Anzeige: Nachhaltige Technologieansätze verstehen

In diesem Intensivworkshop der Golem Karrierewelt werden zukunftsweisende Strategien vorgestellt, mit denen Unternehmen ihre IT effizienter und nachhaltiger gestalten können. (Golem Karrierewelt, GreenIT)

In diesem Intensivworkshop der Golem Karrierewelt werden zukunftsweisende Strategien vorgestellt, mit denen Unternehmen ihre IT effizienter und nachhaltiger gestalten können. (Golem Karrierewelt, GreenIT)

Google backs privately funded satellite constellation for wildfire detection

“Authorities will have high-resolution imagery that is updated globally every 20 minutes.”

The Windy Fire blazes through the Long Meadow Grove of giant sequoia trees near The Trail of 100 Giants overnight in Sequoia National Forest on September 21, 2021, near California Hot Springs, California.

Enlarge / The Windy Fire blazes through the Long Meadow Grove of giant sequoia trees near The Trail of 100 Giants overnight in Sequoia National Forest on September 21, 2021, near California Hot Springs, California. (credit: David McNew/Getty Images)

Space is more accessible than ever thanks to the proliferation of small satellites and more affordable launch prices, which opened the door to bespoke applications like global pollution monitoring, crop observations, and new ways of collecting weather and climate data.

Now you can add wildfire detection to the list. Satellites have observed wildfires from space for decades, but a new initiative partially funded by Google's philanthropic arm aims to deploy more than 50 small satellites in low-Earth orbit to pinpoint flare-ups as small as a classroom anywhere in the world.

The FireSat constellation, managed by a nonprofit called Earth Fire Alliance (EFA), will be the first satellite fleet dedicated to detecting and tracking wildfires. Google announced a fresh investment of $13 million in the FireSat constellation Monday, building on the tech giant's previous contributions to support the development of custom infrared sensors for the FireSat satellites.

Read 10 remaining paragraphs | Comments

Google backs privately funded satellite constellation for wildfire detection

“Authorities will have high-resolution imagery that is updated globally every 20 minutes.”

The Windy Fire blazes through the Long Meadow Grove of giant sequoia trees near The Trail of 100 Giants overnight in Sequoia National Forest on September 21, 2021, near California Hot Springs, California.

Enlarge / The Windy Fire blazes through the Long Meadow Grove of giant sequoia trees near The Trail of 100 Giants overnight in Sequoia National Forest on September 21, 2021, near California Hot Springs, California. (credit: David McNew/Getty Images)

Space is more accessible than ever thanks to the proliferation of small satellites and more affordable launch prices, which opened the door to bespoke applications like global pollution monitoring, crop observations, and new ways of collecting weather and climate data.

Now you can add wildfire detection to the list. Satellites have observed wildfires from space for decades, but a new initiative partially funded by Google's philanthropic arm aims to deploy more than 50 small satellites in low-Earth orbit to pinpoint flare-ups as small as a classroom anywhere in the world.

The FireSat constellation, managed by a nonprofit called Earth Fire Alliance (EFA), will be the first satellite fleet dedicated to detecting and tracking wildfires. Google announced a fresh investment of $13 million in the FireSat constellation Monday, building on the tech giant's previous contributions to support the development of custom infrared sensors for the FireSat satellites.

Read 10 remaining paragraphs | Comments

Ban warnings fly as users dare to probe the “thoughts” of OpenAI’s latest model

OpenAI does not want anyone to know what o1 is “thinking” under the hood.

An illustration of gears shaped like a brain.

Enlarge (credit: Andriy Onufriyenko via Getty Images)

OpenAI truly does not want you to know what its latest AI model is "thinking." Since the company launched its "Strawberry" AI model family last week, touting so-called reasoning abilities with o1-preview and o1-mini, OpenAI has been sending out warning emails and threats of bans to any user who tries to probe into how the model works.

