AI

New Research Reveals AI Lacks Independent Learning, Poses No Existential Threat (neurosciencenews.com) 129

ZipNada writes: New research reveals that large language models (LLMs) like ChatGPT cannot learn independently or acquire new skills without explicit instructions, making them predictable and controllable. The study dispels fears of these models developing complex reasoning abilities, emphasizing that while LLMs can generate sophisticated language, they are unlikely to pose existential threats. However, the potential misuse of AI, such as generating fake news, still requires attention. The study, published today as part of the proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (ACL 2024) -- the premier international conference in natural language processing -- reveals that LLMs have a superficial ability to follow instructions and excel at proficiency in language, however, they have no potential to master new skills without explicit instruction. This means they remain inherently controllable, predictable and safe. "The prevailing narrative that this type of AI is a threat to humanity prevents the widespread adoption and development of these technologies, and also diverts attention from the genuine issues that require our focus," said Dr Harish Tayyar Madabushi, computer scientist at the University of Bath and co-author of the new study on the 'emergent abilities' of LLMs.

Professor Iryna Gurevych added: "... our results do not mean that AI is not a threat at all. Rather, we show that the purported emergence of complex thinking skills associated with specific threats is not supported by evidence and that we can control the learning process of LLMs very well after all. Future research should therefore focus on other risks posed by the models, such as their potential to be used to generate fake news."
Social Networks

Deep-Live-Cam Goes Viral, Allowing Anyone To Become a Digital Doppelganger (arstechnica.com) 17

An anonymous reader quotes a report from Ars Technica: Over the past few days, a software package called Deep-Live-Cam has been going viral on social media because it can take the face of a person extracted from a single photo and apply it to a live webcam video source while following pose, lighting, and expressions performed by the person on the webcam. While the results aren't perfect, the software shows how quickly the tech is developing -- and how the capability to deceive others remotely is getting dramatically easier over time. The Deep-Live-Cam software project has been in the works since late last year, but example videos that show a person imitating Elon Musk and Republican Vice Presidential candidate J.D. Vance (among others) in real time have been making the rounds online. The avalanche of attention briefly made the open source project leap to No. 1 on GitHub's trending repositories list (it's currently at No. 4 as of this writing), where it is available for download for free. [...]

Like many open source GitHub projects, Deep-Live-Cam wraps together several existing software packages under a new interface (and is itself a fork of an earlier project called "roop"). It first detects faces in both the source and target images (such as a frame of live video). It then uses a pre-trained AI model called "inswapper" to perform the actual face swap and another model called GFPGAN to improve the quality of the swapped faces by enhancing details and correcting artifacts that occur during the face-swapping process. The inswapper model, developed by a project called InsightFace, can guess what a person (in a provided photo) might look like using different expressions and from different angles because it was trained on a vast dataset containing millions of facial images of thousands of individuals captured from various angles, under different lighting conditions, and with diverse expressions.

During training, the neural network underlying the inswapper model developed an "understanding" of facial structures and their dynamics under various conditions, including learning the ability to infer the three-dimensional structure of a face from a two-dimensional image. It also became capable of separating identity-specific features, which remain constant across different images of the same person, from pose-specific features that change with angle and expression. This separation allows the model to generate new face images that combine the identity of one face with the pose, expression, and lighting of another.

Google

Google's Osterloh Looks To Get Jump on Apple With Earlier Launch (bloomberg.com) 11

With its hardware event on Tuesday, Alphabet's Google is trying to outshine Apple's annual iPhone launch -- and is letting longtime executive Rick Osterloh take center stage. Bloomberg: Osterloh, the former president of Motorola who joined Google in 2016, will helm the first major product launch after the company this year unified under his leadership the teams developing hardware and the Android operating system. The reorganization expanded Osterloh's influence in the company and signaled that Google intends to compete in hardware for the long term.

In a sign of a more aggressive push into consumer devices, Google moved up its annual flagship Pixel smartphone launch to August from October, preempting the next Apple. iPhone debut and seizing attention during a typically quiet period for the industry. [...] By holding its hardware showcase a month ahead of the iPhone maker's largest annual event, Google is "frontrunning Apple and also making a statement that we are likely way ahead of what Apple will show for iPhone 16 at least," said Mandeep Singh, an analyst with Bloomberg Intelligence.

Google has at least a six-month head start on Apple, which has invested less in AI over the years than some of its Big Tech peers, he added. Google's strategy -- tying together the development of hardware, software and services -- carries echoes of Apple's successful approach to designing devices. Yet, as Osterloh seeks to capitalize on the opportunity presented by AI, he faces a perennial challenge for Google: bringing the fight to Apple without threatening key relationships with hardware giants such as Xiaomi that rely on the Android operating system.

