These Ants Are Among Nature’s Most Efficient Teams

Weaver Ant Folding Paper

Dr. Chris Reid, Macquarie University

Weaver Ant chains can easily surpass all other creatures.

Weaver Ants (Oecophylla smaragdina), found from India to northern Australia, create long chains to gather leaves and construct nests. They grip one another by holding onto the abdomen of the ant in front using their mandibles.

To assess their strength, Chris Reed from Macquarie University in Sydney and his team provided the Weaver Ants with paper leaves instead of real ones for nesting. They attached a transducer to the tip of the paper leaf to measure the force exerted by a group of up to 17 ants while rolling the paper.

https://www.youtube.com/watch?v=ixamog0honi

Researchers discovered that individual ants could generate an average pulling force of 60 times their body weight, while in teams of 15, each ant was capable of pulling over 100 times their weight. Consequently, the average power contribution per ant nearly doubled in group settings.

This finding seemingly contradicts the well-established principle of teamwork known as the Ringelmann effect, which posits that larger groups tend to diminish individual productivity due to loss of coordination and motivation.

The researchers did not calculate how Weaver Ants compare to humans in terms of strength, but Reid noted that even without scaling up to human size, they would pose formidable opponents in a tug-of-war. “Even a guinea pig-sized Weaver Ant could outpull a human,” he remarked. “Their key advantage lies in having six legs, which provides excellent traction.”

This might explain their ability to counteract the Ringelmann effect, according to Reid. The precise mechanism behind their collective strength remains unclear, but one theory suggests that some ants are anchored to the ground while others are pulling, effectively creating a force ratchet.

“When comparing Weaver Ants with other species, their ability to exert force on the ground is extraordinarily high, significantly surpassing that of other ants,” Reed stated.

Insects and Ecosystem Expedition Safari: Sri Lanka

Embark on a journey to the heart of Sri Lanka’s diverse biodiversity on this unique entomology and ecosystem-focused expedition.

Topics:

Source: www.newscientist.com

Silicon Valley Lures Researchers Just Like Soccer Teams

The technology sector is engaged in an intense competition to lure artificial intelligence experts with increasingly lucrative salaries and hefty signing bonuses. Researchers holding doctoral degrees in computer science are at the forefront of this battle, often dubbed “talent.” The Washington Post recently referred to them as Olympians in a headline that asks, “Why are AI superathletes commanding $100 million bonuses in Silicon Valley?” These individuals are the most sought-after professionals globally.

High-tech firms are investing heavily in AI team star players who can create technologies surpassing human capabilities. These innovations aim to yield AI models known as “artificial general intelligence” or “super intelligence,” which outperform human intellect in every task.

In the pursuit of these coveted advancements, Silicon Valley is pouring money that could potentially establish a legacy. The race for talent is so intense that stories about the poaching of individual researchers are making headlines, as seen in Wired: “Another well-known OpenAI researcher joins Meta,” and Bloomberg: “Meta recruits two prominent Apple AI experts after hiring their boss.” The Information also reported, “Humanity has hired two leading coding AI experts from the cursor developer Anysphere.” All these stories emerged just last week.

The tech press’s fixation on these researchers resembles the sports media’s coverage of star player trades. Analysis of their salaries, speculation about upcoming moves Meta’s roster, discussions about team composition or overall strategy, and scrutiny of individual players echo the basketball trade phenomena from the Dallas Mavericks to the Los Angeles Lakers.

The term “another” in the Wired headline hints that one company is driving this frenzy—Meta. Mark Zuckerberg has made headlines recently by stating his company would invest “hundreds of billions” in AI initiatives. In April, Meta adjusted its capital expenditure plans for this year from $640 billion to $75 billion, an increase from the previous estimate of between $600 billion and $65 billion. In 2023, Meta only allocated $28 billion for maintenance, as noted by Fortune.

Zuckerberg is backing his commitment with cash. In early July, Meta hired Ruoming Pang, the head of Apple’s AI modeling team, for a staggering pay package amounting to around $200 million. Pang is set to join Meta’s super intelligence team, which may be the most expensive engineering group since the Manhattan Project.

The current trade frenzy is encapsulated in Nvidia CEO Jensen Huang’s remarks about half of the world’s leading AI researchers last week. He made these comments while in Beijing, during a meeting celebrating Donald Trump’s recent allowance for Huang’s extremely profitable company and a new permit to sell advanced semiconductors to China. Previously, the export of Nvidia chips faced tight restrictions. Huang’s remarks highlight the fact that American companies are investing in a pool of English-speaking talent, which still stands out in competition across the Pacific, regardless of the substantial salaries offered by high-tech giants.

