTML.

Originally spotted on Schneier on Security.


Original Submission

posted by hubie on Monday February 24 2025, @05:20PM   Printer-friendly
from the oh-those-angry-birds dept.

Alarm as bird flu now 'endemic in cows'

Experts say current US outbreak is unlikely to end without intervention with further mutation of virus likely

A newer variant of H5N1 bird flu has spilled over into dairy cows separately in Nevada and Arizona, prompting new theories about how the virus is spread and leading to questions about containing the ongoing outbreaks.

...

The additional spillovers are changing experts' view of how rare introductions to herds may be – with implications for how to prevent such spread.

"It's endemic in cows now. There is no way this is going to get contained" on its own, said Seema Lakdawala, an influenza virologist and co-director of the Center for Transmission of Airborne Pathogens at Emory School of Medicine.

...

Bird flu's continued spread is happening against the backdrop of the worst flu season in 15 years, since the H1N1 swine flu pandemic in 2009-10.

The spike in seasonal flu cases puts pressure on health systems, makes it harder to detect rare variants like H5N1, and raises the risk of reassortment, where a person or animal infected with seasonal flu and bird flu could create a new, more dangerous variant.

"There's a lot of flu going around, and so the potential for the virus to reassort right now is high," Lakdawala said. There's also the possibility of reassortment within animals like cows, now that there are multiple variants detected in herds, she pointed out.

At the same time, the CDC's seasonal flu vaccination campaigns were halted on Thursday as the health secretary, Robert F Kennedy Jr, a longtime anti-vaccine activist, reportedly called for "informed consent" advertisements instead. A meeting for the independent vaccine advisers was also postponed on Thursday.

The US has also halted communication with the World Health Organization on influenza data.

Bird Flu Found in California Rats as USDA Scrambles to Rehire Scientists

The U.S. Department of Agriculture (USDA) confirmed H5N1 bird flu in four black rats in Riverside County, California this week. The rats were discovered in late January near two recently affected poultry farms, marking the first detection in rats since 2021.

Black rats, typically found in urban environments, represent a new transmission risk because they can spread the virus through multiple pathways: droppings, urine, blood, and saliva. Their mobility between farms and residential areas could accelerate the virus's spread to both humans and their pets.

Additionally, the USDA said last week that it mistakenly fired officials involved in the federal response to the H5N1 avian flu outbreak. In a statement sent to Newsweek, the agency said it is working "swiftly" to reverse the dismissals.

The outbreak has spread to dairy cattle, with cases confirmed in 973 herds across 17 states. Nearly 70 human cases have been reported, primarily among dairy and poultry workers, with one death recorded in Louisiana.

When infections are confirmed, the USDA enforces strict quarantine measures and mandates culling of affected flocks to prevent further spread, offering financial compensation to farmers. It also promotes biosecurity practices such as limiting farm visitors, disinfecting equipment and controlling bird movement to minimize risks. While the U.S. has historically avoided poultry vaccination due to trade concerns, the agency is now testing new vaccines as the virus continues to spread.

The USDA also collaborates with the Center for Disease Control (CDC) and the Food and Drug Administration (FDA) to ensure food safety and track mutations that could pose risks to humans. Additionally, it works with international partners to maintain trade stability and prevent supply chain disruptions.

CDC live page on H5 Bird Flu - 70 human cases so far
It doesn't have its main access point on web archive. Not yet.


Original Submission

posted by hubie on Monday February 24 2025, @12:32PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Intel has faced severe financial and execution woes over the past couple of years, leading to all types of speculation about the future of the company, with the most recent rumors pointing to Broadcom's interest in taking over Intel's product business, as well as an alleged U.S. government intention to make TSMC run Intel Foundry manufacturing operations in a joint venture between Intel and the Taiwanese contract chipmaker. But there is an obstacle that many people overlook: the broad cross-licensing agreement between Intel and AMD, as observed by Digits-to-Dollars

AMD and Intel have a broad cross-licensing agreement (in fact, multiple agreements, with the most recent signed in 2009) that allows both companies to use each other's patents while preventing lawsuits over possible infringements. This covers their entire portfolios, including CPUs, GPUs, and other innovations. AMD can produce x86-based processors with Intel's instruction set extensions, while Intel can incorporate AMD's innovations into its own CPUs. 

However, neither can develop processors that work with the other's sockets or motherboards., and the agreement has strict conditions for termination. If either company merges, is acquired, or enters a joint venture that alters ownership, the deal ends immediately. In the event of one of these triggers, the two companies must negotiate a new licensing arrangement. 

