Zipf's Law in Whale Song: A Striking Similarity in Cultural Learning

2025-02-07
Zipf's Law in Whale Song: A Striking Similarity in Cultural Learning

New research reveals that humpback whale songs exhibit the same Zipfian distribution found in human languages—the most frequent word is twice as frequent as the second, and so on. Researchers analyzed eight years of whale song recordings, using techniques inspired by how human infants learn language, to uncover this pattern. This suggests both human language and whale song possess statistically coherent parts, following Zipf's law, likely because cultural learning makes learning easier and promotes the emergence of these properties. However, this doesn't mean we can talk to whales; the meaning of whale song remains unknown. Future research will explore other species, such as songbirds, to test whether cultural learning is the common driver of this phenomenon.

Read more

UK Secretly Demands Apple iCloud Backdoor Access

2025-02-07
UK Secretly Demands Apple iCloud Backdoor Access

The UK government secretly demanded Apple provide backdoor access to all encrypted user data on iCloud, according to The Washington Post. This unprecedented demand, delivered via a technical capability notice, requires Apple to bypass its own encryption, granting UK security officials unfettered access globally. Apple may choose to cease offering encrypted iCloud storage in the UK rather than comply, a move consistent with CEO Tim Cook's long-held stance against backdoors. The revelation highlights the ongoing tension between government surveillance and user privacy.

Read more

OpenAI Cofounder Jumps Ship to Mysterious AI Startup

2025-02-07
OpenAI Cofounder Jumps Ship to Mysterious AI Startup

John Schulman, OpenAI cofounder, left Anthropic after only five months to join a stealth startup founded by former OpenAI CTO Mira Murati. The reasons for Schulman's swift departure remain unclear, as does his role at the unnamed startup. This secretive company has already made headlines for attracting talent from OpenAI, Character AI, and Google DeepMind, and has reportedly secured over $100 million in funding. While Schulman previously cited a desire to focus on AI alignment research, the specifics behind his move remain undisclosed.

Read more

The King in Yellow: A Blend of Gothic Horror and Romance

2025-02-07
The King in Yellow: A Blend of Gothic Horror and Romance

Robert W. Chambers' 1895 collection of short stories, *The King in Yellow*, is a bizarre blend of gothic horror, supernatural elements, and romance. The nine stories and a sequence of poems begin with a macabre tone, revolving around a forbidden play, *The King in Yellow*, which drives readers to madness and introduces a malevolent entity. The first four tales are steeped in eerie atmosphere and supernatural horror, while the latter stories transition to a more lighthearted, romantic style, focusing on Parisian artists. This influential work has left a lasting mark, impacting H.P. Lovecraft's Cthulhu Mythos and inspiring modern works like the first season of *True Detective*.

Read more

InspectMind AI: Hiring AI Engineers for 100x Productivity Boost in Construction

2025-02-07
InspectMind AI: Hiring AI Engineers for 100x Productivity Boost in Construction

InspectMind AI is building AI applications to revolutionize inspections in construction, real estate, and infrastructure. They're looking for experienced full-stack engineers to join a team of experts from Google, Airbnb, and top universities. The role involves designing and building end-to-end AI solutions, integrating with hardware like smart glasses, and leveraging cutting-edge LLM technology. This is a fast-paced environment with a focus on rapid iteration and direct customer interaction.

Read more
AI

Critical Android Zero-Day: CVE-2024-53104 Exploited in the Wild

2025-02-07
Critical Android Zero-Day: CVE-2024-53104 Exploited in the Wild

A critical zero-day vulnerability, CVE-2024-53104, affecting the Linux kernel's USB Video Class (UVC) driver, allows privilege escalation on Android devices without additional permissions. Actively exploited in the wild, this flaw enables attackers to install malware, alter data, or gain full administrative control. Google has released emergency patches, but immediate updates are crucial for all Android users. This vulnerability highlights the ongoing threat of zero-day exploits and the importance of timely patching.

Read more
Tech

Meta's Alleged Illegal Torrenting of Books for AI Training: New Evidence Surfaces

2025-02-07
Meta's Alleged Illegal Torrenting of Books for AI Training: New Evidence Surfaces

Newly surfaced emails reveal Meta allegedly used the shadow library LibGen to train its AI models, employing torrenting to download and seed terabytes of data. Internal messages suggest high-level knowledge and attempts to conceal the activity. Authors allege direct copyright infringement and demand further depositions, contradicting previous testimony. Meta maintains its actions constituted fair use, but the new evidence complicates its legal defense and expands the scope of the copyright infringement claim.

