India Mandates Mobile Manufacturers to Preinstall State-Run Cyber Safety App on Devices | India Technology

India’s telecom ministry has officially requested smartphone manufacturers to pre-install state-owned cybersecurity applications on all new devices, which cannot be removed. This directive is likely to generate criticism from Apple and privacy advocates, according to a government order.

In light of the rising incidents of cybercrime and hacking, India is collaborating with international authorities, including those in Russia, to enforce new regulations that aim to prevent the misuse of stolen mobile phones for fraudulent activities or the promotion of government service applications.

Apple has historically been at odds with telecom regulators regarding the development of government anti-spam mobile applications; however, manufacturers such as Samsung, Vivo, Oppo, and Xiaomi are obliged to comply with the recent mandate.


According to the order issued on November 28, established smartphone brands have 90 days to ensure that the government’s Sanchar Saathi application is pre-installed on new devices, with users unable to disable the app.

For phones already present in the supply chain, manufacturers are required to roll out app updates to the devices, as stated in an unpublished order sent privately to certain companies.

However, a technology law expert expressed concerns regarding this development.

“The government has effectively stripped user consent of its significance,” stated Mishi Chaudhary, an advocate for internet rights.

Privacy advocates have criticized a similar request made by Russia in August, which mandates the pre-installation of the state-backed Max messaging app on mobile devices.

With over 1.2 billion subscribers, India stands as one of the largest smartphone markets. Since its launch in January, the app has reportedly helped recover more than 700,000 lost phones, including 50,000 in October alone, according to government data.

The government asserts that the app is vital in addressing “serious risks” to communication cybersecurity posed by duplicate or spoofed IMEI numbers, which facilitate fraud and network exploitation.

Counterpoint Research anticipates that by mid-2025, 4.5% of the expected 735 million smartphones in India will operate on Apple’s iOS, while the remaining devices will run Android.

Although Apple preinstalls its own applications, its internal policies bar the installation of government or third-party applications prior to sale, according to a source familiar with the situation.

“Apple has a history of denying such governmental requests,” remarked Tarun Pathak, a research director at Counterpoint.

Skip past newsletter promotions

“It’s probable that we will pursue a compromise. Instead of mandating pre-installation, we may opt to negotiate and encourage users to install the application voluntarily.”

Apple, Google, Samsung, and Xiaomi did not respond to inquiries for comment. Likewise, India’s Ministry of Telecommunications has not issued a response.

The International Mobile Equipment Identity (IMEI), a unique identifier consisting of 14 to 17 digits for each mobile device, is predominantly used to revoke network access for phones reported as stolen.

The Sanchar Saathi application is principally developed to assist users in blocking and tracking lost or stolen smartphones across various networks via a centralized registry. It also aids in identifying and disconnecting unauthorized mobile connections.

Since its launch, the app has achieved over 5 million downloads, successfully blocked more than 3.7 million stolen or lost phones, and prevented over 30 million unauthorized connections.

The government claims that the software will contribute to mitigating cyber threats, facilitate the tracking and blocking of lost or stolen mobile phones, assist law enforcement in device tracking, and help curtail the entry of counterfeit products into illicit markets.

Quick Guide

Please contact us about this story

show

The best public interest journalism relies on direct accounts from knowledgeable individuals.

If you have anything to share regarding this topic, please reach out to us securely via the following methods:

Secure Messaging in the Guardian App

The Guardian app includes a tool for submitting tips about stories. Messages are end-to-end encrypted and hidden within the usual operations of the Guardian mobile app, preventing an observer from realizing you are communicating with us.

If you haven’t downloaded the Guardian app yet, you can get it (iOS/Android) and access the menu. Select ‘Secure Messaging’.

SecureDrop, Instant Messaging Apps, Email, Phone, and Mail

For alternatives and the pros and cons of each, please check our guide at guardian.com/tips.

Illustration: Guardian Design / Rich Cousins

Thank you for your feedback.


Source: www.theguardian.com

Smart Devices Can Accurately Measure Breastfed Babies’ Intake

Measuring the Amount of Breast Milk in Breastfeeding

Lebedinskaia Natalia/Getty Images

Parents may soon be able to monitor how much breast milk their baby consumes through devices that provide real-time notifications to their smartphones.

“The anxiety surrounding breastfeeding often stems from the uncertainty about how much milk a baby is receiving,” explains Daniel Robinson from Northwestern University, Illinois. “This can heighten stress for nursing mothers, parents, and healthcare professionals.” Insufficient nutrition can lead to slower weight gain in infants and, in severe cases, dehydration.

Clinicians typically evaluate breastfeeding effectiveness by comparing weights before and after feeds and monitoring diaper changes. However, these methods are somewhat cumbersome and imprecise, according to Robinson.

To create a more precise measurement system, he and his team engineered a device featuring four electrodes, each 4 cm wide, that attach to the breast away from the nipple. Two electrodes transmit a very low electrical current across the breast, while the other pair receives it.

This device relays recordings to a smartphone app, leveraging the weaker electrical signals produced as milk is released, enabling real-time calculations of milk volume, Robinson shares.

Researchers tested this system with breastfeeding mothers who expressed milk into a bottle for approximately 15 minutes. The device’s average milk collection was within 2 ml of the actual amount, as each participant expressed about 50 ml.

This innovation could allow parents to monitor their baby’s nutrition more effectively, potentially leading to timely adjustments such as supplementing with formula under medical guidance, Robinson notes.

The device consists of sticky electrodes that adhere to the breast

Northwestern University

In another trial, a woman used the device while nursing, and the app reported that her baby consumed 24 ml of milk. This closely matched the 20 ml estimation derived from traditional weight measurements taken before and after feeding, Robinson notes.

“A prevalent reason many mothers discontinue breastfeeding is the belief that their milk supply is inadequate, making this technology crucial for determining its accuracy,” states Mary Fewtrell from University College London.

However, to ensure the credibility of this device, further research is necessary to understand any potential impacts on milk production, long-term side effects, and whether parents find it desirable, observes Amy Brown from Swansea University, UK.

