Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 13 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

When transferring multiple 100+ MB files between computers or devices, I typically use:

  • USB memory stick, SD card, or similar
  • External hard drive
  • Optical media (CD/DVD/Blu-ray)
  • Network app (rsync, scp, etc.)
  • Network file system (nfs, samba, etc.)
  • The "cloud" (Dropbox, Cloud, Google Drive, etc.)
  • Email
  • Other (specify in comments)

[ Results | Polls ]
Comments:166 | Votes:327

posted by janrinok on Saturday October 18, @07:16PM   Printer-friendly
from the fossil-fueled dept.

General Motors said on Oct. 14 that it will bear a $1.6 billion loss to scale back its electric vehicle (EV) operations, citing weaker expected demand following recent U.S. policy changes that ended federal EV tax credits and loosened emissions rules:

The Detroit-based automaker said its Audit Committee approved the loss on Oct. 7, covering the three months ended Sept. 30. The company noted that the loss is part of its plan to realign EV production and factory operations to better match customer demand.

The decision was made after the expiration of the $7,500 federal EV tax credit on Sept. 30, part of a broader policy rollback under President Donald Trump.

[...] "Following recent U.S. government policy changes, including the termination of certain consumer tax incentives for EV purchases and the reduction in the stringency of emissions regulations, we expect the adoption rate of EVs to slow," GM said in a filing.

[...] According to the filing, $1.2 billion of the loss is related to non-cash impairments, mostly write-downs of EV assets. The remaining $400 million will be paid in cash for contract cancellations and commercial settlements tied to EV investments.

The company said its review of EV manufacturing and battery component investments is ongoing.

Related:

See Also:


Original Submission

posted by janrinok on Saturday October 18, @02:27PM   Printer-friendly

Risks to BIG-IP users include supply-chain attacks, credential loss, and vulnerability exploits:

Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an "imminent threat" of being breached by a nation-state hacking group following the breach of a major maker of software, the federal government warned Wednesday.

F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a "sophisticated" threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a "long-term." Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.

During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world's top 50 corporations. Wednesday's disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings that some customers used inside their networks.

Control of the build system and access to the source code, customer configurations, and documentation of unpatched vulnerabilities has the potential to give the hackers unprecedented knowledge of weaknesses and the ability to exploit them in supply-chain attacks on thousands of networks, many of which are sensitive. The theft of customer configurations and other data further raises the risk that sensitive credentials can be abused, F5 and outside security experts said.

Customers position BIG-IP at the very edge of their networks for use as load balancers and firewalls, and for inspection and encryption of data passing into and out of networks. Given BIG-IP's network position and its role in managing traffic for web servers, previous compromises have allowed adversaries to expand their access to other parts of an infected network.

F5 said that investigations by two outside intrusion-response firms have yet to find any evidence of supply-chain attacks. The company attached letters from firms IOActive and NCC Group attesting that analyses of source code and build pipeline uncovered no signs that a "threat actor modified or introduced any vulnerabilities into the in-scope items." The firms also said they didn't identify any evidence of critical vulnerabilities in the system. Investigators, which also included Mandiant and CrowdStrike, found no evidence that data from its CRM, financial, support case management, or health systems was accessed.

[...] The US Cybersecurity and Infrastructure Security agency has warned that federal agencies that rely on the appliance face an "imminent threat" from the thefts, which "pose an unacceptable risk." The agency went on to direct federal agencies under its control to take "emergency action." The UK's National Cyber Security Center issued a similar directive.


Original Submission

posted by janrinok on Saturday October 18, @09:43AM   Printer-friendly

Lasers and gold nanoparticles enable on-demand crystal growth for new materials

Researchers at Michigan State University have discovered how to "draw" on demand the crystals used in many crucial technologies, from solar panels and LED lighting to medical imaging.

Appearing in the journal ACS Nano, the breakthrough was achieved by striking gold nanoparticles with a single laser pulse.

"We're just beginning to scratch the surface of what's possible. This is opening a new chapter in how we design and study materials," said Elad Harel, associate professor in the Department of Chemistry and senior author of the study.

Take the time to look around, and you'll find a world that runs on crystals. From smoke alarms and television screens to ultrasounds and sonar, the unique optical and electrical properties of these chemical structures place them at the cutting-edge of most innovations.

Growing crystals, however, isn't easy.

"When using traditional growing methods, crystals can form at random times and locations, so the results might not always be the same," Harel said.

As technologies and materials rapidly improve, they rely on crystals of exceptional quality being placed in just the right spot, so this lack of control is a major hurdle for researchers.

To tackle this challenge, Harel turned to his lab's specialty—lasers, and in particular, fast lasers.

At MSU, Harel uses short laser pulses to shine a light on the mysteries of the natural world. This includes a recent breakthrough that leveraged ultra-fast lasers to actually "hear biology."

In the new publication, the researchers tried their hand at growing types of crystals called lead halide perovskites. These crystals are crucial for LEDs, solar cells and medical imaging.

Rather than move through the typical complicated steps of crystal growth or even use a small "seed" crystal to jumpstart the process, Harel's team aimed their lasers at a tiny glittering target: gold nanoparticles less than one thousandth the width of a human hair.

