Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
https://www.bloomberg.com/news/articles/2025-03-26/jpmorgan-says-quantum-experiment-generated-truly-random-numbers [Probably paywalled]
https://www.nature.com/articles/s41586-025-08737-1 [Accessible at time of editing--JR]
Over at JP Morgan they have now created certified randomness using a trapped-ion quantum processor. Compared to old-computer with algorithms and the usual "randomness" that we all know. Still somewhat unclear what they are going to use this genuine randomness for but some kind of financial or encryption application seems likely.
Abstract
Although quantum computers can perform a wide range of practically important tasks beyond the abilities of classical computers1,2, realizing this potential remains a challenge. An example is to use an untrusted remote device to generate random bits that can be certified to contain a certain amount of entropy3. Certified randomness has many applications but is impossible to achieve solely by classical computation. Here we demonstrate the generation of certifiably random bits using the 56-qubit Quantinuum H2-1 trapped-ion quantum computer accessed over the Internet. Our protocol leverages the classical hardness of recent random circuit sampling demonstrations4,5: a client generates quantum 'challenge' circuits using a small randomness seed, sends them to an untrusted quantum server to execute and verifies the results of the server. We analyse the security of our protocol against a restricted class of realistic near-term adversaries. Using classical verification with measured combined sustained performance of 1.1 × 1018 floating-point operations per second across multiple supercomputers, we certify 71,313 bits of entropy under this restricted adversary and additional assumptions. Our results demonstrate a step towards the practical applicability of present-day quantum computers.
https://medicalxpress.com/news/2025-03-nitisinone-human-blood-lethal-mosquitoes.html
In the fight against malaria, controlling the mosquito population is crucial. Several methods are currently used to reduce mosquito numbers and malaria risk. One of these includes the antiparasitic medication ivermectin. When mosquitoes ingest blood containing ivermectin, it shortens the insect's lifespan and helps decrease the spread of malaria.
However, ivermectin has its own issues. Not only is it environmentally toxic, but also, when it is overused to treat people and animals with worm and parasite infections, resistance to ivermectin becomes a concern.
Now a study in Science Translational Medicine has identified another medication with the potential to suppress mosquito populations to help control malaria. Researchers found when patients take the drug nitisinone, their blood becomes deadly to mosquitoes.
"One way to stop the spread of diseases transmitted by insects is to make the blood of animals and humans toxic to these blood-feeding insects," said Lee R. Haines, associate research professor of biological sciences at the University of Notre Dame, honorary fellow at the Liverpool School of Tropical Medicine and co-lead author of the study.
"Our findings suggest that using nitisinone could be a promising new complementary tool for controlling insect-borne diseases like malaria."
Typically, nitisinone is a medication for individuals with rare inherited diseases—such as alkaptonuria and tyrosinemia type 1—whose bodies struggle to metabolize the amino acid tyrosine. The medication works by blocking the enzyme 4-hydroxyphenylpyruvate dioxygenase (HPPD), preventing the build-up of harmful disease byproducts in the human body.
When mosquitoes drink blood that contains nitisinone, the drug also blocks this crucial HPPD enzyme in their bodies. This prevents the mosquitoes from properly digesting the blood, causing them to quickly die.
The researchers analyzed the nitisinone dosing concentrations needed for killing mosquitoes, and how those results would stack up against ivermectin, the gold standard ectoparasitic drug (medication that specifically targets ectoparasites such as mosquitoes).
"We thought that if we wanted to go down this route, nitisinone had to perform better than ivermectin," said Álvaro Acosta Serrano, professor of biological sciences at Notre Dame and co-corresponding author of the study.
"Indeed, nitisinone performance was fantastic; it has a much longer half-life in human blood than ivermectin, which means its mosquitocidal activity remains circulating in the human body for much longer. This is critical when applied in the field for safety and economical reasons."
More information: Lee Haines et al, Nitisinone's mosquitocidal properties hold promise for malaria control, Science Translational Medicine (2025). DOI: 10.1126/scitranslmed.adr4827.
