Connect with us
DAPA Banner

Tech

Xiangyi Cheng Brings AR to Classrooms and Hospitals

Published

on

When Xiangyi Cheng published her first journal paper as a principal investigator in IEEE Access in 2024, it marked more than a professional milestone. For Cheng, an IEEE member and an assistant professor of mechanical engineering at Loyola Marymount University, in Los Angeles, it was the latest waypoint in a career shaped by curiosity, persistence, and a belief that technology should serve people—not the other way around.

The paper’s title was “Mobile Devices or Head-Mounted Displays: A Comparative Review and Analysis of Augmented Reality in Healthcare.”

XIANGYI CHENG

Employer

Advertisement

Loyola Marymount University, in Los Angeles

Title

Assistant professor of mechanical engineering

Member grade

Advertisement

Member

Alma maters

China University of Mining and Technology; Texas A&M University

Cheng’s work spans robotics, intelligent systems, human-machine interaction and artificial intelligence. It has applications in patient-specific surgical planning, an approach whereby treatment is customized to the anatomy and clinical needs of each individual.

Advertisement

Her research also covers wearables for rehabilitation and augmented-reality-enhanced engineering education.

The throughline of her career is sound judgment based on critical thinking. She urges her students to avoid the temptation to accept the answers they’re given by AI without cross-checking them against their own foundational understanding of the subject matter.

“AI can give you ideas,” Cheng says, “but it should never lead your thinking.”

That principle—honed through uncertainty, disciplinary shifts, and hard-earned confidence—has made Cheng an emerging voice in applied intelligent systems and a thoughtful educator preparing students for an AI-saturated world.

Advertisement

From Xi’an to Beijing: A mind drawn to mathematics

Cheng, born in Xi’an, China, grew up in a household shaped by her parents’ disparate careers. Her father was a mining engineer, and her mother taught Chinese and literature at a high school.

“That contrast between logical and literary thinking helped me understand myself early,” Cheng says. “I liked math, and STEM felt natural to me.”

Several teachers reinforced her inclination, she says, particularly a math teacher whose calm, fair approach emphasized reasoning over punishments such as detention for misbehavior or failure to complete assignments.

“It wasn’t about being right,” Cheng says. “It was about thinking clearly.”

Advertisement

She moved to Beijing in 2011 to attend the China University of Mining and Technology , where she studied mechanical engineering. After graduating with a bachelor’s degree in 2015, she was unsure where the field would take her.

An IEEE paper changed her trajectory

Later in 2015, she traveled to the United States to study at Case Western Reserve University, in Cleveland.

She initially viewed the move as exploratory rather than a long-term commitment.

“I wasn’t thinking about a Ph.D.,” she says. “I wasn’t even sure research was for me.”

Advertisement

That uncertainty shifted in 2017, when Cheng submitted her “IntuBot: Design and Prototyping of a Robotic Intubation Device” paper to the IEEE International Conference on Robotics and Automation (ICRA)—which was accepted.

“AI can give you more possibilities, but thinking is still our responsibility.”

Intubation is a procedure in which an endotracheal tube is inserted into a patient’s airway—usually through the mouth—to help them breathe. Because placing the tube correctly is not simple and usually must be done quickly, it requires training. That’s why research into robotic or assisted intubation systems focuses on improving speed, accuracy, and safety.

She presented her findings at ICRA in 2018, giving her early exposure to a global research community.

Advertisement

“That acceptance gave me confidence,” she recalls. “It showed me I could contribute to the field.”

Her advisor at Case Western encouraged her to switch from the mechanical engineering master’s program to the Ph.D. track. When the advisor moved to Texas A&M University, in College Station, in 2019, Cheng decided to transfer. She completed her Ph.D. in mechanical engineering at Texas A&M in 2022.

Although she didn’t earn a degree from Case Western, she credits her experience there with clarifying her professional direction.

Shortly after graduating with her Ph.D., Cheng was hired as an assistant professor of mechanical engineering at Ohio Northern University, in Ada. She left in 2024 to become an assistant professor at Loyola Marymount.