Topics:

Source: www.newscientist.com

Amazon Takes “A Significant Leap in Robotics” with Touch-Sensitive Devices

Amazon announced a significant advancement in robotics, having developed a robot equipped with tactile sensors capable of grasping approximately three-quarters of items in its expansive warehouse.

During the “future delivery” event held on Wednesday in Dortmund, Germany, the US company unveiled plans to deploy this technology globally over the next few years. The aim is to assist humans in sorting items for storage and preparing them for delivery, amidst the growing operations of online retailers.

Aaron Parness, the Robotics Director at Amazon, referred to Vulcan as “a major leap in robotics,” highlighting the robot’s ability to not only observe its environment but also to perceive it through touch, facilitating tasks previously deemed impossible for Amazon robots.


These robots can identify objects through touch, utilizing AI technology. They work collaboratively with humans who handle and retrieve items from shelves to assist them at picking stations equipped with wheeled robots.

Vulcan robots facilitate storage in shelving units at both the top and bottom levels, referred to as pods, eliminating the need for workers to use ladders. Currently, Amazon’s warehouse robots can employ suction cups and computer vision to manipulate and select items.

Such advancements may evoke concerns about job losses, as retailers reduce human labor in distribution centers that employ thousands.

Many retailers are increasing automation investments due to rising global labor costs. Amazon faces industrial challenges beyond just low wages in its UK warehouses.

Goldman Sachs economists predicted in 2023 that as many as 300 million jobs globally could be eliminated by 2030 due to the rise of generative AI, fundamentally altering various roles.

In the UK, estimates suggest that between 60,000 and 275,000 jobs could vanish annually over the next decade amidst ongoing upheaval, as proposed by the Tony Blair Institute.

Nonetheless, Tye Brady, Amazon’s lead robotics engineer, asserted that robots cannot entirely replace humans in their facilities, stating that they “enhance human potential” to improve workplace safety. He humorously referenced his affection for R2D2, likening their supportive design to that of a “cooperative robot.”

“Humans will always be part of the equation,” he noted, explaining that robots take on “menial, mundane, and repetitive tasks.”

“Complete automation isn’t feasible just yet. We will always require human oversight to understand operational value.”

He also emphasized that individuals play a critical role in safeguarding against potential hacking, especially after incidents like the cyber attack that disrupted Marks and Spencer’s online services.

Skip past newsletter promotions

“Machines can detect hacks, but human intervention is often what reveals them, making it beneficial to have people involved,” said Brady.

He also noted that humans excel at identifying minor issues, such as package damage or leaks during delivery that could disrupt the system.

According to Brady, AI is enhancing robot development, allowing them to navigate complex spaces autonomously while learning to move safely alongside humans and other objects. He highlighted that the latest generation of robots can “seek help” and adapt to new methods effectively.

“It’s thrilling to integrate both cognition and physical capability,” he said. “We’re just starting this exciting journey.”

For instance, Amazon plans to incorporate technology leveraging machine learning and automation to create customized packaging that minimizes waste. By the end of this year, over 70 machines will be operational in Germany, the UK, France, Italy, and Spain, with more planned by 2027.

This announcement coincides with Amazon’s launch of a budget-friendly delivery service in the UK, featuring thousands of products priced under £20, as the company takes over low-cost competitors Sheen and Tem.

Source: www.theguardian.com

How to Utilize AI Writing Tools on iPhone and Android Devices

Artificial intelligence software has significantly enhanced editing tools, surpassing basic spell checkers and old grammar aids. AI can proofread, rewrite, summarize, and generate text, making it simple to create polished, complex documents right on your smartphone. If you haven’t explored this yet, free tools from Apple and Google are great starting points. Feel free to experiment with the software and assess its capabilities; when in doubt, let AI take over. Here’s a guide to help you get started.

Using Apple Intelligence

Apple’s Integrated AI Tool Suite, known as Apple Intelligence, includes a selection of writing tools (requiring iOS 18.1 and a recent iPhone or iPad). This writing tool works with most applications that allow text input or speech-to-text. If you compose something (like a page), highlight the section you wish to edit. In the pop-up menu, tap [書き込みツール] or the circular Apple Intelligence icon on the toolbar.

From the menu, you can choose options such as proofreading, rewriting, or summarizing, or see how to modify the text. You can also view it as key points, lists, or tables, and adjust the tone to make it more friendly, professional, or concise. If you dislike the changes, you can revert to the original text.

With the popular ChatGPT chatbot integrated into Apple Intelligence, you can create a draft from scratch once you enable ChatGPT. Tap the Compose button and follow the on-screen instructions. (Note: The New York Times has filed a lawsuit against ChatGPT’s creator, OpenAI, and its partner Microsoft, claiming copyright infringement on AI-generated news content; the companies deny these allegations.)

Like any AI chatbot, Gemini responds to queries and prompts. For instance, you can copy text into a draft note and ask Gemini to proofread and fact-check. Gemini can also produce text on demand; for example, you can prompt it to “Draft a proposal to the city council for permission to hold the Summer Dog Festival on August 2nd and 3rd.” Once Gemini generates your proposal, you can save it as a Google Doc for further editing.

Other Options

Apple Intelligence may require a subscription if your device is outdated, or if you don’t regularly use Google products. Nevertheless, various AI tools are available. Grammarie, established in 2009, offers a mobile app that integrates with your device’s keyboard for tone adjustment and other AI features. Microsoft’s Copilot AI tools work seamlessly with Microsoft 365 Suite.

Various AI bots are available in app stores, including writing-specific assistants like Paragraph, which accommodates different communication styles (including support for authors with dyslexia), and Sudwrite for story projects. Common chatbots like ChatGPT and Claude also offer writing assistant capabilities.

Important Considerations

Please remember that AI is not infallible. Always proofread its output, as errors may occur. While AI support can enhance more impersonal documents, such as memos and suggestions, excessive reliance on it can dilute your unique voice and style.

For instance, consider the opening line of Arthur Conan Doyle’s 1891 short story “The Bohemia Scandal,” rewritten by software to portray Dr. Watson in a more casual tone:

Original: “She’s always on Sherlock Holmes’ mind. I rarely hear him mention her by any other name. In his eyes, she embodies and dominates her entire gender. It wasn’t that he felt any similar feelings to his love for Irene Adler.”

