Connect with us
DAPA Banner

Tech

How Bluetooth LE Audio Enhances Listening Experience

Published

on

This is a sponsored article brought to you by Audio Precision.

Bluetooth started as a simple wireless connection between a phone and a headset. Since its inception, it has become the invisible scaffolding for music, calls, gaming, and hearing assistance across consumer and professional devices alike. Bluetooth’s evolution to support more use cases has been driven not by a single breakthrough but by a steady accumulation of radio innovations, codecs, transport schemes, and power management strategies that together enhance the user experience with wireless audio. Today, a new architectural baseline—Bluetooth Low Energy (LE) Audio—promises low-power, high quality, and scalable audio delivery to open up the standard for an even wider range of applications [1][2].

Evolution of Bluetooth Radio Technologies

The original Basic Rate (BR) radio introduced with Bluetooth 1.0 in 1999 used a Gaussian frequency-shift keying (GFSK) at 1 Msym/s, hopping through 79 channels in the 2.4 GHz band with alternating transmission directions in a tight time-division duplex rhythm. The short-range robustness and reliability afforded by this technology helped gain performance at par with traditional cable-based devices.

In 2003, the Advanced Audio Distribution Profile (A2DP) arrived as the enabling standard for stereo audio streaming over Bluetooth Classic, marking the technology’s expansion beyond voice into music playback. A2DP uses the Audio/Video Distribution Transport Protocol (AVDTP) for stream management and mandates the Sub-Band Codec (SBC) as its baseline audio compression format. The SBC codec employs 4- or 8-band analysis/synthesis filter banks with adaptive bit allocation, spanning bitrates from 128 to 345 kbps for stereo content. Embedded DSP work showed how to optimize SBC implementation—Weighted Overlap Add (WOLA) filter banks, fixed-point pipelines, and real-time decoding that is audibly indistinguishable from floating point reference implementations while consuming fewer MIPS and milliwatts [3].

Advertisement

In 2004, Bluetooth 2.0 introduced Enhanced Data Rate (EDR) that moved payloads to π/4 DQPSK or 8 DPSK modulation to boost gross throughput to 2–3 Mb/s, while retaining the GFSK for packet headers. This innovation boosted stereo streaming quality and adoption during the decade.

Around 2010, Bluetooth Low Energy (BLE) 1 M PHY technology was introduced via Bluetooth 4.0. This new radio technology continued to use GFSK but tuned for low duty cycles and intermittent bursts. This fundamental difference with BR/EDR (Basic Rate/Enhanced Data Rate) led to common usage of the term “Bluetooth Classic” for Bluetooth 1.0 to distinguish it from BLE.

Isochronous Transport Architecture

In late 2016, Bluetooth 5.0 introduced the LE 2M PHY, doubling the symbol rate to 2 Msym/s. For a healthy link margin, halving a packet’s airtime was found to reduce collision exposure and lower the energy delivered/bit. By 2020, Bluetooth 5.2 or Bluetooth LE Audio radically shifted the focus from continuous streaming to a transport designed explicitly around deadlines. LE (Low Energy) Audio leverages the existing LE 1M and LE 2M PHYs but carries audio over isochronous channels—slots with timing commitments. The isochronous channel architecture comes in two forms. Connected Isochronous Streams (CIS) are unicast flows whose parameters (intervals, subevents, retransmissions) can be tuned to meet frame deadlines with bounded jitter, enabling the radio to sleep predictably between bursts while the application knows precisely when a frame will arrive. A systematic review of BLE performance corroborates that output and latency in the real world are bounded as much by connection interval, event length, and retransmissions as by the raw symbol rate; under the right parameters, faster PHYs reduce radioactive time and improve energy efficiency, while coded long-range modes trade airtime for robustness in harsher channels [1].

Broadcast Isochronous Streams (BIS)—commercially branded as Auracast—extend that scheduling to one-to-many transmissions, enabling connectionless audio delivery to unlimited receivers [2][7].

Advertisement

This difference in architecture over continuous streams requires careful selection of intervals, packetization, codec forming and appropriate models to determine parameters that meet deadlines without wasting airtime. Markov chain analyses of CIS—validated via simulation—translate developer choices (intervals, subevents, retransmission counts) into quantitative predictions for packet loss rate (PLR), backlog, delay, throughput, and average power consumption. [7]

The LC3 Codec Advantage

LE Audio’s Low Complexity Communication Codec (LC3) fundamentally shifts the bitrate-quality-complexity balance. Peer-reviewed listening tests across speech and music demonstrate that LC3 delivers superior perceived quality compared with SBC and mSBC at roughly half the bitrate; it also provides robust packet loss concealment and flexible frame sizes, including low-latency modes that make the encoding delay a smaller slice of the end‑to-end budget [2]. The benefits are practical: lower bitrate shrinks airtime, which reduces collision risk; shorter frames pair cleanly with CIS scheduling so deadlines are easier to meet; the codec’s computational footprint is modest enough for miniature devices [2].

AP logo with blue swoosh, text reads "An Axiometrics Solutions Brand."Audio Precision provides high-performance audio analyzers, accessories, and applications that have helped engineers worldwide design, validate, characterize, and manufacture audio products for over 40 years.

Hearing Aids: Power-Constrained Wireless Audio

Modern hearing devices are a complex assembly of multiple microphones, digital signal processors, and miniature power sources. Except for Completely-in-Canal (CIC) and Invisible-in-Canal (IIC) designs, which are so small they fit entirely within the ear canal, most hearing aids incorporate two or more microphones to support directional processing, beamforming, and noise reduction. Audio output is provided by a single electro-acoustic transducer. The compact form factor severely limits battery capacity, making energy efficiency critical.

Compared to Bluetooth Classic (A2DP/HFP), LE Audio improves energy efficiency through three broad mechanisms: the LC3 codec achieves equivalent perceived audio quality at significantly lower bitrates than the SBC codec used in Bluetooth Classic; the LE 1M and 2M PHYs reduce on-air time per packet relative to BR/EDR; and Connected Isochronous Streams (CIS) enable precise scheduling, allowing the radio to sleep between transmissions, whereas BR/EDR audio requires longer active radio periods.

Advertisement

BLE‑compliant wake‑up receivers (WuRx) monitor the air with micro/nano-watt sensitivity and trigger the main radio with packet preambles. Reported designs demonstrate sensitivity to extremely weak radio signals (down to −80 dBm), with within‑bit duty cycling that trades latency for power from hundreds of microseconds to seconds [4]. Sleep scheduling techniques primarily apply heuristics for periodic check‑ins, event‑driven wake-ups, clustering, and time division to stretch lifetime while meeting QoS targets [5][6].

From True Wireless Stereo to Coordinated Sets

Bluetooth Classic’s A2DP supports only a single audio stream. In Bluetooth Classic’s True Wireless Stereo (TWS) devices, one earbud acts as the primary, receiving the stereo stream from the phone and relaying audio to the secondary earbud—a forwarding or relay architecture. The additional transmission hop adds latency to the secondary earbud, while increasing power consumption in the primary.