Alternatives to iPhones and Samsungs vie for your attention

Photo: Samuel Gibbs/The Guardian

In recent years, several companies have launched mobile phones aimed at providing alternatives to the industry’s biggest players. Some of these companies are capitalizing on a rising unease regarding smartphones’ grip on our daily lives or simply seeking to challenge the prevailing dominance.

One intriguing option is a recently released device in the UK by Sage Mobile. This iPhone 16 variant comes with customized software that prohibits internet searches, gaming downloads, and social media apps like Instagram. British technology editor Robert Booth notes that these bespoke phones are sold at over twice the price of standard UK iPhone contracts, targeting children with the promise of “reconnecting with real life.”

This device includes a curated app store, enabling users to access apps for banking, public transport, school calendars, and weather updates.

Based on experiences with similar devices in the US, usage among children aged 8 to 14 averaged just 15 minutes to an hour per day—significantly less than the average screen time of 3 hours. Kaspar remarked, “It’s not magic and isn’t that fun,” leading to disinterest among kids and resulting in many devices ending up in landfills.

A 16-year-old anonymous reviewer shared their experience with the Guardian, highlighting how using Sage underscored their dependency on various apps and social media platforms. Although they felt more productive and engaged with family, creating a clean division between online and offline life proved to be more complex than merely blocking apps.

Sage’s representatives mentioned that it can take about a month to adapt to these limitations. However, teens may feel isolated from their friends and society, which is perceived as unjust. Having TikTok and Instagram is the norm today, and stepping back from these platforms can make it challenging to stay connected.

Should I continue using this phone, I would likely feel excluded when discussing how many of our jokes and cultural references originate from those platforms.

The London-based company Nothing also aims for a different approach with its Phone 3. This device features a quirky design, including a small LED screen on the back of a translucent case, rather than being a stripped-down version of an iPhone or Android.

Constructed on a Nothing version of the Android operating system, the Phone 3 incorporates many interesting features while striving to differentiate itself from the ubiquitous offerings of Apple and Samsung. Consumer Technology editor Samuel Gibbs provided a four-star review, stressing the importance of its unique attributes for justifying its value.

While the Phone 3 is impressive for Nothing, it may not outperform standard Android devices. It stands out from competitors but requires a desire for something distinctive to appreciate its offerings, given that more affordable devices provide comparable or superior performance.

Photo: AP

In his commitment to invest hundreds of billions of dollars in AI, Zuckerberg disclosed plans for a data center comparable in size to Manhattan. Meta’s sprawling complex, fueled by similarly vast financial outlays, has been named Hyperion, after the Greek Titan symbolizing the sun. Zuckerberg’s second smaller data center is named Prometheus, after the Titan punished for bringing fire and sacred knowledge to humanity. Is this data center a boon for us? Or, as the creators of AI, are we destined to face consequences? The emotions evoked by these names reflect Zuckerberg’s grand ambitions. The famous novel Frankenstein has another notable title that seems relevant: Modern Prometheus.

Google is also expanding its undertakings, planning to invest $3 billion in hydropower and $25 billion in data centers across Pennsylvania and neighboring states within the next two years. Apple is making its mark with a $500 million deal for rare earth minerals, investments that have drawn scrutiny from US mining companies.

The Broader Technology Landscape

Source: www.theguardian.com

Spy Ships, Cyber Attacks, and the Shadow Fleet: Global Security Teams Respond to Maritime Threats

Scenario crafted in Hollywood now reflects a genuine threat: the potential for hackers to seize control of vessels remotely and instigate crashes. Yet, in the security operations hub in Oslo, maritime cyber specialists situated mere meters from the luminous fjords and their tourist boats, floating saunas, and wet bathers assert that such occurrences are not only feasible, but imminent.

“We’re certain this will eventually happen, hence our vigilance,” states Øystein Brekke-Sanderud, Senior Analyst at the Nordic Maritime Cyber Resilience Centre (Norma Cyber). Behind him, a dynamic map displays the fleet they monitor, accompanied by a screen brimming with graphs and codes. Two small rubber ducks observe the passing minutes.

In an unstable global landscape, transportation networks, ports, and terminals have garnered heightened strategic significance as potential targets for infrastructure disruption and espionage—especially pertinent in Scandinavian nations that share maritime boundaries with Russia.

Finland and Sweden are NATO members now, with all countries enhancing their defensive postures amid escalating concerns over hybrid threats and warfare.




A digital map that tracks ship locations globally via Norma Cyber. Photo: Sara Aarøen Lien/The Guardian

As ships become increasingly digitalized, the opportunities for cyber breaches expand, indicating an urgent need to mitigate the complexities of AI tools and intricate systems.