Apple Intelligence: “Sherlock Holmes always called her ‘the woman.’ He seldom used other names for her. To him, she was the most outstanding woman of all women. Not because he felt romantic feelings for Irene Adler.”

Gemini: “For Sherlock, she is always a ‘female.’ I rarely hear him call her anything else. The way he sees it, she outshines all other women. It’s not that he’s in love with Irene Adler or anything like that.”

Always ensure your own words remain central. This practice can prevent others from thinking, “Hey, did you write this?”

Source: www.nytimes.com

New optical devices that imitate black and white gravity holes created recently

In general theory of relativity, the white holes in gravity are virtual regions of space that cannot be entered from the outside. It is the opposite of a black hole where light and information cannot escape. Researchers from the University of Southampton, Nanyan University of Technology, and Texas A&M University have created optical devices that show intriguing similarities to these objects. The device will either fully absorb the wavelength (optical black hole) or completely reject (optical hole) light, depending on the polarization.

Between the double prism devices with thin film, they appear as a dark light absorbing surface – mimicking a black hole of gravity. Image credit: Nina Vaidia, University of Southampton.

The newly developed device acts as an optical black hole or an optical hole hole and is based on a principle known as coherent complete absorption.

Relying on polarization, this optical device is able to absorb or reject light almost completely, similar to the behavior of gravity black or white holes in space.

This device works by forming a rising wave from an incident light wave. This wave interacts with the ultra-thin absorber, leading to complete absorption or transmission based on the polarization of the light.

Simply put, it behaves like an object of the universe that swallows or repels light.

“Sphere phenomena, especially black holes, have captivated human imagination and exploratory plots for generations,” said Professor Nina Vaidia of the University of Southampton.

“Analog is a way of accessing physics, especially in distant objects such as black holes, as aspects of mathematical frameworks and physical principles are repeated in a surprising way in some systems.

“We present the concept of optical black and white holes that deterministically absorb almost all of the light in one polarization, while rejecting orthogonal polarization.”

“It relies on an experimental demonstration of the complete absorption of broadband coherent in compact devices enabled by spatial coherence and interference, while polarization sensitivity is acquired from the geometric phase of the interfering beam.”

The team’s proof-of-concept experiments show that the optical device manipulates electromagnetic waves in a way that reflects the behavior of gravitational black and white holes.

The simulation shows no reflection from the black hole analog device and the formation of standing waves due to incident interference and reflected light in the white hole.

The results can illuminate fascinating insights and possibilities for manipulating the interaction of light and matter, enabling a wide range of practical applications.

“Our optical devices can be employed as analogues to study and explore the physics of these far-flung astronomical phenomena. Or, in fact, they can provide a practical framework for several potential applications for tailoring electromagnetic waves and enhancing lighting interactions such as detection, energy conversion, multispectral camouflage, and stealth technology.

Team’s work Published in the journal Advanced Photonics.

____

Eric Plum et al. 2025. Optical analogue of black and white gravity holes. Advanced Photonics 7 (2): 025001; doi: 10.1117/1.ap.7.2.025001

Source: www.sci.news

Mysterious ghost particles cause havoc in our high-tech devices.

Being a physicist, I have a deep appreciation for all small particles. Each particle plays a crucial role in the universe, and by studying them, we gain a better understanding of the fundamental laws of nature that govern our existence. However, as a researcher in the field of Dark Matter, I must confess that Neutrinos present a unique challenge.

Neutrinos are elusive little particles. From their inception, they defied all expectations.

Confronted with this dilemma, physicists had two unsatisfactory options: either abandon the conservation of energy or posit the existence of invisible particles that could not be detected by conventional means. They opted for the latter, eventually coining the term “Little Neutral” for these new particles, which possessed no charge and were abundant in quantity.

The absence of charge was the defining feature – without charge, the particles do not interact at all through electromagnetic force. This led physicist Wolfgang Pauli to famously remark, “I have done a terrible thing. I have postulated a particle that cannot be detected.”

Fortunately, Pauli’s skepticism about detectability was proven wrong in the end. Neutrinos, though notoriously resistant to interactions with other particles, do pass through our planet on a daily basis without our notice. It took a truly heroic effort to develop instruments capable of detecting them.

https://www.youtube.com/watch?v=bkcsik4zzby

Even now, we are still struggling to capture neutrinos. The standard detection method involves constructing large water tanks deep underground or filled with other liquids (to shield them from cosmic rays). Each day, researchers anxiously wait for one of the four neutrinos that pass through the Earth to directly collide with an atom underwater.

If such a collision occurs, a flash of light is produced as the charged particles in the water move quickly. This light flash acts like an electromagnetic version of the Sonic boom, encoding information about neutrinos and providing insights into these invisible particles that constantly permeate the Earth.

Read more:

Most of the neutrinos detected on Earth come from the solar nucleus. When hydrogen fuses with helium, neutrinos are produced as by-products. They emanate in all directions as soon as they are generated, mostly unaffected by the sun’s mass, and escape into space.

The reason neutrinos pose a specific challenge to dark matter detectors is their similarity to the hypothetical dark matter particles we seek known as Weakly Interacting Massive Particles (WIMPs). Like neutrinos, these “weakly interacting massive particles” have no charge and can traverse the Earth unnoticed.

If they do interact with other matter, it is through weak nuclear force – the same force that may (albeit rarely) cause neutrinos to interact with the underwater particles in the neutrinoscope. Similar to neutrino detectors, dark matter detectors are situated deep underground to shield them from cosmic rays, designed to register any interactions occurring within the detector with these invisible particles.

The challenge arises from the fact that the dark matter detector has become incredibly sensitive, picking up signals caused by neutrinos. Both types of detectors have now produced evidence of solar neutrinos colliding with target materials. The amount of rock cover cannot adequately shield experiments from neutrinos.

Our estimated 27% of the universe consists of dark matter – Photo Credit: Getty

It may take several decades for a dark matter signal detector unaffected by solar neutrino interference to achieve total clarity. Currently, most detectors are only sensitive to high-energy solar neutrinos, which have been causing complications thus far.

