Weaver Ant chains can easily surpass all other creatures.
Weaver Ants (Oecophylla smaragdina), found from India to northern Australia, create long chains to gather leaves and construct nests. They grip one another by holding onto the abdomen of the ant in front using their mandibles.
To assess their strength, Chris Reed from Macquarie University in Sydney and his team provided the Weaver Ants with paper leaves instead of real ones for nesting. They attached a transducer to the tip of the paper leaf to measure the force exerted by a group of up to 17 ants while rolling the paper.
Researchers discovered that individual ants could generate an average pulling force of 60 times their body weight, while in teams of 15, each ant was capable of pulling over 100 times their weight. Consequently, the average power contribution per ant nearly doubled in group settings.
This finding seemingly contradicts the well-established principle of teamwork known as the Ringelmann effect, which posits that larger groups tend to diminish individual productivity due to loss of coordination and motivation.
The researchers did not calculate how Weaver Ants compare to humans in terms of strength, but Reid noted that even without scaling up to human size, they would pose formidable opponents in a tug-of-war. “Even a guinea pig-sized Weaver Ant could outpull a human,” he remarked. “Their key advantage lies in having six legs, which provides excellent traction.”
This might explain their ability to counteract the Ringelmann effect, according to Reid. The precise mechanism behind their collective strength remains unclear, but one theory suggests that some ants are anchored to the ground while others are pulling, effectively creating a force ratchet.
“When comparing Weaver Ants with other species, their ability to exert force on the ground is extraordinarily high, significantly surpassing that of other ants,” Reed stated.
Insects and Ecosystem Expedition Safari: Sri Lanka
Embark on a journey to the heart of Sri Lanka’s diverse biodiversity on this unique entomology and ecosystem-focused expedition.
The technology sector is engaged in an intense competition to lure artificial intelligence experts with increasingly lucrative salaries and hefty signing bonuses. Researchers holding doctoral degrees in computer science are at the forefront of this battle, often dubbed “talent.” The Washington Post recently referred to them as Olympians in a headline that asks, “Why are AI superathletes commanding $100 million bonuses in Silicon Valley?” These individuals are the most sought-after professionals globally.
High-tech firms are investing heavily in AI team star players who can create technologies surpassing human capabilities. These innovations aim to yield AI models known as “artificial general intelligence” or “super intelligence,” which outperform human intellect in every task.
In the pursuit of these coveted advancements, Silicon Valley is pouring money that could potentially establish a legacy. The race for talent is so intense that stories about the poaching of individual researchers are making headlines, as seen in Wired: “Another well-known OpenAI researcher joins Meta,” and Bloomberg: “Meta recruits two prominent Apple AI experts after hiring their boss.” The Information also reported, “Humanity has hired two leading coding AI experts from the cursor developer Anysphere.” All these stories emerged just last week.
The tech press’s fixation on these researchers resembles the sports media’s coverage of star player trades. Analysis of their salaries, speculation about upcoming moves Meta’s roster, discussions about team composition or overall strategy, and scrutiny of individual players echo the basketball trade phenomena from the Dallas Mavericks to the Los Angeles Lakers.
The term “another” in the Wired headline hints that one company is driving this frenzy—Meta. Mark Zuckerberg has made headlines recently by stating his company would invest “hundreds of billions” in AI initiatives. In April, Meta adjusted its capital expenditure plans for this year from $640 billion to $75 billion, an increase from the previous estimate of between $600 billion and $65 billion. In 2023, Meta only allocated $28 billion for maintenance, as noted by Fortune.
Zuckerberg is backing his commitment with cash. In early July, Meta hired Ruoming Pang, the head of Apple’s AI modeling team, for a staggering pay package amounting to around $200 million. Pang is set to join Meta’s super intelligence team, which may be the most expensive engineering group since the Manhattan Project.
The current trade frenzy is encapsulated in Nvidia CEO Jensen Huang’s remarks about half of the world’s leading AI researchers last week. He made these comments while in Beijing, during a meeting celebrating Donald Trump’s recent allowance for Huang’s extremely profitable company and a new permit to sell advanced semiconductors to China. Previously, the export of Nvidia chips faced tight restrictions. Huang’s remarks highlight the fact that American companies are investing in a pool of English-speaking talent, which still stands out in competition across the Pacific, regardless of the substantial salaries offered by high-tech giants.
