Author name: Mike M.

bats-use-echolocation-to-make-mental-maps-for-navigation

Bats use echolocation to make mental maps for navigation

Bat maps

To evaluate the route each bat took to get back to the roost, the team used their simulations to measure the echoic entropy it experienced along the way. The field where the bats were released was a low echoic entropy area, so during those first few minutes when they were flying around they were likely just looking for some more distinct, higher entropy landmarks to figure out where they were. Once they were oriented, they started flying to the roost, but not in a straight line. They meandered a bit, and the groups with higher sensory deprivation tended to meander more.

The meandering, researchers suspect, was due to trouble the bats had with maintaining the steady path relying on echolocation alone. When they were detecting distinctive landmarks like a specific orchard, they corrected the course. Repeating the process eventually brought them to their roost.

But could this be landmark-based navigation? Or perhaps simple beaconing, where an animal locks onto something like a distant light and moves toward it?

The researchers argue in favor of cognitive acoustic maps. “I think if echolocation wasn’t such a limited sensory modality, we couldn’t reach a conclusion about the bats using cognitive acoustic maps,” Goldshtein says. The distance between landmarks the bats used to correct their flight path was significantly longer than echolocation’s sensing range. Yet they knew which direction the roost was relative to one landmark, even when the next landmark on the way was acoustically invisible. You can’t do that without having the area mapped.

“It would be really interesting to understand how other bats do that, to compare between species,” Goldshtein says. There are bats that fly over a thousand meters above the ground, so they simply can’t sense any landmarks using echolocation. Other species hunt over sea, which, as per this team’s simulations, would be just one huge low-entropy area. “We are just starting. That’s why I do not study only navigation but also housing, foraging, and other aspects of their behavior. I think we still don’t know enough about bats in general,” Goldshtein claims.

Science, 2024.  DOI: 10.1126/science.adn6269

Bats use echolocation to make mental maps for navigation Read More »

microsoft-delays-rollout-of-the-windows-11-recall-feature-yet-again

Microsoft delays rollout of the Windows 11 Recall feature yet again

“We are committed to delivering a secure and trusted experience with Recall. To ensure we deliver on these important updates, we’re taking additional time to refine the experience before previewing it with Windows Insiders,” said Microsoft Windows Insider Senior Program Manager Brandon LeBlanc in a statement provided to The Verge.

LeBlanc didn’t offer additional details on the latest Recall delay or make any new announcements about other security precautions Microsoft is taking with the feature. The company’s September blog post detailed how data was being protected using Windows’ Virtualization-Based Security (VBS) features and Windows Hello authentication and reiterated that Recall will be opt-in by default and that it will be fully removable for Windows users who aren’t interested in using it.

When it does start to roll out, Recall will still require a Copilot+ PC, which gets some AI-related features not available to typical Windows 11 PCs. To meet the Copilot+ requirements, PCs must have at least 16GB of RAM and 256GB of storage, plus a neural processing unit (NPU) that can perform at least 40 trillion operations per second (TOPS). Users will also need their PCs to be enrolled in the Windows Insider Program; we have no idea when non-Windows Insider PCs will start getting Recall, though at this point, it seems likely it won’t be until sometime in 2025.

Microsoft delays rollout of the Windows 11 Recall feature yet again Read More »

rfk-jr.-claims-trump-promised-to-put-him-in-charge-of-nih,-cdc,-and-more

RFK Jr. claims Trump promised to put him in charge of NIH, CDC, and more

Earlier this week, Robert F. Kennedy, Jr. used a Zoom call to tell his supporters that Donald Trump had promised him “control” of the Department of Health and Human Services (HHS), the federal agency that includes the Centers for Disease Control, Food and Drug Administration, National Institutes of Health, as well as the Department of Agriculture. Given Kennedy’s support for debunked anti-vaccine nonsense, this represents a potential public health nightmare.

A few days after, Howard Lutnick, a co-chair of Trump’s transition team, appeared on CNN to deny that RFK Jr. would be put in charge of HHS. But he followed that with a long rant in which he echoed Kennedy’s spurious claims about vaccines. This provides yet another indication of how anti-vaccine activism has become deeply enmeshed with Republican politics, to the point where it may be just as bad even if Kennedy isn’t appointed.

Trump as Kennedy’s route to power

Kennedy has a long history of misinformation regarding health, with a special focus on vaccines. This includes the extensively debunked suggestion that there is a correlation between vaccinations and autism incidence, and it extends to a general skepticism about vaccine safety. That’s mixed with conspiracy theories regarding collusion between federal regulators and pharmaceutical companies.