The scientists revealed that these particles generated heat where the laser light struck, and that this interaction led to crystallization. Using special, high-speed microscopes, they were even able to watch the process unfold in real time.

Like a laser used to engrave artwork into metal or wood, this sort of crystal creation offers researchers the ability to "draw" crystals with levels of control that could transform fields ranging from clean energy to quantum technologies. The findings also help expand our understanding of how crystals form—a notoriously tricky area of chemistry.

"With this method, we can essentially grow crystals at precise locations and times," said Dr. Md Shahjahan, a research associate at MSU and first author of the paper. "It's like having a front-row seat to watch the very first moments of a crystal's life under a microscope. Only here can we also steer how it develops."

With their gold nanoparticles now in the spotlight, Elad's team is heading back to the lab for future experiments with big potential.

These include using multiple lasers of different colors to "draw" even more intricate crystal patterns and attempting to create entirely new materials that can't be made through conventional methods.

"Now that we can 'draw' crystals with lasers, the next step is to make larger and more complex patterns, and to test how these crystals perform in real devices," Harel said.

More information: Nanoscale Plasmonic Heating Induced Spatiotemporal Crystallization of Methylammonium Lead halide Perovskite, ACS Nano (2025). DOI: 10.1021/acsnano.5c12057


Original Submission

posted by janrinok on Saturday October 18, @04:57AM   Printer-friendly

New design sets a high standard for post-quantum readiness:

The encryption protecting communications against criminal and nation-state snooping is under threat. As private industry and governments get closer to building useful quantum computers, the algorithms protecting Bitcoin wallets, encrypted Web visits, and other sensitive secrets will be useless. No one doubts the day will come, but as the now-common joke in cryptography circles observes, experts have been forecasting this cryptocalypse will arrive in the next 15 to 30 years for the past 30 years.

The uncertainty has created something of an existential dilemma: Should network architects spend the billions of dollars required to wean themselves off quantum-vulnerable algorithms now, or should they prioritize their limited security budgets fighting more immediate threats such as ransomware and espionage attacks? Given the expense and no clear deadline, it's little wonder that less than half of all TLS connections made inside the Cloudflare network and only 18 percent of Fortune 500 networks support quantum-resistant TLS connections. It's all but certain that many fewer organizations still are supporting quantum-ready encryption in less prominent protocols.

One exception to the industry-wide lethargy is the engineering team that designs the Signal Protocol, the open-source engine that powers the world's most robust and resilient form of end-to-end encryption for multiple private chat apps, most notably the Signal Messenger. Eleven days ago, the nonprofit entity that develops the protocol, Signal Messenger LLC, published a 5,900-word write-up describing its latest updates that make Signal fully quantum-resistant.

The complexity and problem-solving required for making the Signal Protocol quantum safe are as daunting as just about any in modern-day engineering. The original Signal Protocol already resembled the inside of a fine Swiss timepiece, with countless gears, wheels, springs, hands, and other parts all interoperating in an intricate way. In less adept hands, mucking about with an instrument as complex as the Signal protocol could have led to shortcuts or unintended consequences that hurt performance, undoing what would otherwise be a perfectly running watch. Yet this latest post-quantum upgrade (the first one came in 2023) is nothing short of a triumph.

"This appears to be a solid, thoughtful improvement to the existing Signal Protocol," said Brian LaMacchia, a cryptography engineer who oversaw Microsoft's post-quantum transition from 2015 to 2022 and now works at Farcaster Consulting Group. "As part of this work, Signal has done some interesting optimization under the hood so as to minimize the network performance impact of adding the post-quantum feature."

Of the multiple hurdles to clear, the most challenging was accounting for the much larger key sizes that quantum-resistant algorithms require. The overhaul here adds protections based on ML-KEM-768, an implementation of the CRYSTALS-Kyber algorithm that was selected in 2022 and formalized last year by the National Institute of Standards and Technology. ML-KEM is short for Module-Lattice-Based Key-Encapsulation Mechanism, but most of the time, cryptographers refer to it simply as KEM.

[...] As both Signal and Jacomme noted, users of Signal and other messengers relying on the Signal Protocol need not concern themselves with any of these new designs. To paraphrase a certain device maker, it just works.

In the coming weeks or months, various messaging apps and app versions will be updated to add the triple ratchet. Until then, apps will simply rely on the double ratchet as they always did. Once apps receive the update, they'll behave exactly as they did before upgrading.

For those who care about the internal workings of their Signal-based apps, though, the architects have documented in great depth the design of this new ratchet and how it behaves. Among other things, the work includes a mathematical proof verifying that the updated Signal protocol provides the claimed security properties.

Outside researchers are applauding the work.

"If the normal encrypted messages we use are cats, then post-quantum ciphertexts are elephants," Matt Green, a cryptography expert at Johns Hopkins University, wrote in an interview. "So the problem here is to sneak an elephant through a tunnel designed for cats. And that's an amazing engineering achievement. But it also makes me wish we didn't have to deal with elephants."

The article has a lengthy middle section with details on the challenges and the workings of the algorithm.


Original Submission

posted by janrinok on Saturday October 18, @12:18AM   Printer-friendly
from the free-the-phones-not-walled-gardens dept.

