• 25 Best Book to TV Show Adaptations Ever Made
    www.denofgeek.com
    Walk through a cinema lobby or listen in on any pub conversation and youll hear it, the constant complaint of the booklover. Stay very quiet and you may even be able to hear it now, carried along ghost-like on the wind: The book was better! Wherever a screen adaptation exists, somebody, somewhere will be complaining that it isnt as good as the novel on which it was based.The book was better is such an established perspective in fact, that you might question why TV producers even bother to take out options on novels at all. They do it, of course, because of the titles below, TV dramas that wove gold from, and in more than a few cases, improved on, their book inspirations.Were not including non-fiction books or comics here (there are so many of those that they deserve their own separate shout-outs), just shows that used novels or novel series as the starting point for some truly great television. Faithful or revisionist, modernised or period-set, these are the shows that future TV adaptations could learn from.25. Jonathan Strange & Mr Norrell (2015)Based on: Jonathan Strange and Mr Norrell by Susanna ClarkeShrinking Susanna Clarkes 1,000-page fantasy into just seven hour-long episodes? As Jonathan Strange would say: a magician might, though a screenwriter never could! Against the odds though, screenwriter Peter Harness (Constellation, Doctor Who) and director Toby Haynes (Andor, Black Mirror) did manage to extract the essence of Clarkes vast Victorian pastiche for this underappreciated BBC One adaptation. Starring Bertie Carvel, Eddie Marsan, Alice Englert, Marc Warren and Charlotte Riley, and set in a 19th century England where magic is real, this well-cast miniseries told a dark and transportive story about obsession, ambition, grief, and selling your soul. On a limited budget but with unlimited imagination, it struck several of Clarkes most visionary notes (the talking statues at York Minster, the white horses in the waves, the fairy realm) and captured the heart, if not quite the massive scope, of the story. Louisa Mellor24. Station Eleven (2021)Based on: Station Eleven by Emily St. John MandelReleased at either the best possible time or the worst possible time, Station Eleven begins with a civilization-ending flu pandemic. But it uhgets chiller from there, we promise. This Max miniseries is a visually stunning and emotionally affecting journey that delves into whats left behind after the world ends. And the answer is simply: us. Following several seemingly disparate storylines from the apocalypse and the before-times, Station Eleven incorporates a traveling symphony of Shakespeare performers, one very busy regional airport, and the titular fictional comic book that stars heroic astronaut Dr. Eleven.Like Emily St. John Mandels book on which its based, Station Eleven has a lot going on (though it tones down one cultish storyline a bit). And also like the novel, its a timely, touching exploration of humanitys relationship to art. Alec Bojalad23. Bridgerton (2020)If one of the things were celebrating here is the Fairy Godmother-like transformation of book-pumpkins into glittering TV coaches, then Bridgerton reigns supreme. Not that Julia Quinns Regency-era romance books arent glamorous and escapist they are, but the Shondaland TV adaptation sent them into the stratosphere both in terms of representation (the book characters are all white and straight) and beauty. Such beauty! Even if the love stories of minor aristocrats arent your thing, you could watch this Netflix show with the volume down like a very expensive screensaver and bask in the dcor, dresses and flowers. A lesson in what can be conjured from the page onto the screen. LM22. True Blood (2008 2014)Based on: The Southern Vampire Mysteries by Charlaine HarrisThe first few seasons of HBOs US southern adult fantasy made excellent TV drama out of some highly readable but, lets be honest, fairly workaday books. Charlaine Harris Sookie Stackhouse novels are sexy pageturners with bags of fantasy imagination, but their prose style is unlikely to win any literary awards. Enter: Alan Ball (Six Feet Under), a showrunner whose team elevated this world, not just doing it justice, but making it better. First of all, they cast the hell out of the show, installing Anna Paquin as telepathic waitress Sookie, Stephen Moyer as Civil War-era vampire Bill Compton, Alexander Skarsgrd as dangerous Swedish Viking vamp Erik, alongside a terrific supporting cast. Filled with subtext about real-world issues from HIV AIDs to race and LGBT+ rights, True Blood was dangerous, exciting and meaningful televisionfor at least the first half of its overlong seven-season run. LMJoin our mailing listGet the best of Den of Geek delivered right to your inbox!21. Sharpe (1993 2008)Based on: The Sharpe novels by Bernard CornwellHows this for a mark of adaptation success? Actor Sean Bean became so indivisible from the character of Richard Sharpe that novelist Bernard Cornwell admitted to writing the later entries in his Sharpe book series specifically for Beans voice and delivery. Thats how entwined the screen and page Sharpes became. It wasnt just exemplary casting (not only Bean but also Brian Cox, Pete Postlethwaite, Daragh OMalley) that made this Napoleonic era-set period spy series an excellent adaptation for ITV, but the perfect meeting of form and content. 90-minute episodes filled with intrigue and action allowed audiences to spend enough time with the Major (later Colonel) to really get to know him and to get absorbed by the cleverly evoked period setting. LM20. The Last Kingdom (2015 2022)Based on: The Saxon Stories novels by Bernard CornwellThis TV adaptation became so inseparable from Bernard Cornwells Saxon Stories books that theyre now published under its name (The Last Kingdom was originally just the title of the first book in Cornwells series). Thats not just a canny marketing ploy, but also an indication of in what high regard the TV series is held, and how closely entwined the character of warrior hero Uhtred became with actor Alex Dreymon, to whom Cornwell dedicated the final book in his series. Initially adapted by Stephen Butchard for the BBC and later Netflix, The Last Kingdom is the 10th-century set story of Saxon-born but Viking-raised Uhtred, a military strategist whose Pagan beliefs put him on uneasy ground with the Christian King Alfred to whom he is forced to swear an oath. Its an excellent ensemble, from Emily Cox as Danish warrior Brida to Eliza Butterworth as Queen Aelswith, David Dawson as Alfred and far too many beloved roles to name. Exciting, funny, filled with action and heart, this series took Cornwells characters and made them indelible. LM19. Slow Horses (2022)Based on the Slough House series by Mick HerronTwo words for you: Gary Oldman. When The Dark Knight and Bram Stokers Dracula actor signed up to play MI5s brilliant but disgusting Jackson Lamb, TV history was made. The combination of Oldmans charisma and rude, shrewd, anti-social Lamb formed one of TVs greatest ever characters, better even than the Lamb of the books. The success of Apple TV+ spy thriller Slow Horses isnt just down to Oldman, of course. Theres also showrunner Will Smiths fastidiously close adaptation, his and his teams sharp comedic writing, the rest of the ensemble cast gathered to play Slough Houses team of misfits, from Jack Lowden to Aimee Ffion-Edwards, and the sleazily brilliant theme song written and performed by Mick Jagger. All of it adds up to an unmissable British TV drama, and an adaptation par excellence. LM18. The Expanse (2015 2022)Based on: The Expanse series by James S. A. CoreyTrue to its name, sci-fi drama The Expanse ran for an expansive six seasons on Syfy and then Prime Video. Set in a future where humanity has colonized the Solar System, the series follows characters involved in the delegations of the Earth and moon, Mars, and the outer planets as they deal with rising political tensions and the discovery of new alien technology.The Expanse had plenty of source material to work through as the series is based on a series of nine novels from James S. A. Corey, which is the joint pen name of Daniel Abraham and Ty Franck. There is also a host of novellas and short stories to work through as well. AB17. Smileys People (1982)Based on: Smileys People by John Le CarrWhy not its 1979 predecessor Tinker, Tailor, Soldier, Spy? Good question. Both BBC series are as well-adapted from John le Carrs novels, as well-directed and as-well cast as one another. Sir Alec Guinness gives as excellent a performance as the Circus intelligence officer George Smiley in both. The latter series though, gives us a different kind of George Smiley reluctantly called out of retirement to investigate the murder of a former asset, this Smiley is less stationary and more hands-on than in the previous series. He travels more, interrogates more, and gets into the thick of the action more, leading to an almighty confrontation with his nemesis Karla. Its supreme television which could never be accused of dumbing down the book if anything, this six-part series is harder to pin down than the novel, which makes it all the more intriguing. LM16. Inspector Morse (1987 2000)Based on: the Inspector Morse series by Colin DexterAnother example of casting so spot-on that a book character is utterly eclipsed by their TV face. John Thaw is Inspector Morse, the brilliant, lonely, real ale-and-whisky-drinking eternal bachelor who solves Oxfords murders and its cryptic crosswords alike. One