LE Audio eliminates this limitation entirely. The technology’s dual CIS capability lets the phone send synchronized left and right streams directly to both earbuds. This architectural shift enables independent CIS connections from the phone to the left and right earbuds or hearing aids, enabling synchronized stereo delivery without relaying.

Discovery and pairing have evolved to match multi‑device use. The Coordinated Set Identification Service (CSIS) allows two earbuds—or two hearing aids—to be discovered and managed as a coordinated set rather than independently, with resolvable identifiers and set‑level locks. While peer‑reviewed empirical literature on CSIS is thin, timing and carrier synchronization theory is mature: clock‑offset estimation, jitter control, phase‑locked loops, buffer alignment, and recovery strategies hold binaural timing within tens of milliseconds for lip‑sync and spatial imaging [9].

Advertisement

Gaming Headsets: Low Latency With Bidirectional Stereo

Gaming represents a demanding stress test for wireless audio. Bluetooth Classic’s Headset Profile (HSP) and Hands-Free Profile (HFP) support bidirectional audio for voice communication but are fundamentally limited: they transmit only in mono with a maximum sampling rate of 16 kHz, restricting both spatial audio quality and voice fidelity.

LE Audio Unicast Voice transforms this scenario by supporting stereo audio with sampling rates up to 32 kHz, significantly improving spatial audio and speech quality for gaming while maintaining voice communication with other players. End‑to‑end latency often must stay under a few tens of milliseconds for responsive play and coherent spatial sound. LC3’s shorter frames and lower bitrates shrink codec delay; tuned CIS parameters preserve deadlines while limiting retransmissions to useful values; beamforming improves capture quality for bidirectional voice without ballooning computational cost [2][7].

Close-up of smartphone screen showing Bluetooth icon in blue with other icons around it. Audio Precision’s new Bluetooth® 5 module provides an interface to audio devices using the latest version of the Bluetooth specification, including LE Audio devices utilizing Unicast and Auracast™. Adobe Stock

Public Broadcast Audio: Auracast

Bluetooth Classic supports only one active audio connection and typically provides a range of approximately 10 meters, making it fundamentally unsuitable for broadcast scenarios such as lecture halls, churches, gyms, and airports.

LE Audio introduces the Broadcast Isochronous Stream (BIS), commercially branded as Auracast, enabling true one-to-many audio transmission. Multiple hearing aids, headphones, and earbuds can receive the same broadcast, which may be public (e.g., airport announcements) or private (encrypted, non-discoverable, optional password protection). Typical Auracast ranges extend up to 30 meters indoors and 100 meters outdoors, depending on environment and configuration.

Advertisement

BIS’s connectionless nature scales easily to unlimited receivers without pairing overhead; isochronous delivery tolerates packet loss well through forward error correction and interleaving; and the unidirectional transmission eliminates return traffic, reducing radio congestion. Assistive listening studies report that bypassing room acoustics and delivering audio directly can improve signal‑to‑noise ratios by 15–20 dB, making announcements comprehensible and lectures clearer [8].

Ensuring It Sounds Good in, on or Over the Listener’s Ear

LE Audio delivers the music or voice signal more efficiently than its predecessor, Bluetooth Classic. Audio engineers still need to verify their devices’ audio performance as experienced by the end user.

The listener’s pinna, the external part of the ear, and ear canal are a critical part of the playback system. For example, the low-frequency response and the effectiveness of active noise-cancellation are highly dependent on the seal between the device and the listener’s ear canal. Similarly, on-ear and over-ear headphones interact with the listener’s pinnas.

Anthropomorphic test fixtures—most notably GRAS KEMAR (Knowles Electronics Manikin for Acoustic Research) head and torso simulators—incorporate soft, deformable anthropomorphic pinnas that replicate realistic insertion and sealing conditions. These allow accurate replication of insertion depth, sealing, low-frequency response, and ANC performance [10][12].

Advertisement

Gaming headsets both receive and send audio. Just like music headphones, gaming headset testing benefits from fixtures with a human-like pinna to ensure repeatable measurement of ear-pad interaction. The headset’s microphone can be either a traditional boom microphone positioned close to the mouth or an array of microphones located farther away on the ear cups incorporating beamforming to isolate the wearer’s voice from any background noise. Test fixtures use an artificial mouth and a microphone positioned at the Mouth Reference Point (MRP) according to ITU-T standards to evaluate microphone performance under realistic speech and background noise conditions [10].

For testing of devices intended as broadcast receivers, an integrated test system with Auracast broadcast capability—like the Audio Precision Bluetooth 5 module—proves invaluable.

Conclusion

Bluetooth audio is no longer defined by a single radio or a single profile. It is defined by a timed pipeline—a codec that makes better sound with fewer bits, a transport that guarantees when those bits arrive, a radio that can sleep most of the time, and front‑end processing that gives the codec an easier job.

Hearing aids illustrate the payoff: arrays and beamformers improve intelligibility first; LC3 compresses with low delay; CIS schedules delivery; the radio sleeps; batteries last. Enhancements in other applications, such as gaming and public broadcast, further strengthen the case for adoption of this cutting-edge technology.

Advertisement

While Bluetooth audio began as a low-bandwidth, mono voice technology over Basic Rate (BR) radio in 1999, more than 25 years of evolution has produced a fundamental architectural shift. LE Audio replaces continuous point-to-point streams with scheduled, low-power, scalable audio delivery, enabling new classes of devices and use cases. The standards are ready, and audio test systems like Audio Precision’s Bluetooth 5 module are updated to incorporate the new transmission technology; the rest is execution—deploying LE Audio broadly so audio becomes instant, clear, and inclusive [2][7].

References

[1] Tosi, J., Taffoni, F., Santacatterina, M., Sannino, R., & Formica, D. (2017). Performance evaluation of Bluetooth Low Energy: A systematic review. Sensors, 17(12), Article 2898. https://doi.org/10.3390/s17122898

[2] Schnell, M., Riedl, M., Löllmann, H., & Multrus, M. (2021). LC3 and LC3plus: The new audio transmission standards for wireless communication. Proceedings of the AES 150th Convention, Online.

[3] Hermann, D., Herre, J., & Teichmann, R. (2004). Low-power implementation of the Bluetooth subband audio codec. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Montreal, QC, Canada.

Advertisement

[4] Abdelhamid, M. R., Chen, R., Cho, J., Chandrakasan, A. P., & Wentzloff, D. D. (2018). A −80 dBm BLE-compliant, FSK wake-up receiver with system and within-bit duty-cycling for scalable power and latency. Proceedings of the IEEE Custom Integrated Circuits Conference (CICC), San Diego, CA, USA.

