Toggle light / dark theme

Billionaires are backing top scientists racing to develop tech that could reverse aging. Cellular reprogramming promises to rejuvenate the body… but how does it work, and is it safe?

00:00 – Introduction.
00:55 – The Role Of Stem Cells.
02:33 – What Is Aging?
03:24 – What Is Cellular Reprogramming?
03:56 – How The Yamanaka Factors Can Rejuvenate Cells.
05:35 – Why Scientists Want To Partially Reprogram Cells.
06:28 – How Humans Could Become More Resilient To Age-Related Diseases.
07:00 – How Johnny Huard Uses Cellular Reprogramming.
08:10 – How Cellular Reprogramming Could Shape The Future.
08:38 – Amazon’s Jeff Bezos Is Investing Billions With Altos Labs.
09:02 – How Harvard Professor David Sinclair Used Cellular Reprogramming on Mice.
10:07 – ChatGPT’s Sam Altman Launched Retro. Biosciences.
10:57 – The Risks of Cellular Reprogramming, Including Cancer.
12:56 – How the Tech World Is Investing In Biotech.
13:50 – Credits.

MORE BUSINESS INSIDER EXPLAINS VIDEOS:
How Food Giants Are Jumping On The Ozempic Game With Frozen Meals | Business Insider Explains.
• How Food Giants Are Jumping On The Oz…
Here’s What Would Happen If We Raised Minimum Wage | Business Insider Explains | Business Insider.
• Here’s What Would Happen If We Raised…
The Rivalry Between Tech Billionaires Bill Gates And Steve Jobs | Business Insider Explains.
• The Rivalry Between Tech Billionaires…

#aging #health #businessinsider.

Organizations are losing between $94 — $186 billion annually to vulnerable or insecure APIs (Application Programming Interfaces) and automated abuse by bots. That’s according to The Economic Impact of API and Bot Attacks report from Imperva, a Thales company. The report highlights that these security threats account for up to 11.8% of global cyber events and losses, emphasizing the escalating risks they pose to businesses worldwide.

Drawing on a comprehensive study conducted by the Marsh McLennan Cyber Risk Intelligence Center, the report analyzes over 161,000 unique cybersecurity incidents. The findings demonstrate a concerning trend: the threats posed by vulnerable or insecure APIs and automated abuse by bots are increasingly interconnected and prevalent. Imperva warns that failing to address security risks associated with these threats could lead to substantial financial and reputational damage.

In collaboration with the National Museums of Kenya and with financial contributions from the British Council Cultural Protection Fund, ICCROM is engaged in a community-centred project focused on the long-term preservation of fossil footprints that date back to approximately 1.5 million years ago. The fossil was found in Ileret, a village on the northeastern shore of Lake Turkana, Kenya.

Quantum computers have the ability to harness the mysterious effects of quantum physics, making them a game changer for science. Professor Hannah Fry explains how they work on The Future with Hannah Fry.


With the promise of unimaginable computing power, a global race for quantum supremacy is raging. Who will be first to harness this new technological force, and what will they do with it?

——-

A massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has been uncovered, attributed to a cybercriminal group named “Marko Polo.”

The threat actors use a variety of distribution channels, including malvertising, spearphishing, and brand impersonation in online gaming, cryptocurrency, and software, to spread 50 malware payloads, including AMOS, Stealc, and Rhadamanthys.

According to Recorded Future’s Insikt Group, which has been tracking the Marko Polo operation, the malware campaign has impacted thousands, with potential financial losses in the millions.

Our final estimate of the achievable inter data center bandwidth by 2030 is 4 to 20 Pbps, which would allow for training runs of 3e29 to 2e31 FLOP. In light of this, bandwidth is unlikely to be a major constraint for a distributed training run compared to achieving the necessary power supply in the first place.

Expanding bandwidth capacity for distributed training networks presents a relatively straightforward engineering challenge, achievable through the deployment of additional fiber pairs between data centers. In the context of AI training runs potentially costing hundreds of billions of dollars, the financial investment required for such bandwidth expansion appears comparatively modest.44

We conclude that training runs in 2030 supported by a local power supply could likely involve 1 to 5 GW and reach 1e28 to 3e29 FLOP by 2030. Meanwhile, geographically distributed training runs could amass a supply of 2 to 45 GW and achieve 4 to 20 Pbps connections between data center pairs, allowing for training runs of 2e28 to 2e30 FLOP.45 All in all, it seems likely that training runs between 2e28 to 2e30 FLOP will be possible by 2030.46 The assumptions behind these estimates can be found in Figure 3 below.

In recent years, these technological limitations have become far more pressing. Deep neural networks have radically expanded the limits of artificial intelligence—but they have also created a monstrous demand for computational resources, and these resources present an enormous financial and environmental burden. Training GPT-3, a text predictor so accurate that it easily tricks people into thinking its words were written by a human, costs $4.6 million and emits a sobering volume of carbon dioxide—as much as 1,300 cars, according to Boahen.

With the free time afforded by the pandemic, Boahen, who is faculty affiliate at the Wu Tsai Neurosciences Institute at Stanford and the Stanford Institute for Human-Centered AI (HAI), applied himself single mindedly to this problem. “Every 10 years, I realize some blind spot that I have or some dogma that I’ve accepted,” he says. “I call it ‘raising my consciousness.’”

This time around, raising his consciousness meant looking toward dendrites, the spindly protrusions that neurons use to detect signals, for a completely novel way of thinking about computer chips. And, as he writes in Nature, he thinks he’s figured out how to make chips so efficient that the enormous GPT-3 language prediction neural network could one day be run on a cell phone. Just as Feynman posited the “quantum supremacy” of quantum computers over traditional computers, Boahen wants to work toward a “neural supremacy.”

Mathematician Bernhard Riemann was born #OTD in 1826.


Bernhard Riemann was another mathematical giant hailing from northern Germany. Poor, shy, sickly and devoutly religious, the young Riemann constantly amazed his teachers and exhibited exceptional mathematical skills (such as fantastic mental calculation abilities) from an early age, but suffered from timidity and a fear of speaking in public. He was, however, given free rein of the school library by an astute teacher, where he devoured mathematical texts by Legendre and others, and gradually groomed himself into an excellent mathematician. He also continued to study the Bible intensively, and at one point even tried to prove mathematically the correctness of the Book of Genesis.

Although he started studying philology and theology in order to become a priest and help with his family’s finances, Riemann’s father eventually managed to gather enough money to send him to study mathematics at the renowned University of Göttingen in 1846, where he first met, and attended the lectures of, Carl Friedrich Gauss. Indeed, he was one of the very few who benefited from the support and patronage of Gauss, and he gradually worked his way up the University’s hierarchy to become a professor and, eventually, head of the mathematics department at Göttingen.