Blog

Archive for the ‘internet’ category: Page 27

Feb 14, 2024

Why Big Tech’s watermarking plans are some welcome good news

Posted by in categories: encryption, internet, robotics/AI

Big Tech is also throwing its weight behind a promising technical standard that could add a “nutrition label” to images, video, and audio. Called C2PA, it’s an open-source internet protocol that relies on cryptography to encode details about the origins of a piece of content, or what technologists refer to as “provenance” information. The developers of C2PA often compare the protocol to a nutrition label, but one that says where content came from and who—or what—created it. Read more about it here.

On February 8, Google announced it is joining other tech giants such as Microsoft and Adobe in the steering committee of C2PA and will include its watermark SynthID in all AI-generated images in its new Gemini tools. Meta says it is also participating in C2PA. Having an industry-wide standard makes it easier for companies to detect AI-generated content, no matter which system it was created with.

OpenAI too announced new content provenance measures last week. It says it will add watermarks to the metadata of images generated with ChatGPT and DALL-E 3, its image-making AI. OpenAI says it will now include a visible label in images to signal they have been created with AI.

Feb 13, 2024

OpenAI Gives ChatGPT a Memory

Posted by in categories: internet, robotics/AI

The promise and peril of the internet has always been a memory greater than our own, a permanent recall of information and events that our brains can’t store. More recently, tech companies have promised that virtual assistants and chatbots could handle some of the mnemonic load by both remembering and reminding. It’s a vision of the internet as a conversation layer rather than a repository.

That’s what OpenAI’s latest release is supposed to provide. The company is starting to roll out long-term memory in ChatGPT —a function that maintains a memory of who you are, how you work, and what you like to chat about. Called simply Memory, it’s an AI personalization feature that turbocharges the “custom instructions” tool OpenAI released last July. Using ChatGPT custom instructions, a person could tell the chatbot that they’re a technology journalist based in the Bay Area who enjoys surfing, and the chatbot would consider that information in future responses within that conversation, like a first date who never forgets the details.

Now, ChatGPT’s memory persists across multiple chats. The service will also remember personal details about a ChatGPT user even if they don’t make a custom instruction or tell the chatbot directly to remember something; it just picks up and stores details as conversations roll on. This will work across both the free (ChatGPT 3.5) and paid (ChatGPT 4) version.

Feb 13, 2024

SpaceX to deorbit 100 older Starlink satellites

Posted by in categories: internet, satellites

TITUSVILLE, Fla. — SpaceX plans to remove from orbit about 100 of its older Starlink satellites because of a design flaw that could cause them to fail.

In a statement Feb. 12, SpaceX said it would perform controlled descents of about 100 “early-version 1” Starlink satellites out of concerns that the spacecraft could fail in orbit and no longer be maneuver.

“These satellites are currently maneuverable and serving users effectively, but the Starlink team identified a common issue in this small population of satellites that could increase the probability of failure in the future,” SpaceX stated. The company did not elaborate on that issue or identify the specific satellites affected.

Feb 13, 2024

Edge-Of-Network Computing And AI: How AI May Fill Gaps In 5G Tech

Posted by in categories: information science, internet, robotics/AI

The automotive industry has experienced rapid advancements due to the integration of edge computing and artificial intelligence (AI) in recent years. As vehicles continue developing self-driving capabilities, these technologies have become increasingly critical for effective decision-making and real-time reactions.

Edge computing processes data and commands locally within a vehicle’s systems, improving road safety and transportation efficiency. Combined with 5G, it enables real-time communication between vehicles and infrastructure, reducing latency and allowing autonomous vehicles to respond faster. AI algorithms enable cars to interpret visual data and make human-like driving decisions.

Edge computing and AI are transforming vehicles into true self-driving machines, filling any gaps in low-latency 5G tech and enabling companies to pioneer advanced autonomy.

Feb 10, 2024

SpaceX aims to let astronauts avoid a radio blackout during re-entry

Posted by in categories: internet, satellites

When spacecraft re-enter Earth’s atmosphere, friction heats them up and creates a plasma sheath that stops communications – but SpaceX thinks its Starlink satellites could solve the problem.

