Daily Tech Digest - June 16, 2024

Human and AI Partnership Drives Manufacturing and Distribution Forward

Industry 5.0 offers a promising solution to the persistent challenge of labor shortages. By fostering a symbiotic dynamic between humans and robots, it lightens the resourcing burden. Human workers bring adaptability and problem-solving skills to the table, while robots contribute to speed and precision in task handling. This collaboration not only boosts job satisfaction and productivity but also promotes employee skill development and reduces overall errors. Moreover, for any hazardous tasks, Industry 5.0 assigns robots to handle physically demanding or risky duties, enhancing safety and minimizing human error in critical situations, thus creating a healthier work environment. It can also significantly enhance supply chain resilience, a critical concern on every manufacturer and distributor’s radar following the recent Red Sea crisis. Leveraging real-time data analytics and AI-driven insights assists human decision-making in predicting and mitigating disruptions. Advanced sensors and IoT devices continuously monitor supply chain activities, including early detection of potential issues such as transportation delays or inventory shortages. 


Beyond Traditional: Why Cybersecurity Needs Neurodiversity

Neurodiverse individuals often exhibit exceptional logical and methodical thinking, attention to detail, and cognitive pattern recognition skills. For example, they can hyperfocus on tasks, giving complete attention to specific issues for prolonged periods, which is invaluable in identifying and mitigating security threats. Their ability to engage deeply in their work ensures that even the smallest anomalies are detected and addressed swiftly. Moreover, many neurodiverse individuals thrive on repetitive tasks and routines, finding comfort and even excitement in long, monotonous processes. This makes them well-suited for roles that involve continuous monitoring and analysis of security data. Their high levels of concentration and persistence allow them to stay on task until solutions are found, ensuring thorough and effective problem-solving. Creativity is another significant benefit that neurodiverse individuals bring to cybersecurity. Their unique, nonlinear thinking enables them to approach problems from different angles and develop innovative solutions. This creativity is crucial for devising new methods to counteract evolving cyber threats. 


Missing Links: How to ID Supply Chain Risks

Current events seem to indicate that supply chain resilience is something companies need to master, sooner rather than later. To get there, they need real-time, end-to-end visibility into supply chain issues and the ability to proactively plan for various types of supply chain risks. “We have discussed the next best action for decades in our supply chains and operations, but realistically, we have never had the flexibility in our process and systems to enable that,” says Protiviti’s Petrucci. “As the world is adopting cloud and more cloud-native design and thinking it will enable us to move close to breaking away from the traditional systems and design more capable supply chain risk, execution, and next best action capabilities. We have started to enable our customers in moving in this direction.” ... The increasing risk of being tied to one region is now at the highest level ever, and I believe we’ll continue to see a shift in supplier sourcing strategies, with the pendulum swinging towards regional diversification,” says Fictiv’s Evans. “Regional optionality continues to be top of mind for supply chain leaders based on geopolitical uncertainties and the need to mitigate risk where possible. 


Human I/O: Detecting situational impairments with large language models

Situational impairments can vary greatly and change frequently, which makes it difficult to apply one-size-fits-all solutions that help users with their needs in real-time. For example, think about a typical morning routine: while brushing their teeth, someone might not be able to use voice commands with their smart devices. When washing their face, it could be hard to see and respond to important text messages. And while using a hairdryer, it might be difficult to hear any phone notifications. Even though various efforts have created solutions tailored for specific situations like these, creating manual solutions for every possible situation and combination of challenges isn't really feasible and doesn't work well on a large scale. ... Rather than devising individual models for activities like face-washing, tooth-brushing, or hair-drying, Human Input/Output (Human I/O) universally assesses the availability of a user’s vision (e.g., to read text messages, watch videos), hearing (e.g., to hear notifications, phone calls), vocal (e.g., to have a conversation, use Google Assistant), and hand (e.g., to use touch screen, gesture control) input/output interaction channels.


Do IDEs Make You Stupid?

An IDE can be an indispensable tool when used to help a developer think better. But when it’s used as a means of automation while removing the developer’s need to understand the underlying tasks of modern computer programming, an IDE can be a detriment. No doubt, an IDE provides a benefit by automating programming tasks that are tedious and repetitive, or even those tasks that require the programmer to do a lot of typing. Still, those commands are there for a reason, and a developer would do well to understand the details of what they’re about and why they need to be done. ... The “hiding the math” aspect of using an IDE might not matter to senior developers who have the experience and insight to understand the hidden details that an IDE has automated. However, for an entry-level developer, using an IDE without understanding what it’s doing behind the scenes can limit the developer’s ability to do the type of more advanced work that’s needed to progress in their career. Knowing the details is important. ... An IDE can improve cognitive ergonomics, but you must want it to. Passive interaction with the tool will get you only so far. 