While there is no evidence for any of this, and some of it is clearly wrong, the conspiracies have real-world consequences. An anti-vaccine activist in Samoa, aided by a visit from RFK Jr., helped pave the way for a measles outbreak that shut down the government and ultimately led to over 80 deaths.

Kennedy has long been interested in getting access to the agencies that regulate vaccines and other interests of his, such as food safety, under the assumption they are hiding the data that would vindicate his views. And, long before his recent presidential run, he viewed Trump as the route to that access. Shortly before Trump’s inauguration in 2017, Kennedy claimed that he would be appointed to head a vaccine safety commission that Trump would supposedly create once in office. Nothing ever came of that, and it was never clear whether that was due to Trump lying to him, Kennedy exaggerating his significance, or Trump simply telling him what he wanted to hear at the time and never following up.

RFK Jr. claims Trump promised to put him in charge of NIH, CDC, and more Read More »

colorado-scrambles-to-change-voting-system-passwords-after-accidental-leak

Colorado scrambles to change voting-system passwords after accidental leak


BIOS passwords on website

“The goal is to complete the password updates by this evening,” government says.

Colorado Secretary of State Jena Griswold holds press conference with Matt Crane, Executive Director of the Colorado County Clerks Association, at her office in Denver on Thursday, October 24, 2024. Credit: Getty Images | Hyoung Chang

The Colorado Department of State said it accidentally posted a spreadsheet containing “partial passwords” for voting systems. The department said there is no “immediate security threat” because two passwords are needed for each component, but it is trying to complete password changes by the end of today. There were reportedly hundreds of BIOS passwords accessible on the website for over two months before being removed last week.

A government statement issued Tuesday said the agency “is aware that a spreadsheet located on the Department’s website improperly included a hidden tab including partial passwords to certain components of Colorado voting systems. This does not pose an immediate security threat to Colorado’s elections, nor will it impact how ballots are counted.”

Secretary of State Jena Griswold told Colorado Public Radio that “we do not think there is an immediate security threat to Colorado elections, in part because partial passwords don’t get you anywhere. Two unique passwords are needed for every election equipment component. Physical access is needed. And under Colorado law, voting equipment is stored in secure rooms that require secure ID badges. There’s 24/7 video cameras. There’s restricted access to the secure ballot areas, strict chain of custody, and it’s a felony to access voting equipment without authorization.”

Griswold said her office learned about the spreadsheet upload at the end of last week and “immediately contacted federal partners and then we began our investigation.”

The department’s statement said the two passwords for each component “are kept in separate places and held by different parties” and that the “passwords can only be used with physical in-person access to a voting system.” Additionally, “clerks are required to maintain restricted access to secure ballot areas, and may only share access information with background-checked individuals. No person may be present in a secure area unless they are authorized to do so or are supervised by an authorized and background-checked employee.”

The department also cited “strict chain of custody requirements that track when a voting systems component has been accessed and by whom,” and it said that each “Colorado voter votes on a paper ballot, which is then audited during the Risk Limiting Audit to verify that ballots were counted according to voter intent.”

Goal is to change all passwords by this evening

Griswold described the upload as an accident and said the mistake was made by a civil servant who no longer works for the department. “Out of an abundance of caution, we have people in the field working to reset passwords and review access logs for affected counties,” she said.

Gov. Jared Polis and Griswold, who are both Democrats, issued a joint update about the password changes today. The Polis administration is providing support “to complete changes to all the impacted passwords and review logs to ensure that no tampering occurred.”

“The Secretary of State will deputize certain state employees, who have cybersecurity and technology expertise and have undergone appropriate background checks and training,” the statement said. “In addition to the Department of State Employees and in coordination with county clerks, these employees will only enter badged areas in pairs to update the passwords for election equipment in counties and will be directly observed by local elections officials from the county clerk’s office. The goal is to complete the password updates by this evening and verify the security of the voting components, which are secured behind locked doors by county clerks.”

Griswold said she is “thankful to the Governor for his support to quickly resolve this unfortunate mistake.” Griswold told Colorado Public Radio that her department has no reason to believe the passwords were posted with malicious intent, but said that “a personnel investigation will be conducted by an outside party to look into the particulars of how this occurred.”

GOP slams Griswold

The Colorado Republican Party criticized Griswold this week after receiving an affidavit from someone who said they accessed the BIOS passwords on the publicly available spreadsheet three times between August 8 and October 23. The file “contained over 600 BIOS passwords for voting system components in 63 of the state’s 64 counties” before being removed on October 24, the state GOP said.