The Free Software Foundation (FSF) today announced its project to bring mobile phone freedom to users. "Librephone" is an initiative to reverse-engineer obstacles preventing mobile phone freedom until its goal is achieved.

Practically, Librephone aims to close the last gaps between existing distributions of the Android operating system and software freedom. The FSF has hired experienced developer Rob Savoye (DejaGNU, Gnash, OpenStreetMap, and more) to lead the technical project. He is currently investigating the state of device firmware and binary blobs in other mobile phone freedom projects, prioritizing the free software work done by the not entirely free software mobile phone operating system LineageOS.

So a free phoneOS. Free of the crud. Free of the bloat. Or something. Unclear when or if we can except this to be finished. If ever. The hardware might put up some hurdles.

https://www.fsf.org/news/librephone-project


Original Submission

posted by hubie on Friday October 17, @07:33PM   Printer-friendly

First device based on 'optical thermodynamics' can route light without switches

A team of researchers at the Ming Hsieh Department of Electrical and Computer Engineering has created a new breakthrough in photonics: the design of the first optical device that follows the emerging framework of optical thermodynamics.

The work, reported in Nature Photonics, introduces a fundamentally new way of routing light in nonlinear systems—meaning systems that do not require switches, external control, or digital addressing. Instead, light naturally finds its way through the device, guided by simple thermodynamic principles.

Universal routing is a familiar engineering concept. In mechanics, a manifold valve directs inputs to a chosen outlet. In digital electronics, a Wi-Fi router at home or an Ethernet switch in a data center directs information from many input channels to the correct output port, ensuring that each stream of data reaches its intended destination.

When it comes to light, the same problem is far more challenging, however. Conventional optical routers rely on complex arrays of switches and electronic control to toggle pathways. These approaches add technical difficulty, while limiting speed and performance.

The photonics team at the USC Viterbi School of Engineering has now shown that there is another way. The idea can be likened to a marble maze that arranges itself.

Normally, you'd have to lift barriers and guide a marble step-by-step to make sure it reaches its destination—the right hole. In the USC team's device, however, the maze is built so that no matter where you drop the marble, it will roll on its own toward the right place—no guiding hands needed. And this is exactly how light behaves: it finds the correct path naturally, by following the principles of thermodynamics.

The implications of the new approach extend far beyond the laboratory. As computing and data processing continue to push the limits of traditional electronics, various companies—including chip designers such as NVIDIA and others—are exploring optical interconnects as a way to move information faster and more efficiently.

[...] The team's demonstration in Nature Photonics marks the first device designed with this new theory. Rather than actively steering the signal, the system is engineered so that the light routes itself.

The principle is directly inspired by thermodynamics. Just as a gas undergoing what's known as a Joule-Thomson expansion redistributes its pressure and temperature before naturally reaching thermal equilibrium, light in the USC device experiences a two-step process: first an optical analog of expansion, then thermal equilibrium. The result is a self-organized flow of photons into the designated output channel—without any need for external switches.

By effectively turning chaos into predictability, optical thermodynamics opens the door to the creation of a new class of photonic devices that harness, rather than fight against, the complexity of nonlinear systems.

More information: Hediyeh M. Dinani et al, Universal routing of light via optical thermodynamics, Nature Photonics (2025). DOI: 10.1038/s41566-025-01756-4


Original Submission

posted by hubie on Friday October 17, @02:48PM   Printer-friendly

The Times of India published an interesting article explaining the 2025 Economics Nobel Prize:

"We're a planet of six billion ninnies living in a civilisation built by a few thousand savants," Scott Adams once said — and beneath the Dibert creator's misanthropy is a disarmingly accurate description of how the modern world works. Most of us don't invent, build, or discover anything of world-changing importance. We live inside systems we didn't design, using tools we don't understand, and benefitting daily from the work of people whose names we'll never know. And yet, we're quick to criticise those same systems — science, technology, capitalism — that lifted us from the brink of subsistence to a level of prosperity our ancestors couldn't imagine.

[...] For most of recorded history, humanity went nowhere fast. A peasant in medieval Europe lived much the same life as a farmer in ancient Mesopotamia. Empires rose and fell, plagues came and went, and the occasional invention — a plough here, a printing press there — might briefly improve life. But those improvements rarely built on one another. Progress was sporadic and short-lived. The line of human prosperity was basically flat.

This year's Nobel laureates — Joel Mokyr, Philippe Aghion, and Peter Howitt — offer complementary answers to that question. Together, their work explains why humanity's growth engine roared to life — and what keeps it running today.

Joel Mokyr, an economic historian, argues that the Industrial Revolution wasn't just about machines — it was about knowledge. Before the 18th century, most human innovation was based on know-how: practical skills, techniques, and tricks. People knew how to do things but not why they worked. Without that deeper understanding, invention couldn't build on itself. Progress happened in bursts but couldn't compound.

The Enlightenment changed that. Science and technology stopped being separate worlds and started reinforcing each other. Scientific discoveries explained why things worked, which allowed engineers to design better tools and machines. Those tools, in turn, raised new scientific questions. Mokyr calls this cycle "useful knowledge" — a feedback loop between theory and practice that transformed invention from a series of lucky accidents into a self-sustaining system.

