1825 Monetary Lane Suite #104 Carrollton, TX
Do a presentation at NTLUG.
What is the Linux Installation Project?
Real companies using Linux!
Not just for business anymore.
Providing ready to run platforms on Linux
|
Show Descriptions... (Show All)
(Single Column)
|

- Shuttle Fanless Mini Edge PC with Up to 40 TOPS AI Performance
This month, Shuttle Computers launched the SPCNV03, an ultra-compact edge computer based on the NVIDIA Jetson Orin Nano. It delivers up to 40 TOPS of AI performance in a fanless aluminum chassis and carries EMC, Safety, and RoHS certifications for use in robotics, automation, video analytics, and smart city applications. The SPCNV03 is built on […]
- Debian's APT Gaining Built-In History Command
Rather than needing to parse package/history log files manually and akin to functionality provided by Red Hat's DNF, a merge request is pending to add a built-in history command for APT...
- Nordic Semiconductor Expands nRF54L Series with High-Memory nRF54LM20A SoC
Nordic Semiconductor has announced the nRF54LM20A, a high-memory addition to its nRF54L Series of ultra-low power wireless SoCs. Built on the company’s 22 nm technology platform, the device provides developers with more resources to design advanced Bluetooth LE and Matter products for consumer, industrial, and healthcare applications. According to Nordic, the nRF54LM20A integrates a 128 […]
- KDE Plasma 6 Customization Inspired by Ubuntu Layout | Sweet Dawn
KDE Plasma 6 Customization Inspired by UbuntuA clean and elegant KDE Plasma 6 setup inspired by the Ubuntu layout. It uses the Utterly Sweet global theme, Tela Circle icons with purple folders, Noto Sans for the digital clock, and a custom wallpaper all styled with Panel Colorizer to give the panel a dock-like appearance.
- AAEON Intelli i14 Edge Combines Intel Core i9 and NVIDIA RTX in Compact AI Vision System
AAEON has introduced the Intelli i14 Edge, a compact AI vision system powered by Intel’s 14th Gen Core i9-14900T and NVIDIA RTX MXM modules. Designed to deliver workstation-level performance in a small, rugged form factor, the system targets robotics, autonomous platforms, and embedded workstations. According to AAEON, the Intelli i14 Edge is equipped with a […]
- Linux 6.17 File-System Benchmarks, Including OpenZFS & Bcachefs
Linux 6.17 is an interesting time to carry out fresh file-system benchmarks given that EXT4 has seen some scalability improvements while Bcachefs in the mainline kernel is now in a frozen state. Linux 6.17 is also what's powering Fedora 43 and Ubuntu 25.10 out-of-the-box to make such a comparison even more interesting. Today's article is looking at the out-of-the-box performance of EXT4, Btrfs, F2FS, XFS, Bcachefs and then OpenZFS too.
- PCIe 8.0 v0.3 Specification Released To Members
As announced last month, PCI Express 8.0 is aiming for 256 GT/s speeds for allowing 1 TB/s bandwidth in an x16 configuration. In working towards the goals of PCIe 8.0, the PCI-SIG announced today that the v0.3 specification has been released to members...
- Ubuntu Studio 25.10 “Questing Quokka” Beta Launched
Ubuntu Studio 25.10 “Questing Quokka” Beta has officially launched, bringing significant improvements to creative professionals and multimedia enthusiasts. This latest Ubuntu Studio 25.10 release introduces major desktop environment upgrades, enhanced audio production capabilities, and substantial updates to creative applications that position it as a leading choice for content creators.
- EasyOS version 7.0 reviewed on Distrowatch
EasyOS version 7.0 reviewed on Distrowatch. The previous review on Distrowatch was version 4.2, three years ago. The review identifies major improvements, in particular for the container technology.
|
|
|

- PIRG, Other Groups Criticize Microsoft's Plan to Discontinue Support for Windows 11
The consumer advocacy nonprofit PIRG (Public Interest Research Group) is now petitioning Microsoft to reconsider pulling support for Windows 10 in 2025, since "as many as 400 million perfectly good computers that can't upgrade to Windows 11 will be thrown out." In a petition addressed to Microsoft CEO Satya Nadella, the group warned the October 14 end of free support could cause "the single biggest jump in junked computers ever, and make it impossible for Microsoft to hit their sustainability goals."About 40% of PCs currently in use can't upgrade to Windows 11, even if users want to... Less than a quarter of electronic waste is recycled, so most of those computers will end up in landfills. Consumer Reports recently also urged Microsoft to not to "strand millions of customers.". And now more groups are also pushing back, according to a post from the blog Windows: CentralThe Restart Project co-developed the "End of 10" toolkit, which is designed to support Windows 10 users who can't upgrade to Windows 11 after the operating system hits its end-of-support date. They also note that a Paris-based company called Back Market plans to sell Windows 10 laptops refurbished with Ubuntu Linux or ChromeOS Flex. ("We refuse to watch hundreds of millions of perfectly good computers end up in the trash as e-waste," explains their web site.) Back Market's ad promises an "up-to-date, secure operating system — so instead of paying for a new computer you don't need, you can help us give this one a brand new life." Right now Windows 10 holds 71.9% of Microsoft's market share, with Windows 11 at 22.95%, according to figures from StatCounter cited by the blog Windows Central. And HP and Dell "recently indicated that half of the global PCs are still running Windows 10," according to another Windows Central post...
