• Best Of 2024: 'DO NOT MENTION SWITCH 2' - We Infiltrate Nintendo And Sneak A Peek At Its 2024 Calendar
    www.nintendolife.com
    Over the holiday season, we're republishing some of the best articles from Nintendo Life writers and contributors as part of our Best of 2024 series. Enjoy!In the magazine business, the Back Page is where you'd find all the weird goofs that we couldn't fit in anywhere else. Some may call it "filler"; we prefer "a whole page to make terrible jokes that are tangentially related to the content of the mag". We don't have pages on the internet, but we still love terrible jokes so welcome to our semi-regular feature, Back Page.Subscribe to Nintendo Life on YouTube789kWatch on YouTube Today, Jim sneaks into Nintendo HQ and spills the contents of a file marked 'PLAN B'...I don't have much time so I will keep this quick.Thanks to the diligent work of my uncle, I was able to sneak my way into the Nintendo's secret vault located in an undisclosed London location.As I moved through the shadows past rooms stocked with pre-boxed copies of Zelda remasters and a door that simply read "MOTHER 3 (WEST) DO NOT OPEN", I stumbled upon a table, littered with files and various Nintendo paraphernalia that immediately caught my eye.Poking through a stack of Geno amiibo, I noticed a black folder with "PLAN B" written on the top. My curiosity got the better of me, and, sweeping aside the plastic figurines, I lifted the Wii U GamePad paperweight which was keeping everything in order and took a glance at the contents.What I read shocked me to my very core. These were the plans for the coming year, a year without the 'Switch 2'. Thumbing the pages, I saw swathes of re-releases and remasters, all fine-tuned in their scheduling to keep the Nintendo fanboys onside as the Switch marches through its eighth year on the market.Image: Nintendo LifeSuddenly, footsteps. I grabbed my phone and snapped up some pictures of the most shocking pages while committing the rest to memory. I shut the folder and quickly leapt into a nearby cabinet full of unreleased LABO packs and Wiimote accessories. The guard a large American man with the build of Reggie Fils-Aim (though I did not see his face) passed through the room and I was able to escape.I am sure that I have mere minutes before deadly ninjas track me down. But this information has to be seen. Please take what I have to show you as absolute fact.This is what I can remember (and what I was fast enough to photograph) from Nintendo's console-less 2024 plans."PLAN B" - Nintendo Secret Plans 2024The opening page was dull and unassuming. It laid out exactly what the document was going to be about. A clear message of "DO NOT MENTION SWITCH 2 UNTIL 2025" immediately caught my eye and I couldn't help but notice that somebody had doodled in the bottom corner. Is that a PS5 on fire? Did Miyamoto draw that? The questions would only continue from here...Image: Nintendo LifeThere was no faffing about from here on in. You might think that an important document such as this would have a little more filler to hide the juicy bits, but I can tell you that is wrong. This is a real file and clearly whoever made it did not have the time or creative power to pad it out with unnecessary corporatespeak.And so we hit the plans for the February 2024 Direct:Image: Nintendo LifeCrazy, right? Yes, the release dates are pretty unsurprising and, of course, another Kirby remaster is on the way, but who would have thought that the hotly-anticipated Zelda double-pack would be Phantom Hourglass and Spirit Tracks??Speaking of real gob-smackers, I thought that it would be worth grabbing a snap of the page titled "Da Movies" (I can only assume in a reference to that one Vin Diesel video). We knew that Nintendo was looking to branch out and become a multi-armed entertainment company, but this is next level:Image: Nintendo LifeA discarded post-it note carelessly tossed aside seemed to suggest that Nintendo is looking for more Doug Bowser-style name-to-brand synergy in its executives over the coming months. Vanessa Kirby, Ridley Scott, Zelda Williams, and Gino D'Acampo (pending spelling change) were all given as potential options.The June Direct page left me with even more questions: When will the remasters end? Who would leave such an important document on the table? Is that the Aerial font? But Reggie the guard's footsteps were getting louder and I knew that the contents had to be seen to be believed.Image: Nintendo LifeI had an inkling that some of the remasters this year were going to lean a little obscure, but bringing back the Super Scope Battle Clash sequel, Metal Combat: Falcon's Revenge? That feels a little like scraping the bottom of the barrel. Hey, if Nintendo can really nail the Switch motion controls, then we might just be onto something there.Being tight for time, I skipped past taking photos of the next few pages. One was all about a mobile app named 'Pikmin Bloomier' and had a lot of red-penned notes next to its contents. Another detailed a long email chain in which Masahiro Sakurai repeatedly asked for a Kid Icarus: Uprising Switch port but wouldn't explain how he had "revolutionised the control scheme" when asked.And so we hit the last page that I was able to photograph until I had to flee: plans for the final Direct of the year. Honestly, it looks like we're going to be going out with a bit of a whimper, though the emphasised "DO NOT MENTION SWITCH 2" hammers home the fact that 2025 might be different.Image: Nintendo LifeI hope that the above information has been useful. It was a dangerous mission, but this deserves to be seen.Luckily, I seem to have escaped unharmed. Yes, the yellow van with 'Super Mario Bros. Plumbing' written on the side has been parked out the front of my house for a few days now, but I'm sure that's nothing to worry about.