Some physicists are intrigued by the phenomenon of “coherent neutrino scattering” and see it as an opportunity to overcome the challenges of both dark matter detection and neutrino interference. Ultimately, dark matter may be composed of an entirely different substance.

Nevertheless, if dark matter does indeed comprise WIMPs, we will need to think outside the box in our experiments. For those of us delving into the mysteries of the universe’s dark side, the seemingly bright future of neutrinos may blind us to the realities of dark matter.

Read more:

Source: www.sciencefocus.com

AFP defends use of artificial intelligence for searching seized devices

The Australian Federal Police stated that due to the large amount of data being analyzed in their investigation, they have no choice but to rely on artificial intelligence to search through seized mobile phones and other devices, as its use is increasing.

Benjamin Lamont, AFP’s technical strategy and data manager, mentioned that the agency’s surveys contain an average of 40 terabytes worth of data. This includes material from 58,000 referrals per year to the company’s Child Exploitation Center, with a cyber incident reported every six minutes.

“Therefore, we have no choice but to rely on AI,” he stated at the Microsoft AI conference in Sydney.

In addition to participating in the federal trial of Copilot AI assistant technology, AFP is utilizing Microsoft tools to develop its own custom AI for use within government agencies. This involves translating 6 million emails and analyzing 7,000 hours of video footage.

One of the datasets AFP is currently working on is 10 petabytes (10,240TB), with each seized mobile phone potentially containing 1TB of data. Lamont explained that much of the work AFP is looking to use AI for is to structure the files obtained to make it easier for officers to process.

AFP is also developing AI to detect deepfake images and exploring ways to isolate, clean, and analyze data obtained during investigations in a secure and fully disconnected environment. The agency is considering using generative AI to create text summaries of images and videos to prevent officers from being unexpectedly exposed to graphic content.

Lamont acknowledged that AFP has faced criticism over its use of technology, particularly in regards to using Clearview AI, a facial recognition service built on internet photos.

He emphasized the importance of discussing the ethical and responsible use of AI within the AFP, ensuring that humans are always involved in decision-making processes arising from its use. AFP has established an internal Responsible Technology Committee for this purpose.

This article was amended on December 11, 2024 to correct reference to terabytes equivalent to 10 petabytes.

Source: www.theguardian.com

Resisting the Push for “Smart” Devices in My Home: A Tech Journalist’s Battle by Victoria Turk

TThis is one of the battles my husband and I have been fighting ever since we started living together. It’s about whether or not you want to include “smart” appliances in your home. An avid gadget fan, he happily connected all his household items to the internet so he could control them from his mobile phone. As a jaded technology journalist, I’m far too paranoid to have data-hungry surveillance machines around me.

So when I saw a recent article about a seemingly innocuous tool that apparently requires a little too much data, I felt somewhat vindicated. Consumer group “Which one?’ The company found that three of the air fryers it tested were connected to a phone app that requested permission to record audio. This is unlikely to be an important feature for an object whose sole purpose is to cook food. The device also wanted to know the exact location of the user.

To me, there’s no need to connect your air fryer, refrigerator, washing machine, or toaster to the internet, but I can see some merit to the concept. The main advantage of smart home appliances is that they can be controlled remotely. So you can finish a big load of laundry as soon as you get home from work, or check for missing groceries while you’re at the supermarket. However, many of these devices and the apps connected to them collect high levels of personal information with little transparency, despite regulations limiting the data they process.

All smart appliances need to collect some data in order to perform their promised functions. For example, voice activation services require audio access (obviously, some people want to talk to their light switches). However, devices often request more permissions than they actually need or use. Which are the most items? Reviewed also includes smart TVs, speakers, and watches
Connected to a third party tracker Data from your device can be monitored and used for various purposes such as marketing and advertising.

Many of us have a general feeling that technology is collecting more personal data than we are comfortable with. There’s a popular conspiracy theory that social media apps are spying on our private conversations, serving us ads, and secretly using our phones’ microphones to pick up on our consumer desires. I was talking to a friend about the tools I needed for a DIY project when I suddenly came across something. An ad for a power drill appears on your social feed.




“Consumer groups, which one?’ We found that the three air fryers we tested were connected to a phone app that requested permission to record audio.” Photo: Grace Carey/Getty Images

But if that sounds reassuring, all it really shows is that advertisers aren’t. need To listen to your private chatter in order to provide you with advertisements that are relevant to points that you find intrusive. They already have enough other data about you. And now it turns out that the innocent-looking appliance you bought to make dinner doesn’t respect personal boundaries either.

The problem is not just the possibility of eavesdropping. Smart devices can monitor us in all kinds of ways. A smart doorbell might monitor your coming and going from your home, and a fitness watch might track your location at all times. Even seemingly innocuous data collection can reveal more information than you expected. Robot vacuum cleaner can map and share the floor plan of your home. Connected sex toys can reveal your bedroom habits. Running the app could reveal the location of secret military bases. This also creates the possibility of abuse. Domestic abusers used
Smart doorbell, thermostat And even more
kids toys To stalk, surveil, and gaslight their victims.

As more and more things become “smart”, it becomes difficult to resist. My husband managed to sneak a color-changing light bulb into the house with an app, but I drew the line at Ring doorbell. I felt it was excessive to equip the door furniture with eyes and ears.

But in reality, you don’t have to completely avoid smart appliances just to protect your privacy. Despite my groaning, I actually like technology. We all want to use smart devices that make our lives easier without giving up a lot of personal data. In theory, regulations already cover this.
GDPR status What companies must do
be transparent about the data they collect, and
Limit data collection to what you need. But what is “required” is open to interpretation, and even if companies are honest about how they use data, how many people read the fine print when they’re just trying to set up an air fryer? Is it?

The Information Commissioner’s Office (ICO), the UK’s data protection regulator, plans to issue new guidance specifically for smart device manufacturers in spring 2025. Workshops with citizen juries earlier this year found that more people are learning about how smart devices handle personal information. They stopped trusting them. “The overwhelming feeling among participants was that IoT [Internet of Things] Products collect excessive and often unnecessary amounts of personal information.”
said
report We have prepared for the ICO.