Google

Google Just Lost a Big Antitrust Trial. But Now It Has To Face Yet Another.One (yahoo.com) 35

Google's loss in an antitrust trial is just the beginning. According to Yahoo Finance's senior legal reporter, Google now also has to defend itself "against another perilous antitrust challenge that could inflict more damage." Starting in September, the tech giant will square off against federal prosecutors and a group of states claiming that Google abused its dominance of search advertising technology that is used to sell, buy, and broker advertising space online... Juggling simultaneous defenses "will definitely create a strain on its resources, productivity, and most importantly, attention at the most senior levels," said David Olson, associate professor at Boston College Law School.... The two cases targeting Google have the potential to inflict major damage to an empire amassed over the last two decades.

The second case that begins next month began with a lawsuit filed in the US District Court for the Eastern District of Virginia by the Justice Department and eight states in December 2020... Prosecutors allege that since at least 2015 Google has thwarted meaningful competition and deterred innovation through its ownership of the entities and software that power the online advertising technology market. Google owns most of the technology to buy, sell, and serve advertisements online... Google's share of the US and global advertising markets — when measured either by revenue or impressions — exceeded 90% for "many years," according to the complaint.

The government prosecutors accused Google of siphoning off $0.35 of each advertising dollar that flowed through its ad tech tools.

Thanks to Slashdot reader ZipNada for sharing the article.
Transportation

Gamification Gets Drivers To Put Down Their Phones, Study Finds (arstechnica.com) 71

An anonymous reader quotes a report from Ars Technica: Distracted driving isn't only a result of drivers using their phones when they should be paying attention. But it is a significant cause of the problem, accounting for at least 13 percent of distracted driving deaths and rising to 1 in 5 for young drivers. Now, a study conducted with customers of the Progressive insurance company has tested different strategies to get those drivers to put their phones down in the car, and it found two that significantly reduced handheld use, with the effect persisting after the end of the study. The study recruited 1,653 customers already enrolled in its Progressive Snapshot program, which involves the use of a smartphone app that detects phone use while driving. Before the start of the trial, the participants all averaged more than 6.4 minutes per hour of handheld use while driving -- Progressive says its safest customers have handheld usage of less than 1 minute per hour while driving. [...] Paying drivers on top of competitive gamification was the most effective way to get them to put down their phones. This group reduced its handheld usage by 27.6 percent, or 89 seconds/hour, compared to the control. That reduction was maintained at the same level throughout the post-intervention period for this arm.
Open Source

Mike McQuaid on 15 Years of Homebrew and Protecting Open-Source Maintainers (thenextweb.com) 37

Despite multiple methods available across major operating systems for installing and updating applications, there remains "no real clear answer to 'which is best,'" reports The Next Web. Each system faces unique challenges such as outdated packages, high fees, and policy restrictions.

Enter Homebrew.

"Initially created as an option for developers to keep the dependencies they often need for developing, testing, and running their work, Homebrew has grown to be so much more in its 15-year history." Created in 2009, Homebrew has become a leading solution for macOS, integrating with MDM tools through its enterprise-focused extension, Workbrew, to balance user freedom with corporate security needs, while maintaining its open-source roots under the guidance of Mike McQuaid. In an interview with The Next Web's Chris Chinchilla, project leader Mike McQuaid talks about the challenges and responsibilities of maintaining one of the world's largest open-source projects: As with anything that attracts plenty of use and attention, Homebrew also attracts a lot of mixed and extreme opinions, and processing and filtering those requires a tough outlook, something that Mike has spoken about in numerous interviews and at conferences. "As a large project, you get a lot of hate from people. Either people are just frustrated because they hit a bug or because you changed something, and they didn't read the release notes, and now something's broken," Mike says when I ask him about how he copes with the constant influx of communication. "There are a lot of entitled, noisy users in open source who contribute very little and like to shout at people and make them feel bad. One of my strengths is that I have very little time for those people, and I just insta-block them or close their issues."

More crucially, an open-source project is often managed and maintained by a group of people. Homebrew has several dozen maintainers and nearly one thousand total contributors. Mike explains that all of these people also deserve to be treated with respect by users, "I'm also super protective of my maintainers, and I don't want them to be treated that way either." But despite these features and its widespread use, one area Homebrew has always lacked is the ability to work well with teams of users. This is where Workbrew, a company Mike founded with two other Homebrew maintainers, steps in. [...] Workbrew ties together various Homebrew features with custom glue to create a workflow for setting up and maintaining Mac machines. It adds new features that core Homebrew maintainers had no interest in adding, such as admin and reporting dashboards for a computing fleet, while bringing more general improvements to the core project.

Bearing in mind Mike's motivation to keep Homebrew in the "traditional open source" model, I asked him how he intended to keep the needs of the project and the business separated and satisfied. "We've seen a lot of churn in the last few years from companies that made licensing decisions five or ten years ago, which have now changed quite dramatically and have generated quite a lot of community backlash," Mike said. "I'm very sensitive to that, and I am a little bit of an open-source purist in that I still consider the open-source initiative's definition of open source to be what open source means. If you don't comply with that, then you can be another thing, but I think you're probably not open source."