    0 Comments ·0 Shares ·107 Views
  • Can you please help me create this orb effect with some movement in Unity shader graph
    realtimevfx.com
    My outputI have tried everything and I could not create a similar effect. The best I did is shown in the link called My output. Currently, there are multiple plane meshes stacked on top of each other in the one I have made. I am fairly new to shaders in general. Please help me so I can progress, I am stuck on this for past 30 days.Edit: After posting here, I got to know that it can be searched by keyword Ectoplasm on pinterest.Thank you
    0 Comments ·0 Shares ·120 Views
  • Nicholas Galanin Hews Visions of the Present From Indigenous Knowledge, Land, and Memory
    www.thisiscolossal.com
    Never Forget (2021), steel and paint, 59 feet 4 inches x 360 feet 7 inches. Photo by Lance Gerber. All images courtesy of the artist and Peter Blum Gallery, New York, shared with permissionNicholas Galanin Hews Visions of the Present From Indigenous Knowledge, Land, and MemoryDecember 24, 2024Kate MothesBetween 1869 and the 1960s in the U.S., thousands of Indigenous children attended at least 523 boarding schools, supported by the government and church groups that were fueled by the grim motto, Kill the Indian, Save the Man.Children were sent hundreds, if not thousands, of miles from their families and tribal communities, suffering horrific abuse, and in many cases, dying as a result. Federal agents often abducted minors, who were sent to school and punished severely if they spoke their Native languages. By 1926, nearly 83 percent of Indigenous school-age children were enrolled.Loom (2022), prefab childrens school desks and chairs with graphite and pencil carving100 x 83 x 54 inches. Photo by Jason Wyche. Image courtesy of the artist; Peter Blum Gallery, New York; and the Gochman Family CollectionThe National Native American Boarding School Healing Coalition explains that the purpose of the schools was expressly intended to implement cultural genocide through the removal and reprogramming of American Indian and Alaska Native children to accomplish the systematic destruction of Native cultures and communities. In October, the U.S. government issued a formal apology for its role in the boarding schools, yet efforts will long continue to fully understand, process, and begin to heal the trauma.For Tlingit-Unangax artist Nicholas Galanin, looking to the past is fundamental to constructing a more nuanced perception of the present. His multidisciplinary practice aims to redress the widespread misappropriation of Indigenous visual culture, the impact of colonialism, as well as collective amnesia, says a statement from Peter Blum Gallery, which represents the artist and is currently showing Galanins solo exhibition, The persistence of Land claims in a climate of change.We can sharpen our vision of the present with cultural knowledge and memory, Galanin says. These works embody cultural memory and practice, reflecting persistence, sacrifice, violence, refusal, endurance, and resistance.White Flag (2022), trimmed polar bear rug and wood, polar bear: 50 x 78 inches; wood: 10 1/2 x 6 1/4 inches. Image courtesy of the artist; Peter Blum Gallery, New York; and GochmanFamily Collection. Photo by Jason WycheBased in Sitka, Alaska, Galanin often incorporates traditional Tlingit and Unangax art forms into contemporary sculptures and installations. The Imaginary Indian (Garden), for example, takes as its starting point a totem pole, a customarily towering representation of animals hewn from a single tree that is deeply imbued with spiritual and social significance. In 3D Consumption Illustration, Galanin comments on a lack of respect for the art form by cutting up a single totem figure like firewood, as if its disposable or merely decorative. In Loom, he stacks a series of ready-made childrens desks into a winged, totem pole-like tower to memorialize the children who suffered in residential schools.Galanins often provocative work emphasizes the inherent power of symbols and associations. A polar bear pelt stands in for fabric in White Flag, a nod to a symbol for surrender, which draws attention to the increasingly stark effects of the climate crisis on the arctic and on Native peoples way of life.In Miami earlier this month, masts and rigging emerged from the sand as if a Spanish galleon had been buried beneath the beach. The sails boldly asked in both English and Spanish: What are we going to give up to burn the sails of empire? and What are we going to build for our collective liberation?The Imaginary Indian (Garden) (2024), Indonesian replica of a Lingt totem with Victorian wallpaper, installation dimensions variable; totem: 81 1/4 x 69 3/4 x 17 3/4 inches. Photo by Jason WycheThe installation, titled Seletega (run, see if people are coming/corre a ver si viene gente), tapped into the European colonization of North America and its aim of extracting wealth, establishing cities and commerce, and expanding westward at the dire expense of Indigenous peoples.In The persistence of Land claims in a climate of change, Galanin continues to highlight the Indigenous cultural continuum, says a gallery statement, defying cultural erasure and refusing the legitimacy of colonial occupation. Galaninreflects on the distance between peace and justice bycentering the enduring Indigenous protection of Land in the face of expansive extraction.Through photography, monotypes, and sculptural works in ceramic, bronze, and wood, the artist reflects on systems of racial oppression and disenfranchisement, Indigenous knowledge and responsibility, and the importance of collectivity and connection as we proceed into the future.Galanin is the recipient of a slew of prestigious awards recently, including a Joan Mitchell Fellowship in 2023 and both the Guggenheim Fellowship and Don Tyson Prize this year. See more of his work on Instagram, and if youre in New York, visit The persistence of Land claims in a climate of change until January 18 in New York City.Seletega (2024), site specific commission,dimensions variable. Photo by Oriol Tarridas. Image courtesy of the artist and Faena ArtNeon American Anthem (red) (2023), neon installation, 7 x 16 feet. Photo by Brad ToneThe Value of Sharpness: When it Falls (2019), 60 porcelain hatchets, 13 1/4 x 5 x 1 inches each; installation variable. Photo by Thomas Mccarty. Image courtesy of the artist; Peter BlumGallery, New York; and the Gochman Family CollectionDetail of The Value of Sharpness: When it FallsThe American Dream is Alie and Well (2012), U.S. flag, felt, .50 cal ammunition, foam, gold leaf and plastic, 84 x 84 x 9 inches. Photo by Jason Wyche. Image courtesy of the artist; Peter Blum Gallery, New York; and Sheldon Museum of Art, NebraskaDetail of The Imaginary Indian (Garden)Next article
    0 Comments ·0 Shares ·88 Views
  • Ignoring router security settings puts millions at risk from hidden dangers
    www.foxnews.com
    Published December 24, 2024 6:00am EST close NJ police say theft group using Wi-Fi jammers to disable home security systems Kurt "CyberGuy" Knutsson joins "Fox & Friends Weekend" to break down his top tech security tips to implement into your home. If youre like me, your home Wi-Fi is at the center of almost everything you do online, whether its online banking, paying bills, booking trips, chatting with friends or streaming movies.These days, its not just your laptop and phone connected to the network, but also things like security cameras, thermostats and even air conditioners are all managed by your router. But be honest, when was the last time you did anything to secure your router? Its easy to forget about it, especially if its working fine. The thing is, a lot of people feel the same way, and a study reveals this "out of sight, out of mind" attitude could be putting millions at serious risk. Image of a router (Kurt "CyberGuy" Knutsson)Shocking router security facts you need to knowThe2024 Broadband Genie router security survey has uncovered some startling facts about how internet users approach router security. Over half of respondents (52%) admitted they have never adjusted their routers factory settings. Even more concerning, 86% of users have never changed their router administrator password. Leaving the default admin password unchanged is like leaving your front door unlocked. Its an open invitation for hackers to exploit.Similarly, 72% of respondents have never changed their Wi-Fi password. Default passwords are often easily accessible and can be exploited in seconds by knowledgeable attackers. Firmware updates, essential for patching vulnerabilities and enhancing router functionality, are also largely ignored. An overwhelming 89% of users have never updated their routers firmware. While newer routers often handle updates automatically, user awareness and action remain vital for those with older devices.Another glaring issue is the failure to change default network names, such as "SKY12345" or "Linksys-7890." These identifiers can provide hackers with crucial information about the router model, making it easier