Advertisement

Engineering for the body—and the classroom

Cheng’s research focuses on human-centered engineering, particularly in health care. One of her major projects addresses syndactyly, a congenital condition in which a newborn’s fingers are fused at birth. Surgeons rely on their experience to estimate the size and shape of skin grafts to be taken from another part of the body for the corrective surgery.

She is developing technology to scan the patient’s hand, extract anatomical landmarks, and use finite element analysis—a computer-based method for predicting how a physical object will behave under real-world conditions—to determine the optimal graft size and shape.

Smiling portrait of Xiangyi Cheng. Xiangyi Cheng designs human-centered intelligent systems with applications in health care and education.Xiangyi Cheng

“Everyone’s hand is different,” Cheng says. “So the surgery should be personalized.”

Another project centers on developing smart gloves to assist with hand rehabilitation, pairing the unaffected hand with the injured one so the person’s natural motion can help guide therapy.

Advertisement

She also is exploring augmented reality in engineering education, using immersive visualization and AI tools to help students grasp three-dimensional concepts that are difficult to convey through traditional learning tools. Such visualization lets students see and interact with a digital world as if they’re inside it instead of viewing it on a flat screen.

Teaching balance in an AI-driven world

Despite working at the forefront of AI-enabled systems, Cheng cautions her students to be judicious in their use of the technology so that they don’t rely on it too heavily.

“AI is not always right and perfect,” she says. “You still need to be able to judge whether the answers it provides are correct.”

As AI continues to reshape engineering, Cheng remains grounded in a simple principle, she says: “We should use these tools. But we should never let them replace our judgment. AI can give you more possibilities, but thinking is still our responsibility.”

Advertisement

In her lab and classroom, Cheng prioritizes independent thinking, critical evaluation, and persistence. Many of her research students are undergraduates, and she encourages them to take ownership of their work—planning ahead, testing ideas, and learning from failure.

“The students who succeed don’t give up easily,” she says.

What she finds most rewarding, she says, is watching students mature. Reserved first-year students often become confident seniors who can present complex work and manage demanding projects.

“Getting to witness that transformation is why I teach,” she says.

Advertisement

For students considering engineering, Cheng offers straightforward advice: “Focus on mathematics. Engineering looks hands-on, but math is the foundation behind everything.”

With practice and persistence, she says, students can succeed and find meaning in the field.

Why IEEE continues to matter

Cheng joined IEEE in 2017, the year she submitted her first paper to ICRA. The organization has remained central to her professional development, she says.

She has served as a reviewer for IEEE journals and conferences including Robotics and Automation Letters, Transactions on Medical Robotics and Bionics, Transactions on Robotics, the International Conference on Intelligent Robots and Systems, and ICRA.

Advertisement

IEEE’s interdisciplinary scope aligns naturally with her work, she says, adding that the organization is “one of the few places that truly welcomes research across boundaries.”

More personally, IEEE helped her see a future she had not initially imagined.

“That first conference was a turning point,” she says. “It helped me realize I belonged.”

From Your Site Articles

Advertisement

Related Articles Around the Web

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

Flight Path Data Shows How Mosquitoes Target Humans

Published

on

Infectious diseases borne by mosquitoes—such as malaria, dengue fever, and Zika fever—claim more than 770,000 lives worldwide each year. Understanding how mosquitoes find humans has long been a challenge in controlling the spread of these diseases. However, little has been known about how mosquitoes integrate multiple cues, including visual information and carbon dioxide, to approach their targets.

In this context, a research team led by the Georgia Institute of Technology and Massachusetts Institute of Technology has succeeded in automatically deriving a dynamic model governing mosquito flight by applying Bayesian inference statistical methods to a vast amount of data recording mosquito movements.

Bayesian inference is a statistical technique that probabilistically determines the most plausible model parameters from observed data. Using this method, the researchers were able to construct a mathematical model that could reproduce experimental results with high accuracy while compressing mosquito behavior to fewer than 30 parameters.

“The big question was, how do mosquitoes find a human target?” explains Cheng-Yi Fei, a postdoctoral researcher at MIT. “There were previous experimental studies on what kind of cues might be important. But nothing has been especially quantitative.”