The affidavit described how to reveal the passwords in the VotingSystemInventory.xlsx file. It said that right-clicking a worksheet tab and selecting “unhide” would reveal “a dialog box where the application user can select from one, several, or all four listed hidden worksheets contained in the file.” Three of these worksheets “appear to list Basic Input Output System (BIOS) passwords” for hundreds of individual voting system components, the affidavit said.

The state GOP accused Griswold of downplaying the security risk, saying that only one password is needed for BIOS access. “BIOS passwords are highly confidential, allowing broad access for knowledgeable users to fundamentally manipulate systems and data and to remove any trace of doing so,” the GOP said. The “passwords were not encrypted or otherwise protected,” the GOP said.

State GOP Chairman Dave Williams said the incident “represents significant incompetence and negligence, and it raises huge questions about password management and other basic security protocols at the highest levels within Griswold’s office.” He also claimed the breach could put “the entire Colorado election results for the vast majority of races, including the tabulation for the Presidential race in Colorado, in jeopardy unless all of the machines can meet the standards of a ‘Trusted Build’ before next Tuesday.”

US Rep. Lauren Boebert (R-Colo.) and other Republicans called on Griswold to resign. Griswold said she would stay on the job.

Griswold: “I’m going to keep doing my job”

Republicans in the state House “and Congresswoman Lauren Boebert are the same folks who have spread conspiracies and lies about our election systems over and over and over again,” Griswold told Colorado Public Radio. “Ultimately, a civil servant made a serious mistake and we’re actively working to address it.” Griswold added, “I have faced conspiracy theories from elected Republicans in this state, and I have not been stopped by any of their efforts and I’m going to keep on doing my job.”

Colorado previously had a voting-system breach orchestrated by former county clerk Tina Peters of Mesa County, who was sentenced to nine years in prison in early October. Peters, who promoted former President Donald Trump’s election conspiracy theories, oversaw a leak of voting-system BIOS passwords. Griswold said after the Peters conviction that “Tina Peters willfully compromised her own election equipment trying to prove Trump’s big lie.”

Testimony from the Peters case was cited in the GOP’s criticism of Griswold this week. “In the Tina Peters trial, a senior State official even testified that release of these passwords in a single county represented a grave threat. Here, they have been released for the whole state,” the state GOP said.

The Trump campaign called on Griswold to halt the processing of mail ballots and re-scan all mailed ballots that were already scanned.

Photo of Jon Brodkin

Jon is a Senior IT Reporter for Ars Technica. He covers the telecom industry, Federal Communications Commission rulemakings, broadband consumer affairs, court cases, and government regulation of the tech industry.

Colorado scrambles to change voting-system passwords after accidental leak Read More »

call-of-duty:-black-ops-6-accounted-for-19%-of-comcast-internet-traffic-last-week

Call of Duty: Black Ops 6 accounted for 19% of Comcast Internet traffic last week

You might think that since Call of Duty: Black Ops 6 (which was released last Friday) is the 21st game in the franchise, it wouldn’t be that highly anticipated. You’d be wrong. Last week’s entry set multiple records when it launched.

Specifically, Microsoft CEO Satya Nadella said the game set new records for Game Pass subscribers, particularly for a first-day game launch. That’s, of course, to be expected—Call of Duty was a major reason why Microsoft acquired Activision, the longtime publisher of the series.

It gets a little zanier, though. The Internet service provider Comcast says Black Ops 6 was directly responsible for 19 percent of its overall traffic the week of the launch, according to a report in The Verge.

That’s partly due to the game’s popularity, but it can also be attributed to its huge file size. A full install of Black Ops 6 can take up to just over 100GB, depending on your platform—and possibly as much as 300GB if you also install game modes tied to the previous entries in the series, like the immensely popular battle royale Warzone. That will wreak havoc on users’ data caps; Comcast imposes a 1.2TB monthly cap in many states.

Call of Duty: Black Ops 6 accounted for 19% of Comcast Internet traffic last week Read More »

toxic-x-users-sabotage-community-notes-that-could-derail-disinfo,-report-says

Toxic X users sabotage Community Notes that could derail disinfo, report says


It’s easy for biased users to bury accurate Community Notes, report says.

What’s the point of recruiting hundreds of thousands of X users to fact-check misleading posts before they go viral if those users’ accurate Community Notes are never displayed?

That’s the question the Center for Countering Digital Hate (CCDH) is asking after digging through a million notes in a public X dataset to find out how many misleading claims spreading widely on X about the US election weren’t quickly fact-checked.