to exploit known vulnerabilities. Yet, 89% of respondents have never changed their network name. Image of a router (Kurt "CyberGuy" Knutsson)Most people dont know whos connected to their networkAlarmingly, 75% of users have never checked to see who is connected to their network. With an average home now hosting around 12 connected devices, failing to monitor network activity could lead to unauthorized access and potential data breaches. Even more worrying, three-quarters of respondents do not understand why adjusting router settings is important, showing a significant gap in awareness about the risks associated with default configurations."In 2022, we ran a similar study and found 48% had never touched their router's factory settings. Its concerning that not only has the number come down after two years, its got worse," said Alex Tofts, strategist at Broadband Genie."Most concerning is the very high percentage of broadband subscribers who dont even know why they should be making any of these changes. This exposes a clear knowledge gap, and users need to be educated more about the simple steps they can take to help prevent cyberattacks." A woman working on her laptop computer (Kurt "CyberGuy" Knutsson)6 ways to protect your Wi-Fi router from hackersKeeping your home network secure is essential to prevent unauthorized access and potential data breaches. Follow these steps to safeguard your Wi-Fi router:1) Change default passwords:Most routers come with default passwords that hackers can easily find online. To secure your router, change both the admin password (used to access settings) and the Wi-Fi network password. Use a strong password with at least 12 characters, combining uppercase and lowercase letters, numbers and symbols. Avoid simple options like "password123" or personal details such as your name or birth date.2) Rename your network (SSID):The default network name, or SSID, often includes the routers brand or model, making it easier for hackers to identify vulnerabilities. Rename your network to something unique that doesnt reveal personal information. Avoid using names, addresses or other identifiers. Instead, opt for a neutral or creative name thats easy for you to recognize but hard for others to associate with you.3) Keep your routers firmware updated:Router manufacturers release firmware updates to patch security flaws and enhance performance. Check your routers admin panel regularly for updates or enable automatic updates, if supported. Keeping your firmware up to date ensures youre protected against the latest threats. If your router is too old to receive updates, it might be time to upgrade to a newer, more secure model.4) Monitor network activity regularly:Unauthorized devices on your network can slow it down and expose you to risks. Log into your routers admin settings to view all connected devices. If you see anything suspicious, disconnect it and immediately change your Wi-Fi password. You can also enable MAC address filtering to control which devices can access your network or disable features like WPS (Wi-Fi Protected Setup) that may leave you vulnerable.5) Enable network encryption: Use the strongest encryption protocol available for your router, preferably WPA3 or at least WPA2. Encryption scrambles the data transmitted over your network, making it much harder for hackers to intercept and decipher your information.6) Regularly reboot your router: Schedule routine reboots to clear the system memory and refresh all connections, which may disrupt potential malware.Pro tip: Use strong antivirus software: To further protect your devices from malware and other threats, consider using reputable antivirus software. Antivirus programs can detect and remove malicious software, provide real-time protection and alert you to potential threats. Keeping your devices secure helps ensure your entire network remains safe from cyberattacks.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurts key takeawaysCybercriminals are constantly evolving the ways they target us, which means securing just your phone or laptop isnt enough anymore. You need to be cautious with anything connected to the internet, whether it's your router, smart cameras or doorbell. However, the Broadband Genie survey reveals that only a small number of people are aware of the best cybersecurity practices when it comes to protecting their routers. As a basic rule, always remember to change default passwords and rename your routers network to ensure better security.What are your biggest concerns when it comes to cybersecurity? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments ·0 Shares ·83 Views
  • This Linux laptop has a brilliant display and performance that rivals my MacBook
    www.zdnet.com
    ZDNET's key takeaways The Tuxedo Computers InfinityBook Pro 14 Gen 9 is available now on the official site.This laptop outperformed my expectations in every way, with a powerful CPU and a gorgeous display.Use caution when selecting your keyboard during the order process. View now at Tuxedo Computers I love a good laptop or desktop that comes pre-installed with Linux. When said hardware is equal parts beauty and power, it's even better. When German company Tuxedo Computers sent me a new InfinityBook Pro 14 Gen 9 to review, I knew it would be something special.I was not let down.The company uses Clevo rebranded hardware, which, if you're not familiar, are barebones laptop chassis used by many manufacturers that are fairly generic-looking, but offer their own perks (more on that in a bit). Tuxedo Computers can be shipped with either Tuxedo OS (the default) or you can choose fromUbuntu,Kubuntu,Lubuntu, orXubuntu, all of which I've written about.Also:Ready to ditch Windows? 5 factors to help you decide between Linux or MacOSYou can also order the laptop without any OS at all, and build your laptop with a custom logo (instead of the default Tuxedo Computers logo). details View at Tuxedo Computers Tuxedo Computers InfinityBook Pro 14 Gen 9 tech specsOmnia Display: Glare-free 3K (2880 X 1800) with a 16:10 ratio, a 120 Hz refresh rate, and 400 nits brightnessCPU: AMD Ryzen 7 8845HS (8 cores, 16 threads, 5.1 GHz max, and 24MB cache)GPU: AMD Radeon 780 M (12 GPU cores and a max clock speed of 2.7 GHz)RAM: 16GB DDR5 5600 MHzStorage: 500GB Samsung 980 VNMe PCIe 3.0Default keyboard: German DE QWERTZBattery: 80Wh Lithium Polymer with up to 17 hours idle, 13 hours video playback, and 9 hours web surfingPorts: Left side: Kensington Security Slot, USB-A 2.0, USB-C 3.2 Gen2 (10 GBit/s | DisplayPort 1.4 | Power Delivery DC-In*), and a 2-in-1 audio (headphone + mic). Right side: Card reader (SD/SDHC/SDXC), 2x USB-A 3.2 Gen1. Back side - HDMI 2.0b (HDCP 2.3), USB4 (40 GBit/s | DisplayPort 2.1 | Power Delivery DC-In* | DC-Out: max. 15 watts (5 V / 3 A)), RJ45 Port 1 Gbit (LAN).Webcam privacy sliderPrice: Starting at $1,057 from Tuxedo ComputersMy experienceWhen I first pulled the laptop out of the box, I didn't notice the thing that would trip me up most: the keyboard. The laptop I received had the German QWERTZ keyboard layout, something I'd never used. During setup, I just switched it to QWERTY, which turned out fine as long as I ignore the letters on the physical keyboard and type as normal. For example, the Y key was where the Z key would normally be.Speaking of keyboards, the InfinityBook Pro Gen 9 keyboard isn't really anything special. It works well, and while it's certainly not like the dreaded MacBook butterfly keys, but it's no Ultimate Hacking Keyboard. The keys are silent and have good action. I'd call this a Goldilocks keyboard: not too soft or too hard; they're just right. The Penguin key is a nice touch. Jack Wallen/ZDNETAs far as the trackpad is concerned, that's another story. From my perspective, Apple has created the gold standard by which all trackpads are compared, and although the InfinityBook Pro Gen 9 trackpad might not be at that level, it's one of the better trackpads I've experienced on a Linux laptop. It's smooth and reactive, with both a physical click and a tap-to-click that's enabled by default.The next issue was the default resolution. Out of the box, the laptop opted for the highest resolution possible, which made everything way too small for my aging eyes. After a quick change to a 1920 x 1080 resolution, everything was perfect.Also:10 lessons I've learned from the open-source community that aren't about techTuxedo OS uses the KDE Plasma desktop, which also helps boost performance to impressive levels. The laptop handled everything I threw at it without blinking an eye. You also get the Tuxedo Control Center, where you can get an at-a-glance look at system performance, as well as the ability to quickly switch power profiles (from Default, Cool and Breezy, Powersave extreme, Tuxedo defaults, or a user-created custom profile). The Tuxedo Control Center is an outstanding app for managing your laptop. Jack Wallen/ZDNETThe thing that really struck me the most about this laptop was how polished it was. Yes, it's Clevo hardware but Tuxedo Computers has done a wonderful job of making it their own