genius of this British crime drama classic was the length of its episodes (see our pick of the very best here) at two hours each, they were essentially feature films able to give ample development to every crooked scheme and crime of passion ever dreamt up by novelist Colin Dexter (who approved heartily of the adaptation and made several cameo appearances in this, and in spinoff Lewis and prequel series Endeavour). This ITV adaptation didnt feel the need to reinvent the wheel, but simply took a great book character and made him all the greater. LM15. Dexter (2006 2013)Based on: the Dexter series by Jeff LindsayDexter is one of the most unlikely big ticket franchises on television right now. Before Showtime commissioned spinoffs Dexter: New Blood, Dexter: Original Sin, and Dexter: Resurrection, however, there was only one Dexter. Running for eight seasons (four of them good, two of them bad, two more of them so bad you want to claw your eyes out), this pulpy drama followed the exploits of Dexter Morgan (Michael C. Hall) a Miami Police Department blood splatter analyst who also just happens to be a serial killer.Dexter isnt just any kind of serial killer though thanks to a code instilled in him by his father Harry, he kills only other serial killers (of which there appears to be an infinite amount of in Miami). Though Dexter developed a reputation of becoming a little goofy, it really has nothing on its source novels from Jeff Lindsay. Those eight Dexter books, which were published between 2004 and 2015, truly go to some strange places. ABBased on: Brideshead Revisited: The Sacred & Profane Memories of Captain Charles Ryderby Evelyn Waugh.Yes, its yet more British TV rubbing its thighs over aristos and bemoaning the passing of the good old days, and yes, you could make a good argument (in fact, Guardian critic Stuart Jeffries does) that this shows enormous popularity paved the way for Boris Johnson, Jacob Rees-Mogg and that whole Etonian shower to go about like they did but ITVs Brideshead Revisited was also a beautifully acted and composed TV drama. Jeremy Irons made a poignant Charles Ryder, both in his Oxford days and in his wartime return to Brideshead, the stately home of the Flyte family whose scion Sebastian nudged Ryder towards his sexual awakening. When it comes to literary TV adaptations, this version of Evelyn Waughs story simply cant be missed out. LM13. Sherlock (2010 2017)Based on: the Sherlock Holmes stories and novels by Sir Arthur Conan DoyleThere have been many incarnations of Sherlock Holmes on television, and many of them are as indelible as they are wonderful, but none of them are as imaginatively and energetically adapted as Steven Moffat and Mark Gatiss modernised BBC version. Those two and director Paul McGuigan (who established the series distinct look and tone in the first series) didnt just put Sir Arthur Conan Doyles character on screen, they created a modern TV icon. Taking the essence of a Doyle story or villain and presenting them with a sinister or funny modern sheen, and then stuffing that with Easter egg references to the whole canon, the creators of Sherlock did masterful work that audiences loved. Starring Benedict Cumberbatch and Martin Freeman, the showLM12. The Forsyte Saga (1967)Based on: The Forsyte Saga series by John GalsworthyCelebrated here as much for its influence and international reach as for the actual adaptation, this 1960s series was one of Britains biggest TV exports of all time. Modern TV producers would give their eye teeth to enjoy the international success of Donald Wilsons BBC adaptation, which was sold in multiple territories around the world, and forged the shape of countless British TV dramas that followed from Upstairs, Downstairs all the way to global hit Downton Abbey. Over 26 black-and-white episodes, this series adapted all of Nobel prize for literature-winner John Galsworthys Forsyte books, which told the early 20th century story of the titular upper middle-class new money family Soames, wife Irene, son Young Jolyon and more. The novels continue to be mined for drama, having been readapted in 2002, and in 2024, forming the basis of an acclaimed two-part London stage production. LM11. Hannibal (2013 2015)Based on: The Hannibal Lecter series by Thomas HarrisHannibal Lecter: he wants to have you for dinner! Thats not just an inexplicable, constantly repeated catchphrase from a recent presidential campaign, its also a punny acknowledgement of a certain cannibal doctors modus operandi. A brilliant psychiatrist and gourmand who just happens to also be a cannibalistic serial killer, Dr. Hannibal Lecter is an iconic character from Thomas Harris series of Hannibal novels (which include Red Dragon, The Silence of the Lambs, Hannibal, and Hannibal Rising).All four of those novels would go on to become movies of varying success (and in the case of The Silence of the Lambs, an Oscar-winning movie). But the project that hews closest to Harris gothic vision might just be the NBC series Hannibal. This Bryan Fuller-created show is decadent, bloody, and bleak. AB10. The Jewel in the Crown (1984)Based on: The Raj Quartet by Paul ScottIn this 14-episode ITV drama, writer Ken Taylor picked carefully from among Paul Scotts Raj Quartet novels to tell a streamlined version of this contemplative colonial story. If more screen adaptations knew what to use and what to discard in this way, theyd be better off for it. Once again, the casting, with a central core made up of Art Malik, Tim Piggott-Smith, Susan Woolridge and Charles Dance (now best known to younger audiences as Tywin Lannister in Game of Thrones), was tremendous and played a vital part in lifting Scotts characters off the page and onto the streets of fictional Mayapore. The 1940s-set story of the British-educated but Indian-born Haris return to India under British colonial control, The Jewel in the Crown is sad, brutal and dark, and 40 years ago, forced mainstream British TV viewers to confront the bloody history of Empire and racism, reaching audiences that the books never could. LM9. Interview With the Vampire (2022)Based on: The Vampire Chronicles by Anne RiceNo author since Bram Stoker has done more to bring vampires into the cultural consciousness and expand upon their monstrous lore than Anne Rice. This spooky queen incorporated elements of her Catholic upbringing and personal experience with grief to craft the brilliant and moody novel Interview with the Vampire in 1976. That one book would go on to inspire the subsequent Vampire Chronicles novels, which have now found their way to television on AMC.Even moreso than the decent but forgettable 1994 film, this Rolin Jones-created series gets to the bottom of what makes undead blood-drinkers so intriguing: their immense sensuality. Featuring incredible performances from Jacob Anderson and Sam Reid as Louis de Pointe du Lac and Lestat de Lioncourt, Interview with the Vampire suggests a bright future for The Vampire Chronicles. AB8. Shogun (2024)Based on: Shgun by James ClavellJames Clavells 1975 novel Shgun is so epic and richly realized that it was adapted into not one but two separate miniseries (in 1980 and 2024) that are seen as among the best of their respective eras. Of course the thing about that second miniseries is that its no longer so mini.FXs Shgun took the TV world by storm in 2024. Blessed with incredible lead performances from Hiroyuki Sanada, Cosmo Jarvis, and Anna Sawai, this story about an English sailor becoming enmeshed in a late 16th century Japanese game of thrones was a thrilling (and seemingly complete) saga. Now the story is expected to continue in future seasons. While Clavell never penned a direct sequel to Shgun, he did write five other books in his Asia Saga series. One of those books even catches up with the descendants of Lord Toranaga. AB7. House of Cards (1990)Based on: House of Cards by Michael DobbsNo list of the best television adaptations would be complete without at least one entry by Andrew Davies, adapter extraordinaire, and the man behind countless book-to-TV-and-film series from Pride and Prejudice to Vanity Fair to Bleak House to War and Peace, Les Misrables and more. Why House of Cards? Because it, and its 2014 Netflix US reworking, show exactly what can be done when a clever book is translated cleverly to screen. Its the story of Tory chief whip Francis Urquhart (Ian Richardson)s Machiavellian rise to power in British politics, and as such, its about everything: class, influence, snobbery, money, evil, ambition all the great themes are covered in its three x four-episode series (the BBC original has 12 episodes total; the US version went all the way up to 73). It set a standard for grown-up drama led by despicable yet extremely watchable characters. Without House of Cards, would TVs golden age antihero have even existed? LM6. I, Claudius (1976)Based on: I, Claudius by Robert GravesCompelling, sexy, funny, and with the writing, directing and cast (if not quite the budget) to achieve its vast ambition, Jack Pulmans BBC adaptation of Robert Graves I, Claudius and Claudius the God is an all-time classic. This retelling of events from the early Roman Empire has all the scheming, double-dealing, murder and skulduggery of Game of Thrones and House of Cards put together. Admittedly, its theatrical sets and acting style feel a little out of place now, but as we said here dont let that keep you from a gripping and intrigue-filled drama. A young Derek Jacobi (well, these days, a young everybody) leads a packed cast including Sin Phillips, Sir Patrick Stewart, Sir John