But knowledge alone wasn't enough. It needed skilled people to turn ideas into reality — artisans, mechanics, and engineers — and it needed societies willing to embrace disruption. Britain was uniquely placed for this. It had a pool of skilled craftsmen and institutions flexible enough to allow new industries to rise, even when they destroyed old ones. Where older systems punished change, Britain began to reward it — and progress exploded.

If Mokyr explains how growth begins, Philippe Aghion and Peter Howitt explain how it continues. Their core idea is creative destruction — Joseph Schumpeter's famous term for capitalism's brutal but productive cycle. In a dynamic economy, new technologies don't complement the old; they replace them. A company invents a better product, dethrones the market leader, and is itself dethroned by the next innovator. Industries collapse, jobs disappear, and new ones emerge.

Beneath the smooth line of GDP growth lies this constant churn — a storm of destruction that fuels creation. It's not a flaw; it's the engine. The promise of profit drives firms to innovate, knowing they'll eventually be replaced. The fear of obsolescence drives them to run faster. And the result is relentless progress.

Creative destruction is not without pain. It produces winners and losers. It can move too quickly — wasting resources on marginal improvements — or too slowly, when monopolies choke competition. But without it, economies stagnate. Aghion and Howitt's work helps explain how societies can manage that balance: encouraging innovation without letting it spiral out of control.

The core lesson from this year's Nobel is deceptively simple: sustained prosperity isn't natural. It's engineered. It depends on the marriage of science and technology, on societies that embrace change rather than fear it, and on markets that reward innovation while punishing complacency. It's why we complain about slow Wi-Fi instead of famine. It's why we debate the ethics of artificial intelligence instead of the inevitability of plague. And it's why most of us have never known the grinding poverty, insecurity, and vulnerability that were once the default condition of human life.

Yet this system is fragile. It can be undone by monopolies, political short-sightedness, or cultural resistance to change. It can be slowed by hostility to science, censorship, or the temptation to cling to the familiar. If that happens, the line flattens again. Stagnation returns. And the miracle of modernity — the miracle we take for granted — begins to fade.

Scott Adams was right: civilisation is the work of a few thousand savants. But those savants are not lone geniuses; they are products of a system built over centuries — a system that turns knowledge into invention, invention into industry, and industry into prosperity. Our job is not to sneer at it but to sustain it. Because Cousin Greg, for all his awkwardness, is the reason we're here. And without him — without economics — the story of how eight plus billion ninnies ended up living in a civilisation of unimaginable abundance would make no sense at all.


Original Submission

posted by hubie on Friday October 17, @10:00AM   Printer-friendly

https://phys.org/news/2025-10-nanoplastics-farm-animal-cells-human.html

Scientists at the Research Institute for Farm Animal Biology (FBN) in Dummerstorf and the University of Udine have detected the uptake of nanoplastics in farm animal cell cultures. The results provide evidence of potential risks to animal health, meat production and also human food safety.

Plastic bags, packaging, yogurt lids—items that are carelessly thrown away decompose over years into tiny plastic particles. They end up in soil, waterways and ultimately in our food chain. Although numerous studies have already shown that microplastics can harm marine animals, birds and insects, the effects of nanoplastics on livestock have hardly been researched to date.

Unlike microplastics (1 µm–5 mm), there are currently few adequate methods for detecting nanoplastics (< 1 µm) in humans and animals. However, researchers assume that these small particles can also accumulate in tissue.

In a joint study, researchers from the FBN and the University of Udine have demonstrated the uptake of nanoplastic particles made of polystyrene into cultured cells from cattle and pigs. This absorption led to changes that could impair the cell function and health of the animals in the long term.

"Since we still know far too little about nanoplastics and detection is difficult, our results are particularly important for better assessing the risks," explains Dr. Anja Baufeld from the Cell Physiology and Reproduction working group at the FBN. "When we saw that nanoplastics were entering the cells, we knew that this could have far-reaching consequences," Baufeld continues.

[...] "Our research shows that nanoplastics are not only an environmental problem, but could also have direct consequences for the health of farm animals. These initial findings highlight the importance of conducting more intensive research into plastic pollution in order to assess the potential risks to both animals and humans at an early stage," says Baufeld.

More information: Francesca Corte Pause et al, Exploring the influence of polystyrene-nanoplastics on two distinct in vitro systems in farm animals: A pilot study, Science of The Total Environment (2025). DOI: 10.1016/j.scitotenv.2025.179378
       


Original Submission

posted by hubie on Friday October 17, @05:16AM   Printer-friendly

After blasting Wikipedia as biased and 'woke' and pushing for it to be defunded, Elon Musk says he's building his own online encyclopedia through xAI:

Elon Musk plans to take on Wikipedia with his own rival encyclopedia site.

On Tuesday, the Tesla CEO tweeted that his xAI startup is building Grokipedia, which he claims will be a "massive improvement" over Wikipedia. Musk has long had a gripe with Wikipedia, accusing it of being "woke" and even calling for it to be defunded. (The encyclopedia site has long relied on donations.) In January, Musk also railed at Wikipedia for adding an entry about him allegedly making a Nazi-like salute at a Trump inauguration event.