In a report, the CCDH flagged 283 misleading X posts fueling election disinformation spread this year that never displayed a Community Note. Of these, 74 percent were found to have accurate notes proposed but ultimately never displayed—apparently due to toxic X users gaming Community Notes to hide information they politically disagree with.

On X, Community Notes are only displayed if a broad spectrum of X users with diverse viewpoints agree that the post is “helpful.” But the CCDH found that it’s seemingly easy to hide an accurate note that challenges a user’s bias by simply refusing to rate it or downranking it into oblivion.

“The problem is that for a Community Note to be shown, it requires consensus, and on polarizing issues, that consensus is rarely reached,” the CCDH’s report said. “As a result, Community Notes fail precisely where they are needed most.”

Among the most-viewed misleading claims where X failed to add accurate notes were posts spreading lies that “welfare offices in 49 states are handing out voter registration applications to illegal aliens,” the Democratic party is importing voters, most states don’t require ID to vote, and both electronic and mail-in voting are “too risky.”

These unchecked claims were viewed by tens of millions of users, the CCDH found.

One false narrative—that Dems import voters—was amplified in a post from Elon Musk that got 51 million views. In the background, proposed notes sought to correct the disinformation by noting that “lawful permanent residents (green card holders)” cannot vote in US elections until they’re granted citizenship after living in the US for five years. But even these seemingly straightforward citations to government resources did not pass muster for users politically motivated to hide the note.

This appears to be a common pattern on X, the CCDH suggested, and Musk is seemingly a multiplier. In July, the CCDH reported that Musk’s misleading posts about the 2024 election in particular were viewed more than a billion times without any notes ever added.

The majority of the misleading claims in the CCDH’s report seemed to come from conservative users. But X also failed to check a claim that Donald Trump “is no longer eligible to run for president and must drop out of the race immediately.” Posts spreading that false claim got 1.4 million views, the CCDH reported, and that content moderation misstep could potentially have risked negatively impacting Trump’s voter turnout at a time when Musk is campaigning for Trump.

Musk has claimed that while Community Notes will probably never be “perfect,” the fact-checking effort aspires to “be by far the best source of truth on Earth.” The CCDH has alleged that, actually, “most Community Notes are never seen by users, allowing misinformation to spread unchecked.”

Even X’s own numbers on notes seem low

On the Community Notes X account, X acknowledges that “speed is key to notes’ effectiveness—the faster they appear, the more people see them, and the greater effect they have.”

On the day before the CCDH report dropped, X announced that “lightning notes” have been introduced to deliver fact-checks in as little as 15 minutes after a misleading post is written.

“Ludicrously fast? Now reality!” X proclaimed.

Currently, more than 800,000 X users contribute to Community Notes, and with the lightning notes update, X can calculate their scores more quickly. That efficiency, X said, will either spike the amount of content removals or reduce sharing of false or misleading posts.

But while X insists Community Notes are working faster than ever to reduce harmful content spreading, the number of rapidly noted posts that X reports seems low. On a platform with an estimated 429 million daily active users worldwide, only about 400 notes were displayed within the past two weeks in less than an hour of a post going live. For notes that took longer—which the CCDH suggested is the majority if the fact-check is on a controversial topic—only about 60 more notes were displayed in more than an hour.

In July, an international NGO that monitors human rights abuses and corruption, Global Witness, found 45 “bot-like accounts that collectively produced around 610,000 posts” in a two-month period this summer on X, “amplifying racist and sexualized abuse, conspiracy theories, and climate disinformation” ahead of the UK general election.

Those accounts “posted prolifically during the UK general election,” then moved “to rapidly respond to emerging new topics amplifying divisive content,” including the US presidential race.

The CCDH reported that even when misleading posts get fact-checked, the original posts on average are viewed 13 times more than the note is seen, suggesting the majority of damage is done in the time before the note is posted.

Of course, content moderators are often called out for moving too slowly to remove harmful content, a Bloomberg opinion piece praising Community Notes earlier this year noted. That piece pointed to studies showing that “crowdsourcing worked just as well” as professional fact checkers “when assessing the accuracy of news stories,” concluding that “it may be impossible for any social media company to keep up, which is why it’s important to explore other approaches.”

X has said that it’s “common to see Community Notes appearing days faster than traditional fact checks,” while promising that more changes are coming to get notes ranked as “helpful” more quickly.

X risks becoming an echo chamber, data shows

Data that the market intelligence firm Sensor Tower recently shared with Ars offers a potential clue as to why the CCDH is seeing so many accurate notes that are never voted as “helpful.”