Read more
Tech

Boeing's Starliner Program: Over $2 Billion in Losses

2025-02-07
Boeing's Starliner Program: Over $2 Billion in Losses

Boeing reported a $523 million loss on its CST-100 Starliner program in 2024, bringing the total losses to over $2 billion. The losses are attributed to schedule delays, increased testing and certification costs, and higher post-certification mission costs. While NASA reported progress on resolving issues from a previous test flight, key problems, including thruster malfunctions, remain unresolved. The timeline for Starliner's next flight, whether crewed or uncrewed, remains uncertain.

Read more
Tech

Run DeepSeek R1 Reasoning Models Effortlessly on AMD Ryzen AI Processors

2025-02-07
Run DeepSeek R1 Reasoning Models Effortlessly on AMD Ryzen AI Processors

DeepSeek R1, a new class of reasoning models, tackles complex tasks using chain-of-thought (CoT) reasoning, albeit with a longer response time. These highly capable, distilled DeepSeek R1 models are now easily deployable on AMD Ryzen™ AI processors and Radeon™ graphics cards via LM Studio. The article provides a step-by-step guide to running various DeepSeek R1 distillations on different AMD hardware configurations, including recommended model sizes and quantization settings for optimal performance.

Read more

Self-Taught AI Researcher Emil Wallner: An Extraordinary Journey

2025-02-07
Self-Taught AI Researcher Emil Wallner: An Extraordinary Journey

Emil Wallner, a self-taught AI researcher, has an extraordinary life story. From teaching in a rural village in Africa to becoming a machine learning researcher at Google Art & Culture, his career is full of adventure and challenges. He created the popular open-source project Screenshot-to-code, which translates design mock-ups into HTML/CSS, and was featured in a short film by Google for his work on automated colorization. This interview delves into Emil's AI journey, his advice for aspiring self-taught research scientists, and his insights into the future of AI research. He emphasizes the importance of practical experience and building a strong portfolio to gain recognition in the field.

Read more

Google reCAPTCHA vs. GDPR: Privacy Risks and Solutions

2025-02-07

Google's reCAPTCHA technology, used to identify website visitors as human, clashes with the GDPR. reCAPTCHA analyzes user behavior (mouse movements, keystrokes, etc.) and collects personal data like IP addresses and browser information to assess user identity. Since explicit consent isn't obtained, website operators need to justify reCAPTCHA's use, which is difficult given Google's opaque data practices and the unquantifiable privacy risks. The article recommends using more privacy-friendly alternatives and emphasizes transparency, obtaining user consent, and data minimization.

Read more
Development

Missile Software's 'Null Garbage Collector': Memory Leaks? Not a Problem!

2025-02-07
Missile Software's 'Null Garbage Collector': Memory Leaks?  Not a Problem!

A developer recounts a clever application of a 'null garbage collector' in missile software. Because of the limited flight time and ample hardware memory, memory leaks in the program weren't a concern. Engineers calculated the potential memory leakage during flight and added double that amount of memory to ensure the program wouldn't crash before mission completion. This approach cleverly leveraged the program's runtime constraints, effectively solving the memory leak issue—a kind of 'ultimate garbage collection'.

Read more

16TB Archive of US Federal Public Datasets Released

2025-02-07
16TB Archive of US Federal Public Datasets Released

Harvard Law School researchers have released a 16TB archive containing over 311,000 datasets, a complete archive of data.gov from 2024 and 2025. The project aims to preserve the integrity and authenticity of data by maintaining detailed metadata and digital signatures, making it easier for researchers and the public to cite and access this information over time. Open-source software and documentation are also released to enable others to replicate the work and create similar repositories. The project is supported by the Filecoin Foundation and the Rockefeller Brothers Fund.

Read more

Kill the "User": A disillusioned technologist's reflections

2025-02-07

A technologist reflects on the current state of tech companies treating users as commodities to be manipulated. The article critiques how 'user experience' design, under the guise of user-centricity, actually maximizes corporate profits by minimizing interfaces and exploiting user data, leading to poor user experiences and digital burnout. The author proposes 'killing the user' – a shift towards more human-centered technology development, exemplified by personal computing, dignity design, folk software, and small software, ultimately aiming for a harmonious coexistence between humans and technology.

Read more
Tech

NASA's First-Ever Twitch Stream from the ISS!

2025-02-07
NASA's First-Ever Twitch Stream from the ISS!

NASA is hosting its first-ever live Twitch stream from the International Space Station (ISS) on February 12th at 11:45 AM ET! Astronauts Don Pettit and Matt Dominick will discuss daily life aboard the ISS and microgravity research, taking live questions from viewers. This marks NASA's first Twitch-exclusive stream from space, following previous streams of spacewalks, launches, and landings, and promises more to come.