[5] Mutar, M. S., Mohammed, A. H., & Abdulkareem, M. B. (2024). A survey of sleep scheduling techniques in wireless sensor networks for maximizing energy efficiency. AIP Conference Proceedings.

[6] Mikhaylov, K., & Karvonen, H. (2020). Wake-up radio enabled BLE wearables: Empirical and analytical evaluation of energy efficiency. Proceedings of the IEEE International Symposium on Medical Information and Communication Technology (ISMICT).

[7] Yan, Z., Xu, H., & Shen, Z. (2024). Modeling and analysis of the performance for CIS-based Bluetooth LE Audio [Preprint].

Advertisement

[8] Kaufmann, T. B., Weller, T., Stiefelhagen, R., & Adiloglu, K. (2023). Requirements for mass adoption of assistive listening technology by the general public. arXiv. https://arxiv.org/abs/2303.02523

[9] Nasir, A. A., Durrani, S., Mehrpouyan, H., Blostein, S. D., & Kennedy, R. A. (2015). Timing and carrier synchronization in wireless communication systems: A survey and classification of research in the last five years. arXiv. https://arxiv.org/abs/1507.02032

[10] Okorn, E., & Wulf-Andersen, P. (2019). Acoustic test fixtures: From KEMAR and beyond! The Journal of the Acoustical Society of America, 146(4), 2815. https://doi.org/10.1121/1.5136656

[11] An analytical model of Bluetooth performance considering physical and link-layer effects. (2021). IEEE Xplore.

Advertisement

[12] IEC/ITU acoustic standards literature for headphone and earbud testing. (n.d.). Indexed in The Journal of the Acoustical Society of America and AIP Conference Proceedings.

Disclosure: AI tools were used by Wiley, which produced this sponsored article, to skim through research literature for technical insights on the evolution and state of the art of Bluetooth technology. AI was also used to polish the text for conciseness and technical accuracy.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

ChatGPT rolls out new $100 Pro subscription to challenge Claude

Published

on

Claude

OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude’s pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan.

Until now, OpenAI has offered three subscription tiers.

First is Go, which costs approx $8, second is Plus for $20, and then the final tier is at $200, a jump of $180.

Wiz

On the other hand, Anthropic does not offer an $8 subscription, but it has a $100 subscription that comes between the cheapest $20 and the expensive $200 subscription, and it works for the company because it caters to the coding audience.

OpenAI has realized that it needs to go after coders and enterprises, similar to Anthropic’s strategy.

Advertisement

The company’s answer is ChatGPT Pro, which is designed for people who rely on AI to get high-stakes, complex work done for $100.

After this change, OpenAI’s offering looks like the following:

  • Plus $20 – For lighter use. Try advanced capabilities like Codex and Deep Research for select projects throughout the week.
  • Pro $100 – Built for real projects. For those who use advanced tools and models throughout the week, with 5x higher limits than Plus (and 10x Codex usage vs. Plus for a limited time).
  • Pro $200 – For heavy lifting. Run your most demanding workflows continuously, even across parallel projects, with 20× higher limits than Plus.

All Pro plans include access to advanced features, including:

  • Pro models
  • Codex
  • Deep research
  • Image creation
  • Memory
  • File uploads

OpenAI says the Pro plan also includes unlimited access to GPT-5 and legacy models, but it’s not truly unlimited because the typical “Terms of Use” policies apply, including sharing of accounts.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

Source link

Advertisement
Continue Reading

Tech

Mythos autonomously exploited vulnerabilities that survived 27 years of human review. Security teams need a new detection playbook

Published

on

A 27-year-old bug sat inside OpenBSD’s TCP stack while auditors reviewed the code, fuzzers ran against it, and the operating system earned its reputation as one of the most security-hardened platforms on earth. Two packets could crash any server running it. Finding that bug cost a single Anthropic discovery campaign approximately $20,000. The specific model run that surfaced the flaw cost under $50.

Anthropic’s Claude Mythos Preview found it. Autonomously. No human guided the discovery after the initial prompt.

The capability jump is not incremental

On Firefox 147 exploit writing, Mythos succeeded 181 times versus 2 for Claude Opus 4.6. A 90x improvement in a single generation. SWE-bench Pro: 77.8% versus 53.4%. CyberGym vulnerability reproduction: 83.1% versus 66.6%. Mythos saturated Anthropic’s Cybench CTF at 100%, forcing the red team to shift to real-world zero-day discovery as the only meaningful evaluation left. Then it surfaced thousands of zero-day vulnerabilities across every major operating system and every major browser, many one to two decades old. Anthropic engineers with no formal security training asked Mythos to find remote code execution vulnerabilities overnight and woke up to a complete, working exploit by morning, according to Anthropic’s red team assessment.

Anthropic assembled Project Glasswing, a 12-partner defensive coalition including CrowdStrike, Cisco, Palo Alto Networks, Microsoft, AWS, Apple, and the Linux Foundation, backed by $100 million in usage credits and $4 million in open-source grants. Over 40 additional organizations that build or maintain critical software infrastructure also received access. The partners have been running Mythos against their own infrastructure for weeks. Anthropic committed to a public findings report “within 90 days,” landing in early July 2026.

Advertisement

Security directors got the announcement. They didn’t get the playbook.

“I’ve been in this industry for 27 years,” Cisco SVP and Chief Security and Trust Officer Anthony Grieco told VentureBeat in an exclusive interview at RSAC 2026. “I have never been more optimistic for what we can do to change security because of the velocity. It’s also a little bit terrifying because we’re moving so quickly. It’s also terrifying because our adversaries have this capability as well, and so frankly, we must move this quickly.”

Security directors saw this story told fifteen different ways this week, including VentureBeat’s exclusive interview with Anthropic’s Newton Cheng. As one widely shared X post summarizing the Mythos findings noted, the model cracked cryptography libraries, broke into a production virtual machine monitor, and gave engineers with zero security training working exploits by morning. What that coverage left unanswered: Where does the detection ceiling sit in the methods they already run, and what should they change before July?

Seven vulnerability classes that show where every detection method hits its ceiling

  1. OpenBSD TCP SACK, 27 years old. Two crafted packets crash any server. SAST, fuzzers, and auditors missed a logic flaw requiring semantic reasoning about how TCP options interact under adversarial conditions. Campaign cost ~$20,000. Anthropic notes the $50 per-run figure reflects hindsight.

  2. FFmpeg H.264 codec, 16 years old. Fuzzers exercised the vulnerable code path 5 million times without triggering the flaw, according to Anthropic. Mythos caught it by reasoning about code semantics. Campaign cost ~$10,000.

  3. FreeBSD NFS remote code execution, CVE-2026-4747, 17 years old. Unauthenticated root from the internet, per Anthropic’s assessment and independent reproduction. Mythos built a 20-gadget ROP chain split across multiple packets. Fully autonomous.