Advertisement

Mosquitoes Have Two Modes of Flight

The research team released two female Aedes aegypti mosquitoes into a sealed experimental space and recorded their flight paths in 0.01-second increments using two infrared cameras. The data obtained from a total of 20 experiments exceeds 53 million points, with more than 400,000 flight paths recorded. This represents the largest dataset ever collected for a study quantitatively measuring mosquito flight.

The experiment began by photographing mosquitoes flying around human subjects, who were dressed in dark-colored clothing. This observation revealed that Aedes aegypti mosquitoes were concentrating their approach on human heads. This was a fundamental discovery that served as the starting point for the entire study.

Next, the researchers experimented with subjects dressed in black on one side and white on the other. They found that although carbon dioxide and body odor were emitted equally from both sides of the body, the mosquitoes’ flight trajectories were concentrated only on the black side. Although strange at first glance, this result vividly demonstrated that visual stimuli play an important role in the search for targets in a windless environment.

Furthermore, a detailed analysis of mosquitoes flying in a stimulant-free environment revealed that their flight patterns could be broadly classified into two types. One was the active state, in which they actively explored the space while maintaining a speed of approximately 0.7 meter per second. The other was the idle state, in which they flew almost without using thrust. The idle state is thought to be a preparation stage for landing and was observed more frequently near the ceiling of the experimental space.

Advertisement

Analysis of mosquito responses to visual stimuli revealed that mosquitoes are attracted to dark objects and slow down when they get within about 40 centimeters. However, without additional cues such as body odor, humidity, or heat, mosquitoes often flew away even after approaching their target. This suggests that visual stimuli alone are insufficient to induce landing and blood-sucking.

The response to carbon dioxide sources was entirely different. Mosquitoes that entered within a radius of about 40 centimeters of the carbon dioxide source suddenly slowed to 0.2 m/s and began flying erratically, swaying without a clear direction. Numerical simulations also showed that mosquitoes can detect carbon dioxide concentrations as low as 0.1 percent and that their detection range extends to approximately 50 centimeters from the source.

Furthermore, the mosquito response changed even more dramatically when visual stimuli and carbon dioxide were presented simultaneously. The mosquitoes began to circle around the target, and significantly more mosquitoes concentrated near the target than when either stimulus was used on its own.

Source link

Advertisement
Continue Reading

Tech

There’s a sneaky way to watch UFC 327 really cheap…

Published

on

UFC 327 promises high-stakes drama as Jiří Procházka takes on Carlos Ulberg for the vacant UFC light heavyweight championship at Miami’s Kaseya Center. With Alex Pereira moving up to heavyweight, the division is wide open, and Procházka has a golden opportunity to reclaim the belt he never truly lost in the Octagon.

And with analysts like Dustin Poirier, Din Thomas, and Michael Chiesa predicting a comfortable win for the Czech former champion – who’s coming off the back of two knockout wins – Ulberg will have a point to prove, especially since he’s on a red-hot nine-fight winning streak.

Source link

Continue Reading

Tech

Anti-data center vote in Wisconsin puts future AI projects on notice

Published

on


Residents of Port Washington, Wisconsin, have done something no other community in the country has done with data centers: They’ve voted to put the brakes on future development in the region by approving a referendum. From now on, city officials require voter approval before handing out tax incentives worth more…
Read Entire Article
Source link

Continue Reading

Tech

How Russia’s SU-34 Flies So Far Without Refueling

Published

on





Back during World War II, Adolph Hitler dreamed of bombing the United States, but technology at the time literally couldn’t deliver. Nowadays, intercontinental flights are easy, thanks to aerial refueling. That’s how most aircraft in the United States Air Force operate, but the Russian Federation’s Su-34 is a completely different type of jet. The Su-34 Fullback can fly from Moscow to Washington, D.C. without refueling, which is impressive, seeing as that’s a distance of 4,867 miles.