Read more of this story at Slashdot.
- Google Temporarily Pauses AI-Powered 'Homework Helper' Button in Chrome Over Cheating Concerns
An anonymous reader shared this article from the Washington Post:A student taking an online quiz sees a button appear in their Chrome browser: "homework help." Soon, Google's artificial intelligence has read the question on-screen and suggests "choice B" as the answer. The temptation to cheat was suddenly just two clicks away Sept. 2, when Google quietly added a "homework help" button to Chrome, the world's most popular web browser. The button has been appearing automatically on the kinds of course websites used by the majority of American college students and many high-schoolers, too. Pressing it launches Google Lens, a service that reads what's on the page and can provide an "AI Overview" answer to questions — including during tests. Educators I've spoken with are alarmed. Schools including Emory University, the University of Alabama, the University of California at Los Angeles and the University of California at Berkeley have alerted faculty how the button appears in the URL box of course sites and their limited ability to control it. Chrome's cheating tool exemplifies Big Tech's continuing gold rush approach to AI: launch first, consider consequences later and let society clean up the mess. "Google is undermining academic integrity by shoving AI in students' faces during exams," says Ian Linkletter, a librarian at the British Columbia Institute of Technology who first flagged the issue to me. "Google is trying to make instructors give up on regulating AI in their classroom, and it might work. Google Chrome has the market share to change student behavior, and it appears this is the goal." Several days after I contacted Google about the issue, the company told me it had temporarily paused the homework help button — but also didn't commit to keeping it off. "Students have told us they value tools that help them learn and understand things visually, so we're running tests offering an easier way to access Lens while browsing," Google spokesman Craig Ewer said in a statement.
Read more of this story at Slashdot.
- Interlune Signs $300M Deal to Harvest Helium-3 for Quantum Computing from the Moon
An anonymous reader shared this report from the Washington Post: Finnish tech firm Bluefors, a maker of ultracold refrigerator systems critical for quantum computing, has purchased tens of thousands of liters of Helium-3 from the moon — spending "above $300 million" — through a commercial space company called Interlune. The agreement, which has not been previously reported, marks the largest purchase of a natural resource from space. Interlune, a company founded by former executives from Blue Origin and an Apollo astronaut, has faced skepticism about its mission to become the first entity to mine the moon (which is legal thanks to a 2015 law that grants U.S. space companies the rights to mine on celestial bodies). But advances in its harvesting technology and the materialization of commercial agreements are gradually making this undertaking sound less like science fiction. Bluefors is the third customer to sign up, with an order of up to 10,000 liters of Helium-3 annually for delivery between 2028 and 2037... Helium-3 is lighter than the Helium-4 gas featured at birthday parties. It's also much rarer on Earth. But moon rock samples from the Apollo days hint at its abundance there. Interlune has placed the market value at $20 million per kilogram (about 7,500 liters). "It's the only resource in the universe that's priced high enough to warrant going out to space today and bringing it back to Earth," said Rob Meyerson [CEO of Interlune and former president of Blue Origin]... [H]eat, even in small doses, can cause qubits to produce errors. That's where Helium-3 comes in. Bluefors makes the cooling technology that allows the computer to operate — producing chandelier-type structures known as dilution refrigerators. Their fridges, used by quantum computer leader IBM, contain a mixture of Helium-3 and Helium-4 that pushes temperatures below 10 millikelvins (or minus-460 degrees Fahrenheit)... Existing quantum computers have been built with more than a thousand qubits, he said, but a commercial system or data center would need a million or more. That could require perhaps thousands of liters of Helium-3 per quantum computer. "They will need more Helium-3 than is available on planet Earth," said Gary Lai [a co-founder and chief technology officer of Interlune, who was previously the chief architect at Blue Origin]. Most Helium-3 on Earth, he said, comes from the decay of tritium (an isotope of hydrogen) in nuclear weapons stockpiles, but between 22,000 and 30,000 liters are made each year... "We estimate there's more than a million metric tons of Helium-3 on the moon," Meyerson said. "And it's been accumulating there for 4 billion years." Now, they just need to get it. Interlune CEO Meyerson tells the post "It's really all about establishing a resilient supply chain for this critical material" — adding that in the long-term he could also see Helium-3 being used for other purposes including fusion energy.