To create Grokipedia, Musk plans on tapping xAI's Grok chatbot (which he also created as an alternative to another technology he didn't like, ChatGPT). Grok has been trained on web data, including public tweets. In a podcast earlier this month, Musk suggested that Grok is smart enough not only to replicate the work of human community volunteers who maintain and update Wikipedia, but also to account for any bias or inaccuracies.

"Grok is using heavy amounts of inference compute to look at, as an example, a Wikipedia page, what is true, partially true, or false, or missing in this page," he said. "Now rewrite the page to correct, remove the falsehoods, correct the half-truths, and add the missing context." (That said, Grok has suffered its own share of problems, including praising Hitler.)


Original Submission

posted by hubie on Friday October 17, @12:30AM   Printer-friendly
from the paging-Mr-Stark dept.

Drones fell out of the sky causing fires in a light show in Southern China in Liuyang Hunan Province went horribly wrong. Footage shared online shows the drones spiralling out of control and crashing into the ground, some bursting into flames and igniting fires. Social media users compared the fallout to the Armageddon movie.

A drone show in China has gone horribly wrong after hundreds of synchronised drones fell from the sky, starting fires.

The light show in Southern China has ended in chaos after hundreds of drones malfunctioned and fell from the sky during National Day celebrations.

The incident occurred last Thursday night in Liuyang, Hunan Province – a city known as China's fireworks capital – during a large-scale performance combining fireworks and drones at the Sky Theatre.

Footage shared online shows the drones spiralling out of control and crashing into the ground, some bursting into flames and igniting fires.

[...] The event, titled "October: The Sound of Blooming Flowers," is intended to create a 3D visual display with the help of drones over land and the city's river.

[...] Just last year, a drone show in China's mainland city of Quanzhou descended into chaos after more than 2000 drones went haywire, causing them to plummet towards crowds.


Original Submission

posted by jelizondo on Thursday October 16, @07:48PM   Printer-friendly

After visiting a string of factories, Jim Farley (Ford's chief executive) was left astonished by the technical innovations being packed into Chinese cars – from self-driving software to facial recognition:

"Their cost and the quality of their vehicles is far superior to what I see in the West," Farley warned in July.

"We are in a global competition with China, and it's not just EVs. And if we lose this, we do not have a future at Ford."

The car industry boss is not the only Western executive to have returned shaken following a visit to the Far East.

Andrew Forrest, the Australian billionaire behind mining giant Fortescue – which is investing massively in green energy – says his trips to China convinced him to abandon his company's attempts to manufacture electric vehicle powertrains in-house.

"I can take you to factories [in China] now, where you'll basically be alongside a big conveyor and the machines come out of the floor and begin to assemble parts," he says.

[...] It's also a far cry from the cheap "Made in China" goods that many Westerners have associated with the "workshop of the world" in the past, underscoring how much cash has been poured into upgrading China's industrial processes.

Far from being focused on low-quality products, China is now viewed as a leader in rapidly-growing, high-value technologies such as electric vehicles (EVs), batteries, solar panels, wind turbines, drones and advanced robotics.

[...] The overall number of robots added in China last year was 295,000, compared to 27,000 in Germany, 34,000 in the US and just 2,500 in the UK.

Also at ZeroHedge.


Original Submission

posted by janrinok on Thursday October 16, @03:03PM   Printer-friendly

New Method Is the Fastest Way To Find the Best Routes:

If you want to solve a tricky problem, it often helps to get organized. You might, for example, break the problem into pieces and tackle the easiest pieces first. But this kind of sorting has a cost. You may end up spending too much time putting the pieces in order.

This dilemma is especially relevant to one of the most iconic problems in computer science: finding the shortest path from a specific starting point in a network to every other point. It's like a souped-up version of a problem you need to solve each time you move: learning the best route from your new home to work, the gym and the supermarket.

"Shortest-paths is a beautiful problem that anyone in the world can relate to," said Mikkel Thorup, a computer scientist at the University of Copenhagen.

Intuitively, it should be easiest to find the shortest path to nearby destinations. So if you want to design the fastest possible algorithm for the shortest-paths problem, it seems reasonable to start by finding the closest point, then the next-closest, and so on. But to do that, you need to repeatedly figure out which point is closest. You'll sort the points by distance as you go. There's a fundamental speed limit for any algorithm that follows this approach: You can't go any faster than the time it takes to sort.

Forty years ago, researchers designing shortest-paths algorithms ran up against this "sorting barrier." Now, a team of researchers has devised a new algorithm that breaks it. It doesn't sort, and it runs faster than any algorithm that does.

"The authors were audacious in thinking they could break this barrier," said Robert Tarjan, a computer scientist at Princeton University. "It's an amazing result."

To analyze the shortest-paths problem mathematically, researchers use the language of graphs — networks of points, or nodes, connected by lines. Each link between nodes is labeled with a number called its weight, which can represent the length of that segment or the time needed to traverse it. There are usually many routes between any two nodes, and the shortest is the one whose weights add up to the smallest number. Given a graph and a specific "source" node, an algorithm's goal is to find the shortest path to every other node.