There are several reasons why the Su-34, which Russia has used in the Russo-Ukrainian War, can fly so far. For one, it’s a massive aircraft, measuring 76.5 feet in length with a 48-foot wingspan. Under normal operations, it doesn’t need to go that far. In cases where it might be needed, it can add three PTB-3000 external fuel tanks to its hard points, which normally accommodate weapons, significantly increasing its range. Each of those tanks holds 793 gallons of fuel, which is added to the bomber’s internal fuel capacity.

Advertisement

That fuel capacity gives the Su-34 a ferry range of 2,485 miles. Once you add the external fuel and push the Su-34 to its limits, its range can exceed 4,971 miles. That puts it in range to strike Washington, D.C., though it wouldn’t be able to make a return trip home without refueling. Granted, it’s unlikely that Russia would ever use its Su-34 fleet in such a manner, but it could, making the Su-34 one of the most powerful non-American fighter jets in service.

Advertisement

The Su-34 is the world’s longest-range fighter (currently)

With its added drop tanks, the Su-34 is the world’s longest-range fighter, and it’s not even close. The United States’ longest-range fighter is the F-35C Lightning II, which has an internal fuel capacity of 3,002 gallons. That gives it a range of 1,381 miles. The F-35 doesn’t have drop tanks, but they are being designed for the Block 4 upgrade that’s expected to be complete no sooner than 2031. Of course, aerial refueling can indefinitely extend the F-35’s range.

Still, it pales in comparison to the Su-34. Additionally, the Su-34 will likely receive an upgrade in the form of the AL-51F engine, which was developed for the Su-57 5th-generation fighter. The Su-34 is a 4.5-generation fighter (sometimes referred to as a 4++ generation), thanks to various upgrades that keep it flying. With the introduction of a more fuel-efficient engine, it’s likely that the aircraft’s range will increase significantly, making it a truly intercontinental strategic aircraft.

The Su-34 first entered the Russian inventory in 1990, and it has a proven track record. While it’s unclear how many Russia has, estimates put the Russian Air Force’s inventory at around 123 Su-34s. Production continues, and several have been lost in Ukraine, so the total number in the inventory fluctuates over time. Regardless, Russia probably sees a future where the Su-34 remains an important part of its strategic focus, so it’s likely that the country will continue producing its intercontinental fighter for the foreseeable future.

Advertisement



Source link

Advertisement
Continue Reading

Tech

Your Push Notifications Aren’t Safe From the FBI

Published

on

Amid horrific threats from United States president Donald Trump as the US and Iran negotiated a ceasefire, the US government warned this week that Iran-linked hackers were carrying out attacks against US energy and water infrastructure targets. With nearly one in five people in Lebanon displaced by Israeli attacks, the government is attempting to manage the crisis without modern digital infrastructure and an emergency system that is barely hanging on. Plus, a WIRED analysis looked at Syrian government account hijacks in March and the inadequacies they expose in Syria’s baseline cybersecurity defenses.

Amid rising fears of political violence, a WIRED investigation found that US political candidates are spending more on security, including purchasing equipment like home alarms and bulletproof vests. And recent research looking at Telegram groups found that men are sharing thousands of nonconsensual images of women and girls, purchasing spyware to use against their wives and friends, and engaging in doxing and sexual abuse. Meanwhile, as governments scramble to address growing industrial scamming originating from Southeast Asia, China has emerged as the biggest enforcer, but also a selective one, resulting in crime syndicates shifting their focus abroad to avoid Chinese targets.

Anthropic formally announced its new Claude Mythos Preview model this week and said that for now it will only make the model available to a select group of a few dozen leading tech and financial organizations, including Apple, Microsoft, Google, and the Linux Foundation. The consortium, dubbed Project Glasswing, will explore Mythos Preview’s advanced hacking and other cybersecurity capabilities and assess the best ways to improve software and hardware defenses before capabilities like the ones in Mythos Preview proliferate more broadly across other models and inevitably end up in the hands of attackers. The announcements sparked controversy about whether Mythos Preview and similar capabilities will truly be as consequential for cybersecurity as Anthropic says. Experts told WIRED that while it may not be a dramatic catastrophe, it is important for defenders to come together and use their early access to make changes in how software is developed and how organizations around the world invest in patching.