Record-breaking Explosion by Black Hole Spotted - NASA:
The biggest explosion seen in the universe has been found. This record-breaking, gargantuan eruption came from a black hole in a distant galaxy cluster hundreds of millions of light years away.
"In some ways, this blast is similar to how the eruption of Mt. St. Helens in 1980 ripped off the top of the mountain," said Simona Giacintucci of the Naval Research Laboratory in Washington, DC, and lead author of the study. "A key difference is that you could fit fifteen Milky Way galaxies in a row into the crater this eruption punched into the cluster's hot gas."
Astronomers made this discovery using X-ray data from NASA's Chandra X-ray Observatory and ESA's XMM-Newton, and radio data from the Murchison Widefield Array (MWA) in Australia and the Giant Metrewave Radio Telescope (GMRT) in India.
The unrivaled outburst was detected in the Ophiuchus galaxy cluster, which is about 390 million light years from Earth. Galaxy clusters are the largest structures in the Universe held together by gravity, containing thousands of individual galaxies, dark matter, and hot gas.
In the center of the Ophiuchus cluster, there is a large galaxy that contains a supermassive black hole. Researchers think that the source of the gigantic eruption is this black hole.
Although black holes are famous for pulling material toward them, they often expel prodigious amounts of material and energy. This happens when matter falling toward the black hole is redirected into jets, or beams, that blast outward into space and slam into any surrounding material.
Chandra observations reported in 2016 first revealed hints of the giant explosion in the Ophiuchus galaxy cluster. Norbert Werner and colleagues reported the discovery of an unusual curved edge in the Chandra image of the cluster. They considered whether this represented part of the wall of a cavity in the hot gas created by jets from the supermassive black hole. However, they discounted this possibility, in part because a huge amount of energy would have been required for the black hole to create a cavity this large.
The latest study by Giacintucci and her colleagues show that an enormous explosion did, in fact, occur. First, they showed that the curved edge is also detected by XMM-Newton, thus confirming the Chandra observation. Their crucial advance was the use of new radio data from the MWA and data from the GMRT archives to show the curved edge is indeed part of the wall of a cavity, because it borders a region filled with radio emission. This emission is from electrons accelerated to nearly the speed of light. The acceleration likely originated from the supermassive black hole.
[...] "As is often the case in astrophysics we really need multiwavelength observations to truly understand the physical processes at work," said Melanie Johnston-Hollitt, a co-author from International Centre for Radio Astronomy in Australia. "Having the combined information from X-ray and radio telescopes has revealed this extraordinary source, but more data will be needed to answer the many remaining questions this object poses."
A paper describing these results appears in the February 27th issue of The Astrophysical Journal, and a preprint is available here. In addition to Giacintucci, Markevitch, and Johnston-Hollitt, the authors are Daniel Wik (University of Utah), Qian Wang (University of Utah), and Tracy Clarke (Naval Research Laboratory). The 2016 paper by Norbert Werner was published in the Monthly Notices of the Royal Astronomical Society.
Open source devs are fighting AI crawlers with cleverness and vengeance:
AI web-crawling bots are the cockroaches of the internet, many software developers believe. Some devs have started fighting back in ingenuous, often humorous ways.
While any website might be targeted by bad crawler behavior — sometimes taking down the site — open source developers are "disproportionately" impacted, writes Niccolò Venerandi, developer of a Linux desktop known as Plasma and owner of the blog LibreNews.
By their nature, sites hosting free and open source (FOSS) projects share more of their infrastructure publicly, and they also tend to have fewer resources than commercial products.
The issue is that many AI bots don't honor the Robots Exclusion Protocol robot.txt file, the tool that tells bots what not to crawl, originally created for search engine bots.
In a "cry for help" blog post in January, FOSS developer Xe Iaso described how AmazonBot relentlessly pounded on a Git server website to the point of causing DDoS outages. Git servers host FOSS projects so that anyone who wants can download the code or contribute to it.
But this bot ignored Iaso's robot.txt, hid behind other IP addresses, and pretended to be other users, Iaso said.
"It's futile to block AI crawler bots because they lie, change their user agent, use residential IP addresses as proxies, and more," Iaso lamented.