Read more of this story at Slashdot.
- 6,000 Evacuated During Defusing of American WWII Bomb Found Buried in Hong Kong
A large U.S.-made bomb left over from World War II was discovered at a construction site, reports the Associated Press:Police said the bomb was 1.5 meters (nearly 5 feet) in length and weighed about 1,000 pounds (450 kilograms). It was discovered by construction workers in Quarry Bay, a bustling residential and business district on the west side of Hong Kong island... [A police official] said that because of "the exceptionally high risks associated with its disposal," approximately 1,900 households involving 6,000 individuals were "urged to evacuate swiftly." The operation to deactivate the bomb began late Friday and lasted until around 11:30 a.m. Saturday. No one was injured in the operation. Bombs left over from World War II are discovered from time to time in Hong Kong. The city was occupied by Japanese forces during the war, when it became a base for the Japanese military and shipping. The United States, along with other Allied forces, targeted Hong Kong in air raids to disrupt Japanese supply lines and infrastructure. "Bombs from the war have triggered evacuations and emergency measures around the globe in recent months," reports CBS News:Earlier this month, a 500-pound bomb was discovered in Slovakia's capital during construction work, prompting evacuations. In August, large parts of Dresden, Germany, were evacuated so experts could defuse an unexploded World War II bomb found during clearance work for a collapsed bridge. In June, over 20,000 people were evacuated from Cologne after three unexploded U.S. bombs from the war were found... In March, a World War II bomb was found near the tracks of Paris' Gare du Nord station. In February, more than 170 bombs were found near a children's playground in northern England. And in October 2024, a World War II bomb exploded at a Japanese airport.
Read more of this story at Slashdot.
- Cyberattack Delays Flights at Several of Europe's Major Airports
"A cyberattack targeting check-in and boarding systems disrupted air traffic and caused delays at several of Europe's major airports on Saturday," reports the Associated Press. "While the impact on travelers appeared to be limited, experts said the intrusion exposed vulnerabilities in security systems."The disruptions to electronic systems initially reported at Brussels, Berlin's Brandenburg and London's Heathrow airports meant that only manual check-in and boarding was possible. Many other European airports said their operations were unaffected... Airports said the issue centered around a provider of check-in and boarding systems — not airlines or the airports themselves. Collins Aerospace, whose systems help passengers check themselves in, print boarding passes and bag tags and dispatch their luggage from a kiosk, cited a "cyber-related disruption" to its MUSE (Multi-User System Environment) software at "select airports." Brussels Airport initially reported a "large impact" on flight schedules," according to the article, with a spokesperson telling broadcaster VTM that by mid-morning nine flights had been canceled, with four more redirected to another airport and 15 delayed an hour or more. The airport later told Reuters there were "delays on most of the departing flights." Reuters notes it's "the latest in a string of hacks targeting governments and companies across the world, hitting sectors from healthcare and defence to retail and autos.:A recent breach at luxury carmaker Jaguar Land Rover brought its production to a halt... At Heathrow, Berlin and Brussels, 29 flight departures and arrivals had been cancelled as of 1130 GMT, aviation data provider Cirium said. In total, 651 departures were scheduled from Heathrow, 228 from Brussels and 226 from Berlin on Saturday... Brussels Airport said it had asked airlines to cancel half of their scheduled departing flights on Sunday to avoid long queues and late cancellations, signalling that the disruption would continue through the weekend. A European Commission spokesperson said there were currently no indications of a "widespread or severe attack" and that the origin of the incident was still under investigation.
Read more of this story at Slashdot.
