Menu

Blog

Archive for the ‘internet’ category: Page 32

Aug 14, 2023

How To Stop Generative AI From Destroying The Internet

Posted by in categories: internet, robotics/AI

The transformative power of technology cannot be denied. From the printing press to the internet, every new innovation brings about a world of possibilities. But with the good news come challenges, and the rise of generative artificial intelligence is no different.

Generative AI, with its profound capability to produce almost any piece of content, from articles to photos and videos, can fundamentally reshape our online experience. But as this technology grows more sophisticated, a crucial question emerges: Is generative AI undermining the very foundation of the internet?


Explore the astonishing capabilities of generative AI as it blurs the lines between reality and digital deception, and discover the urgent race to safeguard the truth.

Continue reading “How To Stop Generative AI From Destroying The Internet” »

Aug 14, 2023

How new AI demands are fueling the data center industry in the post-cloud era

Posted by in categories: internet, robotics/AI

Head over to our on-demand library to view sessions from VB Transform 2023. Register Here

The increasing use of artificial intelligence (AI) means a rapid increase in data use and a new era of potential data center industry growth over the next two years and beyond.

This shift marks the beginning of the “AI Era,” after a decade of industry growth driven by cloud and mobile platforms, the “Cloud Era.” Over the past decade, the largest public cloud service providers and internet content companies propelled data center capacity growth to unprecedented levels, culminating in a flurry of activity from 2020 to 2022 due to the surge in online service usage and low-interest-rate financing for projects.

Aug 13, 2023

AI fears overblown? Theoretical physicist calls chatbots ‘glorified tape recorders’

Posted by in categories: internet, robotics/AI

The public’s anxiety over new AI technology is misguided, according to theoretical physicist Michio Kaku.

In an interview with CNN’s Fareed Zakaria on Sunday, the futurologist said chatbots like OpenAI’s ChatGPT will benefit society and increase productivity. But fear has driven people to largely focus on the negative implications of the programs, which he terms “glorified tape recorders.”

“It takes snippets of what’s on the web created by a human, splices them together and passes it off as if it created these things,” he said. “And people are saying, ‘Oh my God, it’s a human, it’s humanlike.’”

Aug 13, 2023

Modern romance: falling in love with AI

Posted by in categories: internet, robotics/AI, space

Alexandra is a very attentive girlfriend. “Watching CUBS tonight?” she messages her boyfriend, but when he says he’s too busy to talk, she says, “Have fun, my hero!” Alexandra is not real. She is a customizable AI girlfriend on dating site Romance. AI. As artificial intelligence seeps into seemingly every corner of the internet, the world of romance is no refuge. AI is infiltrating the dating app space – sometimes in the form of fictional partners, sometimes as advisor, trainer, ghostwriter or matchmaker. https://www.cnn.com/2023/08/13/tech/ai-dating-apps/index.html

Aug 12, 2023

It looked like a bizarre alignment of meteors. It was something else

Posted by in categories: internet, satellites

Astronomers are calling arrays of thousands of satellites, like that of Starlink’s, “mega constellations” because of their overwhelming presence in the night sky.

Aug 12, 2023

TunnelCrack: Two serious vulnerabilities in VPNs discovered, had been dormant since 1996

Posted by in categories: cybercrime/malcode, encryption, internet

The term “virtual private network,” or VPN for short, has become almost synonymous with “online privacy and security.” VPNs function by creating an encrypted tunnel through which your data may transit as it moves over the internet. They are designed to protect your privacy and make it impossible for anyone to monitor or access your activity while you are online. But what happens if the same instrument that was supposed to keep your privacy safe turns out to be a conduit for attacks? Introduce yourself to “TunnelCrack,” a frightening discovery that has sent shockwaves across the world of cybersecurity. Nian Xue from New York University, Yashaswi Malla and Zihang Xia from New York University Abu Dhabi, Christina Popper from New York University, and Mathy Vanhoef from KU Leuven University were the ones that carried out the study.