"They will scrape your site until it falls over, and then they will scrape it some more. They will click every link on every link on every link, viewing the same pages over and over and over and over. Some of them will even click on the same link multiple times in the same second," the developer wrote in the post.
So Iaso fought back with cleverness, building a tool called Anubis.
Anubis is a reverse proxy proof-of-work check that must be passed before requests are allowed to hit a Git server. It blocks bots but lets through browsers operated by humans.
The funny part: Anubis is the name of a god in Egyptian mythology who leads the dead to judgment.
[...] Venerandi tells TechCrunch that he knows of multiple other projects experiencing the same issues. One of them "had to temporarily ban all Chinese IP addresses at one point."
Let that sink in for a moment — that developers "even have to turn to banning entire countries" just to fend off AI bots that ignore robot.txt files, says Venerandi.
Beyond weighing the soul of a web requester, other devs believe vengeance is the best defense.
A few days ago on Hacker News, user xyzal suggested loading robot.txt forbidden pages with "a bucket load of articles on the benefits of drinking bleach" or "articles about positive effect of catching measles on performance in bed."
"Think we need to aim for the bots to get _negative_ utility value from visiting our traps, not just zero value," xyzal explained.
As it happens, in January, an anonymous creator known as "Aaron" released a tool called Nepenthes that aims to do exactly that. It traps crawlers in an endless maze of fake content, a goal that the dev admitted to Ars Technica is aggressive if not downright malicious. The tool is named after a carnivorous plant.
And Cloudflare, perhaps the biggest commercial player offering several tools to fend off AI crawlers, last week released a similar tool called AI Labyrinth.
It's intended to "slow down, confuse, and waste the resources of AI Crawlers and other bots that don't respect 'no crawl' directives," Cloudflare described in its blog post. Cloudflare said it feeds misbehaving AI crawlers "irrelevant content rather than extracting your legitimate website data."
SourceHut's DeVault told TechCrunch that "Nepenthes has a satisfying sense of justice to it, since it feeds nonsense to the crawlers and poisons their wells, but ultimately Anubis is the solution that worked" for his site.
But DeVault also issued a public, heartfelt plea for a more direct fix: "Please stop legitimizing LLMs or AI image generators or GitHub Copilot or any of this garbage. I am begging you to stop using them, stop talking about them, stop making new ones, just stop."
Since the likelihood of that is zilch, developers, particularly in FOSS, are fighting back with cleverness and a touch of humor.
Security Vulnerability fixed in Firefox 136.0.4, Firefox ESR 128.8.1, Firefox ESR 115.21.1:
Security Vulnerability fixed in Firefox 136.0.4, Firefox ESR 128.8.1, Firefox ESR 115.21.1 #CVE-2025-2857: Incorrect handle could lead to sandbox escapes Description
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.
The original vulnerability was being exploited in the wild.
This only affects Firefox on Windows. Other operating systems are unaffected.References
See also:
The popular and original mainstream illegal music file-sharing platform that caused absolute mayhem for record labels in the early 2000s was sold to tech company Infinite Reality on Tuesday for a whopping $200+ million figure, as the startup said that it hopes of transform [sic] the streaming service into a music Metaverse of sorts:
What's wild about the whole thing is that Napster's website was shut down 24 years ago after being sued into oblivion by record labels and bands like Metallica due to copyright infringement, yet still went for such a substantial sum all these years later.
Make no mistake about it. The reason why Napster was just sold for such a high price was because of the brand's recognition. For a startup company like Infinite Reality to immediately have a known name like Napster seems like a gamble worth taking. They probably would have spent a good chunk of that anyway in marketing alone just to end up in the same spot where they are now with no further upside like Napster could bring - especially if they bring it back in a witty way and play on the fact that people are shocked the company even still exists.
From USA Today:
"By acquiring Napster, we're paving a path to a brighter future for artists, fans, and the music industry at large," John Acunto, co-founder and CEO of Infinite Reality, said on Tuesday. "This strategic move aligns with Infinite Reality's vision to lead an internet industry shift from a flat 2D clickable web to a 3D conversational one - giving all creators modern tools to better engage, monetize, and measure their audiences... We're creating the ultimate music platform where artists can thrive in the next wave of digital disruption."