- Doomed 'Cannibal' Star Could Explode In a Supernova Visible During Day
"Betelgeuse may have competition for the most exciting star about to go nova near Earth," writes Space.com. "Astronomers have discovered the secret of a strange star system that has baffled them for years, finding it contains a dead star about to erupt after overfeeding on a stellar companion." The supernova explosion of this cosmic cannibal could be as bright as the moon, making it visible with the naked eye over Earth even in broad daylight. The system in question is the double star V Sagittae located around 10,000 light-years from Earth, containing a white dwarf stellar remnant and its victim companion star, which orbit each other roughly twice every Earth day. The new research and the revelation of this white dwarf's imminent catastrophic fate answer questions about V Sagittae that have lingered for 123 years... White dwarfs represent the final stage of stars with masses around that of the sun, occurring when they run out of fuel for nuclear fusion... [W]hite dwarfs that have a stellar companion can get a second lease on life and a more conclusive and explosive end... [T]he stolen stellar material piles up on the surface of the white dwarf until it pushes this stellar remnant past the so-called Chandrasekhar limit of 1.4 solar masses. This is the mass limit that a stellar remnant has to exceed to trigger a supernova... However, this team found something very different and extraordinary happening with the stellar material being stolen by the white dwarf in V Sagittae... This investigation revealed that there is a giant halo of gas comprised of material stolen from the companion star wrapped around both the cannibal white dwarf and its stellar victim... "The white dwarf cannot consume all the mass being transferred from its hot star twin, so it creates this bright cosmic ring," team member Pasi Hakala from the University of Turku said. "The speed at which this doomed stellar system is lurching wildly, likely due to the extreme brightness, is a frantic sign of its imminent, violent end." "The matter accumulating on the white dwarf is likely to produce a nova outburst in the coming years, during which V Sagittae would become visible with the naked eye," Pablo Rodríguez-Gil from Spain's Instituto de Astrofisica de Canarias said. "But when the two stars finally smash into each other and explode, this would be a supernova explosion so bright it'll be visible from Earth even in the daytime." The research was conducted with the Very Large Telescope (four individual telescopes high in the mountains of Chile) — and published last week in the journal Monthly Notices of the Royal Astronomical Society.
Read more of this story at Slashdot.
- There Isn't an AI Bubble - There Are Three
Fast Company ran a contrarian take about AI from entrepreneur/thought leader Faisal Hoque, who argues there's three AI bubbles. The first is a classic speculative bubble, with asset prices soaring above their fundamental values (like the 17th century's Dutch "tulip mania"). "The chances of this not being a bubble are between slim and none..."Second, AI is also arguably in what we might call an infrastructure bubble, with huge amounts being invested in infrastructure without any certainty that it will be used at full capacity in the future. This happened multiple times in the later 1800s, as railroad investors built thousands of miles of unneeded track to serve future demand that never materialized. More recently, it happened in the late '90s with the rollout of huge amount of fiber optic cable in anticipation of internet traffic demand that didn't turn up until decades later. Companies are pouring billions into GPUs, power systems, and cooling infrastructure, betting that demand will eventually justify the capacity. McKinsey analysts talk of a $7 trillion "race to scale data centers" for AI, and just eight projects in 2025 already represent commitments of over $1 trillion in AI infrastructure investment. Will this be like the railroad booms and busts of the late 1800s? It is impossible to say with any kind of certainty, but it is not unreasonable to think so. Third, AI is certainly in a hype bubble, which is where the promise claimed for a new technology exceeds reality, and the discussion around that technology becomes increasingly detached from likely future outcomes. Remember the hype around NFTs? That was a classic hype bubble. And AI has been in a similar moment for a while. All kinds of media — social, print, and web — are filled with AI-related content, while AI boosterism has been the mood music of the corporate world for the last few years. Meanwhile, a recent MIT study reported that 95% of AI pilot projects fail to generate any returns at all. But the article ultimately argues there's lessons in the 1990s dotcom boom: that "a thing can be hyped beyond its actual capabilities while still being important... When valuations correct — and they will — the same pattern will emerge: companies that focus on solving real problems with available technology will extract value before, during, and after the crash." The winners will be companies with systematic approaches to extracting value — adopting mixed portfolios with different time horizons and risk levels, while recognizing organizational friction points for a purposeful (and holistic) integration. "The louder the bubble talk, the more space opens for those willing to take a methodical approach to building value." Thanks to Slashdot reader Tony Isaac for sharing the article.
Read more of this story at Slashdot.