This report includes a clearer privacy policy with bullet points and larger text, audio or visual signals that indicate a smart device is collecting information, and data not only during setup but also periodically over the life of the product. Some common sense solutions have been proposed, including collection reminders. Specific and prominent controls to opt-in or opt-out of having your personal data used for advertising.

It’s not exactly rocket science. The problem is that regulations are only effective if they are enforced. Editor, Harry Rose;
point out
to companies operating from other countries.

In the meantime, it might be a good time to check your phone’s settings to see what each app linked to your appliance can access. Or join the ranks of grumpy Luddites like me and think about how smart your kitchen appliances need to be.

Source: www.theguardian.com

Thousands of devices are now online following global outage, according to CrowdStrike; Microsoft IT also affected

An extensive number of the 8.5 million devices affected by the recent global IT outage have been restored online, as reported by the cybersecurity company involved in the incident.

CrowdStrike mentioned that they are currently experimenting with technology to expedite the rebooting process of systems, while experts caution that recovering fully from the IT outage last Friday might take several weeks.

During the incident, numerous flights were canceled, broadcasters went off-air, medical appointments were disrupted, and countless PCs failed to boot after a CrowdStrike software update unintentionally caused devices using the Microsoft Windows OS to malfunction.

CrowdStrike posted updates on social media outlining the progress in resolving the glitch. According to an expert, this incident caused “the biggest IT outage in history.”

The US company stated, “A substantial number of the roughly 8.5 million Windows devices affected are now operational and back online.”

CrowdStrike remains focused on restoring all systems as quickly as possible, and of the approximately 8.5 million affected Windows devices, a significant number are back online and operational.

Working with our customers, we tested new techniques to accelerate the affected areas…

— CrowdStrike (@CrowdStrike) July 21, 2024


CrowdStrike mentioned ongoing tests for new methods to speed up the repair process of impacted systems, aiming to make this technology accessible to businesses and organizations.

Australia’s Home Affairs Minister confirmed that CrowdStrike plans to implement an automated fix similar to Microsoft’s to address this issue in an upcoming update.

Experts cautioned that affected computers might require manual repairs and could face prolonged restoration times since the outage.

Over 1,500 flights were canceled in the US for a third consecutive day, with Delta Airlines in Atlanta particularly struggling, while 45 flights were canceled in the UK on Saturday.

Ed Bastian, the CEO of Delta Air Lines, stated that critical applications within the airline’s IT systems were impacted by the issue. He mentioned that crew tracking-related tools were affected, causing difficulty in managing the high number of changes due to the outage.

Ryanair, Europe’s largest airline, canceled 400 flights over the weekend primarily due to an IT issue.

Skip Newsletter Promotions

NHS England in the UK issued warnings about potential delays as they work on restoring the health service from the outage. They advised patients with appointments to attend unless instructed otherwise.

The British Medical Association mentioned that regular GP services might not resume immediately due to significant IT-related delays.

An NHS spokesperson stated, “The system is back online now, and with the dedicated efforts of NHS staff, we hope to minimize any further disruptions. However, please expect some delays as services are being restored, especially with GPs needing to reschedule appointments.”

Pharmacy services in the UK are anticipated to be slower than usual as the recovery process continues.

Nick Kaye, president of the National Pharmacists Association, urged customers to be patient as local pharmacies work through the backlog of prescriptions caused by the IT outage last week.

Source: www.theguardian.com

Is AI Coming to Apple Devices? The Safety Concerns

During its annual developers conference on Monday, Apple introduced Apple Intelligence, an eagerly anticipated artificial intelligence system designed to personalize user experiences, automate tasks, and, as CEO Tim Cook assured, set “a new standard of privacy in AI.”

Although Apple emphasizes that its AI prioritizes security, its collaboration with OpenAI has faced criticism. The service, launched in November 2022, has raised privacy concerns by collecting user data for model training without explicit consent. Users will have the option to opt out of this data collection starting in April 2023.

Apple has assured that its collaboration with ChatGPT will be limited to specific tasks with explicit user consent, but security experts remain vigilant about how these concerns will be addressed.

Late to the game in generative AI, Apple has trailed behind competitors like Google, Microsoft, and Amazon, whose AI ventures have boosted their stock prices. Apple has refrained from integrating generative AI into its main consumer products.

Apple aims to apply AI technology responsibly, building Apple Intelligence products over several years using proprietary technology to minimize user data leakage from the Apple ecosystem.

AI, which requires vast data to train language models, poses a challenge to Apple’s focus on privacy. Critics like Elon Musk argue that it’s impossible to balance AI integration and user privacy. However, some experts disagree.

“By pursuing privacy-focused strategies, Apple is leading the way for businesses to reconcile data privacy with innovation,” said Gar Ringel, CEO of a data privacy software company.

Skip Newsletter Promotions

Many recent AI releases have been criticized for being dysfunctional or risky, reflecting Silicon Valley’s “move fast and break things” culture. Apple seems to be taking a more cautious approach.

According to Steinhauer, “Historically, platforms release products first and address issues later. Apple is proactively tackling common concerns. This illustrates the difference between designing security measures upfront versus addressing them reactively, which is always less effective.”

Central to Apple’s AI privacy measures is its new private cloud computing technology. Apple intends to conduct most computing internally for Apple Intelligence features on devices. For tasks requiring more processing power, the company will outsource to the cloud while safeguarding user data.

To achieve this, Apple will only share the data necessary for each request, implement additional security measures at endpoints, and avoid long-term data storage. Apple will also open tools and software related to its private cloud for third-party verification.

Private cloud computing represents a significant advancement in AI privacy and security, according to Krishna Visnubotra, VP of product strategy at Zimperium. The independent audit component is particularly noteworthy.

Source: www.theguardian.com

Enhancing Quantum Communication Devices with Liquid Crystals

Quantum light is generated when a laser is shone on certain crystals

Jaka Waxwing

The liquid crystals found in television screens have made it easy to produce quantum light.