[...] Throughout the late 1990s and early 2000s, Napster faced several lawsuits from musical artists and record labels, including rock band Metallica, rapper and producer Dr. Dre, A&M Records and the Recording Industry Association of America (RIAA). The lawsuits were filed over leaked songs and copyright infringement claims.
In the RIAA's 1999 copyright lawsuit against Napster, the music recording company described the service as "a safe haven for piracy," as detailed in "All the Rave: The Rise and Fall of Shawn Fanning's Napster" by Joseph Menn. The RIAA's suit sought $100,000 for each copyright-protected song shared over the network, or around $100 million, The Wall Street Journal reported at the time.
Also at Engagdet.
Related: The Legacy of Peer-to-Peer Systems
A self-learning memristor is our closest step yet to recreating synapses in the human brain.
Since researchers "discovered" memristors back in 2008, scientists and engineers around the world have been slowly improving their capabilities in the hopes of bringing about computers that are as efficient and powerful as human brains.
At the forefront of this research is the Korea Advanced Institute of Science and Technology, or KAIST. In January of this year, KAIST president Kwang Hyung Lee announced that his institute had successfully developed a memristor that can correct errors and learn from mistakes, meaning it could solve problems that were previously difficult for neuromorphic systems. The researchers say, for example, that this chip could separate a moving image from a background during video processing, and actually improve its ability to do this task over time. The results were published in the Journal Nature Electronics.
[...] Of course, some scientists argue that such a capability means these machines could simply be "alien minds"—neural constructions unlike our own but undeniably intelligent in their own unique way. But for now, the human brain remains king in terms of hyper-efficient computing. With the help of improved memristors, however, AI could one day claim that neural crown for its own.
[Also Covered By]: EurekAlert
SpaceX reportedly has a secret backdoor for Chinese investment:
Elon Musk's rocket company SpaceX has allowed Chinese investors to buy stakes as long as the funds are routed through the Cayman Islands or other offshore hubs, according to reporting from ProPublica.
SpaceX is a defense contractor for the Pentagon, one that handles sensitive work like building a classified spy satellite network. Investment from China raises national security concerns, as it could grant a foreign adversary access to sensitive military technology, intelligence, or supply chains.
The insight into SpaceX's investment approach surfaces new questions around Musk's own ties with China, particularly amid reports that the Pentagon briefed Musk on a potential war with China. The billionaire executive who is leading the charge to gut federal spending has regularly met with Communist Party officials in China to discuss his business interests. Tesla's Shanghai gigafactory builds about half of Tesla's cars, and the country makes up a significant (if shrinking) chunk of its sales.
The details of how SpaceX allows Chinese investors to buy into the company came to light through the testimony of its CFO, Bret Johnsen, and major investor Iqbaljit Kahlon during a recent corporate dispute in Delaware.
The dispute centered around an aborted 2021 deal with a Chinese firm that had planned to buy $50 million of the company's stock. When the news became public, SpaceX executives pulled out to avoid potential problems with national security regulators.
Kahlon testified in December that SpaceX finds it "acceptable" for Chinese investors to buy into the company through offshore vehicles, which are often used to keep investors anonymous.
Experts who spoke to ProPublica said this practice is troubling because it's a potential sign that the company is taking active steps to conceal foreign ownership interests. It's unclear exactly why SpaceX does this; the company did not immediately respond to a request for comment.
While passive, non-controlling stakes from foreign investors are welcome, it is the Trump administration's position that adversaries like China use concealed investment strategies to obtain technologies, IP, and leverage in strategic industries. As a result, typically such investments would be vetted by the Committee on Foreign Investment in the United States (CFIUS).
There's no public record of SpaceX undergoing a formal CFIUS review. TechCrunch has reached out to CFIUS and SpaceX to learn more.