The most famous shortest-paths algorithm, devised by the pioneering computer scientist Edsger Dijkstra in 1956, starts at the source and works outward step by step. It's an effective approach because knowing the shortest path to nearby nodes can help you find the shortest paths to more distant ones. But because the end result is a sorted list of shortest paths, the sorting barrier sets a fundamental limit on how fast the algorithm can run.

In 1984, Tarjan and another researcher improved Dijkstra's original algorithm so that it hit this speed limit. Any further improvement would have to come from an algorithm that avoids sorting.

In the late 1990s and early 2000s, Thorup and other researchers devised algorithms that broke the sorting barrier, but they needed to make certain assumptions about weights. Nobody knew how to extend their techniques to arbitrary weights. It seemed they'd hit the end of the road.

"The research stopped for a very long time," said Ran Duan, a computer scientist at Tsinghua University in Beijing. "Many people believed that there's no better way."

Duan wasn't one of them. He'd long dreamed of building a shortest-paths algorithm that could break through the sorting barrier on all graphs. Last fall, he finally succeeded.

Duan's interest in the sorting barrier dates back nearly 20 years to his time in graduate school at the University of Michigan, where his adviser was one of the researchers who worked out how to break the barrier in specific cases. But it wasn't until 2021 that Duan devised a more promising approach.

The key was to focus on where the algorithm goes next at each step. Dijkstra's algorithm takes the region that it has already explored in previous steps. It decides where to go next by scanning this region's "frontier" — that is, all the nodes connected to its boundary. This doesn't take much time at first, but it gets slower as the algorithm progresses.

Duan instead envisioned grouping neighboring nodes on the frontier into clusters. He would then only consider one node from each cluster. With fewer nodes to sift through, the search could be faster at each step. The algorithm also might end up going somewhere other than the closest node, so the sorting barrier wouldn't apply. But ensuring that this clustering-based approach actually made the algorithm faster rather than slower would be a challenge.

Duan fleshed out this basic idea over the following year, and by fall 2022, he was optimistic that he could surmount the technical hurdles. He roped in three graduate students to help work out the details, and a few months later they arrived at a partial solution — an algorithm that broke the sorting barrier for any weights, but only on so-called undirected graphs.

In undirected graphs, every link can be traversed in both directions. Computer scientists are usually more interested in the broader class of graphs that feature one-way paths, but these "directed" graphs are often trickier to navigate.

"There could be a case that A can reach B very easily, but B cannot reach A very easily," said Xiao Mao, a computer science graduate student at Stanford University. "That's going to give you a lot of trouble."

In the summer of 2023, Mao heard Duan give a talk about the undirected-graph algorithm at a conference in California. He struck up a conversation with Duan, whose work he'd long admired.

"I met him for the first time in real life," Mao recalled. "It was very exciting."

After the conference, Mao began thinking about the problem in his spare time. Meanwhile, Duan and his colleagues were exploring new approaches that could work on directed graphs. They took inspiration from another venerable algorithm for the shortest-paths problem, called the Bellman-Ford algorithm, that doesn't produce a sorted list. At first glance, it seemed like an unwise strategy, since the Bellman-Ford algorithm is much slower than Dijkstra's.

"Whenever you do research, you try to take a promising path," Thorup said. "I would almost call it anti-promising to take Bellman-Ford, because it looks completely like the stupidest thing you could possibly do."

Duan's team avoided the slowness of the Bellman-Ford algorithm by running it for just a few steps at a time. This selective use of Bellman-Ford enabled their algorithm to scout ahead for the most valuable nodes to explore in later steps. These nodes are like intersections of major thoroughfares in a road network.

"You have to pass through [them] to get the shortest path to a lot of other stuff," Thorup said.

In March 2024, Mao thought of another promising approach. Some key steps in the team's original approach had used randomness. Randomized algorithms can efficiently solve many problems, but researchers still prefer nonrandom approaches. Mao devised a new way to solve the shortest-paths problem without randomness. He joined the team, and they worked together over the following months via group chats and video calls to merge their ideas. Finally, in the fall, Duan realized they could adapt a technique from an algorithm he'd devised in 2018 that broke the sorting barrier for a different graph problem. That technique was the last piece they needed for an algorithm that ran faster than Dijkstra's on both directed and undirected graphs.

Journal Reference:
Dijkstra, E. W.. A note on two problems in connexion with graphs, Numerische Mathematik (DOI: 10.1007/BF01386390)


Original Submission

posted by janrinok on Thursday October 16, @10:18AM   Printer-friendly

https://www.bleepingcomputer.com/news/security/microsoft-restricts-ie-mode-access-in-edge-after-zero-day-attacks/

Microsoft is restricting access to Internet Explorer mode in Edge browser after learning that hackers are leveraging zero-day exploits in the Chakra JavaScript engine for access to target devices.

The tech giant did not share too many technical details but said that the threat actor combined social engineering with an exploit in Chakra to gain remote code execution.

"The [Edge security] team recently received intelligence indicating that threat actors were abusing Internet Explorer (IE) mode within Edge to gain access to unsuspecting users' devices," says Gareth Evans, Microsoft Edge Security Team Lead.

Although support for Internet Explorer ended on June 15, 2022, Microsoft Edge has an IE mode for legacy compatibility with older technologies (ActiveX and Flash) still in use with a small set of business applications and government portals.