Light, with its quantum properties, is important for many future technologies: such entangled particles in light could help build quantum communication networks that support an unhackable internet, as well as quantum imaging techniques for biomedical applications. Matyas Humar Despite these advanced applications, the method for generating quantum light has remained largely unchanged for 60 years, says a researcher at the Jozef Stefan Institute in Slovenia. He and his colleagues have devised a way to generate quantum light using liquid crystals.

Team Members Vitaly Sultanov Researchers at the Max Planck Institute in Germany say that traditionally, researchers shine a laser on special crystals to make them emit quantum light. In this technique, the structure of the crystal determines the properties of the light it emits, which in turn determines how it can be used. The only way to change these properties is to redo the experiment with new crystals, which is costly, time-consuming and impractical.

To get around this, the researchers used liquid crystals, a material made of rod-shaped molecules that can wobble like a liquid but adopt unusual arrangements like more conventional crystals. By exposing the liquid crystal to an electric field, they can tune its structure, and thus the properties of the quanta of light it emits when illuminated with a laser.

“In this respect, liquid crystals are the perfect material,” says Sultanov.

After several experiments, his team found that liquid crystals were much easier to tune than solid liquid crystals, and nearly as efficient at producing light filled with entangled particles.

“While the generated photons could conceivably have been produced using conventional crystals, the tunability of the entanglement could not,” he said. Miles Padgett “These advances are [quantum] “Imaging, Communication, Sensing”

Maria ChekhovaResearchers, also from the Max Planck Institute, say that using liquid crystals in quantum communication devices could make it easier to send information over multiple channels at once, because the liquid crystals can be tuned to produce quantum states of light that can encode large amounts of information in many of their properties.

topic:

Source: www.newscientist.com

Utilizing Quantum Forces for Automated Assembly of Small Devices

Triangular gold flakes can be manipulated using mysterious quantum forces

George Zograf

A tiny gold device for controlling light is built using strange quantum effects hidden in seemingly empty space.

In 1948, physicist Hendrik Casimir theorized that when objects are brought close together in space, some objects experience a very weak gravitational pull due to imperceptible flickering of quantum fields in the gaps between them. Ta. Researchers then confirmed this Casimir effect in the laboratory. Betul Kyucukoz and his colleagues at Sweden’s Chalmers University of Technology have found a way to make this useful.

They wanted to build a cavity that would trap the light using two pieces of gold placed parallel to each other, so that the light would bounce back and forth between them and would not be able to escape. First, we created the bottom edge of the cavity by transferring triangular gold flakes ranging in size from 4 to 10 microns onto a small piece of glass. The top end of the cavity also contained a triangular gold flake, but instead of holding it in place with an instrument, the researchers attached it to the glass in a salt water solution containing an additional triangular gold flake. The gold flakes were then dipped in and then allowed to develop. Instead, work naturally.

One of those forces was the electrostatic force caused by the charge associated with the dissolved salt. Another is the Casimir effect. Kyuchkoz said he observed the experiment under the microscope many times and could always see the Casimir effect in action. This causes the floating gold flakes to move towards the gold flake where one is imprinted on the glass, and then he moves over the imprinted gold flake until the triangular footprints of the two flakes match. It was rotated.

This completes the assembly of a cavity that can trap light. The researchers were able to significantly control the cavity formation process, Kyucukoz said. For example, by using different concentrations of salt, we can adjust the strength of the electrostatic force so that the distance between the flakes is different for each cavity, creating cavities with slightly different dimensions of 100-200 nanometers. It can trap colored light.

Raul Esquivel Sirbento The professor at the National Autonomous University of Mexico said the idea of self-assembly, likened to throwing a Lego set into a pot and a structure emerges without having to manually press the pieces together, is not new. But he said his team’s experiment was more detailed and controlled than previous attempts to exploit the Casimir effect for similar purposes. But the Casimir effect can be very subtle, so there may be other effects here as well that haven’t been detected yet, Esquivel Servent said.

In the future, Küçüköz and his colleagues hope to use the cavity as part of more complex experiments with light, such as placing objects inside the cavity between two gold flakes.

topic:

Source: www.newscientist.com

Introducing Aethir Edge Devices: Powered by Qualcomm, Revolutionizing Distributed Edge Computing for the Future

Singapore, Singapore, April 18, 2024, Chainwire

  • At a Dubai press conference, Aethir Edge debuted as a pioneering edge computing device and first licensed mining machine from Aethir, one of the industry's leading distributed cloud computing infrastructure providers alongside Qualcomm. This will allow the user to mine his 23% of Aethir's native token $ATH supply. Integrated with a decentralized cloud network to overcome the barriers of centralization, his Aethir Edge combines unparalleled edge computing capabilities, decentralized access, and exclusive benefits.

The future of distributed edge computing is here. Ethil debut Esil Edge, Token 2049 was supported by Qualcomm technology at an official press conference in Dubai. Aethir Edge spearheads the evolution to decentralized edge computing as the first sanctioned mining device integrated with decentralized cloud infrastructure, delivering elite GPU performance, 23% of Aethir's native token $ATH supply, and equity Access everything on one device.

Enter the multi-trillion computing market

The edge computing sector is rapidly evolving into a multi-trillion dollar industry, but for too long edge capacity has been siled into centralized data centers. Aethir Edge breaks through these barriers with a breakthrough architecture that interconnects high-performance edge AI devices into a distributed cloud network. By pooling localized resources, Aethir Edge brings elite computing power home and makes it accessible to everyone.

Computing power holds immense potential as an energy source for the digital realm. Aethir Edge, with support from Aethir and Qualcomm, leverages this power and takes it to the next level. Aethir Edge's vision is to fundamentally transform how users access, contribute to, and own a future that transcends the constraints of centralized networks and unleashes the full potential of edge AI technologies. Aethir Edge represents the beginning of this user-driven decentralized evolution.

The first and only certified mining device by Aethir

Aethir Edge, Aethir's only whitelisted mining product, allows users around the world to take advantage of exclusive benefits and share their spare bandwidth, IP addresses, and computing power. You can earn income. With its authorized status, Aethir Edge reserves up to 23% of the total supply of its native token $ATH for mining potential.