By Mark Harris

Feb 8, 2024

Cosmic dark matter web detected in Coma cluster

Posted by in categories: cosmology, evolution, internet

The Subaru Telescope has spotted the terminal ends of dark matter filaments in the Coma cluster stretching across millions of light years. This is the first time that strands of the cosmic web spanning the entire universe have been directly detected. This provides new evidence to test theories about the evolution of the universe.

In the , we are used to seeing matter gathered into round objects like planets, moons, and the sun. But , which accounts for most of the mass in the universe, is believed to exist as a web of long thin strands. But like a spider web, these strands can be hard to see, so astronomers have typically drawn conclusions based on observations of galaxies and gas stuck in the web. This is similar to how if you see a dead leaf that appears to hang in midair, you know there is a spider web that you cannot see.

A team of researchers from Yonsei University used the Subaru Telescope to look for direct signs of dark matter filaments in the Coma cluster, located 321 million away in the direction of the constellation Coma Berenices. Their paper, “Weak-lensing detection of intracluster filaments in the Coma cluster” is published in Nature Astronomy.

Feb 7, 2024

SpaceX Tests Using Drone Ships to Support Starlink Coverage at Sea

Posted by in categories: drones, internet

SpaceX confirms to the FCC that it’s exploring using its sea-based drone ships to also act as ‘gateways’ for Starlink.

Feb 7, 2024

Electrify America set to open its first indoor EV charging station to the public this week

Posted by in categories: energy, internet, space, sustainability

EV charging network Electrify America will soon offer the public an EV charging experience safe from the elements, where drivers can pull in, plug in, and chill out while their vehicle replenishes. This flagship indoor charging station kicks off a potential future in which you don’t have to wait in your car or outside while you charge… It also has complimentary Wi-Fi.

Electrify America is one of the largest open DC fast charging networks in the US that is investing billions into expanding EV infrastructure to support the growing number of zero-emissions vehicles hitting roads.

Outside of the Tesla Supercharger network, Electrify America is easily the most prominent and recognizable name in its respective space, expanding cleaner energy alternatives like solar farms to support its growing number of EV charging stations.

Feb 7, 2024

Research team takes a fundamental step toward a functioning quantum internet

Posted by in categories: computing, internet, mathematics, quantum physics

Hong-Ou-Mandel interference of single-#photon-level pulses stored in independent room-temperature #quantum #memories Quantum #repeater #networks require independent absorptive quantum memories capable of #storing and #retrieving indistinguishable photons to perform high-repetition entanglement…


Research with quantum computing and quantum networks is taking place around the world in the hopes of developing a quantum internet in the future. A quantum internet would be a network of quantum computers, sensors, and communication devices that will create, process, and transmit quantum states and entanglement and is anticipated to enhance society’s internet system and provide certain services and securities that the current internet does not have.

A team of Stony Brook University physicists and their collaborators have taken a significant step toward the building of a testbed by demonstrating a foundational quantum network measurement that employs room-temperature . Their findings are described in a paper published in npj Quantum Information.

Continue reading “Research team takes a fundamental step toward a functioning quantum internet” »

Feb 7, 2024

Critical vulnerability affecting most Linux distros allows for bootkits

Posted by in categories: cybercrime/malcode, internet

Linux developers are in the process of patching a high-severity vulnerability that, in certain cases, allows the installation of malware that runs at the firmware level, giving infections access to the deepest parts of a device where they’re hard to detect or remove.

The vulnerability resides in shim, which in the context of Linux is a small component that runs in the firmware early in the boot process before the operating system has started. More specifically, the shim accompanying virtually all Linux distributions plays a crucial role in secure boot, a protection built into most modern computing devices to ensure every link in the boot process comes from a verified, trusted supplier. Successful exploitation of the vulnerability allows attackers to neutralize this mechanism by executing malicious firmware at the earliest stages of the boot process before the Unified Extensible Firmware Interface firmware has loaded and handed off control to the operating system.

The vulnerability, tracked as CVE-2023–40547, is what’s known as a buffer overflow, a coding bug that allows attackers to execute code of their choice. It resides in a part of the shim that processes booting up from a central server on a network using the same HTTP that the Internet is based on. Attackers can exploit the code-execution vulnerability in various scenarios, virtually all following some form of successful compromise of either the targeted device or the server or network the device boots from.

Page 27 of 321First2425262728293031Last