product and ensuring everything works seamlessly and smoothly.The InfinityBook Pro Gen 9 also weighs roughly 3.09 pounds, which is about .09 pounds more than my MacBook Pro 13", so it's nice and light, making it a portable option.Also:You can test all the best Linux distros right in your web browser with this siteAs far as the display, it's beautiful. Images are crisp and have full support for the sRGB color gamut, so you know they're going to be accurate. The best part about the display is the matte anti-glare coating. This is one of the few times where I've really noticed the combination of matte and anti-glare really making a big difference.ZDNET's buying adviceI'm not gonna lie; the Tuxedo Computers InfinityBook Gen 9 is one of the best Linux laptops I've ever tested. It's as beautiful as it is high-performing, and with one of the best displays I've seen on a Linux laptop, this will be one of those review units that I do not want to send back. Just moving the cursor around puts a smile on my face because it's just so smooth and easy to see from any angle.If you've been in the market for a laptop with Linux pre-installed, Tuxedo Computers' InfinityBook Pro 14 Gen 9 is a solid choice. Just remember, if you do purchase one (and you hail from the United States), switch the default keyboard to a QWERTY layout; otherwise, you could get tripped up when typing.Featured reviews
    0 Comments ·0 Shares ·75 Views
  • 3 Tips To Boost Sleep That Most People Dont Know, From A Neurologist
    www.forbes.com
    Woman lying in bed suffering from insomniagettyDifficulty falling asleep, frequent awakenings during the night, and waking up feeling unrefreshed are common signs of insomnia. More than 60 million adults in the US face this challenge each year. If youve tried counting sheep, reading a dull book, or adjusted your routine to eliminate afternoon naps, youre not alone. Despite these well-intentioned efforts, 10-36% of Americans continue to struggle with insomnia. Sleep problems often go unreported in medical settings, making up only 0.42% of office visits. This highlights the need for more awareness and proactive discussions about sleep health. Seeking professional advice and exploring tailored solutions can lead to more restful nights and a better overall sense of well-being.If you have sleep problems, its important to inform your medical provider, as they may not address it otherwise. Your medical provider might have you complete the Epworth Sleepiness Scale , which only takes 2-3 minutes. The ESS helps estimate how likely you are to doze off during everyday activities, which include:Sitting and readingWatching TVSitting inactive in a public place (eg, a theater or meeting)As a passenger in a car for an hour without a breakLying down to rest in the afternoon when circumstances permitSitting and talking with someoneSitting quietly after a lunch without alcoholSitting in a car, while stopped for a few minutes in trafficIf your sleepiness is due to insomnia or poor sleep at night, here are three key tips to help you achieve a good nights sleep.Behavioral TreatmentBefore considering medication for sleep, its important to first explore behavioral interventions, particularly cognitive behavioral therapy. CBT is widely recognized as the first-line treatment for insomnia and is often more effective than sleeping pills. Unfortunately, many people miss out on this valuable option and instead turn to sleep medications, which often fail to address the underlying issues. The main objective of CBT is to reshape negative associations with sleep by providing constructive strategies to help individuals create a healthier relationship with sleep.One of the best ways to improve your sleep is to establish a routine. A part of your brain called the suprachiasmatic nucleus regulates your sleep-wake cycle. This nucleus learns when you typically go to sleep and when you wake up, which helps to trigger hormone and other changes in your body to facilitate transitions between the sleep and awake state. As a result, it becomes easier for you to fall asleep and wake up at consistent times. By maintaining a regular bedtime and wake-up time, you help your body become more disciplined in regulating your sleep-wake cycle.MORE FOR YOUEstablishing consistent bedtime rituals signals your body that it's time to wind down, which helps create an atmosphere conducive to sleep, making it easier for your body to transition into rest mode. Once your body adjusts to this routine, you may find that falling asleep and waking up becomes effortless.Another behavioral approach is stimulus control therapy, which involves going to bed only when you feel sleepy, leaving the bedroom if you can't fall asleep, and engaging in simple activities if you are unable to sleep. Another behavioral method is sleep restriction therapy, which involves avoiding daytime naps. This increases the chances of feeling sleepy at bedtime. However, because there are benefits to daytime naps, eliminating them may not be suitable for everyone.It's important to avoid using the bedroom for activities other than sleep and sexual activity. For example, try not to turn your bedroom into an office. If you live in a studio apartment or have a limited space where you only have one room, you should reserve the bed exclusively for sleeping.The ideal room temperature for sleep is around 65 degrees Fahrenheit. Warmer temperatures may disrupt sleep for some individuals. If you live in a noisy environment, try to minimize it during your bedtime. Additionally, be mindful of light exposure in the evening, particularly from smartphones, laptops, and other devices. You should also avoid alcohol and caffeine consumption before bed.Evaluate For Sleep ApneaThe behavioral treatments wont solve your problem if you have sleep apnea. Sleep apnea affects at least 22 million Americans and around 85% of individuals with sleep apnea dont know they have it. One of the most obvious tip-offs that you might have sleep apnea is snoring, which affects at least 90 million Americans.It's important to distinguish between snoring and sleep apnea, as they are not the same condition. Individuals who snore may or may not have sleep apnea, and those who have sleep apnea may or may not snore. In addition to snoring, other symptoms of sleep apnea can include bruxism (teeth clenching), neck pain, anxiety, and daytime drowsiness.If you are experiencing any of these symptoms and have untreated sleep apnea, you may feel excessively sleepy during the day. Sleep apnea can worsen numerous medical conditions and increase the risk of serious health issues, such as stroke. Therefore, it is essential to get this condition diagnosed and treated.By discussing your concerns with your medical provider, you may receive a referral to a sleep specialist, who may then recommend a sleep study. This study can be conducted either in a sleep lab or in your own home.Understanding what is keeping you up at night is important. With the correct diagnosis, you can get ... [+] the intervention to give you a good night's sleep. For example, use of a snore mouth guard may be the key to getting a good night's rest.gettyOnce a clear diagnosis is made, you can begin treatment. Some individuals may benefit from a continuous positive airway pressure machine, while others may find relief with a mandibular advancement device, commonly known as a snore mouthguard.Address Underlying Medical ProblemsMany medical conditions can negatively affect your sleep. For example, iron deficiency is known to cause restlessness in the legs which may keep you and your bed partner awake at night. Iron supplementation may be all you need, although it would also be advisable for your provider to find out why you had the low iron in the first place.Conditions such as lung disease and heart failure can make it difficult to breathe, leading to disrupted sleep. By effectively managing these conditions, you can greatly enhance your sleep quality and potentially extend your lifespan.Neuropathy can interfere with sleep, often causing pain or tingling in the feet that makes it difficult to fall asleep or wake you up periodically during the night. To address this issue, your healthcare provider will first need to conduct tests to determine the underlying cause of the neuropathy. Once the cause is identified, appropriate treatment can be provided.These are just a few of the conditions that may negatively impact your sleep. Your medical provider may uncover other diagnoses that need to be addressed as part of the workup for your sleep problem.Many factors can contribute to difficulties in getting a good night's sleep, including anxiety and various underlying medical conditions. If lifestyle changes do not improve your sleep, it is crucial to seek medical advice before considering sleeping pills. Self-medication may mask other problems that could be harmful in the long run. By prioritizing healthy sleep habits and making these intentional changes, you can take the first steps towards restful nights, which will allow you to embrace each new day with renewed energy and focus.