Alternatives to iPhones and Samsungs vie for your attention
Photo: Samuel Gibbs/The Guardian
In recent years, several companies have launched mobile phones aimed at providing alternatives to the industry’s biggest players. Some of these companies are capitalizing on a rising unease regarding smartphones’ grip on our daily lives or simply seeking to challenge the prevailing dominance.
One intriguing option is a recently released device in the UK by Sage Mobile. This iPhone 16 variant comes with customized software that prohibits internet searches, gaming downloads, and social media apps like Instagram. British technology editor Robert Booth notes that these bespoke phones are sold at over twice the price of standard UK iPhone contracts, targeting children with the promise of “reconnecting with real life.”
This device includes a curated app store, enabling users to access apps for banking, public transport, school calendars, and weather updates.
Based on experiences with similar devices in the US, usage among children aged 8 to 14 averaged just 15 minutes to an hour per day—significantly less than the average screen time of 3 hours. Kaspar remarked, “It’s not magic and isn’t that fun,” leading to disinterest among kids and resulting in many devices ending up in landfills.
A 16-year-old anonymous reviewer shared their experience with the Guardian, highlighting how using Sage underscored their dependency on various apps and social media platforms. Although they felt more productive and engaged with family, creating a clean division between online and offline life proved to be more complex than merely blocking apps.
Sage’s representatives mentioned that it can take about a month to adapt to these limitations. However, teens may feel isolated from their friends and society, which is perceived as unjust. Having TikTok and Instagram is the norm today, and stepping back from these platforms can make it challenging to stay connected.
Should I continue using this phone, I would likely feel excluded when discussing how many of our jokes and cultural references originate from those platforms.
The London-based company Nothing also aims for a different approach with its Phone 3. This device features a quirky design, including a small LED screen on the back of a translucent case, rather than being a stripped-down version of an iPhone or Android.
Constructed on a Nothing version of the Android operating system, the Phone 3 incorporates many interesting features while striving to differentiate itself from the ubiquitous offerings of Apple and Samsung. Consumer Technology editor Samuel Gibbs provided a four-star review, stressing the importance of its unique attributes for justifying its value.
While the Phone 3 is impressive for Nothing, it may not outperform standard Android devices. It stands out from competitors but requires a desire for something distinctive to appreciate its offerings, given that more affordable devices provide comparable or superior performance.
Photo: AP
In his commitment to invest hundreds of billions of dollars in AI, Zuckerberg disclosed plans for a data center comparable in size to Manhattan. Meta’s sprawling complex, fueled by similarly vast financial outlays, has been named Hyperion, after the Greek Titan symbolizing the sun. Zuckerberg’s second smaller data center is named Prometheus, after the Titan punished for bringing fire and sacred knowledge to humanity. Is this data center a boon for us? Or, as the creators of AI, are we destined to face consequences? The emotions evoked by these names reflect Zuckerberg’s grand ambitions. The famous novel Frankenstein has another notable title that seems relevant: Modern Prometheus.
Google is also expanding its undertakings, planning to invest $3 billion in hydropower and $25 billion in data centers across Pennsylvania and neighboring states within the next two years. Apple is making its mark with a $500 million deal for rare earth minerals, investments that have drawn scrutiny from US mining companies.
Scenario crafted in Hollywood now reflects a genuine threat: the potential for hackers to seize control of vessels remotely and instigate crashes. Yet, in the security operations hub in Oslo, maritime cyber specialists situated mere meters from the luminous fjords and their tourist boats, floating saunas, and wet bathers assert that such occurrences are not only feasible, but imminent.
“We’re certain this will eventually happen, hence our vigilance,” states Øystein Brekke-Sanderud, Senior Analyst at the Nordic Maritime Cyber Resilience Centre (Norma Cyber). Behind him, a dynamic map displays the fleet they monitor, accompanied by a screen brimming with graphs and codes. Two small rubber ducks observe the passing minutes.