Finally, a WIRED investigation found that nonprofit groups linked to Customs and Border Protection facilities were selling challenge coins that celebrated the Trump administration’s immigration raids, including one coin that depicted Charlotte’s Web characters in riot gear.

Advertisement

And there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

The FBI recently got its hands on copies of encrypted Signal messages being sent to a defendant’s iPhone because the contents of those messages were included in push notifications, 404 Media reports. Even though Signal had been removed from the phone prior to it being seized by the FBI, the notifications still lived on in the phone’s internal memory.

The issue affects all apps that send push notifications, not just Signal, but users of that app can adjust their settings to not show the content of a message or the name of the sender in push notifications. To adjust your settings for notifications going forward, open Signal and go to Settings, then Notifications, and change the option to Name Only or No Name or Content.

Despite the tenuous and contested ceasefire enacted in the US-Israel war with Iran, tens of millions of ordinary Iranians are still without regular and reliable internet connectivity. The regime-imposed internet blackout, which started during the first hours of the war on February 28, is now reaching the 1,000 hour point, according to internet monitoring group NetBlocks. In recent weeks, the internet shutdown has become the longest in Iranian history and one of the longest worldwide—depriving Iranians of accurate news about the war, stopping them contacting family and loved ones, and causing further economic harm to the nation. US-based Iranian digital rights project Filter Watch has detailed how the Iranian regime, while being bombarded during the conflict, has labeled anti-censorship tools as “malicious” and claimed to have arrested individuals using Starlink internet connections to get around the block.

Advertisement

The FBI’s annual internet crime report typically paints a bleak picture: year-on-year, the number of cybercrime reports increases and the amount of money lost by Americans shoots up. Unfortunately, 2025 was no different. Last year, according to the FBI’s annual report, losses reported to the Internet Crime Complaint Center topped $20 billion—an increase of 26 percent compared to 2024. More than half of these reported losses ($11.3 billion) were linked to cryptocurrency scams, often through fraudulent investment schemes, according to the FBI. Business email compromise, tech and customer support scams, personal data breaches, and confidence or romance scams, make up the other most common crime reports. Crimes mentioning AI led to $893 million in losses.

Google this week expanded Gmail’s end-to-end encryption to its Android and iOS apps, allowing enterprise users to compose and read E2EE messages natively on mobile for the first time without separate apps or mail portals required. Encrypted emails appear as standard threads in the Gmail app for recipients using Gmail, while those on other providers can access them via a secure browser view. This rollout builds on the client-side encryption model introduced to Google Workspace web users in April 2025, where messages are encrypted with customer-controlled keys, preventing Google from accessing their contents. The approach is particularly appealing for organizations with strict compliance requirements, including HIPAA, export controls, and data sovereignty regulations.

Access, however, remains limited: The feature is available only to Google Workspace Enterprise Plus customers with the Assured Controls or Assured Controls Plus add-on, and is not supported for personal Gmail accounts. Administrators must also explicitly enable the Android and iOS clients in the admin interface before eligible users can access the feature, which is off by default. End users then toggle encryption per-message by tapping the lock icon and selecting “Additional encryption,” mirroring the web workflow. The rollout is available immediately to both Rapid Release and Scheduled Release domains.

Source link

Advertisement
Continue Reading

Tech

A Suction-Driven Seven-Segment Display | Hackaday

Published

on

There’s a long history of devices originally used for communication being made into computers, with relay switching circuits, vacuum tubes, and transistors being some well-known examples. In a smaller way, pneumatic tubes likewise deserve a place on the list; [soiboi soft], for example, has used pneumatic systems to build actuators, logic systems, and displays, including this latching seven-segment display.

Each segment in the display is made of a cavity behind a silicone sheet; when a vacuum is applied, the front sheet is pulled into the cavity. A vacuum-controlled switch (much like a transistor, as we’ve covered before) connects to the cavity, so that each segment can be latched open or closed. Each segment has two control lines: one to pressurize or depressurize the cavity, and one to control the switch. The overall display has four seven-segment digits, with seven common data lines and four control lines, one for each digit.