Oslo Harbor serves as the command center where maritime cyber specialists assess global ship threats. Photo: Carl Hendon/Getty Images

“These vessel systems are incredibly intricate, making them tough to manipulate. However, AI accelerates everything,” explains Brekke-Sanderud. “How does this part function? Can I locate a password amidst this dense manual?”

Stationed at the Norwegian Shipowner Association’s headquarters along the quay of the Norwegian capital, Norma Cyber collaborates with the Norwegian Shipowner’s Risk Insurance Association (DNK).

Two years ago, these organizations united to create a Maritime Security and Resilience Centre, which surveys global threats ranging from warfare and terrorism to intellectual property violations—both physical and digital. They also conduct this work on behalf of the Norwegian government.




Norma Cyber Staff, featuring Managing Director Lars Benjamin Vold, Analyst Øystein Brekke-Sanderud, and Chief Technology Officer Øyvind Berget. Photo: Sara Aarøen Lien/The Guardian

While it is technically feasible to crash a vessel from afar, hackers aiming to sow chaos don’t necessarily need such extreme measures. According to Norma Cyber Managing Director Lars Benjamin Vold, merely halting the vessel’s operations could result in significant system failures.

Emerging evidence suggests that nations may exploit these vulnerabilities against maritime adversaries.




Oil tanker discharging ballast water is one of the vulnerabilities targeted in cyber attacks. Photo: Island Stock/Aramie

Reports indicate that Iran is investigating methods to deploy cyber assaults to disrupt ballast systems—a threat to both ships and satellite networks. An unprecedented hack occurred in April, targeting 116 Iranian VSAT modems used for satellite communications across vessels.

“When discussing nation-states, it is about their willingness to act,” Vold states. Potential “threat actors” such as Russia and China possess substantial capabilities, though these depend on their strategic objectives, which may shift rapidly.

Consequently, while threat levels remain relatively stable, maritime vulnerabilities are on the rise. “The avenues for potential exploitation are multiplying as the sector grows more digital,” Vold remarks.

Norma Cyber has also pinpointed civilian vessels, including fishing boats, research ships, and cargo carriers, used for espionage within the Baltic, North Atlantic, and Arctic regions. China-linked threat actors are reportedly using USB devices to infiltrate maritime systems, such as those from Mustang Panda.

Last year, Norma Cyber documented 239 significant cyber attacks within the maritime sector, attributing the majority to the pro-Russian group NonAME057 (16).

Skip past newsletter promotions



Svein Ringbakken, managing director of DNK’s Oslo office. Photo: Sara Aarøen Lien/The Guardian

Curiously, the rising dependence on digital technology creates a greater demand for traditional navigation skills. Following disruptions to the Baltic satellite navigation system, Finland accused Russia of being the instigator. “An experienced sailor serves as the best protection,” Vold asserts.

Yet, alongside the unseen threats of the digital realm, the maritime industry grapples with unprecedented physical challenges. Vladimir Putin’s shadow fleet, comprised of hundreds of unregulated vessels, poses a growing risk to environmental safety and the global shipping framework as it transports sanctioned crude oil primarily to China and India.

This Shadow Fleet consists of aging oil tankers obscuring their identities to evade Western sanctions. Estimates of its size range between 600 to 900 vessels according to various sources.




Finnish authorities scrutinized the Russian Shadow Fleet Oil Tanker Eagle in December 2024 due to suspected interference with power cables. Photo: Finland Border Guard/AFP/Getty

Internal threats to ships can also arise from within. Engines, elevators, and water purification systems are all vulnerable targets on board vessels. Moreover, 15% of the global crew consist of either Ukrainian or Russian members. The composition of both crews has taken on new significance since the onset of Russia’s invasion of Ukraine.

“The presence of a Russian captain on a ship delivering aid to Ukraine certainly raises concerns,” says Svein Ringbakken, managing director of DNK. “These are sensitive issues that the industry is currently addressing.”




Rhine Falkenberg Orstad, an advisor to the Norwegian Shipowner Association and an expert on the Russian Shadow Fleet. Photo: Sara Aarøen Lien/The Guardian

Rhine Falkenberg Orstad expresses concern that the increasing presence of the Shadow Fleet could foster a “parallel fleet” comprised of crew members uninformed about the intentions at sea.

If one of these vessels experiences an environmental mishap, it poses a risk to Norway’s coastline, she warns. Some ships noted as sanctioned by the US remain operational, with many being at least 15 years old. “Our apprehension is that the situation is deteriorating.”


Another significant query remains: has the entire situation permanently shifted?

“Is the shadow fleet operating outside of Western jurisdiction a new norm? Or can this trend be reversed?” Ollestad ponders. “The answer remains elusive.”