According to Sensor Tower’s estimates, global daily active users on X are down by 28 percent in September 2024, compared to October 2022 when Elon Musk took over Twitter. While many users have fled the platform, those who remained are seemingly more engaged than ever—with global engagement up by 8 percent in the same time period. (Rivals like TikTok and Facebook saw much lower growth, up by 3 and 1 percent, respectively.)

This paints a picture of X risking becoming an echo chamber, as loyal users engage more with the platform where misleading posts can seemingly easily go unchecked and buried notes potentially warp discussion in Musk’s “digital town square.”

When Musk initially bought Twitter, one of his earliest moves was to make drastic cuts to the trust and safety teams chiefly responsible for content-moderation decisions. He then expanded the role of Twitter’s Community Notes to substitute for trust and safety team efforts, where before Community Notes was viewed as merely complementary to broader monitoring.

The CCDH says that was a mistake and that the best way to ensure that X is safe for users is to build back X’s trust and safety teams.

“Our social media feeds have no neutral ‘town square’ for rational debate,” the CCDH report said. “In reality, it is messy, complicated, and opaque rules and systems make it impossible for all voices to be heard. Without checks and balances, proper oversight, and well-resourced trust and safety teams in place, X cannot rely on Community Notes to keep X safe.”

More transparency is needed on Community Notes

X and the CCDH have long clashed, with X unsuccessfully suing to seemingly silence the CCDH’s reporting on hate speech on X, which X claimed caused tens of millions in advertising losses. During that legal battle, the CCDH called Musk a “thin-skinned tyrant” who could not tolerate independent research on his platform. And a federal judge agreed that X was clearly suing to “punish” and censor the CCDH, dismissing X’s lawsuit last March.

Since then, the CCDH has resumed its reporting on X. In the most recent report, the CCDH urged that X needed to be more transparent about Community Notes, arguing that “researchers must be able to freely, without intimidation, study how disinformation and unchecked claims spread across platforms.”

The research group also recommended remedies, including continuing to advise that advertisers “evaluate whether their budgets are funding the misleading election claims identified in this report.”

That could lead brands to continue withholding spending on X, which is seemingly already happening. Sensor Tower estimated that “72 out of the top 100 spending US advertisers on X from October 2022 have ceased spending on the platform as of September 2024.” And compared to the first half of 2022, X’s ad revenue from the top 100 advertisers during the first half of 2024 was down 68 percent.

Most drastically, the CCDH recommended that US lawmakers reform Section 230 of the Communications Decency Act “to provide an avenue for accountability” by mandating risk assessments of social media platforms. That would “expose the risk posed by disinformation” and enable lawmakers to “prescribe possible mitigation measures including a comprehensive moderation strategy.”

Globally, the CCDH noted, some regulators have the power to investigate the claims in the CCDH’s report, including the European Commission under the Digital Services Act and the UK’s Ofcom under the Online Safety Act.

“X and social media companies as an industry have been able to avoid taking responsibility,” the CCDH’s report said, offering only “unreliable self-regulation.” Apps like X “thus invent inadequate systems like Community Notes because there is no legal mechanism to hold them accountable for their harms,” the CCDH’s report warned.

Perhaps Musk will be open to the CCDH’s suggestions. In the past, Musk has said that “suggestions for improving Community Notes are… always… much appreciated.”

Photo of Ashley Belanger

Ashley is a senior policy reporter for Ars Technica, dedicated to tracking social impacts of emerging policies and new technologies. She is a Chicago-based journalist with 20 years of experience.

Toxic X users sabotage Community Notes that could derail disinfo, report says Read More »

Unleashing Transformation

AI isn’t just another tool in the technology toolkit; it’s a revolution waiting to be led. As tech leaders, this is your moment—not merely to optimize but to revolutionize. This isn’t about minor efficiency gains; it’s about redefining what’s possible. AI has the potential to transform your specialists into versatile, strategic thinkers and to amplify your generalists into powerhouses of productivity. As the leader, you’re at the helm of this revolution, so lean into it. This is your chance to create something spectacular, to be the one who leads to the finish line. And when you cross it, don’t just celebrate—let everyone know you’re setting a new standard.

1. Start Small, But Think Big

Revolutions don’t always start with fireworks. They start with steady wins that build momentum. In AI, begin with small, budgetable projects—ones that can scale over time. These are about creating quick, valuable wins that prove AI’s worth to the business. But as you do this, keep the bigger picture in mind. These small steps should ladder up to a vision that’s much larger. With each project, you’re setting the stage for bigger transformations, paving the way for AI to eventually touch every corner of the organization.