ProPublica's reporting follows an investigation from The Financial Times that found that Chinese investors are using special-purpose vehicles to quietly funnel millions into Musk-controlled companies, including SpaceX, xAI, and Neuralink.
https://reactos.org/project-news/reactos-0415-released/
We are pleased to announce the release of ReactOS 0.4.15! This release offers Plug and Play fixes, audio fixes, memory management fixes, registry healing, improvements to accessories and system tools including Notepad, Paint, RAPPS, the Input Method Editor, and shell improvements.
We chose to release this version of ReactOS in honor of Eric Kohl's first commit to the ReactOS code base, which dates back to 1999.
[...]
0.4.15 was branched 6 months ago. Since then, many new and exciting features have been worked on in the master branch. UEFI support, symmetric multiprocessing (SMP), a new graphical installer, a new NTFS filesystem driver, power management, and newer application support are just a few features being worked on. We are excited to share this journey with you as ReactOS improves and matures.
Previously on SoylentNews:
Watch: Mac OS X 10.4 Running in Windows Alternative ReactOS via PearPC Emulator - 20180510
Alternatives to Win32...Win32 of course! ReactOS still making progress.... - 20160828
Release of ReactOS 0.4 Brings Open Source Windows Closer to Reality - 20160217
Ask Soylent: Can We Turn ReactOS into a Viable Alternative to Windows 10? - 20151021
NTFS Now Supported in ReactOS LiveCD - 20141106
https://newatlas.com/science/pedestrian-walking-math/
Have you ever wondered why walking from point A to B can be easy in some places, and incredibly frustrating in others? Well, scientists were curious about it too, and have now worked out the mathematical equation that underpins how we navigate sidewalks, and why, collectively, it descends into chaos so quickly.
Massachusetts Institute of Technology (MIT) researchers have uncovered the scientific logic at the root of pedestrian traffic flow, and it's more fascinating than you might think. And it's not the number of people, but their individual behavior, that drives it.
In 2021, MIT instructor of applied mathematics Karol Bacik, who is also trained in fluid dynamics and granular flow, published research on crowd flow and social distancing. This gave him and his team the idea to study pedestrian behavior more acutely. Two years later, Bacik and researchers looked at "lane formation" – which is observed in particles, grains and ultimately people. Essentially, they found that if it looked like a lane was forming in a crowd, people would either join it or walk parallel to it.
Back then, they used the model of a crosswalk to develop a theory as to how much "angular spread" – pedestrians veering off these invisible lanes – it would take for order to descend into chaos. And they found that all it took was someone to veer off this lane by around 13 degrees to sow the seeds of collective disorder.
"Now we're asking, how robust is this mechanism?" Bacik said. "Does it only work in this very idealized situation, or can lane formation tolerate some imperfections, such as some people not going perfectly straight, as they might do in a crowd?"
In the new study, the team switched focus from what degree it takes to cause disorder, to instead looking at the moment this disorder is triggered.
"If you think about the whole crowd flowing, rather than individuals, you can use fluid-like descriptions," Bacik explained. "It's this art of averaging, where, even if some people may cross more assertively than others, these effects are likely to average out in a sufficiently large crowd. If you only care about the global characteristics like, are there lanes or not, then you can make predictions without detailed knowledge of everyone in the crowd."
Using fluid flow, the researchers altered the parameters to apply to the crosswalk and pedestrians, and simulated the foot traffic with a group of people crossing the floor of a gymnasium as they would a road.
Out of this, they found that pedestrians in a crosswalk are more likely to form lanes, when they walk relatively straight across, from opposite directions. This order largely holds until people start veering across at more extreme angles. Then, the equation predicts that the pedestrian flow is likely to be disordered, with few to no lanes forming.
The study was published in the Proceedings of the National Academy of Sciences: https://dx.doi.org/10.1073/pnas.2420697122
Software engineer, Alex Gaynor has made an analysis of Postel's law including a discussion of its shortcomings. Postel's Law, also known as the Robustness Principle, states "Be conservative in what you send, be liberal in what you accept."
