February, 2024

article thumbnail

Disrupting malicious uses of AI by state-affiliated threat actors

Hacker News

We terminated accounts associated with state-affiliated threat actors. Our findings show our models offer only limited, incremental capabilities for malicious cybersecurity tasks.

AI 182
article thumbnail

A beginner’s guide to making beautiful slides for your talks

Ines Montani

I’ve done quite a bit of conference speaking over the years, and I love designing slides and coming up with a new visual theme for each topic. It’s fun and keeps me motivated to put in the work and actually write my talks. People often ask me for tips and tooling recommendations, so in this guide, I’m sharing some of my not-so-secret secrets and three beginner-friendly steps for how you can up your slides game for the upcoming conference season!

144
144
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Shift from Models to Compound AI Systems

BAIR

These are comments in HTML. The above header text is needed to format the title, authors, etc. The "example_post" is an example representative image (not GIF) that we use for each post for tweeting (see below as well) and for the emails to subscribers. Please provide this image (and any other images and GIFs) in the blog to the BAIR Blog editors directly.

AI 145
article thumbnail

On the genetic basis of tail-loss evolution in humans and apes

Hacker News

The loss of the tail is among the most notable anatomical changes to have occurred along the evolutionary lineage leading to humans and to the ‘anthropomorphous apes’1–3, with a proposed role in contributing to human bipedalism4–6. Yet, the genetic mechanism that facilitated tail-loss evolution in hominoids remains unknown. Here we present evidence that an individual insertion of an Alu element in the genome of the hominoid ancestor may have contributed to tail-loss evolu

182
182
article thumbnail

The Project Clinic: Assessing Project Health, Planning, and Execution

Speaker: Ketan Jahagirdar

Picture your projects as patients, each with its own unique rhythm and pulse, thriving under your care 🥼 🩺 Step into the role of an innovative project doctor in our upcoming webinar! This session is your guide to evaluating the health of your projects through Waterfall and Agile practices like Scrum and Kanban. We’ll explore the vital signs of project success through the lens of the “iron triangle” metrics, using deliverables as tracers.

article thumbnail

Rendering protein structures inside cells at the atomic level with Unreal Engine

Hacker News

While the recent development of cryogenic electron tomography (CryoET) makes it possible to identify various macromolecules inside cells and determine their structure at near-atomic resolution, it remains challenging to visualize the complex cellular environment at the atomic level. One of the main hurdles in cell visualization is to render the millions of molecules in real time computationally.

181
181
article thumbnail

California's fast food law exempts Panera Gov. Newsom's relationship

Hacker News

As California prepares to implement a new law that requires major fast food chains to pay workers a minimum of $20 an hour starting in April, a new report explains why the governor's relationship with a billionaire helped exempt Panera Bread and chain restaurants like it.

182
182

More Trending

article thumbnail

Apple cancels work on electric car, shifts team to generative AI

Hacker News

Apple Inc. is canceling a decadelong effort to build an electric car, according to people with knowledge of the matter, abandoning one of the most ambitious projects in the history of the company.

AI 182
article thumbnail

Google Is Paying Publishers to Test an Unreleased Gen AI Platform

Hacker News

Google launched a private program for a handful of independent publishers last month, providing the news organizations with beta access to an unreleased generative artificial intelligence platform in exchange for receiving analytics and feedback, according to documents seen by ADWEEK. As part of the agreement, the publishers are expected to use the suite of tools.

article thumbnail

US Used AI to Help Find Middle East Targets for Airstrikes

Hacker News

The US used artificial intelligence to identify targets hit by air strikes in the Middle East this month, a defense official said, revealing growing military use of the technology for combat.

article thumbnail

How a Solar Revolution in Farming Is Depleting World’s Groundwater

Hacker News

Farmers in hot, arid regions are turning to low-cost solar pumps to irrigate their fields, eliminating the need for expensive fossil fuels and boosting crop production. But by allowing them to pump throughout the day, the new technology is drying up aquifers around the globe.