And regarding keeping his and his co-founder's dual roles separated, Mike states, "I'm the CTO and co-founder of Workbrew, and I'm the project leader of Homebrew. The project leader with Homebrew is an elected position." Every year, the maintainers and the community elect a candidate. "But then, with the Homebrew maintainers working with us on Workbrew, one of the things I say is that when we're working on Workbrew, I'm your boss now, but when we work on Homebrew, I'm not your boss," Mike adds. "If you think I'm saying something and it's a bad idea, you tell me it's a bad idea, right?" The company is keeping its early progress in a private beta for now, but you can expect an announcement soon. As for what's happening for Homebrew? Well, in the best "open source" way, that's up to the community and always will be.

Bitcoin

Edward Snowden Skeptical of Politicians at Bitcoin Conference - and Public Ledgers (msn.com) 45

Former U.S. president Donald Trump spoke at Nashville's Bitcoin Conference on Saturday.

But he wasn't the only one there making headlines, according to a local newspaper called the Tennesseean: Republican Sens. Cynthia Lummis and Tim Scott pledged their resolute support for the cryptocurrency industry at Nashville's Bitcoin2024 conference Friday — moments before whistleblower and political dissident Edward Snowden warned attendees to be wary of politicians trying to win them over. "Cast a vote, but don't join a cult," Snowden said. "They are not our tribe. They are not your personality. They have their own interests, their own values, their own things that they're chasing. Try to get what you need from them, but don't give yourself to them."

Snowden didn't call out any politicians specifically, but the conference has drawn national attention for its robust lineup of legislators including former President Donald Trump, independent presidential nominee Robert F. Kennedy Jr, former presidential candidate Vivek Ramaswamy and a number of other senators. "Does this feel normal to you?" Snowden said. "When you look at the candidates, when you look at the dynamics, even the people on stage giving all the speeches, I'm not saying they're terrible at all, but it's a little unusual. The fact that they're here is a little unusual...."

Two key tenets of Bitcoin are transparency and decentralization, which means anyone can view all Bitcoin transactions on a public ledger. Snowden said this kind of metadata could be dangerous in the wrong hands, especially with artificial intelligence innovations making it easier to collect. "It is fantasy to imagine they're not doing this," he said.... He added that other countries like China or Russia could be collecting this same data. Snowden said he's afraid the collection of transaction data could happen across financial institutions and ultimately be used against the customers.

Also speaking was RFK Jr — who asked why Snowden hadn't already been pardoned, along with Julian Assange and Ross Ulbricht, when Donald Trump was president (as Kennedy promised to do). According to USA Today, Kennedy promised more than just creating a strategic reserve of Bitcoin worth more than half a trillion dollars: Kennedy also pledged to sign an executive order directing the IRS to treat Bitcoin as an eligible asset for 1031 Exchange into real property — making transactions unreportable and by extension nontaxable — which prompted a roar of approval from the crowd.
Though Trump's appearance also ended with a promise to have the government create a "strategic national bitcoin stockpile," NBC News notes that Trump "stopped short of offering many details." Immediately following Trump's remarks, Senator Cynthia Lummis, R-Wyo., said she would introduce a bill to create the reserve. However, the price of bitcoin fell slightly in the wake of Trump's remarks Saturday, perhaps reflecting crypto traders' unmet expectations for a more definitive commitment on the reserve idea from the presidential candidate...

Shortly after his morning remarks, Bitcoin Magazine reported that a group of Democratic representatives and candidates had sent a letter to the Democratic National Committee urging party leaders to be more supportive of crypto...

On Saturday, the Financial Times reported [presidential candidate Kamala] Harris had approached top crypto companies seeking a "reset" of relations, citing unnamed sources.

Ironically, in the end one conference attendee ended up telling Bloomberg that "It doesn't really matter who the president is. I don't really care much about it, because Bitcoin will do its thing regardless."
Movies

Marvel's Kevin Feige Defends Sequels as an 'Absolute Pillar of the Industry' (variety.com) 61

Marvel Studios President Kevin Feige, who has overseen the Marvel Cinematic Universe's unprecedented success, has expressed his longstanding appreciation for sequels and world-building in cinema at a time when Disney's top executive has admitted that the company has diluted audience's attention by making too many TV shows and movies.

"I was never cynical or rolling my eyes the way people still do today for some reason, even though there've been sequels since the '30s and they're an absolute pillar of the industry," Feige told Variety in an interview, highlighting his enthusiasm for returning to beloved characters and expanding on established narratives. The studio's ambitious expansion into streaming content for Disney+ has led to what Disney CEO Bob Iger described as "some disappointments" in theatrical releases. In July 2023, Iger cited the increased output for streaming as a factor that "diluted focus and attention" at Marvel. In response to these challenges, Disney announced a strategic shift in May, with plans to reduce Marvel's output to a maximum of three films and two TV series per year. This move aligns with Iger's commitment to prioritize quality over quantity, a strategy he believes is "particularly true with Marvel."
Transportation

'Are You Serious?' Hawaii Island Mayor in Disbelief after Third Vehicle Drives Straight Into Harbor (hawaiinewsnow.com) 116

Last year two different tourists — following GPS directions — drove their cars straight into the same harbor in Hawaii.