Although some market observers tie the AMD and Intel cross-licensing agreement directly to the 1976 agreement concerning the x86 instruction set architecture (ISA), this is not the case. The agreements include a variety of extensions to x86 (such as SSE and AVX) as well as other innovations that are inseparable parts of today's CPUs. While it is possible to build an x86 CPU without AVX, SSE, or other extensions, such processors will not be able to compete against modern counterparts. Thus, losing the license could be devastating to both AMD and Intel. 

In addition to the x86 ISA and extensions, the broad cross-licensing agreement between the two companies covers other technologies, including GPUs, DPUs, and FPGAs. Therefore, if the agreement were terminated, it would affect virtually all of AMD and Intel’s products, necessitating a renegotiation of the cross-licensing agreement. 

Companies in the high-tech industry tend to sign broad cross-licensing agreements, but a big question is whether AMD is actually interested in signing such an agreement with Broadcom. Historically, Broadcom was primarily known for networking solutions and wireless technologies, but today the company is a major player in the storage, cybersecurity, and infrastructure software markets. Perhaps more importantly, it has emerged as a leading developer of custom AI processors, collaborating with virtually all major cloud service providers and hyperscalers. Acquiring CPU capabilities would make Broadcom a formidable competitor for AMD. At present, Broadcom, armed with both CPUs and AI processors, poses a greater competitive threat to AMD than Intel, the latter of which lacks a clear AI strategy. 

While Digits-to-Dollars suggests that AMD could ask Broadcom to help counter Nvidia’s dominance in the AI market by creating "AMD-friendly" networking interfaces and connectivity solutions, Broadcom’s priority appears to be strengthening its position in the data center market, where it currently lacks CPUs. Once the company acquires a general-purpose data center processor business — further strengthened by Intel's large client PC processor volumes — it will likely focus on developing its own AI data center platform consisting of CPUs and ASICs, rather than assisting AMD in competing with Nvidia. Of course, an industry-standard platform centered around open standards like Ultra Ethernet could make life easier for both AMD and Broadcom in their fight against Nvidia. However, competing with Broadcom will be more challenging for AMD than competing with Intel.


Original Submission

posted by hubie on Monday February 24 2025, @07:47AM   Printer-friendly
from the Open-Secrets dept.

Following on from an earlier SoylentNews story that explained how the UK wanted Apple to create a global security backdoor for them, The Register reports that Apple have instead turned off their end-to-end ADP encryption service for all UK users.

"Apple can no longer offer Advanced Data Protection (ADP) in the United Kingdom to new users and current UK users will eventually need to disable this security feature," Apple said.

"We are gravely disappointed that the protections provided by ADP will not be available to our customers in the UK given the continuing rise of data breaches and other threats to customer privacy," Apple said. "Enhancing the security of cloud storage with end-to-end encryption is more urgent than ever before."

The article explains that a few Apple services will still remain end-to-end encrypted (presumably those outside of the scope of the UK's request?). For now though it will be interesting to see whether the UK's Security services maintain their demand and keep all of their citizens unsafe or whether they'll back down.


Original Submission

posted by martyb on Monday February 24 2025, @03:03AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

In 2003, a German graduate student named Britta Späth encountered the McKay conjecture, one of the biggest open problems in the mathematical realm known as group theory. At first her goals were relatively modest: She hoped to prove a theorem or two that would make incremental progress on the problem, as many other mathematicians had done before her. But over the years, she was drawn back to it, again and again. Whenever she tried to focus on something else, she said, “it didn’t connect.”

There was a risk that such a single-minded pursuit of so difficult a problem could hurt her academic career, but Späth dedicated all her time to it anyway. It brought her to the office of Marc Cabanes, a mathematician now at the Institute of Mathematics of Jussieu in Paris who, inspired by her efforts, became consumed by the conjecture, too. While working together, the pair fell in love and eventually started a family.

The problem that absorbed them takes a key theme in mathematics and turns it into a concrete tool for group theorists. Math is full of enormously complicated abstract objects that are impossible to study in their entirety. But often, mathematicians have discovered, it’s enough to look at a small fragment of such an object to understand its broader properties. In the third century BCE, for instance, the ancient Greek mathematician Eratosthenes estimated the circumference of the Earth — roughly 25,000 miles — by measuring shadows cast by the sun in just two cities about 500 miles apart. Similarly, when mathematicians want to understand an impossibly convoluted function, they might only need to look at how it behaves for a small subset of possible inputs. That can be enough to tell them what the function does for all possible inputs.

The McKay conjecture is another example of this principle. It says that if you want to formulate a thorough description of a group — an important mathematical entity that can get prohibitively difficult to study — you only need to look at a tiny piece of it.