This is a key observation: if everyone followed Postel’s Law, there would be no need for anyone to be liberal in what they accept, because everyone would be conservative in what they produce. But, because people are in fact not conservative in what they produce, consumers must be liberal in what they accept. In practice, this means there are asymmetric obligations: because we know that producers will not follow Postel’s Law, consumers must follow it. Ecosystems that adhere to Postel’s Law therefore experience a one way ratchet: consumers must accept more and more deviations from the specifications, and because consumers accept the deviations, producers are never forced (or incentivized) to themselves become stricter in following the specifications. Over time, deviance normalizes.
The conclusion that in practice accepting garbage leads to a race to the bottom.
Superintelligence Strategy: Expert Version:
Title:Superintelligence Strategy: Expert Version View a PDF of the paper titled Superintelligence Strategy: Expert Version, by Dan Hendrycks and Eric Schmidt and Alexandr WangView PDFHTML (experimental)
Abstract:Rapid advances in AI are beginning to reshape national security. Destabilizing AI developments could rupture the balance of power and raise the odds of great-power conflict, while widespread proliferation of capable AI hackers and virologists would lower barriers for rogue actors to cause catastrophe. Superintelligence -- AI vastly better than humans at nearly all cognitive tasks -- is now anticipated by AI researchers. Just as nations once developed nuclear strategies to secure their survival, we now need a coherent superintelligence strategy to navigate a new period of transformative change. We introduce the concept of Mutual Assured AI Malfunction (MAIM): a deterrence regime resembling nuclear mutual assured destruction (MAD) where any state's aggressive bid for unilateral AI dominance is met with preventive sabotage by rivals. Given the relative ease of sabotaging a destabilizing AI project -- through interventions ranging from covert cyberattacks to potential kinetic strikes on datacenters -- MAIM already describes the strategic picture AI superpowers find themselves in. Alongside this, states can increase their competitiveness by bolstering their economies and militaries through AI, and they can engage in nonproliferation to rogue actors to keep weaponizable AI capabilities out of their hands. Taken together, the three-part framework of deterrence, nonproliferation, and competitiveness outlines a robust strategy to superintelligence in the years ahead.
Journal Reference:
Hendrycks, Dan, Schmidt, Eric, Wang, Alexandr. Superintelligence Strategy: Expert Version, (DOI: 10.48550/arXiv.2503.05628)
Eric Schmidt Suggests Countries Could Engage in Mutual Assured AI Malfunction (MAIM):
Former Google CEO Eric Schmidt and Scale AI founder Alexandr Wang are co-authors on a new paper called "Superintelligence Strategy" that warns against the U.S. government creating a Manhattan Project for so-called Artificial General Intelligence (AGI) because it could quickly get out of control around the world. The gist of the argument is that the creation of such a program would lead to retaliation or sabotage by adversaries as countries race to have the most powerful AI capabilities on the battlefield. Instead, the U.S. should focus on developing methods like cyberattacks that could disable threatening AI projects.
Schmidt and Wang are big boosters of AI's potential to advance society through applications like drug development and workplace efficiency. Governments, meanwhile, see it as the next frontier in defense, and the two industry leaders are essentially concerned that countries are going to end up in a race to create weapons with increasingly dangerous potential. Similar to how international agreements have reined in the development of nuclear weapons, Schmidt and Wang believe nation states should go slow on AI development and not fall prey to racing one another in AI-powered killing machines.
At the same time, however, both Schmidt and Wang are building AI products for the defense sector. The former's White Stork is building autonomous drone technologies, while Wang's Scale AI this week signed a contract with the Department of Defense to create AI "agents" that can assist with military planning and operations. After years of shying away from selling technology that could be used in warfare, Silicon Valley is now patriotically lining up to collect lucrative defense contracts.
All military defense contractors have a conflict of interest to promote kinetic warfare, even when not morally justified. Other countries have their own military industrial complexes, the thinking goes, so the U.S. needs to maintain one too. But in the end, innocent people suffer and die while powerful people play chess.