And then last weekend — at the same harbor — it happened again. "This time it was different," reports a local news station. "The driver was a local..." Multiple witnesses say the Prius was actually parked at the top of the ramp and that an enforcement officer with the Department of Land and Natural Resources told the owner she had to move it. Witnesses also said that the woman had an issue getting the car started. Eventually, she was able to start the vehicle and called out that the car was running.

Then the car went down the ramp....

More from Hawaii News Now: This follows another viral incident, captured on video in May of last year, showing another SUV sinking in the water with its passengers inside. "The GPS led them into the water," said one witness. Then, a few weeks later, it happened again. Witnesses say the driver, also an out-of-state visitor, was following their GPS directions.

"The first time I heard it, the thought in my head was, you got to be joking," said Hawaii County Mayor Mitch Roth. "The third was — are you serious? This is just another form of people not paying attention to what they're doing."

The news outlet reached out to the Department of Land and Natural Resources — and specifically to its Division of Boating & Ocean Recreation, to ask whether the harbor's boat ramp had adequate lighting and signage.

They responded that a boat ramp descending into the waters of the Pacific ocean is "hard to miss" — and called the recent incidents "operator error."

Meanwhile in Wyoming, SFGate reports that "an SUV with five people inside plunged about 9 feet deep into a 105-degree geyser at Yellowstone National Park after it 'inadvertently drove off the roadway' last Thursday, National Park Service officials said."
Crime

Former Anonymous Spokesperson's Memoir Called 'Deranged, Hyperbolic, and True' (nytimes.com) 33

Slashdot covered Barrett Brown back in 2011 and 2012. The New York Times calls him "an activist associated with the hacker group Anonymous, and a political prisoner recently denied asylum in Britain, all of which sounds a bit dreary until we hear tell of it through Brown's unhinged self-regard."

They're reviewing Brown's "extraordinary" new memoir, My Glorious Defeats: Hacktivist, Narcissist, Anonymous," a book they call "deranged, hyperbolic, and true." A "machine" that focuses attention on little-known social issues, Anonymous has gone after the Church of Scientology, Koch Industries, websites hosting child pornography and the Westboro Baptist Church. The public tends to be confused by nebulous digital activities, so it was, in the collective's heyday, helpful to have Brown act as a translator between the hackers and mainstream journalists. "The year 2011 ended as it began," he writes, "with a sophisticated hack on a state-affiliated corporation that ostensibly dealt in straightforward security and analysis while secretly engaging in black ops campaigns against activists who'd proven troublesome to powerful clients."

This particular corporation was Stratfor, a company that spied on activists for the government... Brown waited for the feds to come back and drag him to jail. He also says he tried to get off suboxone in order to avoid the painful possibility of prison withdrawal, and stopped taking Paxil, inducing a manic state, all of which is given as explanation for his regrettable next move, which was to set up a camera and start talking. The feds had threatened his mother, he told the internet, and in response he was threatening Robert Smith, the lead agent on his case. He found himself in custody the same night.

Brown was then subjected to the kind of nonsense the Department of Justice is prone to inflicting on those involved in shadowy internet activities that, in fact, almost no one in the legal process understands. He was charged with participating in the hack of Stratfor, though he was not really involved and cannot code, and although the whole thing was organized by an F.B.I. informant. Brown had also retweeted a Fox News host's call to murder Julian Assange; the prosecution presented this as if he were himself calling for the murder of Assange. But generally, Brown's primary victim is himself. "My thirst for glory and hatred for the state," he writes, "were incompatible with an orthodox criminal defense, in which the limiting of one's sentence is the sole objective."

In his cell, with an eraser-less pencil he needs a compliant guard to repeatedly sharpen, he writes "The Barrett Brown Review of Arts and Letters and Jail." His mother types it up; The Intercept publishes. He develops the character he will play in his memoir: a self-aware narcissist and addict. He wins a National Magazine Award, and is especially pleased that his column "Please Stop Sending Me Jonathan Franzen Novels," wins while Franzen is in attendance.

"The state is an afterthought here — a litany of absurdist horrors too stupid to appall..." the review concludes.

"We're left with a man who refuses to look away from the deep structure of the world, an unstable position from which there is no sanctuary. My Glorious Defeats is deranged, hyperbolic and as true a work as I have read in a very long time."
Hardware

84% of PC Users Unwilling To Pay Extra For AI-enhanced Hardware, Survey Says (videocardz.com) 183

An anonymous reader shares a report: A recent poll on TechPowerUp revealed that an overwhelming majority of PC users are not interested in paying extra for hardware with AI capabilities. According to the survey, 84% of respondents would not spend more for AI features, while only 7% said they would, and 9% were unsure. The poll data was already contributed by over 26K responders. This indicates that despite the PC market's shift toward integrating AI, most enthusiasts remain skeptical of its value. This suggests that hardware companies should pay attention to the preferences of their core user base. Currently, enthusiasts, who no doubt represent the majority of users on TechPowerUP, show little interest in AI features.
Science

Researchers Discover a New Form of Scientific Fraud: Uncovering 'Sneaked References' (theconversation.com) 47