Read more

HTML Whitespace: A Deep Dive into the Mess and Potential Solutions

2025-02-07
HTML Whitespace: A Deep Dive into the Mess and Potential Solutions

This article delves deep into the complexities of whitespace handling in HTML. Through numerous examples, the author reveals the various rules governing HTML's whitespace treatment, including the differences between inline and block elements, `

` tags, and the `white-space` CSS property, and how they lead to unpredictable rendering results.  The article also analyzes the challenges faced by automated formatters, content management systems, and minification tools when dealing with HTML whitespace.  A potential solution is proposed: using a quoting syntax to distinguish between code whitespace and user-visible whitespace, though it's acknowledged this would be a massive breaking change.  Finally, the author suggests practical tips to mitigate issues arising from HTML whitespace handling and proposes adding a new HTML entity `&ncsp;` to represent a non-collapsing space.

Read more
Development

Google's Android XR Camera Access: As Easy as on Your Phone

2025-02-07
Google's Android XR Camera Access: As Easy as on Your Phone

This article reveals Google's approach to camera access in its Android XR system. Similar to phones, developers can access camera data with user permission, utilizing standard Android Camera APIs (like CameraX) for image streams. While the front camera is accessible (showing a user avatar), the rear camera provides a reconstructed image, not the raw data stream. This mirrors Apple's Vision Pro strategy, ensuring seamless Android app porting to XR devices and maintaining consistent permission requests across phones and headsets. Android XR is currently in preview, so future changes are possible.

Read more
Development Camera Access

Stack Overflow's AI Answer Experiment: A Recipe for Disaster?

2025-02-07
Stack Overflow's AI Answer Experiment: A Recipe for Disaster?

Stack Overflow's planned experiment to incorporate AI-generated answers has sparked significant backlash from the community. The author argues that the experiment is based on a flawed premise: attempting to replace high-quality answers from human experts with AI. This will not only waste time and money but also damage the platform's core value—reliable answers from experts. The article details the potential negative impacts of the experiment, including: increased moderator workload, decreased expert participation, inability to guarantee answer accuracy, and potential user exodus. The author concludes that the experiment's potential gains are extremely low, while the risks are very high, ultimately resulting in a counterproductive outcome that harms Stack Overflow's reputation and community vitality.

Read more
Development

UCLA Scientists Wake Up Dormant Hair Follicles, Promising a Cure for Baldness

2025-02-07
UCLA Scientists Wake Up Dormant Hair Follicles, Promising a Cure for Baldness

UCLA scientists have developed PP405, a small molecule that reactivates dormant hair follicles, offering a potential cure for baldness. Nearly a decade of lab work culminated in promising 2023 human trials, showing topical application of PP405 stimulates growth of healthy, full-length hair, unlike other treatments. Led by three researchers, the breakthrough has spurred the creation of a company backed by Google Ventures to pursue further trials and FDA approval, offering hope for millions suffering from hair loss.

Read more

arXivLabs: Community Collaboration on New arXiv Features

2025-02-07
arXivLabs: Community Collaboration on New arXiv Features

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on the arXiv website. Individuals and organizations involved share arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners who uphold them. Got an idea for a project that will benefit the arXiv community? Learn more about arXivLabs.

Read more
Development

Maria Montessori: A Revolutionary in Education

2025-02-07
Maria Montessori: A Revolutionary in Education

Maria Montessori, an Italian physician and educator, revolutionized education with her unique method. Initially pursuing engineering, she defied societal norms to become one of Italy's first female medical doctors. Her Montessori method, emphasizing self-directed learning and child-led exploration through specially designed materials and environments, gained global recognition. From its humble beginnings in a Roman classroom, the Montessori approach continues to shape education worldwide, impacting countless children and leaving a lasting legacy on pedagogical practices.

Read more

PPP Loan Map: Visualizing the Flow of COVID Relief Funds

2025-02-07

Ever wondered where the massive PPP loan money went? Now you can explore it interactively! This map visualizes public data on Paycheck Protection Program loans, letting you search by ZIP code, business type, or age. See the big picture of loan distribution across the US, explore your local area to see which businesses received funding, all without wading through spreadsheets. Simply click, zoom, and discover the stories the data tells.

Read more

Escaping Meta's Surveillance State: Practical Steps to Limit Data Tracking

2025-02-07
Escaping Meta's Surveillance State: Practical Steps to Limit Data Tracking

Meta's business model relies on extensive data collection across millions of websites and apps, even if you delete your Facebook and Instagram accounts. This article reveals Meta's data harvesting methods and provides practical steps to limit its tracking, including updating Meta account settings, installing the Privacy Badger browser extension, and disabling your phone's advertising ID and location access. Ultimately, the author calls for strong federal privacy legislation to truly protect user data from exploitation.