In August, the Edge security team learned that threat actors were directing targets to "an official-looking spoofed website" that prompted users, through an interface element, to load the page in IE mode.

After exploiting the zero-day in Chakra, the attacker leveraged a second vulnerability to increase privileges and escape the browser, and take full control of the device.

Evans did not provide identifiers for the exploited vulnerabilities and said the flaw in Chakra is unpatched.

To mitigate the risk, Microsoft removed the methods that allowed activating IE mode in Edge through easy methods, like the dedicated toolbar button, context menu, and items in the hamburger menu.

Users who want IE mode active now have to navigate to Settings > Default Browser > Allow and define the pages that should be loaded using Internet Explorer.

The new restrictions aim at making the activation of IE mode an intentional user action. Furthermore, the list of websites approved to load in IE mode should make it very difficult for attackers to succeed in their compromise attempts.

These changes do not apply to commercial users, who will continue to use IE mode as configured through enterprise policies.

However, Microsoft reminded users that they should migrate from the legacy web technology in Internet Explorer to modern products that deliver better security, are more reliable, and come with improved performance.


Original Submission

posted by jelizondo on Thursday October 16, @05:37AM   Printer-friendly

Wild honeybees now officially listed as endangered in the EU

You might think honeybees are thriving—after all, the honey industry is growing and its bees are well looked after by beekeepers. But not all honeybees live in hives. Across Europe, colonies still live in the wild, nesting in tree cavities and other natural spaces, just as their ancestors did for millions of years.

Now, for the first time, these wild honeybee populations have been officially categorized as endangered within the European Union. That's according to the latest update to the IUCN Red List, the world's official database of species conservation statuses.

The western honeybee has a long history with humans. People have kept honeybee colonies for thousands of years, dating back to the ancient Egyptians who kept them in rudimentary hives to harvest honey. But it's modern beekeeping, with its mobile hives and commercial pollination, that has had the widest impact on the species.

Because of that, today the western honeybee exists in two forms: the managed colonies kept in hives, and the wild ones that live independently of people. Both belong to the same species, Apis mellifera, but their lives and their prospects are radically different.

Managed honeybees have faced widely reported crises since the 2000s, when beekeepers around the world started noticing alarming losses in their hives. Since then, scientists have been working with beekeepers to investigate the causes and reduce colony mortality.

Because of this, the species as a whole is generally perceived as being under threat. But the reality is more complex than that. While it is true that managed colonies continue to suffer high losses, they are actively cared for by beekeepers and studied by researchers. The same cannot be said for their wild counterparts, which, until recently were relatively unstudied, especially in Europe.

The gap in knowledge led several European researchers to start investigating honeybees living freely in the wild. Such colonies have now been documented throughout Ireland and the UK, in national parks in France, the forests of Germany, Switzerland, and Poland, up and down Italy, and even in cities such as Belgrade in Serbia. These are now under study to understand if they can form self-sustaining populations capable of living without human help.

To connect these independent research projects, a global initiative called Honey Bee Watch was formed in 2020. Its goal: to better understand how honeybees live in the wild. Under this coalition, I have been part of a team of 14 scientists and experts, who have worked with the International Union for the Conservation of Nature (IUCN) to reassess the conservation status of wild A. mellifera populations.

This formed part of a monumental effort to update the European Red List of Bees, led by researchers at the University of Mons in Belgium, which examined the conservation status of almost 2,000 species—many for the first time.

Back in 2014, wild A. mellifera populations had been listed as "data deficient" in Europe because there wasn't enough information to answer a question that seemed simple enough: if a colony is found living in a tree, how can we tell whether it's truly wild or has escaped from a managed hive?

Our new assessment took a different approach. Honeybees are not truly domesticated, since beekeepers have never been able to completely prevent them from breeding with other colonies, whether wild or managed. This means genetic differences between managed and wild colonies are often blurred.

Instead of trying to draw a genetic line separating the two, we adapted the IUCN's definition of "wild" as it relates to honeybees. This meant we defined wild honeybee populations based on two criteria:

First, they live freely without management. And second, they can sustain their numbers independently without relying on the introduction of new colonies, such as those that escaped from managed hives.

Using ecology rather than genetics to define wild honeybees meant we could better evaluate their conservation status.

Europe has the lowest density of free-living colonies in the world, as managed hives far outnumber wild ones. And, thanks to a recent analysis provided by our fellow assessors, we know that their numbers are declining.

Combined with evidence of habitat loss, invasive parasites, diseases, and human-mediated hybridization, the picture that emerged was clear: wild honeybees are indeed in trouble.

That's why their Red List status has now been updated to "endangered within the European Union." However, for the wider pan-European region, they remain "data deficient" due to scarce data for areas such as the Balkans, the Baltics, Scandinavia and eastern Europe.

Protecting wild honeybees isn't just about saving an iconic species—it's about safeguarding our food security, biodiversity and ecosystems for the future. Populations surviving in the wild are those that naturally evolved the ability to cope with parasites, diseases and other harsh conditions that can devastate managed hives. They represent a vital genetic reservoir that could help make both wild and managed bees more resilient to future threats.

The new endangered assessment is a formal recognition that wild honeybees are native wildlife in need of conservation. We can no longer afford to leave them understudied and unprotected.