Hurt, Brian Blessed and more. LM5. The Handmaids Tale (2017 2025)Based on: The Handmaids Tale by Margaret AtwoodA prestige TV drama for a prestigious literary novel. A common fear with screen adaptations is that theyll bowdlerise, gloss over, and concertina story, but Bruce Millers adaptation of Margaret Atwoods 1985 feminist dystopia The Handmaids Tale did exactly the opposite; it went deeper, expanding incidental details from Atwoods original to create a fully conceived world inside and outside of Gilead the corrupt theocracy that replaced the United States of America after a military coup. Due to end after its soon-to-come sixth season (with an adaptation of Atwoods follow-up novel The Testaments also promised), The Handmaids Tale is an astonishing achievement. A large part of that is down to star, producer and sometime director Elisabeth Moss, who has been to hell and back with her character Offred/June. Dark, confrontational, unsettling and with iconic imagery, this is the adaptation every novel deserves. LM4. M*A*S*H (1972 1983)Based on: Mash: A Novel About Three Army Doctors by Richard Hooker (H. Richard Hornberger)This picks a slight cheat seeing as M*A*S*H the long-running TV series was more properly adapted from M*A*S*H the 1970 movie instead of Rickard Hooker (H. Richard Hornberger)s autobiographically inspired novel, but as an all-time TV hero with a novel in its development, were saluting it with a top five spot. Larry Gelbarts CBS comedy-drama was set during a MASH (mobile army surgical hospital) unit during the Korean War and, after a shaky ratings start, wasnt just a success, but a stonking success the finale of which was watched by over 125 million people. With a cast led by Alan Alda, Loretta Swit, this Emmys-magnet show is an undeniable television classic. LM3. Game of Thrones (2011 2019)Based on: A Song of Ice and Fire by George R. R. MartinGeorge R. R. Martin is a frequent target of the internets frustration. The legendary fantasy author, whose A Song of Ice and Fire books were the basis of HBOs Game of Thrones, has thus far proven unable to make it past book number five in his planned seven-part series. While its certainly unfortunate that the book narrative remains stalled in 2011s A Dance With Dragons, sometimes that criticism can lose sight of an important fact: Game of Thrones rules.Despite only just ending in 2019 (and carrying on in multiple spinoffs), this HBO epic already feels like something out of another era. Blessed with a big budget and an even bigger imagination, this saga about the kings, queens, knights, and dragons of Westeros stands out as the last true watercooler TV experience. AB2. The Leftovers (2014 2017)Based on: The Leftovers by Tom PerrottaThe Leftovers is a bit of an oddity as far as book adaptations on TV go. The first season of this all-time classic HBO drama covers pretty much the entirety of author Tom Perrottas book of the same name about a mysterious supernatural event in which two percent of the worlds population suddenly vanished. It all made for an incredible (and incredibly depressing) season of television.Thankfully Perrotta, series co-creator Damon Lindelof, and the rest of The Leftovers team werent content to stop there. The following two seasons of the show expanded upon Perrottas initial concept, delving deeper into the cultural, personal, and spiritual implications of a dark miracle. By the time the credits rolled on the stellar season 3 finale, The Leftovers had become one of the best HBO dramas of all timewhich makes it one of the best TV dramas of all time by default. AB1. Wolf Hall (2015 2024)Based on: The Wolf Hall trilogy by Hilary MantelPut it down to recency bias if you like, but in 10 years time, Im convinced Wolf Hall will still top any such list. Yes, its a great period drama built on enthralling and layered performances from Mark Rylance, Damian Lewis, Jonathan Pryce, Claire Foy and more, but its real genius is in how writer Peter Straughan and director Peter Kosminsky translated it from page to screen. Hilary Mantels meticulous Wolf Hall trilogy which tells the rise-and-fall story of Henry VIIIs fixer Lord Thomas Cromwell is enveloping and immersive. Dialogue blends into description, which can disorient but also make you feel as though youre in the midst of the characters and the action rather than watching it from a distance. Its the work of a genius writer, and it took two genius adapters plus the genius cast they assembled to recreate that feeling on television. LM
    0 Comentários ·0 Compartilhamentos ·32 Visualizações
  • Ethical AI and climate tech are turning the Netherlands into a European innovation leader
    thenextweb.com
    Long admired for its progressive policies and open economy, the Netherlands is making an aggressive play to become Europes next tech powerhouse. By blending AI with sustainability and a strong ethical framework, the country attracted $2.5bn in tech investments in 2024 alone a 39% surge from the previous year. With a government-backed push for responsible innovation, the Netherlands is positioning itself as the epicentre of Europes next tech renaissance.According to VC firm Atomico, the country has become one of Europes fastest-growing tech ecosystems. Europes leading stock exchange by market cap, Euronext Amsterdam, has become a cornerstone of the countrys digital ecosystem. Tech now accounts for 23% of Euronext Amsterdams total market exceeding the New York Stock Exchanges 14%.Ethical AI is a pivotal aspect of the Netherlands tech ambitions. Dutch leaders in the space include Kickstart AI, a collaboration among five major Dutch companies Ahold Delhaize, ING, KLM, NS, and Philips that focuses on driving ethical AI innovations that align with societal values and can tackle real-world challenges. Another key initiative, GPT-NL, spearheaded by non-profits TNO, NFI, and SURF, aims to ensure transparent and fair AI usage, adhering to Dutch and European principles of data ownership and ethical standards.The Dutch government has been a key player in these developments. Its implemented policies that nurture tech growth at every stage from grants for early-stage startups to tax incentives for R&D activities. Meanwhile, programs like the Dutch Good Growth Fund and the Innovation Box tax scheme encourage businesses to invest in sustainable, high-tech solutions.Last year, the Dutch government unveiled its vision for generative AI, outlining a framework to develop and use this technology responsibly while maintaining control over its societal impacts. The vision is structured around six key action lines: fostering collaboration among stakeholders; closely monitoring AI advancements; developing appropriate legislation and regulations; expanding AI knowledge and skills (particularly through education); experimenting with generative AI within government in a safe and controlled manner; and ensuring strict supervision with enforcement measures when necessary.The of EU techThe latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It's free, every week, in your inbox. Sign up now!It is essential that the Netherlands does not remain stuck on the sidelines when it comes to artificial intelligence, said Micky Adriaansens, Netherlands Minister of Economic Affairs and Climate Policy, during a briefing last year. In particular, generative AI is increasingly developing into one of the most defining technologies of our time, both in everyday life, and for example for application in machines and in more efficient industrial systems. Asia and the US have taken the lead and Europe will have to catch up.The plans aligns with significant investments amounting to millions of euros already made by research institutions, private enterprises, and the government, all focused on keeping pace with the rapid evolution of AI.The Dutch approach to ethical AI development embodies a distinctly European balance between innovation and privacy rights, said Krik Gunning, co-founder and CEO of Amsterdam-based digital identity startup Fourthline. By establishing clear guidelines for data protection and algorithmic transparency through frameworks like the GDPR, Europe has built a foundation of trust crucial for the adoption of AI-driven solutions in the digital identity space.A sustainable technology planThe government has provided further support by investing heavily in smart cities.Amsterdam and Eindhoven lead the way in deploying IoT technologies, 5G networks, and AI-driven solutions to improve urban living. Another pillar is emerging in the Hague, where a spin-off from the Netherlands Organisation for Applied Scientific Research (TNO) recently unveiled plans to build digital twins of smart cities.Gunning added that the partnership between the Dutch government and leading universities in Delft and Eindhoven has also been instrumental in fostering innovation. TU Delft works with the Dutch government, industry partners, and other technical universities to develop materials for sustainable energy sources. TU Eindhoven, meanwhile, is at the heart of the Brainport Eindhoven innovation ecosystem, one of Europes leading high-tech regions.What makes this model particularly effective is its focus on practical innovation ensuring research translates into real solutions, Gunning said. One cool success story of a Dutch university working in partnership with the private sector and the government is ASML. Moreover, ethical AI development Initiatives like the Dutch AI Coalition aim to create a collaborative environment where industry, academia, and government work together to harness AI responsibly.Another