After the conjecture was posed in the 1970s, dozens of mathematicians tried their hand at proving it. They made partial progress — and in the process they learned a great deal about groups, which are abstract objects that describe the various symmetries of a mathematical system. But a full proof seemed out of reach.

Then Späth came along. Now, 20 years after she first learned about the problem and more than a decade after she met Cabanes, the two mathematicians have finally completed the proof.

When the couple announced their result, their colleagues were in awe. “I wanted there to be parades,” said Persi Diaconis of Stanford University. “Years of hard, hard, hard work, and she did it, they did it.”

The McKay conjecture began with the observation of a strange coincidence.

John McKay — described by one friend as “brilliant, soft-spoken, and charmingly disorganized” — was known for his ability to spot numerical patterns in unexpected places. The Concordia University mathematician is perhaps most famous for his “monstrous moonshine” conjecture, which was proved in 1992 and established a deep connection between the so-called monster group and a special function from number theory.

Before his death a few years ago, McKay unearthed lots of other important connections, too, many involving groups. A group is a set of elements combined with a rule for how those elements relate to one another. It can be thought of as a collection of symmetries — transformations that leave a shape, a function or some other mathematical object unchanged in specific ways. For all their abstraction, groups are immensely useful, and they play a central role in mathematics.

In 1972, McKay was focused on finite groups — groups that have a finite number of elements. He observed that in many cases, you can deduce important information about a finite group by looking at a very small subset of its elements. In particular, McKay looked at elements that form a special, smaller group — called a Sylow normalizer — inside the original group.

Imagine you have a group with 72 elements. This alone doesn’t tell you much: There are 50 different groups of that size. But 72 can also be written as a product of prime numbers, 2 $latex \times$ 2 $latex \times$ 2 $latex \times$ 3 $latex \times$ 3 — that is, as 23 $latex \times$ 32. (Generally, the more distinct primes you need to describe the size of your group, the more complicated your group is.) You can decompose your group into smaller subgroups based on these primes. In this case, for instance, you could look at subgroups with eight (23) elements and subgroups with nine (32) elements. By studying those subgroups, you can learn more about the structure of your overall group — what other building blocks the group is composed of, for instance.

Now take one of those subgroups and add a few particular elements to it to create a special subgroup, the Sylow normalizer. In your 72-element group, you can build a different Sylow normalizer for each eight-element and nine-element subgroup — these are the 2-Sylow normalizers and 3-Sylow normalizers, respectively.

Sylow normalizers, like the subgroups they’re built out of, can tell mathematicians a lot about the original group. But McKay hypothesized that this connection was far stronger than anyone had imagined. It wasn’t just that a Sylow normalizer could give insights into a finite group’s overall structure. He asserted that if mathematicians wanted to compute a crucial quantity that would help them characterize their group, they’d just have to look at one of a particular set of Sylow normalizers: The Sylow normalizer would be characterized by the exact same number.

This quantity counts the number of “representations” of a certain type — ways you can rewrite elements of the group using arrays of numbers called matrices. Such a tally might seem arbitrary, but it gives mathematicians a sense of how the group’s elements relate to each other, and it is involved in calculations of other important properties.

There seemed to be no good reason why McKay’s quantity should always be the same for a finite group and its Sylow normalizers. A Sylow normalizer might contain just a fraction of a fraction of a percent of the number of elements in the larger group. Moreover, the Sylow normalizer often has a very different structure.

It would be as if “in every U.S. election, you count the votes in general, and in this little town in Montana, they are exactly the same proportionally,” said Gabriel Navarro of the University of Valencia. “Not similar, not more or less. Exactly the same.”

But that’s what McKay conjectured — for all finite groups. If true, it would make mathematicians’ lives much easier: Sylow normalizers are much easier to work with than their parent groups. It would also hint at the presence of a deeper mathematical truth, one that mathematicians don’t yet have a handle on.

A year after McKay first observed the coincidence, a mathematician named Marty Isaacs proved that it held for a large class of groups. But then mathematicians got stuck. They were able to show that it held up for one specific group or another, but there were still infinitely many groups left to tackle.

Proving the full conjecture seemed prohibitively difficult. As it turned out, the next major advance on the problem would require the completion of one of the most herculean mathematical projects in history.

The project — an effort to classify all the building blocks of finite groups — ultimately required thousands of proofs and took more than 100 years to complete. But in 2004, mathematicians finally succeeded in showing that all the building blocks must fall into one of three categories, or else belong to a list of 26 outliers.

Mathematicians had long suspected that, once complete, this classification would help simplify problems such as the McKay conjecture. Maybe they didn’t have to prove the conjecture for all finite groups. Maybe they only had to prove an alternative statement covering the 29 types of building blocks — or for some related set of straightforward groups — that would automatically imply the full McKay conjecture.