The rubber ducks maintain a vigilant watch over the security operations room at Norma Cyber. Photo: Sara Aarøen Lien/The Guardian

Source: www.theguardian.com

BBC to Establish AI Teams to Deliver Tailored Content

The CEO of BBC News announced plans to create new departments that utilize AI technology to provide more personalized content to audiences. This strategic move comes in response to the evolving landscape of news consumption, where businesses must adapt to reach their target demographic effectively.

In a memo to staff, CEO Deborah Turnness outlined a reorganization plan that includes the establishment of BBC News Growth, Innovation, and AI division. This shift aims to cater to the younger demographic, particularly those under 25, who predominantly consume news through platforms like smartphones and TikTok.

Turnness emphasized the need for companies to address challenges such as news avoidance, increased social media news consumption, digital competition, and decline in traditional broadcasting. The implementation of AI will enable the curation of content tailored to the preferences of mobile users accustomed to social media consumption.

She stressed the importance of understanding audience needs and delivering content that aligns with their preferences while leveraging AI technology to enhance innovation and growth.

While AI plays a significant role in streamlining news delivery, concerns have been raised regarding the accuracy and reliability of AI-generated content. Companies have pledged to uphold public service values and ensure that AI aligns with editorial standards of accuracy, fairness, equity, and privacy.

Turnness mentioned the restructuring of BBC News to broaden audience reach, eliminate traditional silos within the newsroom, and enhance content distribution across various platforms. The creation of BBC Live and Daily News division signifies a shift towards a more integrated approach to news production.

Skip past newsletter promotions

Turnness underscored the importance of adapting to the digital environment and evolving audience preferences to remain competitive in the industry. The appointment of a director for the growth, innovation, and AI departments will ensure strategic investments and innovations are tested and implemented effectively.

Source: www.theguardian.com

Kadena SpireKey Teams Up with WebAuthn for Smooth Web3 Interactions: Blockchain News, Opinion, TV, Jobs

New York City, NY, February 16, 2024, Chainwire

Kadena SpireKey is a human-friendly and secure way to seamlessly interact with any application by eliminating complex signing processes.

Kadena Spire Key

“Unlike today’s complex Web3 wallets that require you to remember every wallet you’ve ever created, Kadena’s SpireKey uses WebAuthn, a technology developed by Google and Apple over the past 20 years, to Make digital assets securely available to anyone directly on their phone or computer. It’s as easy as receiving a prompt on your mobile device and providing your fingerprint as a signature. Family Holiday Dinner Even your uncle who asks you about cryptocurrencies every time can do it. Kadena makes the application accessible to everyone, whether you’re an experienced “degener” or someone new to blockchain. said Mike Herron, CMO of Kadena.

SpireKey creates seamless interactions between humans and technology, delivering Web2 experiences with Web3 innovations. SpireKey allows users to sign transactions and their Web3 applications, just like it works with Apple Pay and Google Pay. However, it can be run directly on the user’s device without opening multiple windows or copying and pasting key pairs, eliminating potential vulnerabilities found in traditional wallets.

Enhanced security with built-in multisig

“Multi-sig signatures built into Kadena enable an additional layer of security for SpireKey, which can only be provided through our proprietary language, Pact. With multi-signatures, SpireKey allows For example, if you’re transferring more than $10,000, you can set a parameter to require signatures from three different devices: your phone, your laptop, and your cold storage wallet. Because a malicious attacker would need access to three devices, multisig functionality reduces the risk of your account being compromised. This reduces the risk of alternative attack vectors and increases overall security. “Stuart Popejoy, co-founder and CEO of Kadena, said:

SpireKey represents how Kadena thinks about the level of usability that Web3 technology should have. At the heart of SpireKey is connecting humans and allowing them to interact with blockchain. SpireKey believes that by showing real-life examples, she can get everyone equally interested in how Spirekey can impact the world beyond her Web3. Masu.

About Kadena

Kadena is a blockchain technology protocol founded in 2017 by Stuart Popejoy and Will Martino. Kadena is the industry’s only scalable layer 1 proof-of-work (PoW) blockchain. This scalability allows Kadena to provide infrastructure-grade performance for any blockchain project. Along with Kadena’s proprietary smart contract language, Pact, Kadena’s platform provides the world with the tools and environment to turn ideas and ambitions into reality. Founded by Stuart Popejoy and William Martino, who developed JPMorgan’s first blockchain and headed the SEC’s Crypto Committee, Kadena aims to enable mass adoption of true blockchain. .

For more information, users can follow Kadena’s information. twitter | telegram | discord | YouTube

contact

Kadena Press
press@kadena.io

Source: the-blockchain.com