- Self-Replicating Worm Affected Several Hundred NPM Packages, Including CrowdStrike's
The Shai-Hulud malware campaign impacted hundreds of npm packages across multiple maintainers, reports Koi Security, including popular libraries like @ctrl/tinycolor and some packages maintained by CrowdStrike.Malicious versions embed a trojanized script (bundle.js) designed to steal developer credentials, exfiltrate secrets, and persist in repositories and endpoints through automated workflows. Koi Security created a table of packages identified as compromised, promising it's "continuously updated" (and showing the last compromise detected Tuesday). Nearly all of the compromised packages have a status of "removed from NPM".Attackers published malicious versions of @ctrl/tinycolor and other npm packages, injecting a large obfuscated script (bundle.js) that executes automatically during installation. This payload repackages and republishes maintainer projects, enabling the malware to spread laterally across related packages without direct developer involvement. As a result, the compromise quickly scaled beyond its initial entry point, impacting not only widely used open-source libraries but also CrowdStrike's npm packages. The injected script performs credential harvesting and persistence operations. It runs TruffleHog to scan local filesystems and repositories for secrets, including npm tokens, GitHub credentials, and cloud access keys for AWS, GCP, and Azure. It also writes a hidden GitHub Actions workflow file (.github/workflows/shai-hulud-workflow.yml) that exfiltrates secrets during CI/CD runs, ensuring long-term access even after the initial infection. This dual focus on endpoint secret theft and backdoors makes Shai-Hulud one of the most dangerous campaigns ever compared to previous compromises. "The malicious code also attempts to leak data on GitHub by making private repositories public," according to a Tuesday blog post from security systems provider Sysdig:The Sysdig Threat Research Team (TRT) has been monitoring this worm's progress since its discovery. Due to quick response times, the number of new packages being compromised has slowed considerably. No new packages have been seen in several hours at the time... Their blog post concludes "Supply chain attacks are increasing in frequency. It is more important than ever to monitor third-party packages for malicious activity." Some context from Tom's Hardware:To be clear: This campaign is distinct from the incident that we covered on Sept. 9, which saw multiple npm packages with billions of weekly downloads compromised in a bid to steal cryptocurrency. The ecosystem is the same — attackers have clearly realized the GitHub-owned npm package registry for the Node.js ecosystem is a valuable target — but whoever's behind the Shai-Hulud campaign is after more than just some Bitcoin.
Read more of this story at Slashdot.
- C++ Committee Prioritizes 'Profiles' Over Rust-Style Safety Model Proposal
Long-time Slashdot reader robinsrowe shared this report from the Register:The C++ standards committee abandoned a detailed proposal to create a rigorously safe subset of the language, according to the proposal's co-author, despite continuing anxiety about memory safety. "The Safety and Security working group voted to prioritize Profiles over Safe C++. Ask the Profiles people for an update. Safe C++ is not being continued," Sean Baxter, author of the cutting-edge Circle C++ compiler, commented in June this year. The topic came up as developers like Simone Bellavia noted the anniversary of the proposal and discovered a decision had been made on Safe C++. One year ago, Baxter told The Reg that the project would enable C++ developers to get the memory safety of Rust, but without having to learn a new language. "Safe C++ prevents users from writing unsound code," he said. "This includes compile-time intelligence like borrow checking to prevent use-after-free bugs and initialization analysis for type safety." Safe C++ would enable incremental migration of code, since it only applies to code in the safe context. Existing unsafe code would run as before. Even the matter of whether the proposal has been abandoned is not clear-cut. Erich Keane, C++ committee member and co-chair of the C++ Evolution Working Group (EWG), said that Baxter's proposal "got a vote of encouragement where roughly 1/2 (20/45) of the people encouraged Sean's paper, and 30/45 encouraged work on profiles (with 6 neutral)... Sean is completely welcome to continue the effort, and many in the committee would love to see him make further effort on standardizing it." In response, Baxter said: "The Rust safety model is unpopular with the committee. Further work on my end won't change that. Profiles won the argument." He added that the language evolution principles adopted by the EWG include the statement that "we should avoid requiring a safe or pure function annotation that has the semantics that a safe or pure function can only call other safe or pure functions." This, he said, is an "irreconcilable design disagreement...."
Read more of this story at Slashdot.
- Study Links Microplastic Exposure to Alzheimer's Disease in Mice
Micro- and nanoplastic particles "infiltrate all systems of the body, including the brain," notes the University of Rhode Island, "where they can accumulate and trigger Alzheimer's-like conditions, according to a new study by researchers in the University of Rhode Island College of Pharmacy." ScienceDaily shares the announcement:After a previous study that showed how microplastics can infiltrate all systems of the body — including the blood-brain barrier, which protects the brain from harmful substances as small as viruses and bacteria — University of Rhode Island pharmacy assistant professor Jaime Ross expanded the study to determine the brain health impacts of the plastic toxins. Her findings indicate that the accumulation of micro- and nanoplastics in the brain can lead to cognitive decline and even Alzheimer's disease, especially in those who carry genetic risk factors. Ross' latest study, published recently in the journal Environmental Research Communications, examined mice that had been genetically modified to include the naturally occurring gene APOE4, a strong indicator of Alzheimer's risk making people 3.5 times more likely to develop the disease than those who carry the APOE3 variant of the gene that is passed from parents to offspring... Ross and her team exposed two groups of mice — one with the APOE4 variant and one with APOE3 — to micro- and nanoplastics in their drinking water over a period of three weeks. The tiny particles from polystyrene — among the most abundant plastics in the world, found in Styrofoam take-out containers, plastic cups and more — infiltrated the mice' organs, including the brain, as expected... Ross' team then ran the mice through a series of tests to examine their cognitive ability, beginning with an open-field test, in which researchers put a mouse in a chamber and allow it to explore at will for 90 minutes. Ordinarily, a mouse will hug the walls, naturally attempting to hide from potential predators. However, after microplastic exposure, the APOE4 mice — especially the male mice — tended to wander more in the middle of the chamber and spend time in open space, leaving themselves vulnerable to predators... The results are concerning enough to warrant further study into the cognitive decline caused by exposure to micro- and nanoplastics, which are among the most prominent environmental toxins to which people are routinely exposed... Ross is continuing to expand her research into the topic and encourages others to do so, in the hope of leading to better regulation of the toxins.