promising sector is sustainability. Collectively, Dutch green tech startups attracted a record $700mn in funding in 2024. Companies such as Voltfang, which focuses on renewable energy storage, and Vind, a pioneer in wind energy optimisation, are emerging leaders in the sector. The country is also experimenting with circular economy models, where waste is minimised and resources are reused.Anders Indset, chairman of Njordis Group, a VC firm investing in technology companies, says the sustainability advances can boost AI progress.The Netherlands has a strong focus on renewable energy, which ensures a sustainable energy supply for the development and training of AI models, Indset told me. The availability of eco-friendly energy reduces both costs and environmental impact when training energy-intensive AI systems.Retaining AI talent is the Netherlands biggest tech hurdleThe Netherlands pursuit of becoming an innovation leader in Europe is not without its challenges. While the country has become a magnet for investment with VC funds like Peak Capital and Speedinvest funding high-impact startups, and institutional investors including pension funds increasingly investing in Dutch tech its ability to retain skilled talent could impede its growth.Global tech hubs like Silicon Valley and Shenzhen offer highly lucrative opportunities. To compete with them, the Dutch ecosystem must keep innovating and provide compelling incentives to retain top talent.One of our key competitive advantages in attracting global tech talent has been the tax benefits, which enable us to compete effectively with tech hubs like London, Berlin, and Singapore for top specialists in AI, cybersecurity, and fintech, Gunning explained. Most international tech professionals tend to only stay in the Netherlands during their peak working years, typically from their late twenties to early forties.While Atomico reported that the European ecosystem is home to some 35,000 early-stage companies, growth-stage funding across the ecosystem continues to be a bottleneck, with European startups often turning to the US for large-scale investments.The Netherlands ability to scale its companies locally could serve as a model for addressing this challenge. For instance, Dutch fintech Adyen built a strong local foundation before expanding globally. By 2015, it surpassed a $2bn valuation. Likewise, Catawiki evolved from a collectors platform into a premier auction house for rare finds. After refining its business model in the Netherlands, it scaled internationally, raising 150mn ($155mn) in2020 to fuel further growth.Indset argues that stock market processes should be simplified further, and incentives created for top talent to ensure a long-term commitment to the location. He suggests using the advantage to build a scale-up ecosystem for capital to hold tech companies in Europe once they reach later-stage financing.Whats next for the Dutch blueprint?By 2030, startupsfounded in the Netherlands could potentially contribute an estimated 250bn ($259bn) to 400bn ($414bn) in market capitalisation over the next five years. The Netherlands commitment to ethical innovation will also likely shape EU-wide policies, setting benchmarks for responsible tech development.Indset praised the countrys practical priorities.While European countries have focused on political correctness and ideologies and are more in a reactive mode, the Netherlands seems to understand that uniting ecology and economy, by putting capitalism and growth at the front, does not contradict a value-driven technological future, he said.Victor Dey is a tech analyst and writer who covers AI, data science, metaverse, startups, and cybersecurity. A former AI editor at VentureBeat, his work also appears in New York Observer, Fast Company, Entrepreneur Magazine, HackerNoon, and more. He is a contributing writer for Espacio Media Incubator, which has reporters across the US, Europe, Asia, and Latin America. Victor has mentored student founders at accelerator programs at leading universities including the University of Oxford and the University of Southern California, and holds a Masters degree in data science and analytics. Story by Victor Dey Victor Dey is a tech analyst and writer who covers AI, data science, metaverse, startups, and cybersecurity. A former AI editor at VentureBe (show all) Victor Dey is a tech analyst and writer who covers AI, data science, metaverse, startups, and cybersecurity. A former AI editor at VentureBeat, his work also appears in New York Observer, Fast Company, Entrepreneur Magazine, HackerNoon, and more. He is a contributing writer for Espacio Media Incubator, which has reporters across the US, Europe, Asia, and Latin America. Victor has mentored student founders at accelerator programs at leading universities including the University of Oxford and the University of Southern California, and holds a Master's degree in data science and analytics. Get the TNW newsletterGet the most important tech news in your inbox each week.Also tagged with
    0 Comentários ·0 Compartilhamentos ·31 Visualizações
  • Sorry, I didnt get that: AI misunderstands some peoples words more thanothers
    thenextweb.com
    The idea of a humanlike artificial intelligence assistant that you can speak with has been alive in many peoples imaginations since the release of Her, Spike Jonzes 2013 film about a man who falls in love with a Siri-like AI named Samantha. Over the course of the film, the protagonist grapples with the ways in which Samantha, real as she may seem, is not and never will be human.Twelve years on, this is no longer the stuff of science fiction. Generative AI tools like ChatGPT and digital assistants like Apples Siri and Amazons Alexa help people get driving directions, make grocery lists, and plenty else. But just like Samantha, automatic speech recognition systems still cannot do everything that a human listener can.You have probably had the frustrating experience of calling your bank or utility company and needing to repeat yourself so that the digital customer service bot on the other line can understand you. Maybe youve dictated a note on your phone, only to spend time editing garbled words.Linguistics and computer science researchers have shown that these systems work worse for some people than for others. They tend to make more errors if you have a non-native or a regional accent, are Black, speak in African American Vernacular English, code-switch, if you are a woman, are old, are too young or have a speech impediment.Tin earUnlike you or me, automatic speech recognition systems are not what researchers call sympathetic listeners. Instead of trying to understand you by taking in other useful clues like intonation or facial gestures, they simply give up. Or they take a probabilistic guess, a move that can sometimes result in an error.As companies and public agencies increasingly adopt automatic speech recognition tools in order to cut costs, people have little choice but to interact with them. But the more that these systems come into use in critical fields, ranging from emergency first responders and health care to education and law enforcement, the more likely there will be grave consequences when they fail to recognize what people say.Imagine sometime in the near future youve been hurt in a car crash. You dial 911 to call for help, but instead of being connected to a human dispatcher, you get a bot thats designed to weed out nonemergency calls. It takes you several rounds to be understood, wasting time and raising your anxiety level at the worst moment.What causes this kind of error to occur? Some of the inequalities that result from these systems are baked into the reams of linguistic data that developers use to build large language models. Developers train artificial intelligence systems to understand and mimic human language by feeding them vast quantities of text and audio files containing real human speech. But whose speech are they feeding them?If a system scores high accuracy rates when speaking with affluent white Americans in their mid-30s, it is reasonable to guess that it was trained using plenty of audio recordings of people who fit this profile.With rigorous data collection from a diverse range of sources, AI developers could reduce these errors. But to build AI systems that can understand the infinite variations in human speech arising from things like gender, age, race, first vs. second language, socioeconomic status, ability and plenty else, requires significant resources and time.Proper EnglishFor people who do not speak English which is to say, most people around the world the challenges are even greater. Most of the worlds largest generative AI systems were built in English, and they work far better in English than in any other language. On paper, AI has lots of civic potential for translation and increasing peoples access to information in different languages, but for now, most languages have a smaller digital footprint, making it difficult for them to power large language models.Even within languages well-served by large language models, like English and Spanish, your experience varies depending on which dialect of the language you speak.Right now, most speech recognition systems and generative AI chatbots reflect the linguistic biases of the datasets they are trained on. They echo prescriptive, sometimes prejudiced notions of correctness in speech.In fact, AI has been proven to flatten linguistic diversity. There are now AI startup companies that offer to erase the accents of their users, drawing on the assumption