Unlike previous AI models from OpenAI, such as GPT-4o, the company trained o1 specifically to work through a step-by-step problem-solving process before generating an answer. When users ask an "o1" model a question in ChatGPT, users have the option of seeing this chain-of-thought process written out in the ChatGPT interface. However, by design, OpenAI hides the raw chain of thought from users, instead presenting a filtered interpretation created by a second AI model.

Nothing is more enticing to enthusiasts than information obscured, so the race has been on among hackers and red-teamers to try to uncover o1's raw chain of thought using jailbreaking or prompt injection techniques that attempt to trick the model into spilling its secrets. There have been early reports of some successes, but nothing has yet been strongly confirmed.

Read 10 remaining paragraphs | Comments

Ban warnings fly as users dare to probe the “thoughts” of OpenAI’s latest model

OpenAI does not want anyone to know what o1 is “thinking” under the hood.

An illustration of gears shaped like a brain.

Enlarge (credit: Andriy Onufriyenko via Getty Images)

OpenAI truly does not want you to know what its latest AI model is "thinking." Since the company launched its "Strawberry" AI model family last week, touting so-called reasoning abilities with o1-preview and o1-mini, OpenAI has been sending out warning emails and threats of bans to any user who tries to probe into how the model works.

Unlike previous AI models from OpenAI, such as GPT-4o, the company trained o1 specifically to work through a step-by-step problem-solving process before generating an answer. When users ask an "o1" model a question in ChatGPT, users have the option of seeing this chain-of-thought process written out in the ChatGPT interface. However, by design, OpenAI hides the raw chain of thought from users, instead presenting a filtered interpretation created by a second AI model.

Nothing is more enticing to enthusiasts than information obscured, so the race has been on among hackers and red-teamers to try to uncover o1's raw chain of thought using jailbreaking or prompt injection techniques that attempt to trick the model into spilling its secrets. There have been early reports of some successes, but nothing has yet been strongly confirmed.

Read 10 remaining paragraphs | Comments

Archaeologists believe this Bronze Age board game is the oldest yet found

Origins of Hounds and Jackals, aka Fifty-Eight Holes, may lie in Asia rather than Egypt.

The fifty-eight holes board from Çapmalı.

Enlarge / The Fifty-Eight holes board from Çapmalı. (credit: W. Crist et al., 2024)

An ancient board game known as Hounds and Jackals has long been believed to have originated in Egypt. However, according to a paper published in the European Journal of Archaeology, a version of the game board found in present-day Azerbaijan might date back even earlier, suggesting that the game originated in Asia.

As previously reported, there is archaeological evidence for various kinds of board games from all over the world dating back millennia: Senet and Mehen in ancient Egypt, for example, or a strategy game called ludus latrunculorum ("game of mercenaries") favored by Roman legions. A 4,000-year-old board discovered last year at an archaeological site in Oman's Qumayrah Valley might be a precursor to an ancient Middle Eastern game known as the Royal Game of Ur (or the Game of Twenty Squares), a two-player game that may have been one of the precursors to backgammon (or was replaced in popularity by backgammon). Like backgammon, it's essentially a race game in which players compete to see who can move all their pieces along the board before their opponent.

Last year, archaeologists discovered a 500-year-old game board in the ruins of Ćmielów Castle in Poland. It was a two-person strategy board game called Mill, also known as Nine Men's Morris, Merels, or "cowboy checkers" in North America. The earliest-known Mill game board was found carved into the roofing slabs of an Egyptian temple at Kurna, which likely predates the Common Era. Historians believe it was well-known to the Romans, who may have learned of the game through trade routes.

Read 6 remaining paragraphs | Comments

Archaeologists believe this Bronze Age board game is the oldest yet found

Origins of Hounds and Jackals, aka Fifty-Eight Holes, may lie in Asia rather than Egypt.

The fifty-eight holes board from Çapmalı.

Enlarge / The Fifty-Eight holes board from Çapmalı. (credit: W. Crist et al., 2024)

An ancient board game known as Hounds and Jackals has long been believed to have originated in Egypt. However, according to a paper published in the European Journal of Archaeology, a version of the game board found in present-day Azerbaijan might date back even earlier, suggesting that the game originated in Asia.