Read more of this story at Slashdot.
- Is OpenAI's Video-Generating Tool 'Sora' Scraping Unauthorized YouTube Clips?
"OpenAI's video generation tool, Sora, can create high-definition clips of just about anything you could ask for..." reports the Washington Post. "But OpenAI has not specified which videos it grabbed to make Sora, saying only that it combined 'publicly available and licensed data'..."With ChatGPT, OpenAI helped popularize the now-standard industry practice of building more capable AI tools by scraping vast quantities of text from the web without consent. With Sora, launched in December, OpenAI staff said they built a pioneering video generator by taking a similar approach. They developed ways to feed the system more online video — in more varied formats — including vertical videos and longer, higher-resolution clips... To explore what content OpenAI may have used, The Washington Post used Sora to create hundreds of videos that show it can closely mimic movies, TV shows and other content... In dozens of tests, The Post found that Sora can create clips that closely resemble Netflix shows such as "Wednesday"; popular video games like "Minecraft"; and beloved cartoon characters, as well as the animated logos for Warner Bros., DreamWorks and other Hollywood studios, movies and TV shows. The publicly available version of Sora can generate only 20-second clips, without audio. In most cases, the look-alike scenes were made by typing basic requests like "universal studios intro." The results also showed that Sora can create AI videos with the logos or watermarks that broadcasters and tech companies use to brand their video content, including those for the National Basketball Association, Chinese-owned social app TikTok and Amazon-owned streaming platform Twitch... Sora's ability to re-create specific imagery and brands suggests a version of the originals appeared in the tool's training data, AI researchers said. "The model is mimicking the training data. There's no magic," said Joanna Materzynska, a PhD researcher at Massachusetts Institute of Technology who has studied datasets used in AI. An AI tool's ability to reproduce proprietary content doesn't necessarily indicate that the original material was copied or obtained from its creators or owners. Content of all kinds is uploaded to video and social platforms, often without the consent of the copyright holder... Materzynska co-authored a study last year that found more than 70 percent of public video datasets commonly used in AI research contained content scraped from YouTube. Netflix and Twitch said they did not have a content partnership for training OpenAI, according to the article (which adds that OpenAI "has yet to face a copyright suit over the data used for Sora.") Two key quotes from the article: "Unauthorized scraping of YouTube content continues to be a violation of our Terms of Service." — YouTube spokesperson Jack Malon"We train on publicly available data consistent with fair use and use industry-leading safeguards to avoid replicating the material they learn from." — OpenAI spokesperson Kayla Wood
Read more of this story at Slashdot.
- Librarians Are Being Asked To Find AI-Hallucinated Books
Libraries nationwide are fielding patron requests for books that don't exist after AI-generated summer reading lists appeared in the Chicago Sun-Times and Philadelphia Inquirer earlier this year. Reference librarian Eddie Kristan told 404 Media the problem began in late 2022 following GPT-3.5's release but escalated dramatically after the newspapers published lists created by a freelancer using AI without verification. A Library Freedom Project survey found patrons increasingly trust AI chatbots over human librarians and become defensive when told their AI-recommended titles are fictional. Kristan now routinely checks WorldCat's global catalog to verify titles exist. Collection development librarians are requesting digital vendors remove AI-generated books from platforms while academic libraries struggle against vendors implementing flawed LLM-based search tools and AI-generated summaries that undermine information literacy instruction.
Read more of this story at Slashdot.