A recent study has exposed a method of artificially inflating citation counts through "sneaked references," which are extra citations included in metadata but not in the actual text of articles. This manipulation, uncovered in journals by Technoscience Academy, distorts citation metrics that are critical for research funding and academic promotions. The Conversation reports: The investigation began when Guillaume Cabanac, a professor at the University of Toulouse, wrote a post on PubPeer, a website dedicated to post-publication peer review, in which scientists discuss and analyze publications. In the post, he detailed how he had noticed an inconsistency: a Hindawi journal article that he suspected was fraudulent because it contained awkward phrases had far more citations than downloads, which is very unusual. The post caught the attention of several sleuths who are now the authors of the JASIST article. We used a scientific search engine to look for articles citing the initial article. Google Scholar found none, but Crossref and Dimensions did find references. The difference? Google Scholar is likely to mostly rely on the article's main text to extract the references appearing in the bibliography section, whereas Crossref and Dimensions use metadata provided by publishers.

To understand the extent of the manipulation, we examined three scientific journals that were published by the Technoscience Academy, the publisher responsible for the articles that contained questionable citations. [...] In the journals published by Technoscience Academy, at least 9% of recorded references were "sneaked references." These additional references were only in the metadata, distorting citation counts and giving certain authors an unfair advantage. Some legitimate references were also lost, meaning they were not present in the metadata. In addition, when analyzing the sneaked references, we found that they highly benefited some researchers. For example, a single researcher who was associated with Technoscience Academy benefited from more than 3,000 additional illegitimate citations. Some journals from the same publisher benefited from a couple hundred additional sneaked citations.

We wanted our results to be externally validated, so we posted our study as a preprint, informed both Crossref and Dimensions of our findings and gave them a link to the preprinted investigation. Dimensions acknowledged the illegitimate citations and confirmed that their database reflects Crossref's data. Crossref also confirmed the extra references in Retraction Watch and highlighted that this was the first time that it had been notified of such a problem in its database. The publisher, based on Crossref's investigation, has taken action to fix the problem.
To combat this practice of "sneaked references," the authors suggest several measures: rigorous verification of metadata by publishers and agencies like Crossref, independent audits to ensure data reliability, and increased transparency in managing references and citations.
Security

BlastRADIUS Attack Exposes Critical Flaw In 30-Year-Old RADIUS Protocol (securityweek.com) 26

wiredmikey shares a report from SecurityWeek: Security vendor InkBridge Networks on Tuesday called urgent attention to the discovery of a thirty-year-old design flaw in the RADIUS protocol and warned that advanced attackers can launch exploits to authenticate anyone to a local network, bypassing any multi-factor-authentication (MFA) protections. The company published a technical description of what is being called the BlastRADIUS attack and warned that corporate networks such as internal enterprise networks, ISPs, and telcos are exposed to major risk. The vulnerability is being tracked as CVE-2024-3596 and VU#456537. "The root cause of the attack is that in the RADIUS protocol, some Access-Request packets are not authenticated and lack integrity checks. An attacker can modify these packets in a way which allows them to control who gets onto the network," the research team explained (PDF).

The RADIUS protocol, first standardized in the late 1990s, is used to control network access via authentication, authorization, and accounting and is still used widely today in switches, routers, access points and VPN products. "All of those devices are likely vulnerable to this attack," the researchers warned. "The key to the attack is that in many cases, Access-Request packets have no authentication or integrity checks. An attacker can then perform a chosen prefix attack, which allows modifying the Access-Request in order to replace a valid response with one chosen by the attacker. Even though the response is authenticated and integrity checked, the chosen prefix vulnerability allows the attacker to modify the response packet, almost at will," according to the InkBridge Networks documentation.
The researchers say that every single RADIUS server must be upgraded in order to protect against this vulnerability. "It is not sufficient to upgrade only RADIUS clients, as doing so will allow the network to remain vulnerable."
AI

Toys 'R' Us Riles Critics With 'First-Ever' AI-Generated Commercial Using Sora (arstechnica.com) 35

An anonymous reader quotes a report from Ars Technica: On Monday, Toys "R" Us announced that it had partnered with an ad agency called Native Foreign to create what it calls "the first-ever brand film using OpenAI's new text-to-video tool, Sora." OpenAI debuted Sora in February, but the video synthesis tool has not yet become available to the public. The brand film tells the story of Toys "R" Us founder Charles Lazarus using AI-generated video clips. "We are thrilled to partner with Native Foreign to push the boundaries of Sora, a groundbreaking new technology from OpenAI that's gaining global attention," wrote Toys "R" Us on its website. "Sora can create up to one-minute-long videos featuring realistic scenes and multiple characters, all generated from text instruction. Imagine the excitement of creating a young Charles Lazarus, the founder of Toys "R" Us, and envisioning his dreams for our iconic brand and beloved mascot Geoffrey the Giraffe in the early 1930s."