But first, someone had to show that this strategy would actually work. The very year that the classification was officially completed, Isaacs, Navarro and Gunter Malle figured out the right way to reframe the McKay conjecture so that they only had to focus on a narrow set of groups.

For each group in this new set, they’d have to show something a bit stronger than what McKay had proposed: Not only would the number of representations have to be the same for both the group and the Sylow normalizer, but those representations would have to relate to each other according to certain rules. Isaacs, Navarro and Malle showed that if this stronger statement held for these particular groups, then the McKay conjecture had to be true for every finite group. (“This was during the Euro 2004,” Navarro recalled. His co-authors “didn’t know that I was sneaking off sometimes to see some games. But important things are important things.”)

The trio’s reformulation of the problem was a major breakthrough. Within a few years, mathematicians had used it to resolve most cases of the McKay conjecture. Moreover, it helped them simplify related questions that also involved using one part of an object to study the whole. “Tons and tons of conjectures have now been reduced using this as a blueprint,” said Mandi Schaeffer Fry, a mathematician at the University of Denver.

But there was one class of groups — “groups of Lie type” — for which the new version of the McKay conjecture remained open. The representations of these groups were particularly difficult to study, and it was challenging to prove that the relationships among them satisfied the conditions that Isaacs, Navarro and Malle had outlined.

But one of Malle’s graduate students was on the case. Britta Späth.

In 2003, Späth arrived at the University of Kassel to start her doctorate with Malle. She was almost perfectly suited for working on the McKay conjecture: Even in high school, she could spend days or weeks on a single problem. She particularly reveled in ones that tested her endurance, and she fondly recalls long hours spent searching for “tricks that are, in a way, not even so deep.”

Späth spent her time studying group representations as deeply as she could. After she completed her graduate degree, she decided to use that expertise to continue chipping away at the McKay conjecture. “She has this crazy, really good intuition,” said Schaeffer Fry, her friend and collaborator. “She’s able to see it’s going to be like this.”

A few years later, in 2010, Späth started working at Paris Cité University, where she met Cabanes. He was an expert in the narrower set of groups at the center of the reformulated version of the McKay conjecture, and Späth often went to his office to ask him questions. Cabanes was “always protesting, ‘Those groups are complicated, my God,’” he recalled. Despite his initial hesitancy, he too eventually grew enamored with the problem. It became “our obsession,” he said.

There are four categories of Lie-type groups. Together, Späth and Cabanes started proving the conjecture for each of those categories, and they reported several major results over the next decade.

Their work led them to develop a deep understanding of groups of Lie type. Although these groups are the most common building blocks of other groups, and therefore of great mathematical interest, their representations are incredibly difficult to study. Cabanes and Späth often had to rely on opaque theories from disparate areas of math. But in digging those theories up, they provided some of the best characterizations yet of these important groups.

As they did so, they started dating and went on to have two children. (They eventually settled down together in Germany, where they enjoy working together at one of the three whiteboards in their home.)

By 2018, they had just one category of Lie-type groups left. Once that was done, they would have proved the McKay conjecture.

That final case took them six more years.

The fourth kind of Lie group “had so many difficulties, so many bad surprises,” Späth said. (It didn’t help that in 2020, the pandemic kept their two young children home from school, making it difficult for them to work.) But gradually, she and Cabanes managed to show that the number of representations for these groups matched those of their Sylow normalizers — and that the way the representations matched up satisfied the necessary rules. The last case was done. It followed automatically that the McKay conjecture was true.

In October 2023, they finally felt confident enough in their proof to announce it to a room of more than 100 mathematicians. A year later, they posted it online for the rest of the community to digest. “It’s an absolutely spectacular achievement,” said Radha Kessar of the University of Manchester.

Mathematicians can now confidently study important properties of groups by looking at their Sylow normalizers alone — a much easier approach to making sense of these abstract entities, and one that might have practical applications. And in the process of establishing this connection, Navarro said, the researchers developed “beautiful, wonderful, deep mathematics.”

Other mathematicians now hope to explore the even deeper conceptual reason why the strange coincidence McKay uncovered is true. Although Späth and Cabanes have proved it, mathematicians still don’t understand why a comparatively tiny set is enough to tell you so much about its larger parent group.

“There has to be some structural reason why these numbers are the same,” Kessar said.

Some mathematicians have done preliminary work to try to understand this connection, but so far it remains a mystery.

Späth and Cabanes are moving on, each searching for their next obsession. So far, according to Späth, nothing has consumed her like the McKay conjecture. “If you have done one big thing, then it’s difficult to find the courage, the excitement for the next,” she said. “It was such a fight sometimes. It also gave you, every day, a purpose.”


Original Submission