  4. Linux kernel local privilege escalation. Mythos chained two to four low-severity vulnerabilities into full local privilege escalation via race conditions and KASLR bypasses. CSA’s Rich Mogull noted Mythos failed at remote kernel exploitation but succeeded locally. No automated tool chains vulnerabilities today.

  5. Browser zero-days across every major browser. Thousands identified. Some required human-model collaboration. In one case, Mythos chained four vulnerabilities into a JIT heap spray, escaping both the renderer and the OS sandboxes. Firefox 147: 181 working exploits versus two for Opus 4.6.

  6. Cryptography library vulnerabilities (TLS, AES-GCM, SSH). Implementation flaws enabling certificate forgery or decryption of encrypted communications, per Anthropic’s red team blog and Help Net Security. A critical Botan library certificate bypass was disclosed the same day as the Glasswing announcement. Bugs in the code that implements the math. Not attacks on the math itself.

  7. Virtual machine monitor guest-to-host escape. Guest-to-host memory corruption in a production VMM, the technology keeping cloud workloads from seeing each other’s data. Cloud security architectures assume workload isolation holds. This finding breaks that assumption.

Nicholas Carlini, in Anthropic’s launch briefing: “I’ve found more bugs in the last couple of weeks than I found in the rest of my life combined.”

VentureBeat’s prescriptive matrix

Vulnerability Class

Advertisement

Why Current Methods Miss It

What Mythos Does

Security Director Action

OS kernel logic (OpenBSD 27yr, Linux 2-4 chain)

Advertisement

SAST lacks semantic reasoning. Fuzzers miss logic flaws. Pen testers time-boxed. Bounties scope-exclude kernel.

Chains 2-4 low-severity findings into local priv-esc. ~$20K campaign.

Add AI-assisted kernel review to pen test RFPs. Expand bounty scope. Request Glasswing findings from OS vendors before July. Re-score clustered findings by chainability.

Media codec (FFmpeg 16yr H.264)

Advertisement

SAST unflagged. Fuzzers hit path 5M times, never triggered.

Reasons about semantics beyond brute-force. ~$10K campaign.

Inventory FFmpeg, libwebp, ImageMagick, libpng. Stop treating fuzz coverage as security proxy. Track Glasswing codec CVEs from July.

Network stack RCE (FreeBSD 17yr, CVE-2026-4747)

Advertisement

DAST limited at protocol depth. Pen tests skip NFS.

Full autonomous chain to unauthenticated root. 20-gadget ROP chain.

Patch CVE-2026-4747 now. Inventory NFS/SMB/RPC services. Add protocol fuzzing to 2026 cycle.

Multi-vuln chaining (2-4 sequenced, local)

Advertisement

No tool chains. Pen testers hours-limited. CVSS scores in isolation.

Autonomous local chaining via race conditions + KASLR bypass.

Require AI-assisted chaining in pen test methodology. Build chainability scoring. Budget AI red teams for 2026.

Browser zero-days (thousands, 181 Firefox exploits)

Advertisement

Bounties + continuous fuzzing missed thousands. Some required human-model collaboration.

90x over Opus 4.6. Chained 4 vulns into JIT heap spray escaping renderer + OS sandbox.

Shorten patch SLA to 72hr critical. Pre-stage pipeline for July cycle. Pressure vendors for Glasswing timelines.

Crypto libraries (TLS, AES-GCM, SSH, Botan bypass)

Advertisement

SAST limited on crypto logic. Pen testers rarely audit crypto depth. Formal verification not standard.

Found cert forgery + decryption flaws in battle-tested libraries.

Audit all crypto library versions now. Track Glasswing crypto CVEs from July. Accelerate PQC migration.

VMM / hypervisor (guest-to-host memory corruption)

Advertisement

Cloud security assumes isolation. Few pen tests target hypervisor. Bounties rarely scope VMM.

Guest-to-host escape in production VMM.

Inventory hypervisor/VMM versions. Request Glasswing findings from cloud providers. Reassess multi-tenant isolation assumptions.

Attackers are faster. Defenders are patching once a year.

The CrowdStrike 2026 Global Threat Report documents a 29-minute average eCrime breakout time, 65% faster than 2024, with an 89% year-over-year surge in AI-augmented attacks. CrowdStrike CTO Elia Zaitsev put the operational reality plainly in an exclusive interview with VentureBeat. “Adversaries leveraging agentic AI can perform those attacks at such a great speed that a traditional human process of look at alert, triage, investigate for 15 to 20 minutes, take an action an hour, a day, a week later, it’s insufficient,” Zaitsev said. A $20,000 Mythos discovery campaign that runs in hours replaces months of nation-state research effort.

Advertisement

CrowdStrike CEO George Kurtz reinforced that timeline pressure on LinkedIn the same day as the Glasswing announcement. “AI is creating the largest security demand driver since enterprises moved to the cloud,” Kurtz wrote. The regulatory clock compounds the operational one. The EU AI Act’s next enforcement phase takes effect August 2, 2026, imposing automated audit trails, cybersecurity requirements for every high-risk AI system, incident reporting obligations, and penalties up to 3% of global revenue. Security directors face a two-wave sequence: July’s Glasswing disclosure cycle, then August’s compliance deadline.

Mike Riemer, Field CISO at Ivanti and a 25-year US Air Force veteran who works closely with federal cybersecurity agencies, told VentureBeat what he is hearing from the government. “Threat actors are reverse engineering patches, and the speed at which they’re doing it has been enhanced greatly by AI,” Riemer said. “They’re able to reverse engineer a patch within 72 hours. So if I release a patch and a customer doesn’t patch within 72 hours of that release, they’re open to exploit.” Riemer was blunt about where that leaves the industry. “They are so far in front of us as defenders,” he said.

Grieco confirmed the other side of that collision at RSAC 2026. “If you talk to an operational team and many of our customers, they’re only patching once a year,” Grieco told VentureBeat. “And frankly, even in the best of circumstances, that is not fast enough.”

CSA’s Mogull makes the structural case that defenders hold the long-term advantage: fix a vulnerability once and every deployment benefits. But the transition period, when attackers reverse-engineer patches in 72 hours and defenders patch once a year, favors offense.

Advertisement

Mythos is not the only model finding these bugs. Researchers at AISLE, an AI cybersecurity startup, tested Anthropic’s showcase vulnerabilities on small, open-weights models and found that eight out of eight detected the FreeBSD exploit. AISLE says one model had only 3.6 billion parameters and costs 11 cents per million tokens, and that a 5.1-billion-parameter open model recovered the core analysis chain of the 27-year-old OpenBSD bug. AISLE’s conclusion: “The moat in AI cybersecurity is the system, not the model.” That makes the detection ceiling a structural problem, not a Mythos-specific one. Cheap models find the same bugs. The July timeline gets shorter, not longer.