181
181
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

Testcontainers

Hacker News

Testcontainers is an opensource framework for providing lightweight, throwaway instances of common databases, Selenium web browsers, or anything else that can run in a Docker container.

Database 181
article thumbnail

Inside North Korea's Forced Labor Program

Hacker News

Workers sent from the country to Chinese factories describe enduring beatings and sexual abuse, having their wages taken by the state, and being told that if they try to escape they will be “killed without a trace.

182
182
article thumbnail

Calendar Meeting Links Used to Spread Mac Malware

Hacker News

Malicious hackers are targeting people in the cryptocurrency space in attacks that start with a link added to the target’s calendar at Calendly , a popular application for scheduling appointments and meetings. The attackers impersonate established cryptocurrency investors and ask to schedule a video conference call. But clicking the meeting link provided by the scammers prompts the user to run a script that quietly installs malware on macOS systems.

Database 181
article thumbnail

Baruch Spinoza and the art of thinking in dangerous times

Hacker News

The philosopher was a champion of political and intellectual freedom, but he had no interest in being a martyr. Instead, he shows us how prudence and boldness can go hand in hand.

182
182
article thumbnail

Leading the Development of Profitable and Sustainable Products

Speaker: Jason Tanner

While growth of software-enabled solutions generates momentum, growth alone is not enough to ensure sustainability. The probability of success dramatically improves with early planning for profitability. A sustainable business model contains a system of interrelated choices made not once but over time. Join this webinar for an iterative approach to ensuring solution, economic and relationship sustainability.

article thumbnail

NTIA Solicits Comments on Open-Weight AI Models

Hacker News

Today, the Department of Commerce’s National Telecommunications and Information Administration (NTIA) launched a Request for Comment on the risks, benefits and potential policy related to advanced artificial intelligence (AI) models with widely available model weights – the core component of AI systems.

article thumbnail

German Bundestag Passes Cannabis Legalization

Hacker News

Nach langer politischer Auseinandersetzung hat der Bundestag am Freitag, 23. Februar, den kontrollierten Umgang mit Cannabis gebilligt. Mit dem Gesetz soll Erwachsenen künftig der Besitz von bis zu 50 Gramm Cannabis für den Eigenkonsum im privaten Raum erlaubt werden. Im öffentlichen Raum soll die Höchstgrenze bei 25 Gramm liegen. In namentlicher Abstimmung votierten 407 Abgeordnete für das Gesetz, 226 stimmten dagegen und vier enthielten sich.

182
182
article thumbnail

How an African streaming service dethroned Netflix

Hacker News

Showmax sits at the top of the market with a vast library of local content, partnerships with Comcast and HBO, and exclusive access to the biggest football leagues in the world.

181
181
article thumbnail

Privacy Isn't Dead. Far from It

Hacker News

Welcome! The fact that you’re reading this means that you probably care deeply about the issue of privacy, which warms our hearts. Unfortunately, even though you care about privacy, or perhaps because you care so much about it, you may feel that there's not much you (or anyone) can really do to.

181
181
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Stable Diffusion 3

Hacker News

Announcing Stable Diffusion 3 in early preview, our most capable text-to-image model with greatly improved performance in multi-subject prompts, image quality, and spelling abilities.

182
182
article thumbnail

“Corolla killer:” BYD launches $US15,000 EV in direct attack on legacy makers

Hacker News

BYD has launched its low cost sedan in China which industry observers are calling the Corolla Killer. The post “Corolla killer:” BYD launches $US15,000 EV in direct attack on legacy makers appeared first on The Driven.

182
182
article thumbnail

YouTube dominates TV streaming in US, per Nielsen's latest report

Hacker News

Nielsen today released its January report on viewing usage across linear TV and streaming, which revealed that YouTube is once again the overall top streaming service in the U.S., with 8.6% of viewing on television screens. Netflix, meanwhile, saw 7.9% of TV usage.