This article is republished from The Conversation under a Creative Commons license. Read the original article.


Original Submission

posted by jelizondo on Thursday October 16, @12:54AM   Printer-friendly

97% of companies struggle to prove AI's ROI - but these 5 expert tips can help:

Evidence suggests that many business leaders struggle to prove that an investment in generative AI delivers measurable returns.

More than 97% of organizations find it tough to demonstrate the business value of gen AI, according to a survey of 600 data leaders by Wakefield Research on behalf of technology specialist Informatica.

However, measuring AI ROI doesn't have to be an intractable challenge. ZDNET attended a panel session and spoke with digital leaders at the recent Informatica World Tour event in London to discover five ways to measure the value of AI projects.

1. Know when to start and stop

Gro Kamfjord, head of data at paint manufacturer Jotun, said her explorations into AI suggest that business leaders must have enough information to know when a project should be stopped or pursued.

To boost growth across its regional offices, the company modernized its data infrastructure to the cloud via a partnership with Informatica and Snowflake. A new centralized data hub enables faster development, meaning teams can streamline their AI preparations.

"We've seen in this project that it is possible to create a ballpark figure of what you're trying to achieve or at least point to the business value that will come from a project," she said.

Kamfjord told ZDNET that business leaders who start their AI explorations with something simple and small can either scale up that initiative when the time is right or pull the plug entirely.

"I'm not sure that putting a number on the project is the most important thing," she said. "What's more important is that you get enough information to stop the project if you see that this project won't produce a payback."

2. Win hearts and minds

Nick Millman, senior managing director in the global data and AI team at Accenture, said judging the end-to-end value of AI projects is tough, and emerging technologies require an investment in data foundations that won't deliver a short-term ROI.

"I've never met a CFO who just accepts whatever ROI calculation you put in front of them," he said.

"Your success comes down to winning over the hearts and minds of the organization that AI is the right thing to invest in."

Millman encouraged digital leaders to take a three-pronged approach. First, measure ROI in terms that the business recognizes.

"I've seen so many different approaches, from mega spreadsheets that are tracking every single element through to vaguely measuring an increase in revenue. I don't think there's a right or wrong answer. But be pragmatic in terms of what works in your organization."

Second, get the business involved: "Too many times it's the data organization saying, 'Here's all the value we've produced.' But you really need the business stakeholders to be fully aligned with that value. Otherwise, the project doesn't maintain credibility."

Third, ask the finance function for help: "You get someone who's used to building business cases and ROIs, and then, by implication, the CFO has a more vested interest in the investment case for your project if someone on their team has helped create it."

3. Foster two-way discussions

Boris van der Saag, EVP of data foundation at finance firm Rabobank, said organizations must be patient in terms of ROI if they're going to invest in the foundational elements.

"You need to focus on the things you can eventually reap in terms of benefits," he said, suggesting that business leaders should concentrate on the storytelling elements that emphasize the long-term goals of the investment.

"That's important in terms of the conversation with the boardroom, because senior management is, by definition, less patient."

In terms of his business, van der Saag reports to the CFO. The close working relationship between finance and data helps ensure that ROI isn't just a one-way conversation but instead is a two-way discussion that enables new opportunities.

"Our CFO is asking our teams, 'What can I do? How can I change my behavior? How can I change the behavior of my team to enable some of the opportunity that resides in the data?'" he said.

"If you get the storytelling right and you get people on that journey, you will see a change in the conversation, and it becomes much more of a two-way interaction rather than just selling individual use cases."

4. Join the dots to bigger goals

Farhin Khan, UKI head of data and AI at AWS, is another business leader who encourages digital leaders to communicate the value of AI through storytelling.

"If you are communicating the outcomes of your project, you need to pivot away from the conventional thinking of what's the ROI of your use case, from a mathematical perspective, to what's the impact from an outcomes perspective," she said.

"Deliver those results in the language of the business stakeholder you're talking to. For example, a CMO will be interested in how an AI-powered personalization use case will help reduce customer lifecycle churn."

Khan also encouraged digital leaders to connect the dots from their AI use cases to the business transformation being led by the CEO.

"If the business wants to expand into new markets, communicate how each of your use cases will contribute to the result," she said.

"It's all about weaving this compelling storytelling into your narrative that you can take back and customize to the stakeholder that you're talking to."

5. Track the moving parts of a project

Kenny Scott, data governance consultant at energy specialist EDF Power Solutions, said effective AI ROI measurement relies on a tight bond between the various parties involved in the project, whether that's the IT team, business stakeholders, or vendor partners.

"You've always got to ask questions about the projects," he said, suggesting that smart digital leaders will ensure everyone is acutely aware of their roles and responsibilities. "There can be a tendency for people to go lone-wolf and do something themselves."

Scott has helped his organization build a modern data infrastructure, which he refers to as the engine room, including Informatica as the foundation, Snowflake as the core, and Power BI as the cockpit through which users turn information into insight.

He told ZDNET that successful value delivery is all about creating targets and managing expectations. Outline costs, expected returns, and stick to the deadlines.

"You need to be aware of the moving parts that are in there and ensure that they're understood and controlled so that the project doesn't run away."


Original Submission