    0 Comments ·0 Shares ·74 Views
  • Urgent New Gmail Security Warning For Billions As Attacks Continue
    www.forbes.com
    Beware these AI attacks targeting Gmail usersSOPA Images/LightRocket via Getty ImagesUpdate, Dec. 24, 2024: This story, originally published Dec. 23 now includes details of new AI threat research from the Palo Alto Networks Unit 42 security group that could positively impact Gmail users as well as others.The single most popular free email platform on the planet is under attack from hackers wielding AI-driven threats. With 2.5 billion users, according to Googles own figures, Gmail isnt the only target of such attacks, but it sure is the biggest. Heres what you need to know and do to protect yourself. Right now.The AI Threat To Billions Of Gmail Users ExplainedGmail is most certainly not immune to advanced attacks from threat actors looking to exploit the treasure trove of sensitive data that is to be found ion the average email inbox. As I recently reported, theres an ongoing Google Calendar notification attack that relies upon Gmail to succeed, and Google itself has warned about a second wave of Gmail attacks that include extortion and invoice-based phishing, for example. With Apple also warning iPhone users about spyware attacks, an infamous ransomware gang rising from the dead and claiming Feb. 3 as the next attack date, now is not the time to be cyber-complacent. Certainly not when a giant of the security vendor world, McAfee, issued a new warning that confirmed what I have been saying about the biggest threat facing Gmail users: AI-powered phishing attacks that are frighteningly convincing.Scammers are using artificial intelligence to create highly realistic fake videos or audio recordings that pretend to be authentic content from real people, McAfee warned, As deepfake technology becomes more accessible and affordable, even people with no prior experience can produce convincing content. So, just imagine what people, threat actors, scammers and hackers with prior experience, can produce by way of an AI-driven attack. Attacks that can get within a cats whisker of fooling a seasoned cybersecurity professional into handing over credentials that could have seen his Gmail account hacked with all the consequences that could carry.MORE FOR YOUThe Convincing AI-Powered Attacks Targeting Gmail UsersIn October, a Microsoft security solutions consultant called Sam Mitrovic went viral after I reported how he had so nearly fallen victim to an AI-powered attack. So convincing, and typical of the latest wave of cyberattacks targeting Gmail users that it is worth mentioning briefly again. It started a week before it started, let me explain:Mitrovic got a notification about a Gmail account recovery attempt, apparently from Google. He ignored this, and the phone call also pertaining to come from. Google that followed a week later. Then, it all happened again. This time, Mitrovic picked up: an American voice, claiming to be from Google support, confirmed that there was suspicious activity on the Gmail account. To cut this long story short, please do go read the original, it is very much worth it, the number the call was coming from appeared to check out as being Google from a quick search, and the caller was happy to send a confirmation email. However, being a security consultant, Mitrovic spotted something that a less experienced user may well not have done: the To field was a cleverly obfuscated address that wasnt really a genuine Google one. As I wrote at the time, Its almost a certainty that the attacker would have continued to a point where the so-called recovery process would be initiated, which would have served to capture login credentials and quite possibly a session cookie to enable 2FA bypass as well.Unit 42 Researchers Develop New Adversarial Machine Learning Algorithm That Could Help Gmail And Other Users Defend Against AI-Powered MalwareNewly published research coming out of the Unit 42 group based at Palo Alto Networks, has detailed how by developing an adversarial machine learning algorithm to employ large language models in order to generate malicious JavaScript code at scale, detection of these AI-powered threats in the wild can be reduced by as much as 10%. One of the big problems facing both users and those who work to defend them against cyber threats, is that while LLMs struggle to create malware from scratch, Unit 42 researchers Lucas Hu, Shaown Sarker, Billy Melicher, Alex Starov, Wei Wang, Nabeel Mohamed and Tony Li, said, criminals can easily use them to rewrite or obfuscate existing malware, making it harder to detect. Its relatively easy for defenders to detect existing off-the-shelf obfuscation tools because their fingerprints are well known, their actions already cataloged. LLMs have changed the obfuscation game, swinging the odds in favor of the attackers as using AI prompts they can perform transformations that are much more natural-looking, the report stated, which makes detecting this malware more challenging. The ultimate aim is, with the use of multiple layers of such transformations, fooling malware classifiers into thinking malicious code is, in fact, totally benign.Unit 42 managed to create an algorithm using LLMs themselves to rewrite malicious JavaScript code, continually applying a number of rewriting steps to fool static analysis models. At each step, the researchers said, we also used a behavior analysis tool to ensure the programs behavior remained unchanged. Why is this important? Because, given the availability of generative AI tools for attackers, as weve seen in various attacks against Gmail users for example, the scale of malicious code variants and the difficulty in detecting them will continue to grow. The Unit 42 work shows how defenders can use the same tactics to rewrite malicious code to help generate training data that can improve the robustness of ML models. Indeed, Unit 42 said that by using the rewriting technique mentioned, it was able to develop a new deep learning-based malicious JavaScript detector, which is currently running in advanced URL filtering detecting tens of thousands of JavaScript-based attacks each week.What Gmail And McAfee Recommend You Do To Mitigate Ongoing AI AttacksWhen it comes to mitigation advice, some can be more relevant than others. Take the recent advice from the Federal Bureau of Investigation, of all people, which suggested verifying phishing emails by checking for spelling errors and grammatical inconsistencies. This, as I have pointed out, is very outdated advice and, as such, pretty pointless in the AI-driven threatscape of today.McAfees advice is to protect yourself by double-checking any unexpected requests through a trusted, alternate method and relying on security tools designed to detect deepfake manipulation, and is much better.Best still, however, is the advice from Google itself when it comes to mitigating attacks against Gmail users and can be broken down into these main points:If you receive a warning, avoid clicking on links, downloading attachments or entering personal information. Google uses advanced security to warn you about dangerous messages, unsafe content or deceptive websites, Google said, even if you don't receive a warning, don't click on links, download files or enter personal info in emails, messages, web pages or pop-ups from untrustworthy or unknown providers.Don't respond to requests for your private info by email, text message or phone call and always protect your personal and financial info.If you think that a security email that looks as though it's from Google might be fake, go directly to myaccount.google.com/notifications. On that page, Google said, you can check your Google Account's recent security activity.Beware of urgent-sounding messages that appear to come from people you trust, such as a friend, family member or person from work.If you click on a link and are asked to enter the password for your Gmail, Google account or another service: Dont. Instead, go directly to the website that you want to use, Google said, and that includes your Google/Gmail account login.