The company says that The Origin of Toys "R" Us commercial was co-produced by Toys "R" Us Studios President Kim Miller Olko as executive producer and Native Foreign's Nik Kleverov as director. "Charles Lazarus was a visionary ahead of his time, and we wanted to honor his legacy with a spot using the most cutting-edge technology available," Miller Olko said in a statement. In the video, we see a child version of Lazarus, presumably generated using Sora, falling asleep and having a dream that he is flying through a land of toys. Along the way, he meets Geoffery, the store's mascot, who hands the child a small red car. Many of the scenes retain obvious hallmarks of AI-generated imagery, such as unnatural movement, strange visual artifacts, and the irregular shape of eyeglasses. [...] Although the Toys "R" Us video uses key visual elements from Sora, it still required quite a bit of human post-production work to put it together. Sora eliminated the need for actors and cameras, but creating successful generations and piecing together the rest still took human scriptwriters and VFX artists to fill in the AI model's shortcomings. "The brand film was almost entirely created with Sora, with some corrective VFX and an original music score composed by Aaron Marsh of famed indie rock band Copeland," wrote Toys "R" Us in a press release.
Comedy writer Mike Drucker wrapped up several of these criticisms into one post, writing: "Love this commercial is like, 'Toys R Us started with the dream of a little boy who wanted to share his imagination with the world. And to show how, we fired our artists and dried Lake Superior using a server farm to generate what that would look like in Stephen King's nightmares.'"

Other critical comments were more frank. Filmmaker Joe Russo posted: "TOYS 'R US released an AI commercial and it fucking sucks."
The Almighty Buck

Why Going Cashless Has Turned Sweden Into a High-Crime Nation (fortune.com) 167

An anonymous reader quotes a report from Fortune: Ellen Bagley was delighted when she made her first sale on a popular second-hand clothing app, but just a few minutes later, the thrill turned to shock as the 20-year-old from Linkoping in Sweden discovered she'd been robbed. Everything seemed normal when Bagley received a direct message on the platform, which asked her to verify personal details to complete the deal. She clicked the link, which fired up BankID -- the ubiquitous digital authorization system used by nearly all Swedish adults.After receiving a couple of error messages, she started thinking something was wrong, but it was already too late. Over 10,000 Swedish kronor ($1,000) had been siphoned from her account and the thieves disappeared into the digital shadows. "The fraudsters are so skilled at making things look legitimate," said Bagley, who was born after BankID was created. "It's not easy" to identify scams. Although financial crime has garnered fewer headlines than a surge in gang-related gun violence, it's become a growing risk for the country. Beyond its borders, Sweden is an important test case on fighting cashless crime because it's gone further on ditching paper money than almost any other country in Europe.

Online fraud and digital crime in Sweden have surged, with criminals taking 1.2 billion kronor in 2023 through scams like the one Bagley fell for, doubling from 2021. Law-enforcement agencies estimate that the size of Sweden's criminal economy could amount to as high as 2.5% of the country's gross domestic product. To counter the digital crime spree, Swedish authorities have put pressure on banks to tighten security measures and make it harder on tech-savvy criminals, but it's a delicate balancing act. Going too far could slow down the economy, while doing too little erodes trust and damages legitimate businesses in the process.Using complex webs of fake companies and forging documents to gain access to Sweden's welfare system, sophisticated fraudsters have made Sweden a "Silicon Valley for criminal entrepreneurship," said Daniel Larson, a senior economic crime prosecutor. While the shock of armed violence has grabbed public attention -- the nation's gun-homicide rate tripled between 2012 and 2022 -- economic crime underlies gang activity and needs to be tackled as aggressively, he added. "That has been a strategic mistake," Larson said. "This profit-generating crime is what's fueling organized crime and, in some cases, leads to these conflicts."

Sweden's switch to electronic cash started after a surge of armed robberies in the 1990s, and by 2022, only 8% of Swedes said they had used cash for their latest purchase, according to a central bank survey. Along with neighboring Norway, Sweden has Europe's lowest number of ATMs per capita, according to the IMF. The prevalence of BankID play a role in Sweden's vulnerability. The system works like an online signature. If used, it's considered a done deal and the transaction gets executed immediately. It was designed by Sweden's banks to make electronic payments even quicker and easier than handing over a stack of bills. Since it's original rollout in 2001, it's become part of the everyday Swedish life. On average, the service -- which requires a six-digit code, a fingerprint or a face scan for authentication -- is used more than twice a day by every adult Swede and is involved in everything from filing tax returns to paying for bus tickets.Originally intended as a product by banks for their customers, its use exploded in 2005 after Sweden's tax agency adopted the technology as an identification for tax returns, giving it the government's official seal of approval. The launch of BankID on mobile phones in 2010 increased usage even further, along with public perception that associated cash with criminality.The country's central bank has acknowledged that some of those connotations may have gone too far. "We have to be very clear that there are still honest people using cash," Riksbank Governor Erik Thedeen told Bloomberg.