Read more
Tech tracking

Memory Safety Standardization: A Path to Secure Software

2025-02-07

For decades, endemic memory-safety vulnerabilities in software trusted computing bases (TCBs) have fueled malware and devastating attacks. This article argues for memory-safety standardization as a crucial step towards universal strong memory safety. Recent advancements in memory-safe languages, hardware/software protections, formal methods, and compartmentalization offer solutions, but a lack of shared terminology hinders adoption. Standardization would improve industry best practices and address market failures preventing widespread use of these technologies, ultimately leading to more secure software for everyone.

Read more
Development Standardization

The Truth About Word-of-Mouth Marketing: NPS Isn't a Silver Bullet

2025-02-07

Many companies rely on NPS (Net Promoter Score) to measure word-of-mouth marketing effectiveness, but a high NPS doesn't guarantee organic growth. This article argues that word-of-mouth only works when users interact frequently and your product solves problems they'd discuss. For B2B tools or products lacking user interaction, referral programs alone may be ineffective, making NPS a customer satisfaction metric rather than a growth predictor. The author suggests differentiating between proactive and passive referrals and directly asking users about recommendations to assess the real potential of word-of-mouth marketing and avoid wasted resources.

Read more

Musk's Political Gamble: Tesla's Sales Plummet

2025-02-07
Musk's Political Gamble: Tesla's Sales Plummet

Elon Musk's political maneuvers have alienated potential EV buyers, particularly Democrats, resulting in Tesla having the worst favorability rating among prospective EV purchasers. A new study reveals that Musk's past year of political posturing has damaged Tesla's brand image, especially among its core customer base: affluent, educated, left-leaning EV drivers. While Musk's popularity has risen among right-wing voters, this group shows less concern for climate change and EVs. Declining sales, underwhelming Cybertruck performance, and tepid response to the Model Y refresh are directly linked to this brand image damage. Musk's political strategy, while potentially offering short-term gains, severely impacts Tesla's sales and long-term prospects.

Read more
Tech

6502 Assembly Language: A Beginner's Guide to Retro Computing

2025-02-07

This tiny ebook introduces you to 6502 assembly language, a historical processor powering iconic machines like the Commodore 64 and Apple II. Learning assembly offers a deep understanding of computer architecture. The 6502, with its human-friendly design, makes it an ideal starting point. The book guides you through registers, flags, instructions, addressing modes, and the stack, culminating in a simple Snake game. An online assembler and simulator are included for hands-on learning.

Read more
Development

Ransomware Payments Plummet 35%, Signaling Ecosystem Collapse?

2025-02-07
Ransomware Payments Plummet 35%, Signaling Ecosystem Collapse?

A new report by Chainalysis reveals a 35% drop in ransomware payments in 2023, from $1.25 billion to $812.55 million. This significant decline, largely concentrated in the second half of the year, is attributed to law enforcement crackdowns on major ransomware groups like LockBit and the exit scam by AlphV/BlackCat, eroding victim trust in paying ransoms. Despite this, ransomware attacks remain prevalent, with critical infrastructure still under significant threat.

Read more
Tech

Efficiently Detecting Enclosed Spaces in a Browser Game

2025-02-07
Efficiently Detecting Enclosed Spaces in a Browser Game

In a browser game, players place obstacles to hinder enemies. To prevent players from cheating by enclosing themselves or enemies, the author designed an efficient algorithm to detect enclosed spaces. The initial brute-force approach—flood filling from every cell—proved too slow. The author devised an improved algorithm that leverages a cache of "open-faced" cells (cells not surrounded by obstacles) to prune the flood fill search space. When obstacles are added or removed, the algorithm updates the open-faced cell set and recalculates legal placement locations. While the worst-case time complexity remains the same as brute-force flood fill, in practice, this algorithm significantly reduces lag. The author also discusses other optimization tricks, such as iterative updates and checking only cells adjacent to multiple obstacles. Finally, the author mentions another possible solution: a cycle detection-based algorithm.

Read more

arXivLabs: Experimental Projects with Community Collaborators

2025-02-07
arXivLabs: Experimental Projects with Community Collaborators

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on the website. Individuals and organizations involved uphold arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners who share them. Have an idea to improve the arXiv community? Learn more about arXivLabs.

Read more
Development
1 2 463 464 465 467 469 470 471 596 597