Video gaming may be associated with better cognitive performance in children
https://nida.nih.gov/news-events/news-releases/2022/10/video-gaming-may-be-associated-with-better-cognitive-performance-in-children
The researchers found that the children who reported playing video games for three or more hours per day were faster and more accurate on both cognitive tasks than those who never played.
https://nida.nih.gov/news-events/news-releases/2022/10/video-gaming-may-be-associated-with-better-cognitive-performance-in-children
The researchers found that the children who reported playing video games for three or more hours per day were faster and more accurate on both cognitive tasks than those who never played.
archives.nida.nih.gov
Video gaming may be associated with better cognitive performance in children | NIDA Archives
Additional research necessary to parse potential benefits and harms of video games on the developing brain
👍1
Electrons turn a piece of wire into a laser-like light source
Shining a laser on an iron wire generates fast-moving electrons that boost the electromagnetic waves created by the light interacting with the wire. This way of making laser-like light could surpass existing methods that use electrons.
https://www.nature.com/articles/d41586-022-03455-4
Shining a laser on an iron wire generates fast-moving electrons that boost the electromagnetic waves created by the light interacting with the wire. This way of making laser-like light could surpass existing methods that use electrons.
https://www.nature.com/articles/d41586-022-03455-4
Nature
Electrons turn a piece of wire into a laser-like light source
Nature - Light-induced electron pulse amplifies electromagnetic waves.
The End of Programming
By Matt Welsh
Programming will be obsolete. I believe the conventional idea of "writing a program" is headed for extinction, and indeed, for all but very specialized applications, most software, as we know it, will be replaced by AI systems that are trained rather than programmed. In situations where one needs a "simple" program (after all, not everything should require a model of hundreds of billions of parameters running on a cluster of GPUs), those programs will, themselves, be generated by an AI rather than coded by hand.
https://m-cacm.acm.org/magazines/2023/1/267976-the-end-of-programming/fulltext
By Matt Welsh
Programming will be obsolete. I believe the conventional idea of "writing a program" is headed for extinction, and indeed, for all but very specialized applications, most software, as we know it, will be replaced by AI systems that are trained rather than programmed. In situations where one needs a "simple" program (after all, not everything should require a model of hundreds of billions of parameters running on a cluster of GPUs), those programs will, themselves, be generated by an AI rather than coded by hand.
https://m-cacm.acm.org/magazines/2023/1/267976-the-end-of-programming/fulltext
The Digital Personal Data Protection Bill, 2023 was introduced in Lok Sabha on August 3, 2023. The Bill seeks to provide for the protection of personal data and the privacy of individuals.
Applicability: The Bill applies to the processing of digital personal data within India where such data is: (i) collected online, or (ii) collected offline and is digitised. It will also apply to the processing of personal data outside India if it is for offering goods or services in India. Personal data is defined as any data about an individual who is identifiable by or in relation to such data. Processing has been defined as wholly or partially automated operation or set of operations performed on digital personal data. It includes collection, storage, use, and sharing.
Applicability: The Bill applies to the processing of digital personal data within India where such data is: (i) collected online, or (ii) collected offline and is digitised. It will also apply to the processing of personal data outside India if it is for offering goods or services in India. Personal data is defined as any data about an individual who is identifiable by or in relation to such data. Processing has been defined as wholly or partially automated operation or set of operations performed on digital personal data. It includes collection, storage, use, and sharing.
MobileDiffusion: Rapid text-to-image generation on-device
https://research.google/blog/mobilediffusion-rapid-text-to-image-generation-on-device
Text-to-image diffusion models have shown exceptional capabilities in generating high-quality images from text prompts. However, leading models feature billions of parameters and are consequently expensive to run, requiring powerful desktops or servers (e.g., Stable Diffusion, DALL·E, and Imagen). While recent advancements in inference solutions on Android via MediaPipe and iOS via Core ML have been made in the past year, rapid (sub-second) text-to-image generation on mobile devices has remained out of reach.
To that end, in “MobileDiffusion: Subsecond Text-to-Image Generation on Mobile Devices”, we introduce a novel approach with the potential for rapid text-to-image generation on-device.
https://research.google/blog/mobilediffusion-rapid-text-to-image-generation-on-device
Text-to-image diffusion models have shown exceptional capabilities in generating high-quality images from text prompts. However, leading models feature billions of parameters and are consequently expensive to run, requiring powerful desktops or servers (e.g., Stable Diffusion, DALL·E, and Imagen). While recent advancements in inference solutions on Android via MediaPipe and iOS via Core ML have been made in the past year, rapid (sub-second) text-to-image generation on mobile devices has remained out of reach.
To that end, in “MobileDiffusion: Subsecond Text-to-Image Generation on Mobile Devices”, we introduce a novel approach with the potential for rapid text-to-image generation on-device.
Forwarded from Accidental Archivist
10031-2024.pdf
13.7 MB
IEEE Standard for Information
Technology—Portable Operating
System Interface (POSIX™)
Base Specifications, Issue 8
IEEE Computer Society
and
The Open Group
Developed by the
Microprocessor Standards Committee
IEEE Std 1003.1™-2024
(Revision of IEEE Std 1003.1-2017)
Technology—Portable Operating
System Interface (POSIX™)
Base Specifications, Issue 8
IEEE Computer Society
and
The Open Group
Developed by the
Microprocessor Standards Committee
IEEE Std 1003.1™-2024
(Revision of IEEE Std 1003.1-2017)
👍1
How I Tripped Over the Debian Weak Keys Vulnerability
http://hezmatt.org/~mpalmer/blog/2024/04/09/how-i-tripped-over-the-debian-weak-keys-vuln.html
GitHub provided SSH access to the git repos they hosted, by SSHing to git@github.com with publickey authentication. They were using the standard way that everyone manages SSH keys: the ~/.ssh/authorized_keys file, and that became a problem as the number of keys started to grow.http://hezmatt.org/~mpalmer/blog/2024/04/09/how-i-tripped-over-the-debian-weak-keys-vuln.html
CVE-2021-4440: A Linux CNA Case Study
It's kind of alarming that multiple projects rely on these CVE notification schemes to fix their issues, and if this chain breaks they're unaware of them.https://grsecurity.net/cve-2021-4440_linux_cna_case_study
grsecurity.net
grsecurity - CVE-2021-4440: A Linux CNA Case Study
This blog serves as a case study into how the newly-formed Linux CNA (CVE Numbering Authority) has affected Linux kernel vulnerability management, through the mishandling of a vulnerability we reported this year in the upstream 5.10 LTS kernel.