As previously reported, there is archaeological evidence for various kinds of board games from all over the world dating back millennia: Senet and Mehen in ancient Egypt, for example, or a strategy game called ludus latrunculorum ("game of mercenaries") favored by Roman legions. A 4,000-year-old board discovered last year at an archaeological site in Oman's Qumayrah Valley might be a precursor to an ancient Middle Eastern game known as the Royal Game of Ur (or the Game of Twenty Squares), a two-player game that may have been one of the precursors to backgammon (or was replaced in popularity by backgammon). Like backgammon, it's essentially a race game in which players compete to see who can move all their pieces along the board before their opponent.

Last year, archaeologists discovered a 500-year-old game board in the ruins of Ćmielów Castle in Poland. It was a two-person strategy board game called Mill, also known as Nine Men's Morris, Merels, or "cowboy checkers" in North America. The earliest-known Mill game board was found carved into the roofing slabs of an Egyptian temple at Kurna, which likely predates the Common Era. Historians believe it was well-known to the Romans, who may have learned of the game through trade routes.

Read 6 remaining paragraphs | Comments

Secure Boot-neutering PKfail debacle is more prevalent than anyone knew

Keys were marked “DO NOT TRUST.” More devices than previously known used them anyway.

Secure Boot-neutering PKfail debacle is more prevalent than anyone knew

Enlarge (credit: Getty Images)

A supply chain failure that compromises Secure Boot protections on computing devices from across the device-making industry extends to a much larger number of models than previously known, including those used in ATMs, point-of-sale terminals, and voting machines.

The debacle was the result of non-production test platform keys used in hundreds of device models for more than a decade. These cryptographic keys form the root-of-trust anchor between the hardware device and the firmware that runs on it. The test production keys—stamped with phrases such as “DO NOT TRUST” in the certificates—were never intended to be used in production systems. A who's-who list of device makers—including Acer, Dell, Gigabyte, Intel, Supermicro, Aopen, Foremelife, Fujitsu, HP, and Lenovo—used them anyway.

Medical devices, gaming consoles, ATMs, POS terminals

Platform keys provide the root-of-trust anchor in the form of a cryptographic key embedded into the system firmware. They establish the trust between the platform hardware and the firmware that runs on it. This, in turn, provides the foundation for Secure Boot, an industry standard for cryptographically enforcing security in the pre-boot environment of a device. Built into the UEFI (Unified Extensible Firmware Interface), Secure Boot uses public-key cryptography to block the loading of any code that isn’t signed with a pre-approved digital signature.

Read 9 remaining paragraphs | Comments

Secure Boot-neutering PKfail debacle is more prevalent than anyone knew

Keys were marked “DO NOT TRUST.” More devices than previously known used them anyway.

Secure Boot-neutering PKfail debacle is more prevalent than anyone knew

Enlarge (credit: Getty Images)

A supply chain failure that compromises Secure Boot protections on computing devices from across the device-making industry extends to a much larger number of models than previously known, including those used in ATMs, point-of-sale terminals, and voting machines.

The debacle was the result of non-production test platform keys used in hundreds of device models for more than a decade. These cryptographic keys form the root-of-trust anchor between the hardware device and the firmware that runs on it. The test production keys—stamped with phrases such as “DO NOT TRUST” in the certificates—were never intended to be used in production systems. A who's-who list of device makers—including Acer, Dell, Gigabyte, Intel, Supermicro, Aopen, Foremelife, Fujitsu, HP, and Lenovo—used them anyway.

Medical devices, gaming consoles, ATMs, POS terminals

Platform keys provide the root-of-trust anchor in the form of a cryptographic key embedded into the system firmware. They establish the trust between the platform hardware and the firmware that runs on it. This, in turn, provides the foundation for Secure Boot, an industry standard for cryptographically enforcing security in the pre-boot environment of a device. Built into the UEFI (Unified Extensible Firmware Interface), Secure Boot uses public-key cryptography to block the loading of any code that isn’t signed with a pre-approved digital signature.

Read 9 remaining paragraphs | Comments