Over 99% of the vulnerabilities Mythos has identified have not yet been patched, per Anthropic’s red team blog. The public Glasswing report lands in early July 2026. It will trigger a high-volume patch cycle across operating systems, browsers, cryptography libraries, and major infrastructure software. Security directors who have not expanded their patch pipeline, re-scoped their bug bounty programs, and built chainability scoring by then will absorb that wave cold. July is not a disclosure event. It is a patch tsunami.

What to tell the board

Every security director tells the board “we have scanned everything.” Merritt Baer, CSO at Enkrypt AI and former Deputy CISO at AWS, told VentureBeat that the statement does not survive Mythos without a qualifier.

“What security leaders actually mean is: we have exhaustively scanned for what our tools know how to see,” Baer said in an exclusive interview with VentureBeat. “That’s a very different claim.”

Advertisement

Baer proposed reframing residual risk for boards around three tiers: known-knowns (vulnerability classes your stack reliably detects), known-unknowns (classes you know exist but your tools only partially cover, like stateful logic flaws and auth boundary confusion), and unknown-unknowns (vulnerabilities that emerge from composition, how safe components interact in unsafe ways). “This is where Mythos is landing,” Baer said.

The board-level statement Baer recommends: “We have high confidence in detecting discrete, known vulnerability classes. Our residual risk is concentrated in cross-function, multi-step, and compositional flaws that evade single-point scanners. We are actively investing in capabilities that raise that detection ceiling.”

On chainability, Baer was equally direct. “Chainability has to become a first-class scoring dimension,” she said. “CVSS was built to score atomic vulnerabilities. Mythos is exposing that risk is increasingly graph-shaped, not point-in-time.” Baer outlined three shifts security programs need to make: from severity scoring to exploitability pathways, from vulnerability lists to vulnerability graphs that model relationships across identity, data flow, and permissions, and from remediation SLAs to path disruption, where fixing any node that breaks the chain gets priority over fixing the highest individual CVSS.

“Mythos isn’t just finding missed bugs,” Baer said. “It’s invalidating the assumption that vulnerabilities are independent. Security programs that don’t adapt, from coverage thinking to interaction thinking, will keep reporting green dashboards while sitting on red attack paths.”

Advertisement

VentureBeat will update this story with additional operational details from Glasswing’s founding partners as interviews are completed.

Source link

Continue Reading

Tech

A Mercury Rover Could Explore The Planet By Sticking To The Terminator

Published

on

The planet Mercury in true color. (Credit: NASA)
The planet Mercury in true color. (Credit: NASA)

With multiple rovers currently scurrying around on the surface of Mars to continue a decades-long legacy, it can be easy to forget sometimes that repeating this feat on other planets that aren’t Earth or Mars isn’t quite as straightforward. In the case of Earth’s twin – Venus – the surface conditions are too extreme to consider such a mission. Yet Mercury might be a plausible target for a rover, according to a study by [M. Murillo] and [P. G. Lucey], via Universe Today’s coverage.

The advantages of putting a rover’s wheels on a planet’s surface are obvious, as it allows for direct sampling of geological and other features unlike an orbiting or passing space probe. To make this work on Mercury as in some ways a slightly larger version of Earth’s moon that’s been placed right next door to the Sun is challenging to say the least.

With no atmosphere it’s exposed to some of the worst that the Sun can throw at it, but it does have a magnetic field at 1.1% of Earth’s strength to take some of the edge off ionizing radiation. This just leaves a rover to deal with still very high ionizing radiation levels and extreme temperature swings that at the equator range between −173 °C and 427 °C, with an 88 Earth day day/night cycle. This compares to the constant mean temperature on Venus of 464 °C.

To deal with these extreme conditions, the researchers propose that a rover might be able to thrive if it sticks to the terminator, being the transition between day and night. To survive, the rover would need to be able to gather enough solar power – if solar-powered – due to the Sun being very low in the sky. It would also need to keep up with the terminator velocity being at least 4.25 km/h, as being caught on either the day or night side of Mercury would mean a certain demise. This would leave little time for casual exploration as on Mars, and require a high level of autonomy akin to what is being pioneered today with the Martian rovers.

Advertisement

Top image: the planet Mercury with its magnetic field. (Credit: A loose necktie, Wikimedia)

Source link

Advertisement
Continue Reading

Tech

Artemis II Returns From Historic Flight Around the Moon

Published

on

The farthest journey in human history concluded Friday evening when NASA’s Artemis II astronauts returned to Earth after a flight around the moon. The crew’s Orion space capsule named Integrity splashed down in the Pacific Ocean off the coast of San Diego shortly after 5 pm Pacific Time, marking the end of a 10-day, more than 695,000-mile voyage beyond the lunar far side and back.

The four-person crew of Artemis II—commander Reid Wiseman, pilot Victor Glover, mission specialist Christina Koch, and mission-specialist Jeremy Hansen—traveled a greater distance from Earth than ever before, reaching 252,756 miles from our home planet.

“We most importantly choose this moment to challenge this generation and the next to make sure this record is not long-lived,” said Canadian astronaut Hansen as the crew passed the previous record of 248,655 miles set during Apollo 13.

Integrity began its fiery descent when the spacecraft hit Earth’s atmosphere at about 24,000 miles per hour, entering a communication blackout and decelerating from friction as its heat shield reached temperatures of roughly 3,000 degrees Fahrenheit. The plan was for the capsule to deploy two drogue parachutes at an altitude of about 22,000 feet, slowing it to about 200 miles per hour, then deploy pilot chutes pulling the three main parachutes at roughly 6,000 feet. This would further slow the spacecraft to around 20 miles per hour before it splashed into the ocean.

Advertisement

During their mission, the Artemis II crew saw things that no human has seen before. Flying higher above the lunar surface than the Apollo missions, the astronauts were the first people to see the entire disk of the moon’s far side. They also witnessed a solar eclipse from the vicinity of the moon as the sun slipped behind the lunar disk and illuminated it from behind.

“Humans probably have not evolved to see what we are seeing,” said NASA astronaut Glover during the eclipse. He and the rest of the crew described a halo of light surrounding the moon while one side of the lunar surface was bathed in earthshine. Venus, Mars, and Saturn shone among the stars. “It is truly hard to describe. It is amazing.”

Artemis II began on April 1 when the crew launched from NASA’s Kennedy Space Center in Florida atop the 322-foot-tall Space Launch System rocket, the most powerful vehicle to ever carry humans. After conducting multiple altitude-raising engine burns and testing the manual controls of the spacecraft, the crew proceeded with the engine firing known as translunar injection on day two of the mission, which sent them on a trajectory to the moon.

For the next three days, the crew tested the Orion spacecraft’s systems, practiced putting on their spaceflight suits, conducted additional course correction burns, manually flew the Orion capsule again, and prepared for the lunar flyby around the far side of the moon. They also had trouble venting wastewater from the Orion capsule’s toilet into space.

Advertisement

“We definitely have to fix some of the plumbing,” NASA administrator Jared Isaacman said during a conversation with the crew.