In an unstable global landscape, transportation networks, ports, and terminals have garnered heightened strategic significance as potential targets for infrastructure disruption and espionage—especially pertinent in Scandinavian nations that share maritime boundaries with Russia.
Finland and Sweden are NATO members now, with all countries enhancing their defensive postures amid escalating concerns over hybrid threats and warfare.
A digital map that tracks ship locations globally via Norma Cyber. Photo: Sara Aarøen Lien/The Guardian
As ships become increasingly digitalized, the opportunities for cyber breaches expand, indicating an urgent need to mitigate the complexities of AI tools and intricate systems.
Oslo Harbor serves as the command center where maritime cyber specialists assess global ship threats. Photo: Carl Hendon/Getty Images
“These vessel systems are incredibly intricate, making them tough to manipulate. However, AI accelerates everything,” explains Brekke-Sanderud. “How does this part function? Can I locate a password amidst this dense manual?”
Stationed at the Norwegian Shipowner Association’s headquarters along the quay of the Norwegian capital, Norma Cyber collaborates with the Norwegian Shipowner’s Risk Insurance Association (DNK).
Two years ago, these organizations united to create a Maritime Security and Resilience Centre, which surveys global threats ranging from warfare and terrorism to intellectual property violations—both physical and digital. They also conduct this work on behalf of the Norwegian government.
Norma Cyber Staff, featuring Managing Director Lars Benjamin Vold, Analyst Øystein Brekke-Sanderud, and Chief Technology Officer Øyvind Berget. Photo: Sara Aarøen Lien/The Guardian
While it is technically feasible to crash a vessel from afar, hackers aiming to sow chaos don’t necessarily need such extreme measures. According to Norma Cyber Managing Director Lars Benjamin Vold, merely halting the vessel’s operations could result in significant system failures.
Emerging evidence suggests that nations may exploit these vulnerabilities against maritime adversaries.
Oil tanker discharging ballast water is one of the vulnerabilities targeted in cyber attacks. Photo: Island Stock/Aramie
Reports indicate that Iran is investigating methods to deploy cyber assaults to disrupt ballast systems—a threat to both ships and satellite networks. An unprecedented hack occurred in April, targeting 116 Iranian VSAT modems used for satellite communications across vessels.
“When discussing nation-states, it is about their willingness to act,” Vold states. Potential “threat actors” such as Russia and China possess substantial capabilities, though these depend on their strategic objectives, which may shift rapidly.
Consequently, while threat levels remain relatively stable, maritime vulnerabilities are on the rise. “The avenues for potential exploitation are multiplying as the sector grows more digital,” Vold remarks.
Norma Cyber has also pinpointed civilian vessels, including fishing boats, research ships, and cargo carriers, used for espionage within the Baltic, North Atlantic, and Arctic regions. China-linked threat actors are reportedly using USB devices to infiltrate maritime systems, such as those from Mustang Panda.
Last year, Norma Cyber documented 239 significant cyber attacks within the maritime sector, attributing the majority to the pro-Russian group NonAME057 (16).
Svein Ringbakken, managing director of DNK’s Oslo office. Photo: Sara Aarøen Lien/The Guardian
Curiously, the rising dependence on digital technology creates a greater demand for traditional navigation skills. Following disruptions to the Baltic satellite navigation system, Finland accused Russia of being the instigator. “An experienced sailor serves as the best protection,” Vold asserts.
Yet, alongside the unseen threats of the digital realm, the maritime industry grapples with unprecedented physical challenges. Vladimir Putin’s shadow fleet, comprised of hundreds of unregulated vessels, poses a growing risk to environmental safety and the global shipping framework as it transports sanctioned crude oil primarily to China and India.
This Shadow Fleet consists of aging oil tankers obscuring their identities to evade Western sanctions. Estimates of its size range between 600 to 900 vessels according to various sources.
Finnish authorities scrutinized the Russian Shadow Fleet Oil Tanker Eagle in December 2024 due to suspected interference with power cables. Photo: Finland Border Guard/AFP/Getty
Internal threats to ships can also arise from within. Engines, elevators, and water purification systems are all vulnerable targets on board vessels. Moreover, 15% of the global crew consist of either Ukrainian or Russian members. The composition of both crews has taken on new significance since the onset of Russia’s invasion of Ukraine.