2. Make Trust the Core Metric

In today’s IT landscape, trust is everything. The greatest silent threat to modern enterprises isn’t a technical vulnerability but shadow IT—the projects people start outside of sanctioned channels because they don’t trust IT to deliver. And with shadow IT comes unmanaged risk, scattered governance, and countless security gaps. To counteract this, focus on trust as your ultimate KPI. Trust isn’t measured by words; it’s seen in the number of projects in your backlog and the speed at which they’re delivered. If your backlog is robust and your delivery is steady, trust is growing. This isn’t just an IT metric; it’s a company-wide indicator of how aligned and connected your teams are. Bubble these metrics up, celebrate them, and make sure the whole organization knows that trust in IT is climbing.

3. Champions: The Lifeblood of Transformational Success

In AI and beyond, champions are everything. Champions don’t just amplify your work—they are the lifeblood of a culture of change. Think of them as the ultimate multiplier, bringing new projects to you and generating excitement for what’s possible. They’re the ones telling the story of AI’s value to their peers and advocating for your team’s contributions. The presence of champions signals that you’re creating a sustainable, scalable transformation that resonates at every level.

But here’s the kicker: champions don’t come from rigid structures or executive edicts. They’re grown organically, at the peer level, where their influence is strongest. Don’t force it or set arbitrary criteria; let champions emerge naturally, based on their enthusiasm and impact. Executive leaders can define what a champion looks like and provide air cover when needed, but let the team breathe life into it. Trust me, if you create an environment where people feel valued and rewarded for driving change, champions will come out in force.

And if you’re doing it right, champions will bring champions. With each new advocate in your ranks, you’re not only building momentum—you’re creating an unstoppable movement. A movement where your backlog is filled not by top-down initiatives but by genuine, grassroots demand for AI to make work better, faster, and more exciting.

4. Embrace Failure as a Learning Engine

The path to AI-driven success isn’t linear. It’s a loop of small experiments, constant adjustments, and, yes, failures. Each failure is just as valuable as a win; it’s a guidepost pointing out what doesn’t work so you can zero in on what does. If a project falters, don’t overanalyze. Just pick another approach, adjust, and try again. Like any scientist, identify your variables, change one at a time, and see what sticks. Failure, in this context, isn’t the enemy—it’s a tool for refinement, a path to the ideal solution.

5. Build a Culture of Feedback and Recognition

For this revolution to succeed, feedback must flow freely. You want all ideas—not just the “good” ones. Keep feedback channels open and easy, and make sure people know they’re being heard. Even when a suggestion doesn’t pan out, employees should feel valued in the process. Celebrate wins loudly and visibly. Acknowledge everyone who contributes to a successful project, regardless of their role. Set up a dashboard to track accepted ideas and feature requests, and make it public. Broadcast the wins far and wide—in newsletters, on office screens, in board reports. Recognition shouldn’t be just an afterthought; it should be a cornerstone of the culture you’re building.

Rewarding each accepted idea, even in small ways like a coffee gift card, creates a culture where people feel inspired to bring their best ideas forward. It’s not about setting up hoops to jump through; it’s about creating a space where people are excited to contribute.

6. Lead the Charge, Don’t Micromanage the Details

Your role as a leader isn’t in the trenches; it’s in the vision. Enable your team to succeed by setting the direction, then letting them own the journey. Guide, support, and celebrate their wins, but resist the urge to do the work for them. Give them the autonomy to test, iterate, and implement. This approach builds both capability and confidence, giving your team the space to become their own champions for change.

7. When You’ve Built Enough Champions, Scale Up

When the number of champions in your organization reaches a critical mass, you’ll have the trust and support to move from smaller projects to transformative ones. By then, your backlog will be brimming with projects that have organic buy-in, and your team will be experienced enough to handle larger, more complex initiatives. This is where the revolution goes full-scale. And remember: the more you focus on trust, champion growth, and continuous feedback, the easier it will be to sustain this momentum.

Call to Action: Seize the Revolution

The era of incrementalism is over. This is your chance to redefine what it means to be a transformational leader. Trust, champions, and a culture of continuous learning aren’t just buzzwords—they’re the foundation of an AI-driven revolution that you, as a tech leader, are uniquely positioned to lead. Don’t just let AI happen to your organization; use it to drive unparalleled value and unleash your team’s true potential.

And if you’re ready to go deeper, to push harder, and to make this transformation a reality, let’s talk. Reach out to me and my team to explore how we can support you on this journey. Together, we’ll make sure your organization doesn’t just adopt AI but thrives because of it.