How to streamline data center sustainability governance

Achieving sustainability goals requires an extensive understanding of energy systems – specifically how, where, and when power is used. Eaton’s Brightlayer Data Centers suite includes the industry’s first digital platform that natively integrates asset management, IT and operational technology (OT) device monitoring, IT automation, power quality metrics, and one-line diagrams into a single, configurable application. Leveraging decades of expertise in the data center industry (from low- and medium-voltage switchgear and transformers to uninterruptible power supplies, battery storage, and power distribution units) this platform consolidates information traditionally siloed in disparate applications. ... More effective data and reporting on sustainability will help future-proof compliance, uncover opportunities to reduce resource consumption, increase customer satisfaction, and differentiate businesses. This approach improves data center performance by applying digitalization to make assets work harder, smarter, and more sustainably.


Why we don't have 128-bit CPUs

You might think 128-bit isn’t viable because it’s difficult or impossible, but that’s not the case. Many components in modern processors, like memory buses and SIMD units, already utilize 128-bit or larger sizes for specific tasks. For instance, the AVX-512 instruction set allows for 512-bit wide data processing. These SIMD (Single Instruction, Multiple Data) instructions have evolved from 32-bit to 64-bit, 128-bit, 256-bit, and now 512-bit operands, demonstrating significant advancements in parallel processing capabilities. ... The only significant use cases for 128-bit integers are IPv6 addresses, universally unique identifiers (or UUID) that are used to create unique IDs for users (Minecraft is a high-profile use case for UUID), and file systems like ZFS. The thing is, 128-bit CPUs aren't necessary to handle these tasks, which have been able to exist just fine on 64-bit hardware. Ultimately, the key reason why we don't have 128-bit CPUs is that there's no demand for a 128-bit hardware-software ecosystem. The industry could certainly make it if it wanted to, but it simply doesn't.


A New Tactic in the Rapid Evolution of QR Code Scams

Because the QR code has ASCII characters behind it, security system may ignore it, thinking it’s a clean email. “Attack forms all evolve,” Fuchs wrote. “QR code phishing is no different. It’s unique, though, that the evolution has happened so rapidly. It started off with standard MFA verification codes. These were pretty straight forward, asking users to scan a code, either to re-set MFA or even look at financial data like an annual 401k contribution.” The next iteration – what Fuchs called QR Code Phishing 2.0 – involved conditional routing attacks, where the link adjusts to where the victim is interacting with it. If the target is using an Apple Mac system, one link appears. Another one will appear if the user is on a smartphone running Android. “We also saw custom QR Code campaigns, where hackers are dynamically populating the logo of the company and the correct username,” he wrote. This newest phase (“QR Code 3.0”) is more of a manipulation campaign, where it is using a text-based representation of a QR code rather than a traditional one. “It also represents how threat actors are responding to the landscape,” he wrote. 


'Sleepy Pickle' Exploit Subtly Poisons ML Models

Poisoning a model in this way carries a number of advantages to stealth. For one thing, it doesn't require local or remote access to a target's system, and no trace of malware is left to the disk. Because the poisoning occurs dynamically during deserialization, it resists static analysis. Serialized model files are hefty, so the malicious code necessary to cause damage might only represent a small fraction of the total file size. And these attacks can be customized in any number of ways that regular malware attacks are to prevent detection and analysis. While Sleepy Pickle can presumably be used to do any number of things to a target's machine, the researchers noted, "controls like sandboxing, isolation, privilege limitation, firewalls, and egress traffic control can prevent the payload from severely damaging the user’s system or stealing/tampering with the user’s data." More interestingly, attacks can be oriented to manipulate the model itself. For example, an attacker could insert a backdoor into the model, or manipulate its weights and, thereby, its outputs.


Digital Twins In Meetings? Not Any Time Soon

The benefits of having a digital twin are very interesting. To start, consider productivity, Bloomfilter founder and CEO Erik Severinghaus told Reworked. Your twin could manage everyday tasks and find problems before they become major headaches. However, there are many problems to solve first. The first thing to understand is how exactly these digital twins would copy us. He also raised the question of security, ensuring these AI versions of us cannot be used to create problems in our lives. Finally, while it is often overlooked, organizations need to keep ethical considerations in mind, Severinghaus continued. Are all employees OK with how their data and images get used by these digital twins? And what about future malicious use cases that no one has even imagined yet? ... While Yuan predicted the use of digital twins at an undetermined future date on the podcast, it clearly is still speculative. Let's just say you're safe from attending a meeting with a digital twin for now. However, given where we were with AI just 18 months ago, we suspect Yuan's vision becoming a reality might not be as far off in the future as you'd think.



Quote for the day:

"Be willing to make decisions. That's the most important quality in a good leader." -- General George S. Patton, Jr.

No comments:

Post a Comment