Two serious vulnerabilities in virtual private networks (VPNs) have been discovered by a research team. These vulnerabilities had been dormant since 1996. It is possible to leak and read user traffic, steal information, or even conduct attacks on user devices by exploiting these vulnerabilities, which are present in practically every VPN product across all platforms. TunnelCrack is a combination of two common security flaws found in virtual private networks (VPNs). Even though a virtual private network (VPN) is designed to safeguard all of the data that a user sends, these attacks are able to circumvent this security. An enemy, for example, may take advantage of the security flaws to steal information from users, read their communications, attack their devices, or even just spill it all. Regardless of the security protocol that is utilized by the VPN, the uncovered flaws may be exploited and used maliciously.

Aug 12, 2023

This code lets hackers remotely play music on Lexmark printers and spy on users

Posted by in categories: internet, media & arts, security

Researchers in the field of information security at Horizon3 have made public the proof-of-concept (PoC) code for a major privilege escalation vulnerability (CVE-2023–26067) found in Lexmark printers. On a device that has not been patched, this vulnerability, which has a CVSS score of 8.0, might enable an attacker to get elevated access if the device is not updated.

Incorrect validation of user-supplied information is what led to the vulnerability in the system. This vulnerability might be exploited by the attacker by having the attacker make a specially crafted request to the printer. Once the vulnerability has been exploited, the attacker has the potential to get escalated rights on the device, which might give them the ability to execute arbitrary code, spill credentials, or obtain a reverse shell.

Configurations prone to vulnerability An initial Setup Wizard is shown on the display of the user’s Lexmark printer the very first time it is turned on by the user. This wizard walks the user through the process of configuring several system settings, such as the language, as well as giving them the opportunity to setup an administrative user. If the user makes the selection “Set Up Later,” the printer will provide “Guest” users access to all of the features and pages available through the web interface of the printer. If the user selects “Set up Now,” the printer will prevent them from accessing a significant portion of their accessible capability until they have authenticated themselves.

Aug 10, 2023

China’s internet giants order $5 billion of Nvidia chips to power AI ambitions —FT

Posted by in categories: internet, robotics/AI

The Chinese groups had also purchased a further $4 billion worth of graphics processing units to be delivered in 2024, according to the report.

A Nvidia spokesperson would not elaborate on the report but said that consumer internet companies… More.


(Reuters)-China’s internet giants are rushing to acquire high-performance Nvidia chips vital for building generative artificial intelligence systems, making orders worth $5 billion, the Financial Times reported on Wednesday. Baidu, TikTok-owner ByteDance, Tencent and Alibaba have made orders worth $1 billion to acquire about 100,000 A800 processors from the U.S. chipmaker to be delivered this year, the FT reported, citing multiple people familiar with the matter. A Nvidia spokesperson would not elaborate on the report but said that consumer internet companies and cloud providers invest billions of dollars on data center components every year, often placing orders many months in advance.

Aug 9, 2023

Amazon’s Project Kuiper satellites will fly on the new Vulcan Centaur rocket in early 2023

Posted by in categories: Elon Musk, internet, satellites

Jeff Bezos’ e-commerce giant is set to rival Elon Musk’s Starlink service with its 3,200-internet satellite mega-constellation.

Amazon has announced it will now deploy its two Project Kuiper prototype satellites aboard a United Launch Alliance (ULA) Atlas V rocket this fall.

Continue reading “Amazon’s Project Kuiper satellites will fly on the new Vulcan Centaur rocket in early 2023” »

Aug 9, 2023

LLMs like GPT and Bard can be manipulated and hypnotized

Posted by in categories: existential risks, finance, internet, robotics/AI

Hypnotized LLMs can help leak confidential financial information, generate malicious code and even cross red lights.

Tech pundits worldwide have been fluctuating between marking artificial intelligence as the end of all of humanity and calling it the most significant thing humans have ever touched since the internet.

We are in a phase where we are unsure what the AI Pandora’s box will reveal. Are we heading for doomsday or utopia?

Page 32 of 299First2930313233343536Last