181
181
article thumbnail

Don't Fall for the Latest Changes to the Dangerous Kids Online Safety Act

Hacker News

The authors of the dangerous Kids Online Safety Act (KOSA) unveiled an amended version this week, but it’s still an unconstitutional censorship bill that continues to empower state officials to target services and online content they do not like.

182
182
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Signal: Keep your phone number private with Signal usernames

Hacker News

Signal’s mission and sole focus is private communication. For years, Signal has kept your messages private, your profile information (like your name and profile photo) private, your contacts private, and your groups private – among much else. Now we’re taking that one step further, by making your.

182
182
article thumbnail

Fingerprints can be recreated from the sounds made when you swipe a screen

Hacker News

Researchers outline the PrintListener side-channel attack, which is claimed to be the first to leverage swiping sounds to infer fingerprint information. They claim they can successfully attack up to 27.9% of partial fingerprints.

182
182
article thumbnail

Tesla Sold Only One Car in Korea in January

Hacker News

Tesla Inc. sold just one electric vehicle in South Korea in January as a raft of headwinds, from safety concerns to price and a lack of charging infrastructure, weigh on demand.

182
182
article thumbnail

Implants and other technologies that decode neural activity

Hacker News

Implants and other technologies that decode neural activity can restore people’s abilities to move and speak — and help researchers to understand how the brain works. Implants and other technologies that decode neural activity can restore people’s abilities to move and speak — and help researchers to understand how the brain works.

181
181
article thumbnail

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You Need to Know

Speaker: Timothy Chan, PhD., Head of Data Science

Are you ready to move beyond the basics and take a deep dive into the cutting-edge techniques that are reshaping the landscape of experimentation? 🌐 From Sequential Testing to Multi-Armed Bandits, Switchback Experiments to Stratified Sampling, Timothy Chan, Data Science Lead, is here to unravel the mysteries of these powerful methodologies that are revolutionizing how we approach testing.

article thumbnail

"Rabbit Test" Unwins the Hugo Award

Hacker News

I cannot convey the supreme depths to which I'd rather be doing anything else with my Saturday afternoon other than writing this blog post, but here we are. If you have been blessedly insulated from the current furor over the 2023 Hugo Awards -- good for you!

181
181
article thumbnail

Implementing the Successor to LoRA (Low-Rank Adaptation) from Scratch

Hacker News

Low-rank adaptation (LoRA) is a machine learning technique that modifies a pretrained model (for example, an LLM or vision transformer) to better suit a specific, often smaller, dataset by adjusting only a small, low-rank subset of the model's parameters.

article thumbnail

Study suggests a 'dark mirror' universe within ours where atoms failed to form

Hacker News

The invisible substance called dark matter remains one of the biggest mysteries in cosmology. Perhaps, a new study suggests, this strange substance arises from a 'dark mirror universe' that's been linked to ours since the dawn of time.

181
181
article thumbnail

Inquiry launches into Polish ex-government's 'Pegasus' spying

Hacker News

Polish prime minister Donald Tusk last week revealed the Pegasus spyware had been used not only to monitor PiS's political opponents —but also PiS members of the party's leadership suspected of disloyalty.

181
181
article thumbnail

The Key to Sustainable Energy Optimization: A Data-Driven Approach for Manufacturing

Speaker: Kevin Kai Wong, President of Emergent Energy Solutions

In today's industrial landscape, the pursuit of sustainable energy optimization and decarbonization has become paramount. ♻️ Manufacturing corporations across the U.S. are facing the urgent need to align with decarbonization goals while enhancing efficiency and productivity. Unfortunately, the lack of comprehensive energy data poses a significant challenge for manufacturing managers striving to meet their targets. 📊 Join us for a practical webinar hosted by Kevin Kai Wong of Emergent Ene