Unleashing Transformation Read More »

apple-silicon-macs-will-get-their-ultimate-gaming-test-with-cyberpunk-2077-release

Apple silicon Macs will get their ultimate gaming test with Cyberpunk 2077 release

Cyberpunk 2077, one of the most graphically demanding and visually impressive games in recent years, will soon get a Mac release, according to developer and publisher CD Projekt Red.

The announcement was published on CD Projekt Red’s blog and also appeared briefly during Apple’s pre-recorded MacBook Pro announcement video. The game will be sold on the Mac App Store, Steam, GOG, and the Epic Game Store when it launches, and it will be labeled the Cyberpunk 2077: Ultimate Edition, which simply means it also includes Phantom Liberty, the expansion that was released a couple of years after the original game.

Cyberpunk 2027 launched in a rough state in 2020, especially on low-end hardware. Subsequent patches and a significant overhaul with Phantom Liberty largely redeemed it in critics’ eyes—the result of all that post-launch work is the version Mac users will get.

Apple has been working with AAA game publishers to try and get the games they made for consoles or Windows gaming PCs onto the Mac or iPhone, including Assassin’s Creed Mirage, Death Stranding, and Resident Evil Village, among others. But the addition of Cyberpunk 2077 is notable because of its history of running poorly on low-end hardware, and because it uses new technologies like ray-traced illumination, reflections, and shadows. It also heavily relies on AI upscaling like DLSS or FSR to be playable even on high-end machines.

Apple silicon Macs will get their ultimate gaming test with Cyberpunk 2077 release Read More »

proton-is-the-latest-entrant-in-the-quirky-“vpn-for-your-tv”-market

Proton is the latest entrant in the quirky “VPN for your TV” market

Netflix started blocking VPN and proxy providers as early as 2015, then stepped up its efforts in 2021. VPN providers aiming to keep up geofence-avoiding services to customers would sometimes lease IP addresses generally associated with residential IP subnets. This resulted in Netflix banning larger swaths of IP addresses that VPNs were using as exit proxies.

Amazon’s Prime Video, Parmount+, and other services, including the BBC, have similarly ramped up efforts to block anything resembling tunneled traffic. Proton has, for example, a guide to “unblock Amazon Prime Video with Proton VPN“; Proton also writes on that page that it “does not condone the use of our VPN service to bypass copyright regulations.”

You can search the web and find freshly updated lists of the best VPNs for getting around various services’ geo-filtering blocks, but the fact that so many are dated by the year, or even month, gives you some clue as to how effective any one solution may be.

For the purposes of getting back to the content you’re entitled to view, or maybe keeping your viewing habits private on an Apple TV you’re using outside your home, Proton VPN is likely more useful. As for the other stuff, hey, it might be worth a shot. Using the Apple TV app requires a paid Proton VPN plan.

Proton is the latest entrant in the quirky “VPN for your TV” market Read More »

“impact-printing”-is-a-cement-free-alternative-to-3d-printed-structures

“Impact printing” is a cement-free alternative to 3D-printed structures

Recently, construction company ICON announced that it is close to completing the world’s largest 3D-printed neighborhood in Georgetown, Texas. This isn’t the only 3D-printed housing project. Hundreds of 3D-printed homes are under construction in the US and Europe, and more such housing projects are in the pipeline.

There are many factors fueling the growth of 3D printing in the construction industry. It reduces the construction time; a home that could take months to build can be constructed within days or weeks with a 3D printer. Compared to traditional methods, 3D printing also reduces the amount of material that ends up as waste during construction. These advantages lead to reduced labor and material costs, making 3D printing an attractive choice for construction companies.

A team of researchers from the Swiss Federal Institute of Technology (ETH) Zurich, however, claims to have developed a robotic construction method that is even better than 3D printing. They call it impact printing, and instead of typical construction materials, it uses Earth-based materials such as sand, silt, clay, and gravel to make homes. According to the researchers, impact printing is less carbon-intensive and much more sustainable and affordable than 3D printing.

This is because Earth-based materials are abundant, recyclable, available at low costs, and can even be excavated at the construction site. “We developed a robotic tool and a method that could take common material, which is the excavated material on construction sites, and turn it back into usable building products, at low cost and efficiently, with significantly less CO2 than existing industrialized building methods, including 3D printing,” said Lauren Vasey, one of the researchers and an SNSF Bridge Fellow at ETH Zurich.

How does impact printing work?

Excavated materials can’t be used directly for construction. So before beginning the impact printing process, researchers prepare a mix of Earth-based materials that has a balance of fine and coarse particles, ensuring both ease of use and structural strength. Fine materials like clay act as a binder, helping the particles stick together, while coarser materials like sand or gravel make the mix more stable and strong. This optimized mix is designed such that it can move easily through the robotic system without getting stuck or causing blockages.