Earth

Satellite 'Megaconstellations' May Jeopardize Recovery of Ozone Hole (phys.org) 90

An anonymous reader quotes a report from Phys.Org: When old satellites fall into Earth's atmosphere and burn up, they leave behind tiny particles of aluminum oxide, which eat away at Earth's protective ozone layer. A new study finds that these oxides have increased 8-fold between 2016 and 2022 and will continue to accumulate as the number of low-Earth-orbit satellites skyrockets. The 1987 Montreal Protocol successfully regulated ozone-damaging CFCs to protect the ozone layer, shrinking the ozone hole over Antarctica with recovery expected within fifty years. But the unanticipated growth of aluminum oxides may push pause on the ozone success story in decades to come. Of the 8,100 objects in low Earth orbit, 6,000 are Starlink satellites launched in the last few years. Demand for global internet coverage is driving a rapid ramp up of launches of small communication satellite swarms. SpaceX is the frontrunner in this enterprise, with permission to launch another 12,000 Starlink satellites and as many as 42,000 planned. Amazon and other companies around the globe are also planning constellations ranging from 3,000 to 13,000 satellites, the authors of the study said. Internet satellites in low Earth orbit are short-lived, at about five years. Companies must then launch replacement satellites to maintain internet service, continuing a cycle of planned obsolescence and unplanned pollution.

Aluminum oxides spark chemical reactions that destroy stratospheric ozone, which protects Earth from harmful UV radiation. The oxides don't react chemically with ozone molecules, instead triggering destructive reactions between ozone and chlorine that deplete the ozone layer. Because aluminum oxides are not consumed by these chemical reactions, they can continue to destroy molecule after molecule of ozone for decades as they drift down through the stratosphere. Yet little attention has yet been paid to pollutants formed when satellites fall into the upper atmosphere and burn. Earlier studies of satellite pollution largely focused on the consequences of propelling a launch vehicle into space, such as the release of rocket fuel. The new study, by a research team from the University of Southern California Viterbi School of Engineering, is the first realistic estimate of the extent of this long-lived pollution in the upper atmosphere, the authors said. [...]

In 2022, reentering satellites increased aluminum in the atmosphere by 29.5% over natural levels, the researchers found. The modeling showed that a typical 250-kilogram (550-pound) satellite with 30% of its mass being aluminum will generate about 30 kilograms (66 pounds) of aluminum oxide nanoparticles (1-100 nanometers in size) during its reentry plunge. Most of these particles are created in the mesosphere, 50-85 kilometers (30-50 miles) above Earth's surface. The team then calculated that based on particle size, it would take up to 30 years for the aluminum oxides to drift down to stratospheric altitudes, where 90% of Earth's ozone is located. The researchers estimated that by the time the currently planned satellite constellations are complete, every year, 912 metric tons of aluminum (1,005 U.S. tons) will fall to Earth. That will release around 360 metric tons (397 U.S. tons) of aluminum oxides per year to the atmosphere, an increase of 646% over natural levels.
The study is published in the journal Geophysical Research Letters.
Data Storage

The Short, Happy Reign of CD-ROM (fastcompany.com) 148

"Over at Fast Company, where we're celebrating 1994 Week, I wrote about the year of Peak CD-ROM, when excitement over the medium's potential was sky-high and the World Wide Web's audience still numbered in the extremely low millions," writes Slashdot reader and Fast Company technology editor Harry McCracken (harrymcc). "I cover once-famous products such as Microsoft's Encarta encyclopedia, the curse of shovelware, the rise of a San Francisco neighborhood known as 'Multimedia Gulch,' and why the whole dream soon came crashing down." Here's an excerpt from the article: Thirty years ago, a breakthrough technology was poised to transform how people stayed informed, entertained themselves, and maybe even shopped. I'm not talking about the World Wide Web. True, it was already getting good buzz among early adopter types. But even three years after going online, Tim Berners-Lee's creation was "still relatively slow and crude" and "limited to perhaps two million Internet users who have the proper software to gain access to it," wrote The New York Times' Peter H. Lewis in November 1994. At the time, it was the CD-ROM that had captured the imagination of consumers and the entire publishing industry. The high-capacity optical discs enabled mass distribution of multimedia for the first time, giving software developers the ability to create new kinds of experiences. Some of the largest companies in America saw them as media's next frontier, as did throngs of startups. In terms of pure mindshare, 1994 might have been the year of Peak CD, with 17.5 million CD-ROM drives and $590 million in discs sold, according to research firms Dataquest and Link Resources.

You already know that the frenzy didn't last. As the web got faster, slicker, and more readily accessible, CD-ROMs came to look pretty mundane, and eventually faded from memory. Myst, once the best-selling PC game of all time, might be the only 1990s disc that retains a prominent spot in our shared cultural consciousness. (Full disclosure: I do have a friend who can be relied upon to fondly bring up Microsoft's Cinemania movie guide about once a year for no apparent reason.) Revisiting the discs that defined the mid-1990s -- all of which are incompatible with modern operating systems -- isn't easy. To get some of them up and running again, I downloaded virtual CD-ROM files from the Internet Archive and used them with Windows 3.1 on my iPad Pro, courtesy of a piece of software Apple removed from the App Store in 2021. Spending time with titles such as Compton's Interactive Encyclopedia and It's a Wonderful Life Multi-Media Edition, three decades after they last commanded my attention, was a Proustian rush. You may not want to go to similar extremes. But would you indulge me as I wallow in enough CD-ROM nostalgia to get it out of my system?