“The presence of a Russian captain on a ship delivering aid to Ukraine certainly raises concerns,” says Svein Ringbakken, managing director of DNK. “These are sensitive issues that the industry is currently addressing.”
Rhine Falkenberg Orstad, an advisor to the Norwegian Shipowner Association and an expert on the Russian Shadow Fleet. Photo: Sara Aarøen Lien/The Guardian
Rhine Falkenberg Orstad expresses concern that the increasing presence of the Shadow Fleet could foster a “parallel fleet” comprised of crew members uninformed about the intentions at sea.
If one of these vessels experiences an environmental mishap, it poses a risk to Norway’s coastline, she warns. Some ships noted as sanctioned by the US remain operational, with many being at least 15 years old. “Our apprehension is that the situation is deteriorating.”
Another significant query remains: has the entire situation permanently shifted?
“Is the shadow fleet operating outside of Western jurisdiction a new norm? Or can this trend be reversed?” Ollestad ponders. “The answer remains elusive.”
The rubber ducks maintain a vigilant watch over the security operations room at Norma Cyber. Photo: Sara Aarøen Lien/The Guardian
The CEO of BBC News announced plans to create new departments that utilize AI technology to provide more personalized content to audiences. This strategic move comes in response to the evolving landscape of news consumption, where businesses must adapt to reach their target demographic effectively.
In a memo to staff, CEO Deborah Turnness outlined a reorganization plan that includes the establishment of BBC News Growth, Innovation, and AI division. This shift aims to cater to the younger demographic, particularly those under 25, who predominantly consume news through platforms like smartphones and TikTok.
Turnness emphasized the need for companies to address challenges such as news avoidance, increased social media news consumption, digital competition, and decline in traditional broadcasting. The implementation of AI will enable the curation of content tailored to the preferences of mobile users accustomed to social media consumption.
She stressed the importance of understanding audience needs and delivering content that aligns with their preferences while leveraging AI technology to enhance innovation and growth.
While AI plays a significant role in streamlining news delivery, concerns have been raised regarding the accuracy and reliability of AI-generated content. Companies have pledged to uphold public service values and ensure that AI aligns with editorial standards of accuracy, fairness, equity, and privacy.
Turnness mentioned the restructuring of BBC News to broaden audience reach, eliminate traditional silos within the newsroom, and enhance content distribution across various platforms. The creation of BBC Live and Daily News division signifies a shift towards a more integrated approach to news production.
Turnness underscored the importance of adapting to the digital environment and evolving audience preferences to remain competitive in the industry. The appointment of a director for the growth, innovation, and AI departments will ensure strategic investments and innovations are tested and implemented effectively.
Kadena SpireKey is a human-friendly and secure way to seamlessly interact with any application by eliminating complex signing processes.
Kadena Spire Key
“Unlike today’s complex Web3 wallets that require you to remember every wallet you’ve ever created, Kadena’s SpireKey uses WebAuthn, a technology developed by Google and Apple over the past 20 years, to Make digital assets securely available to anyone directly on their phone or computer. It’s as easy as receiving a prompt on your mobile device and providing your fingerprint as a signature. Family Holiday Dinner Even your uncle who asks you about cryptocurrencies every time can do it. Kadena makes the application accessible to everyone, whether you’re an experienced “degener” or someone new to blockchain. said Mike Herron, CMO of Kadena.
SpireKey creates seamless interactions between humans and technology, delivering Web2 experiences with Web3 innovations. SpireKey allows users to sign transactions and their Web3 applications, just like it works with Apple Pay and Google Pay. However, it can be run directly on the user’s device without opening multiple windows or copying and pasting key pairs, eliminating potential vulnerabilities found in traditional wallets.