“We are excited to support this innovative convergence of decentralized cloud, edge infrastructure, and fair incentives,” said Mark Rydon, co-founder of Aethir. “Aethir Edge is pioneering community-powered edge computing technology through rugged hardware, proprietary mining, and Aethir’s decentralized cloud network.”

When unparalleled edge computing power meets open accessibility

Powered by the Qualcomm® SnapdragonTM 865 chip, Aethir Edge delivers superior performance for data-intensive workloads. 12GB LPDDR5 memory and 256GB UFS 3.1 storage ensure ample resources for smooth parallel processing. Distributed architecture ensures reliability and uptime by distributing capacity across peer nodes, overcoming the vulnerabilities of centralized networks.

“I am very pleased to congratulate the Aethir team on the launch of their next-generation products targeted at distributed edge computing use cases and, more importantly, powered by Qualcomm Technologies and Qualcomm processors. ,” said Qualcomm's vice president and head of enterprise development. and industrial automation. “We are very proud to work with partners like Aethir to advance our edge capabilities.”

Aethir Edge seamlessly interoperates with a variety of applications and delivers ultra-low latency through localized processing. Users around the world can access optimized experiences regardless of their location.

The backbone of innovation in the decentralized cloud ecosystem

As a core component of Aethir's decentralized cloud, Aethir Edge powers innovative new products such as the APhone, the first decentralized cloud smartphone. Localized edge capabilities enable implementation and operation across gaming, AI, VR/AR, real-time streaming, and many other applications.

“Aethir Edge perfectly complements APhone's mission to make Web3 available to everyone. APhone brings high-performance gaming, AI, graphics rendering, and more to every smartphone user around the world through a virtual OS. ” – William Peckham, APhone Chief Business Officer.

Democratize access to the future of edge computing

Aethir Edge spearheads a decentralized infrastructure that is owned and managed by users, rather than a centralized organization. This makes high-performance computing available as an elegant, easy-to-use product that is integrated with profitability. Featuring superior enterprise-grade hardware and distributed cloud infrastructure, Aethir Edge leads the transition from centralized data monopoly to the unbiased edge environment of the future.

Aethir Edge is currently actively building partnerships with distributors around the world, including crypto mining companies, hardware vendors, and distributors. If you are interested, please fill out Aethir Edge. Sales agent application form In doing so, teams can explore win-win opportunities to distribute products together and shape tomorrow's landscape through community power.

Users can visit www.myedge.io Be one of the first to unlock distributed edge computing power.

About Ethyl Edge

Esil Edge is an enterprise-grade edge computing device integrated with Aethir's distributed GPU cloud infrastructure, ushering in a new era of edge computing. As Aethir’s first and only licensed mining device, we combine powerful computing, exclusive revenue, and decentralized access into one device, unlocking the true potential of DePIN.

Website | documentation | twitter

About Esil

Ethil is a cloud computing infrastructure platform that revolutionizes the ownership, distribution, and usage paradigm of enterprise-grade graphics processing units (GPUs). By moving away from traditional centralized models, Aethir has deployed a scalable and competitive framework for sharing distributed computing resources to serve enterprise applications and customers across various industries and geographies.

Aethir is revolutionizing DePIN with its highly distributed, enterprise-grade, GPU-based computing infrastructure customized for AI and gaming. He has raised over $130 million in funding for the ecosystem, backed by major Web3 investors including Framework Ventures, Merit Circle, Hashkey, Animoca Brands, Sanctor Capital, and Infinity Ventures Crypto (IVC). , Aethir is paving the way for his Web3 future. distributed computing.

Website | documentation | twitter | discord | telegram | linkedin

contact

marketing leader
diksha
Ethil
diksha@aethir.com

Source: the-blockchain.com

British Safety Council’s findings reveal that AI safety devices are easily susceptible to breaches

The UK’s new Artificial Intelligence Safety Authority has discovered that the technology can mislead human users, produce biased results, and lacks safeguards against the dissemination of harmful information.

Announced by the AI Safety Research Institute, initial findings of research into advanced AI systems, also known as large language models (LLMs), revealed various concerns. These AI systems power tools like chatbots and image generators.

The institute found that basic prompts can bypass LLM safeguards and be used to power chatbots such as ChatGPT for “dual-use” tasks, which refers to using a model for both military and civilian purposes.

According to AISI, “Using basic prompting techniques, users were able to instantly defeat the LLM’s safeguards and gain assistance with dual-use tasks.” The institute also mentioned that more advanced “jailbreak” techniques could be used by relatively unskilled attackers within a few hours.

The research showed that LLM models can be useful for beginners planning cyberattacks and are capable of creating social media personas for spreading disinformation.

When comparing AI models to web searches, the institute stated that they provide roughly the same level of information, but AI models tend to produce “hallucinations” or inaccurate advice.

The image generator was found to produce racially biased results. Additionally, the institute discovered that AI agents can deceive human users in certain scenarios.

AISI is currently testing advanced AI systems and evaluating their safety, while also sharing information with third parties. The institute focuses on the misuse of AI models, their impact on humans, and their ability to perform harmful tasks.

AISI clarified that it does not have the capacity to test all released models and is not responsible for declaring these systems “secure.”

The institute emphasized that it is not a regulator but conducts secondary checks on AI systems.

Source: www.theguardian.com

Privacy Concerns Rise as Smart Devices Gain Popularity in Australian Homes

Do you have any smart devices or home appliances that can be controlled remotely in your house? These devices have become a common feature in modern homes over the past decade, offering convenience but also raising concerns about privacy. These smart devices collect, share, aggregate, and analyze data, posing potential risks to personal information. According to Katherine Kemp, an expert in law and data privacy, privacy laws in Australia are not up to date, which is a global concern. The information collected by smart devices can be used for targeted advertising, and it’s unclear where this data ends up.

While smart devices offer benefits such as environmental friendliness, Kemp believes that their main purpose is to collect and sell more information rather than promoting environmental sustainability. There’s a concern that companies use this data for targeted advertising and other commercial purposes, potentially creating detailed profiles of individuals.