    0 Comments ·0 Shares ·75 Views
  • Diabetes Cases Have Doubled Globally, With Health Disparities Soaring.
    www.forbes.com
    A woman with diabetes monitors her glycemia in Paris on March 24, 2020. (Photo by FRANCK FIFE / ... [+] AFP) (Photo by FRANCK FIFE/AFP via Getty Images)AFP via Getty ImagesMore than 800 million individuals have diabetes globally, doubling in the last three decades according to research recently published in The Lancet.This represents an increase of 630 million individuals since 1990, with 14% of the global population with the disease. More than half of global cases were concentrated in four countries- the most in India, followed by China, the United States and Pakistan.The largest increase in diabetes cases occurred in low and middle-income countries, such as Malaysia, Pakistan and Egypt.These health disparities are amplified by the lack of treatment for many diabetics around the world. In 2022, more than half of diabetics, or 445 million adults aged 30 and over did not receive treatment for diabetes, which represents 3.5 times the number in 1990. Treatment coverage was lowest in many middle and low-income countries, particularly countries in sub-Saharan Africa and south Asia.The study sheds light on the growing inequities in the prevalence and treatment of a chronic debilitating disease that can decrease the quality of life for millions of individuals around the world. Diabetes occurs when blood sugar levels are too high. It can be genetic whereby the body does not produce enough insulin (type I diabetes), which is a hormone that decreases blood sugar levels, or when the body cannot use insulin properly (type II diabetes). The vast majority (90-95%) of diabetics are type II, which is largely preventable with a healthy diet and regular exercise. The rise of obesity, ultra-processed foods and lack of physical activity have perpetuated an epidemic in type II diabetes.Diabetes can take a significant toll on ones health. Too much sugar in the blood can damage blood vessel and ultimately lead to heart disease, kidney failure and vision loss. In fact, diabetes is the eighth leading cause of death and the number one cause of kidney failure, lower leg amputations and adult blindness in America.MORE FOR YOUMajor systemic changes that involve health policy and healthcare access must be implemented in order to narrow the global gap in diabetes prevalence and treatment, which has resulted in an increasing number of people with both diabetes and untreated diabetes living in middle and low-income countries.The study underscores the importance of tackling the obesity epidemic, with one billion individuals projected to be living with obesity by 2030, according to the World Obesity Federation. A proactive approach should be adopted globally to screen as many patients as possible at health visits to identify those with diabetes early, so early intervention can be performed along with education to prevent detrimental complications of the disease.In addition, widespread access to healthier food options that are cheaper and readily available, particularly among underserved poorer communities will help keep people healthy and mitigate obesity and ultimately a diagnosis of type II diabetes. Investments in parks and fitness centers that can serve the entire population, not just the wealthy, will be crucial in decreasing the burden of disease globally.A major bottleneck in addressing the scope of diabetes is also the lack of treatment among low and middle-income countries for diabetes. Universal healthcare insurance that is affordable or subsidized by the government needs to be considered in these countries, coupled with an infrastructure that supports preventive doctor visits to treat and address diabetes throughout the population. These barriers must all be addressed in order to move the needle for a healthier global environment.The vast majority of diabetes cases can be entirely prevented. The world must take notice of the enormous inequities that are plaguing diabetics globally. Without intervention, millions upon millions of individuals will continue to suffer.
    0 Comments ·0 Shares ·75 Views
  • www.techspot.com
    Installing this Intel generic graphics driver will overwrite your computer manufacturer (OEM) customized driver. OEM drivers are handpicked and include customized features and solutions to platform-specific issues. The generic Intel driver provides users the latest and greatest feature enhancements and bug fixes that OEMs may not have customized yet to address platform-specific needs. Users can check for matching OEM versions at OEM websites.Note: This driver only supports Intel Core Ultra, Intel Arc Alchemist, 14th Gen Core, 13th Gen Core GPUs and 12th Gen Core Alder Lake GPUsAny graphics issues found using Intel generic graphics drivers should be reported directly to Intel. Corporate customers should always use OEM drivers and report all issues through the vendor they purchased the platforms and support through.What's New:Fixed IssuesIntel Arc B-Series Graphics Products:The Crew Motorfest (VK) may exhibit flickering corruptions in certain scenes.Saleco (VK) may experience application crash during game launch.Elden Ring (DX12) may exhibit stuttering during gameplay in certain scenes.Homeworld 3 (DX12) may experience application crash during game launch.F1 24 (DX12) may exhibit stuttering during gameplay with ray tracing quality set to high.Game may exhibit corruptions during night scenes.Known Issues:Intel Arc B-Series Graphics Products:F1 24 (DX12) with XeSS FG may exhibit certain corruptions and applications crashesApplication may crash when dynamically changing XeSS FG settings during gameplay. Recommendation is to toggle XeSS FG settings in the game menu before starting a race."Alt + Enter" shortcut may change the display mode to fullscreen exclusive, which is not supported in XeSS 2 and may cause the game to crash.Skull and Bones (DX12) may experience an application crash while launching gameplay.MLPerf may exhibit intermittent errors when running on multi-GPU system configurations. It is recommended to disable integrated GPU as a workaround.Topaz Labs Photo AI may exhibit corruptions with certain image enhancement operations.Magix Vegas Pro may exhibit corruptions when using style transfer feature.Dassault Systmes CATIA may experience an application crash when using HQAO option.Certain capture cards may exhibit visual artifacts in some scenarios.Adobe Lightroom Classic may experience lower than expected performance. Workaround is to set recommended preferences in the applicationUnder Edit, Preferences, Performance options, choose Graphics Processor as "Custom"Select "Use GPU for Display", "Use GPU for Image Processing" and "Use GPU for Export" options.Intel Arc A-Series Graphics Products:Call of Duty: Black Ops 6 (DX12) may exhibit darker than expected shadows in certain campaign scenarios.Topaz Gigapixel AI may experience intermittent crash while exporting images.Intel Core Ultra Series 1 with built-in Intel Arc GPUs:SPECworkstation3.1 may exhibit system instability while running certain workloads.PugetBench for Davinci Resolve Studio V19 may experience errors intermittently with benchmark preset set to Extended.Davinci Resolve Studio v19.0 may experience errors while rendering OpenVino test scenarios.Topaz Video AI may experience corruption when exporting videos after using some models for video enhancementsCall of Duty Modern Warfare III (DX12) may experience flickering during gameplay.Intel Core Ultra Series 2 with built-in Intel Arc GPUs:Adobe Premiere Pro may exhibit corruption in the output video after performing 8K AV1 Encode.PugetBench for Davinci Resolve Studio V19 may experience errors intermittently with benchmark preset set to Extended.Davinci