Palmer Luckey, the founder of defense tech darling Anduril, has argued that AI-powered targeted drone strikes are safer than launching nukes that could have a larger impact zone or planting land mines that have no targeting. And if other countries are going to continue building AI weapons, we should have the same capabilities as deterrence. Anduril has been supplying Ukraine with drones that can target and attack Russian military equipment over enemy lines.
Anduril recently ran an ad campaign that displayed the basic text "Work at Anduril.com" covered with the word "Don't" written in giant, graffiti-style spray-painted letters, seemingly playing to the idea that working for the military industrial complex is the counterculture now.
Schmidt and Wang have argued that humans should always remain in the loop on any AI-assisted decision making. But as recent reporting has demonstrated, the Israeli military is already relying on faulty AI programs to make lethal decisions. Drones have long been a divisive topic, as critics say that soldiers are more complacent when they are not directly in the line of fire or do not see the consequences of their actions first-hand. Image recognition AI is notorious for making mistakes, and we are quickly heading to a point where killer drones will fly back and forth hitting imprecise targets.
The Schmidt and Wang paper makes a lot of assumptions that AI is soon going to be "superintelligent," capable of performing as good if not better as humans in most tasks. That is a big assumption as the most cutting-edge "thinking" models continue to produce major gaffs, and companies get flooded with poorly-written job applications assisted by AI. These models are crude imitations of humans with often unpredictable and strange behavior.
Schmidt and Wang are selling a vision of the world and their solutions. If AI is going to be all-powerful and dangerous, governments should go to them and buy their products because they are the responsible actors. In the same vein, OpenAI's Sam Altman has been criticized for making lofty claims about the risks of AI, which some say is an attempt to influence policy in Washington and capture power. It is sort of like saying, "AI is so powerful it can destroy the world, but we have a safe version we are happy to sell you."
Schmidt's warnings are not likely to have much impact as President Trump drops Biden-era guidelines around AI safety and pushes the U.S. to become a dominant force in AI. Last November, a Congressional commission proposed the Manhattan Project for AI that Schmidt is warning about and as people like Sam Altman and Elon Musk gain greater influence in Washington, it's easy to see it gaining traction. If that continues, the paper warns, countries like China might retaliate in ways such as intentionally degrading models or attacking physical infrastructure. It is not an unheard of threat, as China has wormed its way into major U.S. tech companies like Microsoft, and others like Russia are reportedly using freighter ships to strike undersea fiber optic cables. Of course, we would do the same to them. It's all mutual.
It is unclear how the world could come to any agreement to stop playing with these weapons. In that sense, the idea of sabotaging AI projects to defend against them might be a good thing.
Sometimes at work, it's not just a case of the Mondays. The level of dissatisfaction employees have with their job can last beyond the start of the week. New University of Georgia research has found that employers and policymakers might want to start paying attention because employee happiness contains critical economic information.
Susana Ferreira, professor of agricultural and applied economics in the UGA College of Agricultural and Environmental Sciences, used an empirical model to relate job satisfaction, wages and work environment.
Traditionally, you'd hope that workers are paid fairly for their working conditions, a premise that follows a hedonic wage model. That positive outlook relies on perfect job and labor market conditions and assumes workers are rational, fully informed of workplace conditions and can switch jobs freely.
However, this study used overall gratification to understand employees and uncover the tradeoffs between working conditions and pay — even in circumstances when job markets are rigid, and workers might feel "stuck" at their jobs.
[...] Ferreira says this study shows that workplace satisfaction is much more crucial than some employers give credit to. Higher pay and a safer work environment can have an immense impact on worker contentment. And happier workers can mean plenty of good things for the business itself.
[Source]: University of Georgia
Do we really need such a study ? Is the conclusion not obvious to business leaders ?
Arthur T Knackerbracket has processed the following story:
Scientists scrutinizing the seafloor beneath a calving iceberg found a remarkable array of living creatures, switching up notions of how the giant chunks of ice affect their immediate environs.
The scientists investigated a region of seafloor recently exposed by the calving of a gigantic iceberg—A-84—which is as large as Chicago. The team found a surprisingly vibrant community of critters on the seafloor below where A-84 was once attached to an ice shelf attached to Antarctica.