Concerns about privacy and consent models have been raised by Sam Floreani, the policy director at Digital Rights Watch. The collection and use of data depend on underlying incentives, and it’s essential for individuals to fully understand the implications of sharing their data. He also mentioned the need for improving consent laws and rights around personal data.

Australia’s current privacy laws require consent, but customers are not always given the right information to make informed choices. The government is planning an overhaul of the law to bring it into the “digital age” and strengthen enforcement powers for privacy watchdogs.

Convenience and privacy

Some argue that sacrificing privacy for convenience is worth it, especially if it improves accessibility. For the visually impaired community, smart devices play an important role in reducing social isolation. However, concerns remain about the trade-off between convenience and privacy.

“That’s too tempting.”

Early concepts of smart homes focused on collecting data solely for the occupants’ purposes. However, the potential for lucrative behavioral advertising services led to a shift in the use of this data. Changes in privacy laws are needed to establish stricter standards for how companies behave regarding smart devices.

Source: www.theguardian.com

Well actually, I’m unsure of how to address my bad habits of drinking beer, vaping, and constantly scrolling on my electronic devices. Any advice on what to do?

BIt's easy to feel a kinship with pop star Selena Gomez, considering her 430 million Instagram followers, reported net worth of $800 million, and close relationship with Taylor Swift. rare. However, 11 days have passed since the new year started, heading “Selena Gomez returns to Instagram, 18 hours after announcing social media hiatus.''

I feel extra conscious of my bad habits – probably due to my depressed body evidence suggests We usually give up on our New Year's resolutions by mid-January.

Info about Selena Gomez

It's not even noon yet and I've spent 45 minutes on Instagram today. She drank two cups of coffee, but I can't rule out the possibility of a third one. My mild headache is a solemn reminder that I ended up having three drinks last night after a sudden hinge date ruined my plans for a quiet evening. And I just took a small swig from her nearly empty vape, which I had vowed to buy one last time.

At least I'm not eating sugar yet.

As you can see, I'm ambivalent about what I consider to be my vices, and I'm more or less attached to them. Most of the time I can ignore them as reliable pleasures in life and they are reasonably tolerable. But peer pressure to be better is always insidious and becomes especially acute at the beginning of a new year..

My newsfeed is full of stories about financial goal setting, improving fitness, non-alcoholic drinks, and sugar substitutes. Friends are pledging to spend the month of dry January taking 10,000 steps a day and cutting out junk food. On the other hand, I think I may be missing out on the tricks of the trade by missing out on the opportunity for a fresh start.


“hand“At this time of year, the focus is on what to start doing and what to stop doing,” says the counselor. georgina starmer. She links it to the excesses of the just-past Christmas season: What do you change? ”

But the flip side of this focus on self-improvement is the need for self-monitoring. We become more aware of our supposed flaws and shortcomings, which may not be particularly harmful and may even bring us joy.

… (content continues)

Source: www.theguardian.com

TikTok introduces upgraded app experience for tablets and foldable devices

TikTok has rolled out updates that enhance the app experience for viewers on tablets and foldable devices, the company announced Monday. The app has been optimized for larger screens, so viewers can now experience a crisper video feed, streamlined navigation bar, and orientation support.

With the new update, users will see a polished video feed that “presents content more clearly.” Additionally, navigation bars at the top and bottom of the screen provide easy access to app features and tabs.

The app now works in landscape or portrait orientation. Today’s announcement comes a year after TikTok began testing horizontal full-screen mode on mobile worldwide. TikTok is already pushing further into YouTube territory by rolling out landscape mode on larger devices and supporting longer videos. The company’s support of long-form content makes it sensible to enhance the viewing experience for users watching things like cooking demos and beauty tutorials on tablets. The company hopes this new mode will persuade people who normally watch YouTube on their tablets to spend their time on TikTok instead.

“While most people already know and love TikTok on their mobile devices, we know that many people prefer accessing TikTok on larger screens and foldable devices,” the company said in a blog post. “Whether you’re looking for the latest cooking trends or searching for the latest soccer highlights, we’re excited to share that TikTok is now even more optimized for tablets and foldable gadgets.”

TikTok’s optimization for foldables and tablets comes at a time when one of its main competitors, Instagram, still lacks an iPad app. By rolling out updates to its app experience on larger devices, TikTok can surpass its mobile-first approach at a time when competitors are still lagging behind.

Source: techcrunch.com

“Handheld Devices: More Popular than Ever as Christmas Gifts” – Science and Technology Update

Twenty-five years ago, Nintendo’s Game Boy Color was at the top of the Christmas list for many. This iconic mobile device, launched in November 1998, featured classic games like Pokemon, Super Mario Land, and Tetris, and became one of the most successful gaming consoles ever created, with approximately 120 million units sold.

Although the rise of smartphones and games like Candy Crush temporarily overshadowed portable gaming devices, dedicated fans continued to be drawn to the power of consoles and PCs. However, it seems that the mobile device market is healthier than ever this Christmas season.

Nintendo’s Switch, which was released about seven years ago, continues to sell well, with sales exceeding 130 million copies. Inspired by the success of the Switch, Valve released the Steam Deck, a portable gaming device that allows games that were once exclusive to consoles and computers to be taken on the go. Valve has also announced a new model for the Christmas sales season, the Deck OLED, which boasts a better screen, battery life, and lightweight construction.

This handheld gaming craze has expanded beyond Switches and decks to include rivals such as the Asus ROG Ally and Lenovo Legion Go. According to engineer Lawrence Yang, this marks the beginning of a new handheld game console category, where the line between games played at home and games played on the go is blurring.

In addition to these advancements, cloud gaming services like Google Stadia, and streaming services such as Netflix are also making it easier for gamers to access their favorite titles from anywhere.

Leading console makers Sony and Microsoft are also paying attention to the increasingly popular handheld gaming trend, with Sony launching the Playstation Portal and Microsoft’s Xbox Game Pass becoming more accessible. Additionally, services like Antstream are offering over 1,400 retro titles available on multiple platforms.

It’s clear that the convenience and accessibility of handheld gaming devices are appealing to many, making it possible to play games on the go without compromising on graphics or gameplay.

Source: news.sky.com