Enhanced security with built-in multisig
“Multi-sig signatures built into Kadena enable an additional layer of security for SpireKey, which can only be provided through our proprietary language, Pact. With multi-signatures, SpireKey allows For example, if you’re transferring more than $10,000, you can set a parameter to require signatures from three different devices: your phone, your laptop, and your cold storage wallet. Because a malicious attacker would need access to three devices, multisig functionality reduces the risk of your account being compromised. This reduces the risk of alternative attack vectors and increases overall security. “Stuart Popejoy, co-founder and CEO of Kadena, said:
SpireKey represents how Kadena thinks about the level of usability that Web3 technology should have. At the heart of SpireKey is connecting humans and allowing them to interact with blockchain. SpireKey believes that by showing real-life examples, she can get everyone equally interested in how Spirekey can impact the world beyond her Web3. Masu.
About Kadena
Kadena is a blockchain technology protocol founded in 2017 by Stuart Popejoy and Will Martino. Kadena is the industry’s only scalable layer 1 proof-of-work (PoW) blockchain. This scalability allows Kadena to provide infrastructure-grade performance for any blockchain project. Along with Kadena’s proprietary smart contract language, Pact, Kadena’s platform provides the world with the tools and environment to turn ideas and ambitions into reality. Founded by Stuart Popejoy and William Martino, who developed JPMorgan’s first blockchain and headed the SEC’s Crypto Committee, Kadena aims to enable mass adoption of true blockchain. .
Karine Mellata and Michael Lin met several years ago while working on Apple’s Fraud Engineering and Algorithmic Risk team. Both Mellata and Lin were involved in addressing online fraud issues such as spam, bots, account security, and developer fraud among Apple’s growing customer base.
Despite their efforts to develop new models to respond to evolving patterns of abuse, Melata and Lin feel they are falling behind and stuck in rebuilding core elements of their trust and safety infrastructure. I did.
“As regulation puts increased scrutiny on teams that centralize somewhat ad hoc trust and safety responses, we are helping modernize this industry and build a safer internet for everyone. We saw this as a real opportunity to do that,” Melata told TechCrunch in an email interview. “We dreamed of a system that could magically adapt as quickly as the abuse itself.”
Co-founded by So Mellata and Lin essentialis a startup that aims to give safety teams the tools they need to prevent product fraud. Intrinsic recently raised $3.1 million in a seed round with participation from Urban Innovation Fund, Y Combinator, 645 Ventures, and Okta.
Intrinsic’s platform is designed to moderate both user-generated and AI-generated content, allowing customers (primarily social media companies and e-commerce marketplaces) to detect and take action on content that violates their policies. We provide the infrastructure to do so. Intrinsic focuses on integrating safety products and automatically orchestrates tasks like banning users and flagging content for review.
“Intrinsic is a fully customizable AI content moderation platform,” said Mellata. “For example, Intrinsic can help publishers creating marketing materials avoid giving financial advice that carries legal liability. We can also help marketplaces discover listings such as:
Mellata notes that there are no off-the-shelf classifiers for such sensitive categories, and even for a well-resourced trust and safety team, adding a new auto-discovered category can take weeks of engineering. They claim it can take several months in some cases. -House.
Asked about rival platforms such as Spectrum Labs, Azure, and Cinder (almost direct competitors), Mellata said Intrinsic is superior in terms of (1) explainability and (2) significantly expanded tools. I said I was thinking about it. He explained that Intrinsic allows customers to “ask questions” about mistakes they made in content moderation decisions and provide an explanation as to why. The platform also hosts manual review and labeling tools that allow customers to fine-tune moderation models based on their own data.
“Most traditional trust and safety solutions were inflexible and not built to evolve with exploits,” Melata said. “Now more than ever, resource-constrained trust and safety teams are looking to vendors to help them reduce moderation costs while maintaining high safety standards.”
Without third-party auditing, it is difficult to determine how accurate a particular vendor’s moderation model is or whether it is susceptible to some type of influence. prejudice It plagues content moderation models elsewhere. But either way, Intrinsic appears to be gaining traction thanks to its “large and established” enterprise customers, who are signing deals in the “six-figure” range on average.
Intrinsic’s near-term plans include increasing the size of its three-person team and expanding its moderation technology to cover not just text and images, but also video and audio.
“The widespread slowdown in the technology industry has increased interest in automation for trust and safety, and this puts Intrinsic in a unique position,” Melata said. “COOs are concerned with reducing costs. Chief compliance officers are concerned with mitigating risk. Embedded helps both. , to catch more fraud.”
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.