At 12:41 am Eastern Time on April 6, Artemis II entered the lunar sphere of influence, where the moon’s gravity overcomes that of Earth. That day, the crew made their closest approach to the moon, flying to about 4,000 miles above the lunar surface. During the lunar flyby, the crew communicated with a team of scientists on the ground, both before and after a roughly 40-minute communication blackout on the far side, to describe geologic features such as craters and canyons.

Just after breaking the distance record, the crew proposed names for two young, unnamed craters on the moon. The first they called Integrity, after their spacecraft, and the second they named Carroll, in honor of commander Reid Wiseman’s wife, who died of cancer in 2020.

Source link

Advertisement
Continue Reading

Tech

France orders all government ministries to ditch Windows for Linux in digital sovereignty push

Published

on

In short: France’s Interministerial Digital Directorate (DINUM) announced on 8 April 2026 that it is migrating its own workstations from Windows to Linux and has ordered every government ministry to formalise a plan to eliminate extra-European digital dependencies by autumn 2026. The directive covers operating systems, collaborative tools, cloud infrastructure, and artificial intelligence platforms. It follows France’s January 2026 mandate to replace Microsoft Teams and Zoom with its domestic Visio platform across 2.5 million civil servants by 2027, and is the most comprehensive digital sovereignty measure the French state has yet announced.

What France is actually committing to

An interministerial seminar convened on 8 April by the Directorate General for Enterprise, the National Agency for Information Systems Security, and the State Procurement Directorate produced a directive with two immediate obligations. DINUM itself, which employs roughly 250 agents, will migrate its workstations from Windows to Linux. All other ministries, including their operators and affiliated bodies, must produce their own reduction plans before autumn 2026. The plans are required to address eight categories of dependency: workstations and operating systems, collaborative and communication tools, antivirus and security software, artificial intelligence and algorithms, databases and storage, virtualisation and cloud infrastructure, and network and telecommunications equipment.

No specific Linux distribution has been named in the public announcement, and individual ministries retain the flexibility to choose their migration path within that framework. The software replacement strategy for the most common desktop tasks is already in place in the form of La Suite Numérique, a stack of sovereign productivity tools developed and maintained by DINUM. It includes Tchap, an end-to-end encrypted messaging application already deployed to more than 600,000 civil servants, Visio for video conferencing, a sovereign webmail service, file storage, and collaborative document editing.

The entire platform is hosted on Outscale servers, a subsidiary of Dassault Systèmes, and is certified SecNumCloud by the French information security agency ANSSI. As of April 2026, La Suite had been tested by some 40,000 regular users across departments before the broader mandate. The next milestone is a first set of “Industrial Digital Meetings” scheduled for June 2026, where DINUM intends to formalise public-private coalitions to support the transition.

Advertisement

The precedent that makes this credible

Announcements of government Linux migrations have a long and largely disappointing history. Most have quietly reversed course under the weight of compatibility problems, vendor pressure, and the path dependence of legacy software. France has a reason to believe this time is different, and the reason is the Gendarmerie nationale. Beginning in 2004 with a phased adoption of OpenOffice, Firefox, and Thunderbird, the Gendarmerie progressively built the internal competencies and governance structures required for a full operating system switch. In 2008 it launched GendBuntu, its customised Ubuntu-based deployment.

Advertisement

By June 2024, GendBuntu ran on 103,164 workstations, representing 97% of the force’s computing estate. The financial outcome has been unambiguous: the project saves approximately two million euros per year in licensing costs and has reduced the total cost of ownership by an estimated 40%. In February 2026, the Gendarmerie was cited explicitly by DINUM as the governance model for the national rollout.

The international context adds further validation. Germany’s state of Schleswig-Holstein, which began its own Microsoft-to-Linux transition in earnest in 2024, completed nearly 80% of its 30,000-workstation migration by early 2026 and recorded savings of €15 million in licensing costs in 2026 alone. The lesson both cases illustrate is the same: phased migration with coherent governance, strong internal support functions, and sustained political will consistently outperforms big-bang approaches that attempt to switch everything at once.

The geopolitical trigger

The April 8 announcement does not exist in isolation. It is the operating-system layer of a digital sovereignty strategy that France has been accelerating visibly since late 2024, driven in significant part by the changed relationship with the United States under the Trump administration. Trump’s tariffs reignited Europe’s push for cloud sovereignty from April 2025 onward, with OVHcloud and Scaleway reporting record client growth as European institutions began actively seeking to reduce their exposure to American vendors. In November 2025, France and Germany convened a joint summit on European digital sovereignty, establishing a task force to report in 2026.

In January 2026, France announced it would replace Teams and Zoom with its homegrown Visio platform for all 2.5 million civil servants by 2027, a move described at the time as digital sovereignty moving from slogan to policy. The April 8 Linux mandate is the same logic applied to the operating system itself. Anne Le Hénanff, Minister Delegate for Artificial Intelligence and Digital Technology, has framed the imperative plainly: “Digital sovereignty is not an option, it is a strategic necessity.” David Amiel, Minister of Public Action and Accounts, who led the announcement alongside Le Hénanff, stated that France “can no longer accept that our data, our infrastructure, and our strategic decisions depend on solutions whose rules, pricing, evolution, and risks we do not control.

Advertisement

The context for that framing is structural: US cloud providers control an estimated 85% of the European cloud market, according to Synergy Research Group, and spending on sovereign European cloud infrastructure is forecast to more than triple to €23 billion by 2027. Europe’s broader bid to reclaim its technology stack has moved from a niche policy concern to a headline political priority across the continent, and France is now moving faster than any other EU member state at the level of government desktop infrastructure.

The limits and the open questions

The April 8 directive is a mandate, not a completed migration. The absence of a specified Linux distribution means each ministry will face its own procurement and compatibility decisions, and the history of public sector IT projects suggests that autumn 2026 plans will vary enormously in ambition and specificity. Certain categories of specialist software, particularly in defence, healthcare, and financial regulation, have deep dependencies on Windows-specific applications for which open-source alternatives either do not exist or are not yet production-ready.

DINUM has acknowledged this through the flexibility it has built into the framework, but the question of how many of those remaining dependencies can realistically be resolved by a government-mandated roadmap is one that will only be answered over the next two to three years. The sovereignty strategy also contains a structural irony that will persist regardless of which operating system runs on civil servant desktops. Even as France replaces Windows with Linux and Teams with Visio, the twelve European AI startups selected for Amazon’s 2026 AWS Pioneers cohort illustrate that the continent’s most ambitious technology projects continue to be built and scaled on American cloud infrastructure. Replacing the desktop layer matters, but it sits above a cloud and compute substrate that remains predominantly American.

The full sovereignty project, if France and its partners are serious about it, will eventually have to address that substrate too. For now, the direction is clear, the political will is real, and the Gendarmerie’s 103,000 Linux workstations provide proof that the goal is achievable at scale. 2025 established AI as the defining technology of the decade, and the decisions governments make now about which infrastructure that AI runs on, and under whose legal jurisdiction, will shape the continent’s digital autonomy for the next generation.