- Hard-Fought Treaty To Protect Ocean Life Clears a Final Hurdle
The high seas, the vast waters beyond any one country's jurisdiction, cover nearly half the planet. On Friday, a hard-fought global treaty to protect the "cornucopia of biodiversity" living there cleared a final hurdle and will become international law. From a report: The High Seas Treaty, as it is known, was ratified by a 60th nation, Morocco, crossing the threshold for United Nations treaties to go into effect. Two decades in the making, it allows for the establishment of enormous conservation zones in international waters. Environmentalists hailed it as a historic moment. The treaty "is a conservation opportunity that happens once in a generation, if that," said Lisa Speer, who directs the International Oceans Program at the Natural Resources Defense Council. It is also a bright spot amid a general dimming of optimism about international diplomacy and cooperation among nations toward common goals. It will come into force just as the high seas are poised to become the site of controversial industrial activities including deep sea mining. The treaty provides a comprehensive set of regulations for high seas conservation that would supersede the existing patchwork of rules developed by United Nations agencies and industrial organizations in sectors like oil, fishing and shipping. Currently, less than 10 percent of the world's oceans are protected under law, and conservation advocates say little of that protection is effective. The treaty states a goal of giving 30 percent of the high seas some kind of protected status by 2030.
Read more of this story at Slashdot.
- Africa's Only Internet Cable Repair Ship Keeps the Continent Online
The Leon Thevenin, Africa's only permanently stationed cable repair ship, maintains over 60,000 kilometers of undersea internet infrastructure from Madagascar to Ghana. The 43-year-old vessel employs a 60-person crew who perform precision repairs on fiber-optic cables that carry data for Alphabet, Meta, and Amazon -- companies that consumed 3.6 billion megabits per second of bandwidth in 2023. Operating costs range from $70,000 to $120,000 daily, according to owner Orange Marine. The ship has experienced increased demand due to unusual underwater landslides in the Congo Canyon causing frequent cable breaks. Cable jointer Shuru Arendse and his team spend up to 48 hours on repairs that require fusing hair-thin glass fibers in conditions where a speck of dust can ruin the joint. The vessel gained Starlink connectivity last year after decades of relying on satellite phones and shared computers for crew communication. Sixty-two cable repair ships operate globally to maintain the infrastructure supporting streaming media and AI applications.
Read more of this story at Slashdot.
- Pentagon Demands Journalists Pledge To Not Obtain Unauthorized Material
The Washington Post: The Trump administration unveiled a new crackdown Friday on journalists at the Pentagon, saying it will require them to pledge they won't gather any information - even unclassified - that hasn't been expressly authorized for release, and will revoke the press credentials of those who do not obey. Under the policy, the Pentagon may revoke press passes for anyone it deems a security threat. Possessing confidential or unauthorized information, under the new rules, would be grounds for a journalist't press pass to be revoked. "DoW remains committed to transparency to promote accountability and public trust," the document says, using an acronym for the newly rebranded Department of War. "However, DoW information must be approved for public release by an appropriate authorizing official before it is released, even if it is unclassified." For months, Defense Secretary Pete Hegseth and his staff have been tightening restrictions on Pentagon reporters while limiting military personnel's direct communication with the press. Like many defense secretaries before him, Hegseth has been deeply irritated by leaks. His staff this year threatened to use polygraph tests to stop people from leaking information, until the White House intervened.
Read more of this story at Slashdot.
|

- Zuck has the power! Meta applies to sell excess electricity
With new electricity sources for AI datacenters, the company will have some juice left over AI model training and serving require vast quantities of power, but not necessarily all at once. With the first of several gigawatt-scale datacenters due to come online next year, Meta is looking at ways to offload excess energy capacity by selling it on the wholesale market.…
- Sorry, but DeepSeek didn’t really train its flagship model for $294,000
Training costs detailed in R1 training report don't include 2.79 million GPU hours that laid its foundation Chinese AI darling DeepSeek's now infamous R1 research report was published in the Journal Nature this week, alongside new information on the compute resources required to train the model. Unfortunately, some people got the wrong idea about just how expensive it was to create.…
- Ivanti EPMM holes let miscreants plant shady listeners, CISA says
Unnamed org compromised with two malware sets An unknown attacker has abused a couple of flaws in Ivanti Endpoint Manager Mobile (EPMM) and deployed two sets of malware against an unnamed organization, according to the US Cybersecurity and Infrastructure Security Agency.…
- Court lets NSF keep swinging axe at $1B in research grants
Judge rules there’s no quick fix for 1,700+ axed grants, leaving labs scrambling for cash while the lawsuit plays out A US court has cleared the way for the National Science Foundation to press ahead with the cancellation of more than 1,700 research grants worth upwards of $1 billion. …
- Scattered Spider teen cuffed after buying games and meals with extortion bitcoin