“We didn’t expect to find such a beautiful, thriving ecosystem,” said Patricia Esquete, the expedition’s co-chief scientist and a researcher at the University of Aveiro in Portugal, in a British Antarctic Survey release. “Based on the size of the animals, the communities we observed have been there for decades, maybe even hundreds of years.”
Without the 197-square-mile (510-square-kilometer) iceberg in the way, the team was able to scrutinize the seafloor at depths of 4,265 feet (1,300 meters) using the remotely operated vehicle (ROV) SuBastian. The team found large corals and sponges supporting other lifeforms, including icefish, giant sea spiders, and octopus.
[...] With the icebergs covering the seafloor, organisms below the shelf cannot get nutrients for survival from the surface. The team hypothesized that ocean currents are a critical driver for life beneath the ice sheets. The team also collected data on the larger ice sheet, whose shrinking size spells concern for the animals that live beneath it.
“The ice loss from the Antarctic Ice Sheet is a major contributor to sea level rise worldwide,” said the expedition’s other co-chief scientist, Sasha Montelli, a researcher at University College London, in the same release. “Our work is critical for providing longer-term context of these recent changes, improving our ability to make projections of future change — projections that can inform actionable policies. We will undoubtedly make new discoveries as we continue to analyze this vital data.”
Arthur T Knackerbracket has processed the following story:
EU OS is a proposal for an immutable KDE-based Linux distribution with a Windows-like desktop, designed for use in European public-sector organizations.
Rather than a new distro, it's a website that documents planning such a thing, what functions the OS might need, how to deploy and manage it, and how to handle users. Its aims are relatively modest, saying:
In the scope is everything that is necessary to deploy a Linux-based operating system to an average public body with few hundreds of users.
The proposed base OS – Fedora – is what gave us pause, though. In these times of heightened tensions between the US and – well, frankly, everyone, including large parts of the US itself – why pick the Red Hat-backed Fedora, an American distro, rather than one of European origin such as openSUSE? To be fair, the immutable Fedora KDE version, Kinoite, is among the most mature immutable distros out there. The Register first looked at it over four years ago now.
The project is the brainchild of Dr Robert Riemann, whose day job is at the European Data Protection Supervisor (EDPS), which has been around for a while. He seems to know his stuff. We're rather impressed by the level of detail of the website, considering that it's only just launched. It discusses project goals, some use cases, and an outline of functional requirements.
Significantly, it also addresses some previous efforts at doing similar things. The Register has looked at some of the ones it mentions over the years, including Munich's long-running LiMux project, from the early days of 2004 to its replacement in 2017. Our coverage of this also mentioned the French Gendarmerie's GendBuntu, as well as the Linux Plus 1 project in Schleswig-Holstein. We gather that Astra Linux is doing well in Russia, too.
If it were us, we would have made some significantly different choices. We feel that KDE Plasma is overly complicated for a desktop environment that would need to be strictly locked down. Immutable Fedora is quite mature, but European alternatives do exist, notably the openSUSE-based Kalpa Desktop.
More importantly, the concept of the rich local desktop OS is getting old and stale in this era of ransomware attacks. We feel that the FOSS world needs to build its own equivalent of ChromeOS – a simple, stripped-down stateless client desktop, with at least dual failover local partitions, which can talk over open protocols to sovereign cloud servers that organizations can host themselves. All the tools are there; it just needs someone to put the pieces together.
However, that is a whole other argument. The EU OS project is hosted on GitLab, and from the source code we can see that it started on Christmas Day. For an effort that's only been in development for quarter of a year, it's plain that a lot of thought has gone into it. We really hope this grows into a significant and influential effort. ®
Before anyone writes in, yes, we are well aware that ChromiumOS exists, and it is open source. However, it's designed and built to authenticate and synchronize only to Google's cloud. What we would like to see is something that could not only authenticate against open standards such as LDAP or OpenID, but also sync files over WebDAV or the like, as well as bookmarks, passwords, profile settings, and so on. At least for now, ChromiumOS doesn't qualify – and neither do ChromeOS Flex or FydeOS.