Advertisement

Source link

Continue Reading

Tech

Grab Apple's M5 MacBook Air for $949 this weekend, record low price

Published

on

Thanks to a $150 discount, shoppers can grab Apple’s 2026 M5 MacBook Air 13-inch for a record low $949.

Open Midnight MacBook Air 13-inch laptop with blue abstract wallpaper on screen, large white text reading M5 AIR $949 over a bright pink, yellow, and teal gradient background.
Get the lowest 13-inch MacBook Air price this weekend at Amazon – Image credit: Apple

The 13-inch MacBook Air (2026) is now equipped with Apple’s M5 chip that features a 10-core CPU with 4 super cores and 6 efficiency cores. This allows a performance boost over the M4 model. In the standard spec, which is on sale for $949 at Amazon this weekend, you’ll also get an 8-core GPU, 16GB of unified memory, and 512GB of storage.
Get 13″ MacBook Air M5 from $949
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

5 Telltale Signs You’re Probably A Bad Driver

Published

on





Few people believe they are bad drivers, which is exactly why terrible drivers remain blissfully unaware that they are menacing the road. In 1981, a Stockholm University study found that the majority of drivers reported having “above average” driving and safety skills. This wasn’t a one-off, either, as a 2021 study by five researchers at the University of Hong Kong and Linköping University reaffirmed the widespread tendency to overstate one’s abilities. 

Try an experiment the next time you’re in a group setting. Ask people what they’d rate their own driving skills, and you’ll probably receive answers ranging from “above average” to “excellent,” which can’t be true. By math and logic, most drivers have to be “average”, as that’s the definition of the word. 

This cognitive dissonance — as the researchers call it — happens because bad driving rarely results in fiery crashes and police chases on TV. It happens every day, through many small failures like poor spacing, inconsistent speeds, late or harsh braking, hesitant decisions, and more such minor problems. Together, these small, irritating problems endanger everyone on the road. Also, all of the signs on this list are objectively measurable failures in vehicle control, not just driving preferences. With all that said, here are five worryingly common signs of a bad driver.

Advertisement

Thinking everyone else is the problem

Perhaps the most definitive metric of what defines a bad driver is the “I’m never in the wrong” attitude. If someone you know is constantly bemoaning the state of drivers on the road, then it’s extraordinarily likely that they are the bad driver themselves. Furthermore, if anyone says something along the lines of “that crash was unavoidable,” that indicates a poor or inexperienced driver. In 2016, a Proceedings of the National Academy of Sciences study found that driver-related issues were to blame in over 90% of cited crashes.

While most literature on driver confidence is published outside the U.S., a 2013 National Library of Medicine (NLM) study by two researchers from NYU and Elizabethtown College found that Americans are prone to thinking they are better drivers than average.

Advertisement

Tailgating other drivers

Many people don’t realize that even if you’re in front of someone going the speed limit, the law requires giving way to someone faster than you. That is why it can be very frustrating to be stuck behind a driver who is camping in the left lane on a highway, especially if you’re in a rush. However, this is not an excuse to tailgate the slowpoke in the left lane, and doing so is dangerous and a telltale sign of a bad driver. Studies have shown that tailgating drastically impacts reaction time and road safety, should an incident occur. 

In most cases, the two or three-second rule should be applied, wherein you look at a fixed object on the road, and ensure at least three seconds pass between your passing that fixed object, and the car in front of you. 

This leaves adequate braking distance should something require a quick stop of the car ahead of you. Furthermore, the evidence overwhelmingly suggests that younger drivers are more likely to be tailgaters than older drivers, though it is one of many common mistakes that even experienced drivers make

Advertisement

Never missing an exit

A lot of you must have seen the “I turn now, good luck everybody else” snippet from “Family Guy”, Seth MacFarlane’s Disney-owned running animated sitcom. There’s a famous saying that goes along the lines of “bad drivers never miss their/an exit”, which is what that snippet plays on. The idea is that someone who is an objectively bad driver will do dangerous things, like cutting across several lanes of traffic, crossing solid yellow or white lines, or braking extremely hard before taking an off-ramp in order not to miss their exit. 

The underlying assumption is that someone who is a “good” driver will prioritize road safety, and if that means adding time and distance to their journey, they’d do it over making a hazardous exit. Of course, the situation can be quite frustrating, especially in certain areas of the U.S. where a single missed exit can result in 15 or even more minutes of extra driving time each journey. The easiest way to not miss exits is to be prepared for them, which might sound intuitive, but is easier said than done. You could be on a new road, visibility could be bad, road markings and signs could be faded, and if you’re going fast, GPS callouts might be a bit delayed. Nonetheless, it’s always better to have a bit more driving time and not cause an accident than to make a risky turn to save a bit of time.

Advertisement

Hard or late braking

Arguably, knowing when to brake (and how much to brake) is the most important skill that a driver can possess, and having a car with a good stopping distance goes a long way in keeping you safe. If you think back to your driving classes, many instructors would have emphasized checking at least the rearview mirror before braking hard, though this may not be possible all the time. On that note, it’s worth taking a look at our guide on how to minimize blind spots in your car, as many drivers fail to set up their mirrors properly.

Anyway, smooth braking is a skill that not a lot of drivers have, because it does take a fair bit of time to develop. Highway traffic can often meet standstill cars, especially near major interchanges in and out of the city. An example would be the Mass Pike interchange in Massachusetts (the U.S. state with the worst drivers, statistically). It is at places like these where you’ll typically hear tires squealing, and more than one person moving into the emergency lane to avoid a crash. 

Advertisement

If your passengers are constantly doing the invisible passenger-side brake stomp, it’s probably worth taking a closer look at your braking habits. The easiest fix to this problem is to drive slower, as you would have more control over the vehicle.

Advertisement

They hesitate at predictable situations

We’ve all been at an intersection, free-right, stuck behind a new driver who cannot judge the speed of an oncoming vehicle before merging onto the road. This either causes frustration among the people waiting in line to turn, or downright danger as the oncoming vehicles need to brake or swerve to avoid an incident. These situations often freak people out, especially beginner drivers. Examples that spring to mind are four-way stops, California stops, free right turns, U-turn areas, roundabouts, and, of course, the notorious zipper merges. 

Poor decision-making in these situations is a telltale sign of a bad driver, such as not matching speed during on-ramp merging, waiting too long to enter a roundabout, taking a U-turn without gauging oncoming traffic, and more. There is strong evidence to suggest that this hesitation disproportionately affects newer drivers. 

A study conducted by four researchers from Jilin University and Yanshan University in January 2021 found a moderate relation between the driver’s total experience and driving violations. This suggests that the more one drives, the easier it becomes to gauge and judge road situations and react to them appropriately. It also means that if you find yourself hesitating with right-of-way and safety decisions, you shouldn’t be too hard on yourself, and that things will get better the more you drive.