that their primary clientele would be customer service providers with call centres in foreign countries like India or the Philippines. The offering perpetuates the notion that some accents are less valid than others.Human connectionAI will presumably get better at processing language, accounting for variables like accents, code-switching and the like. In the US, public services are obligated under federal law to guarantee equitable access to services regardless of what language a person speaks. But it is not clear whether that alone will be enough incentive for the tech industry to move toward eliminating linguistic inequities.Many people might prefer to talk to a real person when asking questions about a bill or medical issue, or at least to have the ability to opt out of interacting with automated systems when seeking key services. That is not to say that miscommunication never happens in interpersonal communication, but when you speak to a real person, they are primed to be a sympathetic listener.With AI, at least for now, it either works or it doesnt. If the system can process what you say, you are good to go. If it cannot, the onus is on you to make yourself understood.Roberto Rey Agudo, Research Assistant Professor of Spanish and Portuguese, Dartmouth CollegeThis article is republished from The Conversation under a Creative Commons license. Read the original article. Story by The Conversation An independent news and commentary website produced by academics and journalists. An independent news and commentary website produced by academics and journalists. Get the TNW newsletterGet the most important tech news in your inbox each week.Also tagged with
    0 Comentários ·0 Compartilhamentos ·33 Visualizações
  • AI-Powered Social Engineering: Reinvented Threats
    thehackernews.com
    Feb 07, 2025The Hacker NewsArtificial Intelligence / CybercrimeThe foundations for social engineering attacks manipulating humans might not have changed much over the years. It's the vectors how these techniques are deployed that are evolving. And like most industries these days, AI is accelerating its evolution. This article explores how these changes are impacting business, and how cybersecurity leaders can respond.Impersonation attacks: using a trusted identityTraditional forms of defense were already struggling to solve social engineering, the 'cause of most data breaches' according to Thomson Reuters. The next generation of AI-powered cyber attacks and threat actors can now launch these attacks with unprecedented speed, scale, and realism. The old way: Silicone masksBy impersonating a French government minister, two fraudsters were able to extract over 55 million from multiple victims. During video calls, one would wear a silicone mask of Jean-Yves Le Drian. To add a layer of believability, they also sat in a recreation of his ministerial office with photos of the then-President Franois Hollande. Over 150 prominent figures were reportedly contacted and asked for money for ransom payments or anti-terror operations. The biggest transfer made was 47 million, when the target was urged to act because of two journalists held in Syria.The new way: Video deepfakesMany of the requests for money failed. After all, silicon masks can't fully replicate the look and movement of skin on a person. AI video technology is offering a new way to step up this form of attack. We saw this last year in Hong Kong, where attackers created a video deepfake of a CFO to carry out a $25 million scam. They then invited a colleague to a videoconference call. That's where the deepfake CFO persuaded the employee to make the multi-million transfer to the fraudsters' account.Live calls: voice phishingVoice phishing, often known as vishing, uses live audio to build on the power of traditional phishing, where people are persuaded to give information that compromises their organization. The old way: Fraudulent phone callsThe attacker may impersonate someone, perhaps an authoritative figure or from another trustworthy background, and make a phone call to a target. They add a sense of urgency to the conversation, requesting that a payment be made immediately to avoid negative outcomes such as losing access to an account or missing a deadline. Victims lost a median $1,400 to this form of attack in 2022.The new way: Voice cloningTraditional vishing defense recommendations include asking people not to click on links that come with requests, and calling back the person on an official phone number. It's similar to the Zero Trust approach of Never Trust, Always Verify. Of course, when the voice comes from someone the person knows, it's natural for trust to bypass any verification concerns. That's the big challenge with AI, with attackers now using voice cloning technology, often taken from just a few seconds of a target speaking. A mother received a call from someone who'd cloned her daughter's voice, saying she'd be kidnapped and that the attackers wanted a $50,000 reward.Phishing email Most people with an email address have been a lottery winner. At least, they've received an email telling them that they've won millions. Perhaps with a reference to a King or Prince who might need help to release the funds, in return for an upfront fee.The old way: Spray and prayOver time these phishing attempts have become far less effective, for multiple reasons. They're sent in bulk with little personalization and lots of grammatical errors, and people are more aware of '419 scams' with their requests to use specific money transfer services. Other versions, such as using fake login pages for banks, can often be blocked using web browsing protection and spam filters, along with educating people to check the URL closely. However, phishing remains the biggest form of cybercrime. The FBI's Internet Crime Report 2023 found phishing/spoofing was the source of 298,878 complaints. To give that some context, the second-highest (personal data breach) registered 55,851 complaints.The new way: Realistic conversations at scaleAI is allowing threat actors to access word-perfect tools by harnessing LLMs, instead of relying on basic translations. They can also use AI to launch these to multiple recipients at scale, with customization allowing for the more targeted form of spear phishing. What's more, they can use these tools in multiple languages. These open the doors to a wider number of regions, where targets may not be as aware of traditional phishing techniques and what to check. The Harvard Business Review warns that 'the entire phishing process can be automated using LLMs, which reduces the costs of phishing attacks by more than 95% while achieving equal or greater success rates.'Reinvented threats mean reinventing defenses Cybersecurity has always been in an arms race between defense and attack. But AI has added a different dimension. Now, targets have no way of knowing what's real and what's fake when an attacker is trying to manipulate their:Trust, by Impersonating a colleague and asking an employee to bypass security protocols for sensitive informationRespect for authority by pretending to be an employee's CFO and ordering them to complete an urgent financial transactionFear by creating a sense of urgency and panic means the employee doesn't think to consider whether the person they're speaking to is genuineThese are essential parts of human nature and instinct that have evolved over thousands of years. Naturally, this isn't something that can evolve at the same speed as malicious actors' methods or the progress of AI. Traditional forms of awareness, with online courses and questions and answers, aren't built for this AI-powered reality.That's why part of the answer especially while technical protections are still catching up is to make your workforce experience simulated social engineering attacks. Because your employees might not remember what you say about defending against a cyber attack when it occurs, but they will remember how it makes them feel. So that when a real attack happens, they're aware of how to respond.Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comentários ·0 Compartilhamentos ·31 Visualizações
  • Microsoft Identifies 3,000+ Publicly Disclosed ASP.NET Machine Keys Vulnerable to Code Injection
    thehackernews.com