Resolve Studio v19.0 may experience issues while rendering certain OpenVino test scenarios.Davinci Resolve Studio v19.0 may experience errors intermittently while rendering certain AI/ML scenarios.Topaz Video AI may experience corruption when exporting videos after using some models for video enhancements.Call of Duty: Black Ops 6 (DX12) may exhibit black shadow corruption in certain scenes during gameplay.Horizon Zero Dawn Remastered (DX12) may experience crash during gameplay with frame generation enabled.Intel Graphics Software Known Issues:Intel Graphics Software may experience a very intermittent application crash when navigating pages or dialogue boxes due to an underlying framework issue. A fix will be made available in IGS once WinAppSDK 1.7 is available for upgrade. The application can be re-launched without issue as a workaround.When using the settings, preferences, reset all settings option in Windows 10 the application may experience an intermittent crash. Settings can be reset from individual pages without issue.Intel Graphics Software detects plug and play events from Windows and reconfigures the user interface to make sure users have the latest available hardware information listed. On some system configurations the frequency of windows reconfiguration is higher than expected and may take longer after sleep. IGS optimizations will be made available soon that help reduce the number of reconfigurations that may occur.Intel Graphics Software may sometimes experience a single application crash on the first re-arrange of metrics within the select metrics window. Subsequent usage will not be affected by this crash again.FPS Limiter may not limit FPS with VSync ON and Low Latency Mode enabled.Profile controls don't always supersede global controls.Display scaling at non-native panel resolutions might result in unintended scaling.Intel Graphics Software Performance Tuning (Beta):Intel Graphics Software Performance Tuning is currently in Beta. As such, performance and features may behave unexpectedly. Intel will continue to refine the Performance Tuning software in future releases.In multi-GPU scenarios with two performance tuning capable devices, the performance tuning page may attempt to apply changes to one or more devices at once rather than individually based on the GPU selector.
    0 Comments ·0 Shares ·98 Views
  • Meet Transformers: The Google Breakthrough that Rewrote AI's Roadmap
    www.techspot.com
    In the summer of 2017, a group of Google Brain researchers quietly published a paper that would forever change the trajectory of artificial intelligence. Titled "Attention Is All You Need," this academic publication didn't arrive with splashy keynotes or frontpage news. Instead, it debuted at the Neural Information Processing Systems (NeurIPS) conference, a technical gathering where cutting-edge ideas often simmer for years before they reach the mainstream.Few outside the AI research community knew it at the time, but this paper would lay the groundwork for nearly every major generative AI model you've heard of today from OpenAI's GPT to Meta's LLaMA variants, BERT, Claude, Bard, you name it.The Transformer is an innovative neural network architecture that sweeps away the old assumptions of sequence processing. Instead of linear, step-by-step processing, the Transformer embraces a parallelizable mechanism, anchored in a technique known as self-attention. Over a matter of months, the Transformer revolutionized how machines understand language.Some of the illustrations in this article were generated by AI. Masthead prompt: giant robot towering above city landscape in style of Eva-01 from Neon Genesis Evangelion by Gainax, 4k. Image above, 3d render by BoliviaInteligente.A New ModelBefore the Transformer, state-of-the-art natural language processing (NLP) hinged heavily on recurrent neural networks (RNNs) and their refinements LSTMs (Long Short-Term Memory networks) and GRUs (Gated Recurrent Units). These recurrent neural networks processed text word-by-word (or token-by-token), passing along a hidden state that was meant to encode everything read so far.This process felt intuitive... after all, we read language from left to right, so why shouldn't a model?But these older architectures came with critical shortcomings. For one, they struggled with very long sentences. By the time an LSTM reached the end of a paragraph, the context from the beginning often felt like a faded memory. Parallelization was also difficult because each step depended on the previous one. The field desperately needed a way to process sequences without being stuck in a linear rut.Comparison of RNN, LSTM, GRU, and Transformer architectures, highlighting their key components and mechanisms for processing sequential data. Source: aiml.comGoogle Brain researchers set out to change that dynamic. Their solution was deceptively simple: ditch recurrence altogether. Instead, they designed a model that could look at every word in a sentence simultaneously and figure out how each word related to every other word.This clever trick called the "attention mechanism" let the model focus on the most relevant parts of a sentence without the computational baggage of recurrence. The result was the Transformer: fast, parallelizable, and bizarrely good at handling context over long stretches of text.The breakthrough idea was that "attention," not sequential memory, could be the true engine of understanding language. Attention mechanisms had existed in earlier models, but the Transformer elevated attention from a supporting role to the star of the show. Without the Transformer's full-attention framework, generative AI as we know it would likely still be stuck in slower, more limited paradigms.Serendipity and AI.Image prompt: the meaning of lifeBut how did this idea come about at Google Brain? The backstory is sprinkled with the kind of serendipity and intellectual cross-pollination that defines AI research. Insiders talk about informal brainstorming sessions, where researchers from different teams compared notes on how attention mechanisms were helping solve translation tasks or improve alignment between source and target sentences.There were coffee-room debates over whether the necessity of recurrence was just a relic of old thinking. Some researchers recall "corridor coaching sessions" where a then-radical idea removing RNNs entirely was floated, challenged, and refined before the team finally decided to commit it to code.Part of the brilliance of the transformer is that it made it possible to train on huge datasets very quickly and efficiently.The Transformer's architecture uses two main parts: an encoder and a decoder. The encoder processes the input data and creates a detailed, meaningful representation of that data using layers of self-attention and simple neural networks. The decoder works similarly but focuses on the previously generated output (like in text generation) while also using information from the encoder.Part of the brilliance of this design is that it made it possible to train on huge datasets very quickly and efficiently. An oft-repeated anecdote from the early days of the Transformer's development is that some Google engineers didn't initially realize the extent of the model's potential.They knew it was good much better than previous RNN-based models at certain language tasks but the idea that this could revolutionize the entire field of AI was still unfolding. It wasn't until the architecture was publicly released and enthusiasts worldwide began experimenting that the true power of the Transformer became undeniable.A Renaissance in Language ModelsWhen Google Brain published the 2017 paper, the NLP community reacted first with curiosity, then with astonishment. The Transformer architecture was