Bad opsec Thalha Jubair, one of the two UK teens arrested on Tuesday and accused of being members of the notorious Scattered Spider cybercrime gang, allegedly played a role in bilking more than 100 organizations out of at least $115 million in ransom payments. The cops nabbed him after following a number of clues, including paying for gift cards from a wallet on the same server that also held wallets receiving extortion payments.…
- User group says SAP's licensing models make cloud migration harder
DSAG criticizes separate regimes for public, private cloud, says users need more time to upgrade in uncertain times SAP's German-speaking user group has warned that the enterprise software giant's current licensing regime is creating unwanted difficulties in launching cloud migration and upgrade projects.…
- Charities warn Ofcom too soft on Online Safety Act violators
Another blow for the legislation as Parliament continues to hear stakeholder views As UK ministers continue to quiz stakeholders over the effectiveness of the Online Safety Act, one charity chief raised concerns over the robustness of Ofcom's enforcement of the controversial legislation.…
- Pigs will fly: Uber Eats to trial drone delivery
Teams with UAV operator Flytrex for service that moves meals in minutes Flying pigs may soon be on their way to some US households, after rideshare and food delivery behemoth Uber teamed with drone operator Flytrex for food delivery services.…
- Intel and Nvidia sitting in a tree, NVLink-I-N-G
But still no hero customer for Chipzilla's Foundry biz Nvidia is set to become one of Intel's largest shareholders after the GPU giant announced on Thursday it would invest $5 billion in the struggling chipmaker under a co-development agreement targeting PCs and datacenter infrastructure.…
- AI can now design functional viruses – not the computer kind, either
Inject this synthetic phage into E. coli and it kills better than the real thing A group of Stanford bioengineers claim that they've created synthetic bacteriophages using AI-generated designs that not only work in the real world, but are far more infectious than their naturally-occurring counterparts. …
- Crims bust through SonicWall to grab sensitive config data
Vendor pulls plug on cloud backup feature, urges admins to reset passwords and re-secure devices SonicWall is telling some customers to reset passwords after attackers broke into its cloud backup service and accessed firewall configuration data.…
- Cybercriminals pwn 850k+ Americans' healthcare data
Three US medical centers fess up to serious breaches Cybercriminals broke in and stole nearly a million Americans' data in the space of a week, in the course of three digital burglaries at healthcare providers.…
- Cloudflare DDoSed itself with React useEffect hook blunder
Dashboard loop caused API outage that was hard to troubleshoot Cloudflare has confessed to a coding error using a React useEffect hook, notorious for being problematic if not handled carefully, that caused an outage for the platform's dashboard and many of its APIs.…
- French jet left circling while Corsican controller caught Zs
Wake-up call for dozed and confused chap who had to turn on runway lights In the high-stress and safety-critical world of air traffic control, "don't fall asleep" probably comes pretty far toward the top of the rule book, and yet that's apparently the reason for the landing delay of an Air Corsica Airbus A320 this week.…
- Insight Partners confirms ransomware hit, more than 12,000 caught in data dragnet
VC giant rebuilt boxes, patched holes, and says it’s beefed up security – but won’t say who did it Venture capital giant Insight Partners has confirmed that a January ransomware attack compromised the personal data of more than 12,000 people, including employees, former staff, and the firm's usually-secretive limited partners.…
- China's DeepSeek applying trial-and-error learning to its AI 'reasoning'
Model can also explain its answers, researchers find Chinese AI company DeepSeek has shown it can improve the reasoning of its LLM DeepSeek-R1 through trial-and-error based reinforcement learning, and even be made to explain its reasoning on math and coding problems, even though explanations might sometimes be unintelligible.…
- Toys can tell us a lot about how tech will change our lives
LEGO Mindstorms, PlayStation 2 and Furby all resonate today in their own way Column Twenty-five years ago this month I published a book called The Playful World that explored a simple idea: that the seeds of the future can be found in the present by considering the dazzling toys we started giving our children at the turn of the millennium.…
- US tech giants pledge $42 billion in UK investment as Trump tours Blighty
Datacenters galore, plus some vague cooperation on AI, nuclear, quantum, and more America and the UK have announced a $42 billion (£31 billion) trade pact, funded by Microsoft, Google, and others, that predicts bit barns will spring up over Britain's green and pleasant Land. But there's a lot more than money involved.…
- Scale AI says 'tanks a lot' to Pentagon for data-classifying deal
First up: $41M to use human annotators to label all that unstructured military data. What could go wrong? Data curation firm Scale AI has partnered with the Pentagon to deploy its AI on Top Secret networks - a move its interim CEO says is necessary if the US wants AI to be useful for national security.…
- AMD tries to catch CUDA with performance-boosting ROCm 7 software
House of Zen promises 3.5x improvement in inference and 3x uplift in training perf over last-gen software AMD closed the performance gap with Nvidia's Blackwell accelerators with the launch of the MI355X this spring. Now the company just needs to overcome Nvidia's CUDA software advantage and make that perf more accessible to developers. …
|
|
|
|