Supercomputing

$2.4 Million Texas Home Listing Boasts Built-In 5,786 sq ft Data Center (tomshardware.com) 34

A Zillow listing for a $2.4 million house in a Dallas suburb is grabbing attention for its 5,786-square-foot data center with immersion cooling tanks, massive server racks, and two separate power grids. Tom's Hardware reports: With a brick exterior, cute paving, and mini-McMansion arch stylings, the building certainly looks to be a residential home for the archetypal Texas family. Prospective home-buyers will thus be disappointed by the 0 bedroom, 1 bathroom setup, which becomes a warehouse-feeling office from the first step inside where you are met with a glass-shielded reception desk in a white-brick corridor. The "Crypto Collective" branding betrays the former life of the unit, which served admirably as a crypto mining base.

The purchase of the "upgraded turnkey Tier 2 Data Center" will include all of its cooling and power infrastructure. Three Engineered Fluids "SLICTanks," single-phase liquid immersion cooling tanks for use with dielectric coolant, will come with pumps and a 500kW dry cooler. The tanks are currently filled with at least 80 mining computers visible from the photos, though the SLICTanks can be configured to fit more machines. Also visible in proximity to the cooling array is a deep row of classic server racks and a staggering amount of networking.

The listing advertises a host of potential uses for future customers, from "AI services, cloud hosting, traditional data center, servers or even Bitcoin Mining". Also packed into the 5,786 square feet of real estate is two separate power grids, 5 HVAC units, a hefty amount of four levels of warehouse-style storage aisles, a lounge/office space, and a fully-paved backyard. In other good news, its future corporate residents will not have an HOA to deal with, and will only be 20 minutes outside of the heart of Dallas, sitting just out of earshot of two major highways.

Wine

Wine Staging 9.11 Released with A Patch For A 17 Year Old Bug (phoronix.com) 15

Building off Friday's release of Wine 9.11, the development team has now also released Wine Staging 9.11 with some 428 patches, reports Phoronix founder Michael Larabel: Catching my interest was a patch for Bug 7955. That right away catches my attention since the latest Wine bug reports are at a bug ticket number over 56,000.... Yep, Bug 7955 dates back 14 years ago to April 2007.

The #7955 bug report is over the S-Hoai Windows client displaying an application exception when clicking the "File" or "Projects" menu. S-Hoai is a Windows application used in Germany by architects and building engineers/contractors for managing estimates and billing according to German laws.

Medicine

Researchers Plan To Retract Landmark Alzheimer's Paper Containing Doctored Images (science.org) 69

An anonymous reader quotes a report from Science Magazine: Authors of a landmark Alzheimer's disease research paper published in Nature in 2006 have agreed to retract the study in response to allegations of image manipulation. University of Minnesota (UMN) Twin Cities neuroscientist Karen Ashe, the paper's senior author, acknowledged in a post on the journal discussion site PubPeer that the paper contains doctored images. The study has been cited nearly 2500 times, and would be the most cited paper ever to be retracted, according to Retraction Watch data. "Although I had no knowledge of any image manipulations in the published paper until it was brought to my attention two years ago," Ashe wrote on PubPeer, "it is clear that several of the figures in Lesne et al. (2006) have been manipulated ... for which I as the senior and corresponding author take ultimate responsibility." After initially arguing the paper's problems could be addressed with a correction, Ashe said in another post last week that all of the authors had agreed to a retraction -- with the exception of its first author, UMN neuro-scientist Sylvain Lesne, a protege of Ashe's who was the focus of a 2022 investigation by Science. "It's unfortunate that it has taken 2 years to make the decision to retract," says Donna Wilcock, an Indiana University neuroscientist and editor of the journal Alzheimer's & Dementia. "The evidence of manipulation was overwhelming."

The 2006 paper suggested an amyloid beta (AB) protein called AB*56 could cause Alzheimer's. AB proteins have long been linked to the disease. The authors reported that AB*56 was present in mice genetically engineered to develop an Alzheimer's-like condition, and that it built up in step with their cognitive decline. The team also reported memory deficits in rats injected with AB*56. For years researchers had tried to improve Alzheimer's outcomes by stripping amyloid proteins from the brain, but the experimental drugs all failed. AB*56 seemed to offer a more specific and promising therapeutic target, and many embraced the finding. Funding for related work rose sharply. But the Science investigation revealed evidence that the Nature paper and numerous others co-authored by Lesne, some listing Ashe as senior author, appeared to use manipulated data. After the story was published, leading scientists who had cited the paper to support their own experiments questioned whether AB*56 could be reliably detected and purified as described by Lesne and Ashe -- or even existed. Some said the problems in that paper and others supported fresh doubts about the dominant hypothesis that amyloid drives Alzheimer's. Others maintained that the hypothesis remains viable. That debate has continued amid the approval of the antiamyloid drug Leqembi, which modestly slows cognitive decline but carries risks of serious or even fatal brain swelling or bleeding.

Slashdot Top Deals