“Impact printing” is a cement-free alternative to 3D-printed structures Read More »

how-the-new-york-times-is-using-generative-ai-as-a-reporting-tool

How The New York Times is using generative AI as a reporting tool

If you don’t have a 1960s secretary who can do your audio transcription for you, AI tools can now serve as a very good stand-in.

Credit: Getty Images

If you don’t have a 1960s secretary who can do your audio transcription for you, AI tools can now serve as a very good stand-in. Credit: Getty Images

This rapid advancement is definitely bad news for people who make a living transcribing spoken words. But for reporters like those at the Times—who can now accurately transcribe hundreds of hours of audio quickly and accurately at a much lower cost—these AI systems are now just another important tool in the reporting toolbox.

Leave the analysis to us?

With the automated transcription done, the NYT reporters still faced the difficult task of reading through 5 million words of transcribed text to pick out relevant, reportable news. To do that, the team says it “employed several large-language models,” which let them “search the transcripts for topics of interest, look for notable guests and identify recurring themes.”

Summarizing complex sets of documents and identifying themes has long been touted as one of the most practical uses for large language models. Last year, for instance, Anthropic hyped the expanded context window of its Claude model by showing off its ability to absorb the entire text of The Great Gatsby and “then interactively answer questions about it or analyze its meaning,” as we put it at the time. More recently, I was wowed by Google’s NotebookLM and its ability to form a cogent review of my Minesweeper book and craft an engaging spoken-word podcast based on it.

There are important limits to LLMs’ text analysis capabilities, though. Earlier this year, for instance, an Australian government study found that Meta’s Llama 2 was much worse than humans at summarizing public responses to a government inquiry committee.

Australian government evaluators found AI summaries were often “wordy and pointless—just repeating what was in the submission.”

Credit: Getty Images

Australian government evaluators found AI summaries were often “wordy and pointless—just repeating what was in the submission.” Credit: Getty Images

In general, the report found that the AI summaries showed “a limited ability to analyze and summarize complex content requiring a deep understanding of context, subtle nuances, or implicit meaning.” Even worse, the Llama summaries often “generated text that was grammatically correct, but on occasion factually inaccurate,” highlighting the ever-present problem of confabulation inherent to these kinds of tools.

How The New York Times is using generative AI as a reporting tool Read More »

study:-dna-corroborates-“well-man”-tale-from-norse-saga

Study: DNA corroborates “Well-man” tale from Norse saga

The results: The Well-man was indeed male, between 30 and 40, with blue eyes and blond or light-brown hair, and his ancestry was traced to southern Norway, most likely present-day Vest-Agder. This is interesting because King Sverre’s men were from central Norway, and it had long been assumed that the dead body thrown into the well was part of that army. It was the invading Baglers who hailed from southern Norway. The authors are careful to note that one cannot definitively conclude that therefore the Well-man was a Bagler, but it’s certainly possible that the Baglers tossed one of their own dead into the well.

As for whether the action was a form of 12th-century biological warfare intended to poison the well, the authors weren’t able to identify any pathogens in their analysis. But that might be because of the strict decontamination procedures that were used to prepare the tooth samples, which may have also removed traces of any pathogen DNA. So they could not conclude one way or another whether the Well-man had been infected with a deadly pathogen at the time of his death.

Seven well-man teeth recovered from excavation

Seven Well-man teeth recovered from the excavation.

Credit: Norwegian Institute for Cultural Heritage Research

Seven Well-man teeth recovered from the excavation. Credit: Norwegian Institute for Cultural Heritage Research

“It was a compromise between removing surface contamination of the people who have touched the tooth and then removing some of the possible pathogens. There are lots of ethical considerations,” said co-author Martin Ellegaard, also of the Norwegian University of Science and Technology. “We need to consider what kind of tests we’re doing now because it will limit what we can do in the future.”

The fact that the Well-man hailed from southern Norway indicates that the distinctive genetic drift observed in southern Norway populations already existed during King Sverre’s reign. “This has implications for our understanding of Norwegian populations, insofar as it implies that this region must have been relatively isolated not only since that time, but also at least for a few hundred years beforehand and perhaps longer,” the authors concluded. Future research sequencing more ancient Norwegian DNA would shed further light on this finding—perhaps even the remains of the Norwegian Saint Olaf, believed to be buried near Trondheim Cathedral.

iScience, 2024. DOI: 10.1016/j.isci.2024.111076  (About DOIs).

Study: DNA corroborates “Well-man” tale from Norse saga Read More »