Advertisement



Source link

Continue Reading

Tech

Folding iPhone unveiling & shipment date rumors are all over the place

Published

on

It’s been a wild week for folding iPhone rumors, with battles about what it will be called, release timing, when orders will ship, and more. On Friday, one prolific leaker jumped in and claims the device will ship in October at the latest.

Silver foldable smartphone concept showing dual rear cameras with flash on one side and a vivid wavy abstract pattern on the unfolded front display against a dark gradient background
Apple’s foldable iPhone is now closer to release than ever

This comes following numerous back-and-forth reports that foldable iPhone buyers would have to wait until as late as December for their new devices. Writing in a post on the Weibo social network, leaker Instant Digital says that the most likely outcome is that Apple will be able to debut the foldable iPhone in September.
However, if Apple does choose to split the releases, the leaker doesn’t anticipate a long wait. They say the iPhone Fold will ship a month after the iPhone 18 Pro.
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

Chimpanzees In Uganda Locked In Vicious ‘Civil War’, Say Researchers

Published

on

Researchers say the world’s largest known wild chimpanzee community in Uganda fractured into rival factions and has been locked in a vicious “civil war” for the last eight years. “It is not clear exactly why the once close-knit community of Ngogo chimpanzees at Uganda’s Kibale National Park are at loggerheads, but since 2018 the scientists have recorded 24 killings, including 17 infants,” reports the BBC. From the report: [O]ver several decades, [lead author Aaron Sandel] said the nearly 200 Ngogo chimpanzees had lived in harmony. There were divided into two sets – known to researchers as Western and Central – but they had existed overall as a cohesive group. Sandel said he first noticed them polarizing in June 2015, when the Western chimpanzees ran away and were chased by the Central group. “Chimpanzees are sort of melodramatic,” he said, explaining that following arguments there would ordinarily be “screaming and chasing” and then later, they would grooming and co-operating.

But following the 2015 dispute, the researchers saw that there was a six-week avoidance period between the two sets, with interactions becoming more infrequent. When they did occur, Sandel said they were “a little more intense, a little more aggressive.” Following the emergence of the two distinct groups in 2018, members of the Western group started attacking the Central chimpanzees. In 24 targeted attacks since the split, at least seven adult males and 17 infants from the Central chimps have been killed, the study found, although the researchers believe the actual number of deaths are higher. The researchers believe many factors such as the group size and subsequent competition of resources, and “male-male competition” for reproducing may be to blame.

But they say there were three likely catalysts:
– The first, were the deaths of five adult males and one adult female — for reasons unknown — in 2014, which could have disrupted social networks and weakened social ties across the subgroups
– The following year, there was a change in the alpha male, which the study says coincided with the first period of separation between the Western and Central groups. “Changes in the dominance hierarchy can increase aggression and avoidance in chimpanzees,” it explained
– The third factor was the deaths of 25 chimpanzees, including four adult males and 10 adult females, as a result of a respiratory epidemic, in 2017, a year before the final separation. One of the adult males who died was “among the last individuals to connect the groups,” the research paper said. The study has been published in the journal Science.

Source link

Advertisement
Continue Reading

Tech

Investing in part of the workforce creates an AI skills gap, finds report

Published

on

Forrester’s research has shown that a failure to commit to long-term, inclusive AI education can greatly impact an organisation.

Research and advisory firm Forrester has published the results of a report in which it explored the ramifications for employers and their organisations, when there is a failure to promote AI education across the entirety of a company.  

The AIQ 2.0: Employees (Still) Aren’t Ready To Succeed With Workforce AI report found that while the majority of AI decision-makers and their organisations are using predictive and generative AI (GenAI), only half say they offer training in this area to non-technical employees. As a result, many companies are failing to invest in AI understanding, skills and ethics among the wider workforce. 

The report said: “Those that have tried to upskill haven’t been particularly successful, yet people remain central to the success of your AI strategy.”

Advertisement

Employer readiness

According to a previous report issued by Forrester, the State of AI 2025 survey, almost 70pc of AI decision-makers said they are using GenAI in deployed production applications, while 20pc use it to run experiments and among automation decision-makers. 81pc of automation decision-makers also said AI copilots that assist employees in their work are important applications. 

Forrester suggests that this is indicative of a growing problem in which there is a growing disconnect between the AI needs of a company and the actions being taken. 

“AI is becoming more important to the work lives of employees and employees must adapt,” said the organisation. “But adaptation isn’t coming quickly or easily. Many employers remain mired in an environment of low skills and employee fears that isn’t conducive to successfully adopting workforce AI or driving productivity from its use.”

Research found that the proportion of AI decision-makers across six countries who said their organisations offer internal training on AI to non-technical employees only grew from 47pc in 2024 to 51pc in 2025, an improvement of just 4pc. Also only growing by 4pc was the number of AI decision-makers who said that their organisations offer training on prompt engineering – which Forrester finds to be a key skill for using most workforce AI tools in the modern era – which grew from 19pc to 23pc. 

Advertisement

Fear factor

Forrester also noted that fears around ‘stunt adoption’ and AI-related job loss are hindering implementation, despite Forrester’s opinion that “very few jobs were lost to AI in 2025”. Data indicated that future job loss, while possible, will not constitute a job apocalypse, yet fears persist, due in part to a failure by organisations to correctly or consistently discuss and explain the process of introducing AI.  

The report said: “Forrester’s 2025 data shows that 43pc of employees fear that, in general, many people will lose their jobs to automation in the next five years, while 25pc fear it will impact their own job during that span. This creates an ambient environment of fear and mistrust.”

The organisation added that one business leader said some of their employees fear job less, which turns them away from AI “altogether”.

“Organisations that fail to frame workforce AI as an opportunity builder for employees and that don’t articulate the benefits from an employee perspective see fears of job loss magnified,” said Forrester.

Advertisement

So, how might fears and anxieties be reduced so employers and employees can better embrace the changing landscape?

According to Forrester’s research, comprehensive learning and engagement programmes are key, with the report noting that leading organisations move beyond formal training and invest in continuous, hands-on learning and peer-based approaches that drive real adoption and impact.

Commenting on the findings of the report, JP Gownder, a vice-president and principal analyst at Forrester said: “Employers aren’t giving their people the skills, understanding, or ethical grounding they need to succeed with AI and it’s becoming a clear bottleneck to productivity and ROI. Our research shows most organisations are rolling out AI tools without investing in employees’ ability to use them effectively.

“To close the gap, businesses must move beyond surface-level training and build continuous, hands-on learning that demystifies AI, addresses employee concerns and develops real capability. This isn’t about replacing workers, it’s about enabling them to work smarter with AI.

Advertisement

“The organisations that treat AI literacy as a strategic priority, not a box-ticking exercise, will be the ones that unlock meaningful productivity gains and long-term competitive advantage.”

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025