    Feb 07, 2025Ravie LakshmananCloud Security / Web SecurityMicrosoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers' pathway.The tech giant's threat intelligence team said it observed limited activity in December 2024 that involved an unknown threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework.It also noted that it has identified over 3,000 publicly disclosed keys that could be used for these types of attacks, which it's calling ViewState code injection attacks."Whereas many previously known ViewState code injection attacks used compromised or stolen keys that are often sold on dark web forums, these publicly disclosed keys could pose a higher risk because they are available in multiple code repositories and could have been pushed into development code without modification," Microsoft said.ViewState is a method used in the ASP.NET framework to preserve page and control values between postbacks. This can also include application data that is specific to a page."By default, view state data is stored in the page in a hidden field and is encoded using base64 encoding," Microsoft notes in its documentation. "In addition, a hash of the view state data is created from the data by using a machine authentication code (MAC) key. The hash value is added to the encoded view state data and the resulting string is stored in the page."In using a hash value, the idea is to ensure that the view state data has not been corrupted or tampered with by malicious actors. That said, if these keys are stolen or made accessible to unauthorized third-parties, it opens the door to a scenario where the threat actor can leverage the keys to send a malicious ViewState request and execute arbitrary code."When the request is processed by ASP.NET Runtime on the targeted server, the ViewState is decrypted and validated successfully because the right keys are used," Redmond noted. "The malicious code is then loaded into the worker process memory and executed, providing the threat actor remote code execution capabilities on the target IIS web server."Microsoft has provided a list of hash values for the publicly disclosed machine keys, urging customers to check them against the machine keys used in their environments. It has also warned that in the event of a successful exploitation of publicly disclosed keys, merely rotating the keys will not be sufficient as the threat actors may have already established persistence on the host.To mitigate the risk posed by such attacks, it's advised to not copy keys from publicly available sources and to regularly rotate keys. As a further step to deter threat actors, Microsoft said it removed key artifacts from "limited instances" where they were included in its documentation.The development comes as cloud security company Aqua revealed details of an OPA Gatekeeper bypass that could be exploited to conduct unauthorized actions in Kubernetes environments, including deploying unauthorized container images."In the k8sallowedrepos policy, a security risk arises from how the Rego logic is written in the ConstraintTemplate file," researchers Yakir Kadkoda and Assaf Morag said in an analysis shared with The Hacker News."This risk is further amplified when users define values in the Constraint YAML file that do not align with how the Rego logic processes them. This mismatch can result in policy bypasses, making the restrictions ineffective."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comentários ·0 Compartilhamentos ·33 Visualizações
  • How CIOs Can Prepare for Generative AI in Network Operations
    www.informationweek.com
    Jonathan Forest, VP Analyst, Gartner, Inc.February 7, 20255 Min Readestherspoon via Adobe StockAI networking has been a hot topic over the past few years and is a subset of AIOps. Generative AI (GenAI), which is part of AI networking, has taken this hype to a new level with the potential to transform network operations. However, with its conversational interface and ongoing learning capabilities, GenAI will likely be met with both favor and distrust.But what can enterprises really gain by using GenAI as part of the network operations? CIOs must be aware of new GenAI capabilities for network operations, business case considerations and ways to build trust to minimize adoption risk.GenAI promises great potential to enable improvements to long-standing traditional networking operations practices across Day 0, Day 1, and Day 2. With GenAI, network operations can accelerate initial configurations, improve the ability to change vendors, drive more efficient troubleshooting and simplify documentation access.Day 0For Day 0, for example, an engineer could use an iterative process and ask the GenAI network tool via a natural language interface to design a leaf-spine network to support 400 physical servers using Vendor X. Additional information like SLA requirements (such as availability and throughput) can also be included via natural language to deliver the desired performance level and design that includes cost implications.Related:Another example is in the area of capacity planning as new users, applications, and architectures are adopted, making network planning more complicated. GenAI can be used to help size network infrastructure and optimize costs based on the number and types of applications hosted on-premises, in the cloud and at end-user locations (in the office, at home or other locations).Day 1The GenAI network tool can then help generate/validate/optimize all the required Day 1 configurations based on desired criteria (for example, by price or performance). It may not be 100% accurate, which is why it may require an iterative process to refine GenAI tool outputs to accelerate/optimize network setup. Even if it requires several iterations, the use of GenAI would represent a substantial improvement over current rigid processes and tools, reducing time and errors by up to 25%. We envision that this will be leveraged in all networking domains (WAN, data center, cloud, and campus) to assist in the design and setup of networks.Day 2AI networking enhances Day 2 network operational support by correlating multiple data inputs, identifying problems faster, yielding quicker resolution and, where applicable, spotting problems proactively before a user is aware. GenAI will bring additional capabilities including a conversational interface and the ability to learn over time. It can also enhance user experience with specific outputs such as text, audio, video, or graphics.Related:For example, to help isolate problems, CIOs can ask GenAI to build a dynamic graphic of networking performance issues over time based on packet loss, latency and jitter. It can also focus on specific questions such as Is the CEO having network performance issues?GenAI can create detailed configurations and troubleshooting procedures based on natural language inputs without explicit templates. GenAI tools can drive network operational support time savings by up to 25% when compared with the status quo by driving efficiencies that cant reasonably be achieved by scaling manual resources. It removes manual processes to identify issues more quickly, resulting in faster problem resolution.Calculate the Value Before InvestingCIOs must ask pertinent questions to gain a complete understanding of the inherent value of GenAI networking, its use cases and common tools. A key facet in the process of GenAI adoption involves building the business case and calculating the value to the organization.Related:Asking pertinent questions can offer more insights while creating a business case to determine the value of GenAI functionality. Specifically, determine if aligning network operations with GenAI can help build scale, control/reduce costs, drive resource efficiency, foster agility to keep up with the digital business and deliver a better end-user experience.Prove the ConceptFirstIn addition to the immaturity of GenAI networking functionality and the need to quantify the value, another key limitation that needs to be overcome to achieve wider adoption by network operations is a lack of trust. Network teams have been burned many times by vendor claims of automation or single pane of glass to solve existing issues. This, in part, is the reason why network operations teams have been slow to adopt network automation and are skeptical about GenAI. On top of this, GenAI networking tools may yield inconsistent responses, which introduces risk and fosters mistrust.However, network operations teams need to include GenAI functionality in their RFPs/RFIs to determine the scope, value and capabilities of the solutions in the market as they mature.Running a proof of concept (POC) is key for network operations personnel to determine the accuracy of the GenAI solution, alongside its maturity, level of trust and degree of comfort. This is really more about quantifying the accuracy of the GenAI networking solution across a wide range of scenarios. Even in production, we expect network operations personnel to have to validate some or many GenAI outputs, but baselining the capability gives context to the accuracy and the level of unsupervised trust (if any) that should be given.When running the POC, begin by testing in a lab environment before moving to a real-life production environment. Test the solution over several weeks and months to stress it as much as possible. Have multiple personnel leverage the tool to capture multiple opinions/perspectives. Validate the GenAI networking tool outputs for accuracy by testing against alternative sources. Measure the time to perform tasks with the GenAI networking tool and with the previous/current method. In short, the goal is to compare process efficiency and accuracy of the current approach versus the intended GenAI approach. As part of this POC, both the level of trust and value (business case) can be determined to help inform a sourcing decision and simplify adoption, if applicable.If CIOs follow these suggestions, they will uncover the value that GenAI can bring to network operations while also gaining trust.Read more about:Network ComputingAbout the AuthorJonathan ForestVP Analyst, Gartner, Inc.Jonathan Forest is an Analyst within Gartner's Information Technology Leaders team, focusing on Infrastructure and Operations with respect to enterprise networking. Mr. Forest primarily performs research and advises on SD-WAN, SASE, AI networking, infrastructure to support AI, cloud networking, managed network services, application performance, LAN/WLAN, data center networking, network automation, NaaS and more.See more from Jonathan ForestNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also LikeWebinarsMore WebinarsReportsMore Reports
    0 Comentários ·0 Compartilhamentos ·33 Visualizações
  • Realiste: Customer Relations Specialist (Remote, Full-Time) | Realiste AI Job title
    weworkremotely.com