seen outperforming the best machine translation models at tasks like the WMT English-to-German and English-to-French benchmarks. But it wasn't just the performance researchers quickly realized the Transformer was orders of magnitude more parallelizable. Training times plummeted. Suddenly, tasks that once took days or weeks could be done in a fraction of the time on the same hardware.The encoder's self-attention pattern for the word "it," observed between the 5th and 6th layers of a Transformer model trained for English-to-French translationWithin a year of its introduction, the Transformer model had inspired a wave of innovations. Google itself leveraged the Transformer architecture to create BERT (Bidirectional Encoder Representations from Transformers). BERT drastically improved the way machines understood language, taking the top spot on many NLP benchmarks. It soon found its way into everyday products like Google Search, quietly enhancing how queries were interpreted.Media outlets discovered GPT's prowess and showcased countless examples sometimes jaw-dropping, sometimes hilariously off-base.Almost simultaneously, OpenAI took the Transformer blueprint and went in another direction with GPT (Generative Pre-trained Transformers).GPT-1 and GPT-2 hinted at the power of scaling. By GPT-3, it became impossible to ignore how good these systems were at producing human-like text and reasoning through complex prompts.The first ChatGPT version (late 2022) used a further refined GPT-3.5 model, it was a watershed moment. ChatGPT could generate eerily coherent text, translate languages, write code snippets, and even produce poetry. Suddenly, a machine's ability to produce human-like text was no longer a pipe dream but a tangible reality.Media outlets discovered GPT's prowess and showcased countless examples sometimes jaw-dropping, sometimes hilariously off-base. The public was both thrilled and unnerved. The idea of AI-assisted creativity moved from science fiction to everyday conversation. This wave of progress fueled by the Transformer transformed AI from a specialized tool into a general-purpose reasoning engine.But the Transformer isn't just good at text. Researchers found that attention mechanisms could work across different types of data images, music, code.But the Transformer isn't just good at text. Researchers found that attention mechanisms could work across different types of data images, music, code. Before long, models like CLIP and DALL-E were blending textual and visual understanding, generating "unique" art or labeling images with uncanny accuracy. Video understanding, speech recognition, and even scientific data analysis began to benefit from this same underlying blueprint.In addition, software frameworks like TensorFlow and PyTorch incorporated Transformer-friendly building blocks, making it easier for hobbyists, startups, and industry labs to experiment. Today, it's not uncommon to see specialized variants of the Transformer architecture pop up in everything from biomedical research to financial forecasting.The Race to Bigger ModelsA key discovery that emerged as researchers continued to push Transformers was the concept of scaling laws. Experiments by OpenAI and DeepMind found that as you increase the number of parameters in a Transformer and the size of its training dataset, performance continues to improve in a predictable manner. This linearity became an invitation for an arms race of sorts: bigger models, more data, more GPUs.Experiments found that as you increase the number of parameters in a Transformer and the size of its training dataset, performance continues to improve in a predictable manner... this linearity became an invitation for an arms race of sorts: bigger models, more data, more GPUs.Google, OpenAI, Microsoft, and many others have poured immense resources into building colossal Transformer-based models. GPT-3 was followed by even larger GPT-4, while Google introduced models like PaLM with hundreds of billions of parameters. Although these gargantuan models produce more fluent and knowledgeable outputs, they also raise new questions about cost, efficiency, and sustainability.GPUs were originally designed for gaming and 3D rendering. For a while the chips gained popularity in cryptomining before becoming essential for AI training. Nvidia leads the market with most of its chip sales driven by data centers and AI applications.Training such models consumes enormous computing power (Nvidia is too happy about that one) and electricity transforming AI research into an endeavor that is much closer today to industrial engineering than the academic tinkering it once was.Attention EverywhereChatGPT has become a cultural phenomenon, breaking out of tech circles and industry discussions to spark dinner table conversations about AI-generated content. Even people who aren't tech-savvy now have some awareness that "there's this AI that can write this for me" or talk to me "like a human." Meanwhile, high school students are increasingly turning to GPT queries instead of Google or Wikipedia for answers.But all technological revolutions come with side effects, and the Transformer's influence on generative AI is no exception. Even at this early stage, GenAI models have ushered in a new era of synthetic media, raising tricky questions about copyright, misinformation, impersonations of public figures, and ethical deployment.The same Transformer models that can generate convincingly human prose can also produce misinformation and toxic outputs. Biases can and will be present in the training data, which can be subtly embedded and amplified in the responses offered by GenAI models. As a result, governments and regulatory bodies are beginning to pay close attention. How do we ensure these models don't become engines of disinformation? How do we protect intellectual property when models can produce text and images on demand?Researchers and the companies developing today's dominant models have started to integrate fairness checks, establish guardrails, and prioritize the responsible deployment of generative AI (or so they say). However, these efforts are unfolding in a murky landscape, as significant questions remain about how these models are trained and where big tech companies source their training data.The "Attention Is All You Need" paper remains a testament to how open research can drive global innovation. By publishing all the key details, the paper allowed anyone competitor or collaborator to build on its ideas. That spirit of openness by Google's team, fueled the astonishing speed at which the Transformer architecture has spread across the industry.We are only beginning to see what happens as these models become more specialized, more efficient, and more widely accessible. The machine learning community was in dire need for a model that could handle complexity at scale, and self-attention so far has delivered. From machine translation to chatbots that can carry on diverse conversations, from image classification to code generation. Transformers have become the default backbone for natural language processing and then some. But researchers are still wondering: is attention truly all we need?Skynet and The Terminator 40 years later...the sci-fi cult classic that still shapes how we view the threat of AINew architectures are already emerging, such as Performer, Longformer, and Reformer, aiming to improve the efficiency of attention for very long sequences. Others are experimenting with hybrid approaches, combining Transformer blocks with other specialized layers. The field is anything but stagnant.Moving forward, each new proposal will garner scrutiny, excitement, and why not, fear.Keep Reading. Explainers and Tech Culture features at TechSpot
    0 Comments ·0 Shares ·113 Views