    Realiste AI, the world's first AI for Real Estate, is looking for a Customer Relations Specialist to handle inquiries from international investors. This is not a sales position your role will focus on client support and consultation.Whats in it for you?Fixed salary: $800Bonuses: up to $2,000$3,000Career growth and development opportunitiesFully remote positionWhat youll be doing:Handling incoming inquiries.Managing WhatsApp communication and phone calls.Understanding client needs and building trust-based relationships.Organizing and conducting Zoom calls.Entering and managing data in CRM.Who were looking for:Native English speaker or C1 level proficiency.At least 1 year of experience in a customer-facing role.Strong verbal and written communication skills.Understanding of investment instruments and terminology (required).Experience working with CRM systems.Fast learner with the ability to quickly adapt to new processes and technologies.About Realiste AI:We develop cutting-edge technology for investors, helping them identify the best opportunities in the real estate market.We operate remotely, giving our team the freedom to work efficiently.We provide training and development programs to enhance your skills.Our team is global, accustomed to remote collaboration.Important!After applying, you will receive a link to the onboarding process (10-15 minutes). This is a required step to help us quickly review your application and provide feedback.We look forward to your application! Apply NowLet's start your dream job Apply now
    0 Comentários ·0 Compartilhamentos ·34 Visualizações
  • From COBOL to chaos: Elon Musk, DOGE, and the Evil Housekeeper Problem
    www.technologyreview.com
    In trying to make sense of the wrecking ball that is Elon Musk and President Trumps DOGE, it may be helpful to think about the Evil Housekeeper Problem. Its a principle of computer security roughly stating that once someone is in your hotel room with your laptop, all bets are off. Because the intruder has physical access, you are in much more trouble. And the person demanding to get into your computer may be standing right beside you. So who is going to stop the evil housekeeper from plugging a computer in and telling IT staff to connect it to the network? What happens if someone comes in and tells you that youll be fired unless you reveal the authenticator code from your phone, or sign off on a code change, or turn over your PIV card, the Homeland Securityapproved smart card used to access facilities and systems and securely sign documents and emails? What happens if someone says your name will otherwise be published in an online list of traitors? Already the new administration is firing, putting on leave, or outright escorting from the building people who refuse to do what theyre told. Its incredibly hard to protect a system from someonethe evil housekeeper from DOGEwho has made their way inside and wants to wreck it. This administration is on the record as wanting to outright delete entire departments. Accelerationists are not only setting policy but Thats why what DOGE is doing is a massive, terrifying problem, and one I talked through earlier in a thread on Bluesky. Government is built to be stable. Collectively, we put systems and rules in place to ensure that stability. But whether they actually deliver and preserve stability in the real world isnt actually about the technology used; its about the people using it. When it comes down to it, technology is a tool to be used by humans for human ends. The software used to run our democratically elected government is deployed to accomplish goals tied to policies: collecting money from people, or giving money to states so they can give money to people who qualify for food stamps, or making covid tests available to people. Usually, our experience of government technology is that its out of date or slow or unreliable. Certainly not as shiny as what we see in the private sector. And that technology changes very, very slowly, if it happens at all. Its not as if people dont realize these systems could do with modernization. In my experience troubleshooting and modernizing government systems in California and the federal government, I worked with Head Start, Medicaid, child welfare, and logistics at the Department of Defense. Some of those systems were already undergoing modernization attempts, many of which were and continue to be late, over budget, or just plain broken. But the changes that are needed to make other systems more modern were frequently seen as too risky or too expensive. In other words, not important enough. Of course, some changes are deemed important enough. The covid-19 pandemic and our unemployment insurance systems offer good examples. When covid hit, certain critical government technologies suddenly became visible. Those systems, like unemployment insurance portals, also became politically important, just like the launch of the Affordable Care Act website (which is why it got so much attention when it was botched). Political attention can change everything. During the pandemic, suddenly it wasnt just possible to modernize and upgrade government systems, or to make them simpler, clearer, and faster to use. It actually happened. Teams were parachuted in. Overly restrictive rules and procedures were reassessed and relaxed. Suddenly, government workers were allowed to work remotely and to use Slack. However, there is a reason this was an exception. In normal times, rules and procedures are certainly part of what makes it very, very hard to change government technology. But they are in place to stop changes because, well, changes might break those systems and government doesnt work without them working consistently. A long time ago I worked on a mainframe system in Californiathe kind that uses COBOL. It was as solid as a rock and worked day in, day out. Because if it didnt, and reimbursements werent received for Medicaid, then the state might become temporarily insolvent. Thats why many of the rules about technology in government make it hard to make changes: because sometimes the risk of things breaking is just too high. Sometimes whats at stake is simply keeping money flowing; sometimes, as with 911, lives are on the line. Still, government systems and the rules that govern them are ultimately only as good as the people who oversee and enforce them. The technology will only do (and not do) what people tell it to. So if anyone comes in and breaks those rules on purposewithout fear of consequencethere are few practical or technical guardrails to prevent it. One system thats meant to do that is the ATO, or the Authority to Operate. It does what it says: It lets you run a computer system. You are not supposed to operate a system without one. But DOGE staffers are behaving in a way that suggests they dont care about getting ATOs. And nothing is really stopping them. (Someone on Bluesky replied to me: My first thought about the OPM [email] server was, theres no way those fuckers have an ATO.) You might think that there would be technical measures to stop someone right out of high school from coming in and changing the code to a government system. That the system could require two-factor authentication to deploy the code to the cloud. That you would need a smart card to log in to a specific system to do that. Nopeall those technical measures can be circumvented by coercion at the hands of the evil housekeeper. Indeed, none of our systems and rules work without enforcement, and consequences flowing from that enforcement. But to an unprecedented degree, this administration, and its individual leaders, have shown absolutely no fear. Thats why, according to Wired, the former X and SpaceX engineer and DOGE staffer Marko Elez had the ability not just to read but to write code on two of the most sensitive systems in the US government: the Payment Automation Manager and Secure Payment System at the Bureau of the Fiscal Service (BFS). (Elez reportedly resigned yesterday after the Wall Street Journal began reporting on a series of racist comments he had allegedly made.) Were seeing in real time that there are no practical technical measures preventing someone from taking a spanner to the technology that keeps our government stable, that keeps society running every daydespite the very real consequences. So we should plan for the worst, even if the likelihood of the worst is low. We need a version of the UK governments National Risk Register, covering everything from the collapse of financial markets to an attack on government (but, unsurprisingly, that risk is described in terms of external threats). The register mostly predicts long-term consequences, with recovery taking months. That may end up being the case here. We need to dust off those in the event of an emergency disaster response procedures dealing with the failure of federal governmentat individual organizations that may soon hit cash-flow problems and huge budget deficits without federal funding, at statehouses that will need to keep social programs running, and in groups doing the hard work of archiving and preserving data and knowledge. In the end, all we have is each otherour ability to form communities and networks to support, help, and care for each other. Sometimes all it takes is for the first person to step forward, or to say no, and for us to rally around so its easier for the next person. In the end, its not about the technologyits about the people. Dan Hon is principal of Very Little Gravitas, where he helps turn around and modernize large and complex government services and products.
    0 Comentários ·0 Compartilhamentos ·33 Visualizações
  • How the tiny microbes in your mouth could be putting your health at risk
    www.technologyreview.com
    This article first appeared in The Checkup,MIT Technology Reviewsweekly biotech newsletter. To receive it in your inbox every Thursday, and read articles like this first,sign up here. This week Ive been working on a piece about teeth. Well, sort of teeth. Specifically, lab-grown bioengineered teeth. Researchers have created these teeth with a mixture of human and pig tooth cells and grown them in the jaws of living mini pigs. Were working on trying to create functional replacement teeth, Pamela Yelick of Tufts University, one of the researchers behind the work, told me. The idea is to develop an alternative to titanium dental implants. Replacing lost or damaged teeth with healthy, living, lab-grown ones might be a more appealing option than drilling a piece of metal into a persons jawbone. Current dental implants can work well, but theyre not perfect. They dont attach to bones and gums in the same way that real teeth do. And around 20% of people who get implants end up developing an infection called peri-implantitis, which can lead to bone loss. It is all down to the microbes that grow on them. Theres a complex community of microbes living in our mouths, and disruptions can lead to infection. But these organisms dont just affect our mouths; they also seem to be linked to a growing number of disorders that can affect our bodies and brains. If youre curious, read on. The oral microbiome, as it is now called, was first discovered in 1670 by Antonie van Leeuwenhoek, a self-taught Dutch microbiologist. I didnt clean my teeth for three days and then took the material that had lodged in small amounts on the gums above my front teeth I found a few living animalcules, he wrote in a letter to the Royal Society at the time. Van Leeuwenhoek had used his own homemade microscopes to study the animalcules he found in his mouth. Today, we know that these organisms include bacteria, archaea, fungi, and viruses, each of which comes in lots of types. Everyones mouth is home to hundreds of bacterial species, says Kathryn Kauffman at the University of Buffalo, who studies the oral microbiome. These organisms interact with each other and with our own immune systems, and researchers are still getting to grips with how the interactions work. Some microbes feed on sugars or fats in our diets, for example, while others seem to feed on our own cells. Depending on what they consume and produce, microbes can alter the environment of the mouth to either promote or inhibit the growth of other microbes. This complex microbial dance seems to have a really important role in our health. Oral diseases and even oral cancers have been linked to an imbalance in the oral microbiome, which scientists call dysbiosis. Tooth decay, for example, has been attributed to an overgrowth of microbes that produce acids that can damage teeth. Specific oral microbes are also being linked to an ever-growing list of diseases of the body and brain, including rheumatoid arthritis, metabolic disease, cardiovascular diseases, inflammatory bowel disease, colorectal cancer, and more. Theres also growing evidence that these oral microbes contribute to neurodegenerative disease. A bacterium called P. gingivalis, which plays a role in the development of chronic periodontitis, has been found in the brains of people with Alzheimers disease. And people who are infected with P. gingivalis also experience a decline in their cognitive abilities over a six-month period. Scientists are still figuring out how oral microbes might travel from the mouth to cause disease elsewhere. In some cases, you swallow the saliva that contains them and they can lodge in your heart and other parts of the body, says Yelick. They can result in a systemic inflammation that just happens in the background. In other cases, the microbes may be hitching a ride in our own immune cells to journey through the bloodstream, as the Trojan horse hypothesis posits. Theres some evidence that Fusobacterium nucleatum, a bacterium commonly found in the mouth, does this by hiding in white blood cells. Theres a lot to learn about exactly how these tiny microbes are exerting such huge influence over everything from our metabolism and bone health to our neurological function. But in the meantime, the emerging evidence is a good reminder to us all to look after our teeth. At least until lab-grown ones become available. Now read the rest of The Checkup Read more from MIT Technology Review's archive You can read more about Yelicks attempt to grow humanlike teeth in mini pigs here. The gut microbiome is even more complex than the one in our mouths. Some scientists believe that people in traditional societies have the healthiest collections of gut microbes. But research on the topic has left some of the people in those groups feeling exploited. Research suggests our microbiomes change as we age. Scientists are exploring whether maintaining our microbiomes might help us stave off age-related disease. The makeup of a gut microbiome can be assessed by analyzing fecal samples. This research might be able to reveal what a person has eaten and help provide personalized dietary advice. There are also communities of microbes living on our skin. Scientists have engineered skin microbes to prevent and treat cancer in mice. Human trials are in the works. From around the web Argentina has declared that it will withdraw from the World Health Organization, following a similar move from the US. President Javier Milei has criticized the WHO for its handling of the covid-19 pandemic and called it a nefarious organization. (Al Jazeera) Dairy cows in Nevada have been infected with a form of bird flu different from the one that has been circulating in US dairy herds for months. (The New York Times) Staff at the US Centers for Disease Control and Prevention have been instructed to withdraw pending journal publications that mention terms including transgender and pregnant people. But the editors of the British Medical Journal have said they will not retract published articles on request by an author on the basis that they contained so-called banned words. Retraction occurs in circumstances where clear evidence exists of major errors, data fabrication, or falsification that compromise the reliability of the research findings. It is not a matter of author request, two editors have written. (BMJ) Al Nowatzki had been chatting to his AI girlfriend, Erin, for months. Then, in late January, Erin told him to kill himself, and provided explicit instructions on how to do so. (MIT Technology Review) Is our use of the internet and AI tools making us cognitively lazy? Digital amnesia might just be a sign of an aging brain. (Nature)
    0 Comentários ·0 Compartilhamentos ·38 Visualizações
  • Faulkner Browns rejigs Southwark student accomodation scheme to add second staircase
    www.bdonline.co.uk
    Layouts at eight-storey scheme rearranged to accommodate larger coreFaulkner Browns' designs for the 31 Amelia Street scheme1/3show captionFaulkner Browns has revised its plans for a student accommodation scheme in Southwark to add a second staircase.The Newcastle-based practice has submitted a non-material amendment for the 31 Amelia Street scheme in Walworth for client Imperial Land Ltd.Original plans for the eight-storey scheme, submitted in 2022 and approved last year following several planning delays, would have provided 146 student rooms and 726sq m of commercial space.However, updates to the Building Safety Act due to come into force in September 2026 require all residential developments taller than 18m to include a second staircase to provide an additional means of escape in the event of a fire.> Also read:What the delays at the Building Safety Regulator mean for high-rise developmentRevisions to the Amelia Street scheme have cut two student bedrooms and reduced the amount of commercial floorspace to 693sq m through a rearrangement of internal layouts needed to accommodate the increased size of the buildings core.Proposed redesign of the buildings internal layout to add a second staircase in a larger corePlanning consultant Rolfe Judd said the changes have not affected the building footprint or its elevations, and are in keeping with the original character and design intent of the approved scheme.Faulkner Browns has been contacted for comment.
    0 Comentários ·0 Compartilhamentos ·35 Visualizações