The display is built in five layers: the front display membrane, a frame to clamp this in place, the chamber bodies, the membrane which forms the switches, and the control channels. The membranes were cast in silicone using 3D-printed molds, and the other parts were 3D-printed on a glass build plate to get a sufficiently smooth, leak-free surface. As it was, the display used a truly intimidating number of fasteners to ensure airtight connections between the different layers. [soiboi soft] used the display for a clock, so it sits at the front of a 3D-printed enclosure containing an Arduino, a small vacuum pump, and solenoid valves.

This capacity for latching and switching, combined with pneumatic actuators, raises the interesting possibility of purely air-powered robots. It’s even possible to 3D-print pneumatic channels by using a custom nozzle.

Advertisement

Thanks to [Norbert Mezei] for the tip!

Source link

Advertisement
Continue Reading

Tech

Oxygen Made From Moon Dust For First Time

Published

on

“Breathable oxygen has been created from Moon dust,” reports the Telegraph, “in a world first that paves the way for a lunar base.”

Jeff Bezos’s Blue Origin “”announced this week that it had developed a reactor that could successfully release oxygen from lunar soil by using an electric current.”

Almost half of Moon dust — the thin layer of rock that blankets the lunar surface — is oxygen, but it is bound to metals such as iron and titanium… Previous work to isolate oxygen has been lab-based, and the unwieldy equipment needed has been too difficult to send to the Moon. In contrast, Blue Origin said its small-scale reactor, named Air Pioneer, could be made flight-ready to “provide the first breath of life for a sustainable Moon base”… As well as breathable air, Blue Origin said the reactor produces other critical elements for planetary infrastructure, such as iron, aluminium and silicon for construction and electronics, as well as glass for windows and solar panel covers. The company has previously said it wants to turn the Moon, and eventually Mars, into “self-sustaining worlds where robots and humans can go beyond visiting and truly explore, grow, live, and thrive”….

Blue Origin said it would need to generate around one megawatt of power to drive the reactors — about the energy it would require to power around 400 to 1,000 homes simultaneously. It envisages that each lunar settlement would have an array of nearby solar panels, generating the power needed for one reactor.
Besides breathable air for astronauts, the oxygen could also be used in propellant for refuelling landers and fuel cells, Blue Origin points out — and “produced right where they’re needed, and at much lower cost than being brought from Earth.”

Advertisement

Thanks to Slashdot reader fjo3 for sharing the article.

Source link

Continue Reading

Tech

X readies dedicated messaging app as XChat goes live on App Store

Published

on

Early in March, X (formerly Twitter) started testing a dedicated app called XChat among thousands of beta testers. It appears that the test phase is over and the app is ready for its public rollout. The Elon Musk-owned company has announced that XChat is now listed on the App Store, with a wide launch lined up in the coming days. 

What’s the big play? 

The chat app’s listing page on the App Store mentions a release date of April 17, and it will be available simultaneously for iPhone and iPad. As far as features go, the XChat app is advertising end-to-end encryption as one of its highlight features. For the unaware, E2E is currently deemed the safest security protocol to ensure that your messages are private, and no middleman or third-party (including the company that built the platform) can read your conversations. 

WhatsApp and Signal, for example, implement it by default. On Instagram and Telegram, there’s a dedicated private chats feature that relies on end-to-end encryption to protect your messages.

Circling back to XChat, it will also enable screenshot blocking, which means no participant in the conversation can take a screengrab of the chats. The app will let users edit or delete sent messages, and will also let them send disappearing messages. Calling and group chats will also be a part of the package.

Ever since Musk took over X (which eventually merged with xAI, followed by a broad merger with SpaceX), plans for creating a super-app took center stage. Back in December, Musk quipped that he wants to transform X into something like WeChat, the Chinese app that allows everything from messaging and payments to reservations, among a whole bunch of other quirky services. In June last year, it was reported that the X super app would also offer investment and trading services once the super app plans materialize. 

Advertisement

Why is this an interesting shift? 

There’s more to the plans than a straightforward messaging pivot to XChat. Or at least that’s what Musk’s past claims, and the recent turn of events, suggest. On the surface, it would seem that Musk simply wants to serve a messaging app that fills the functional gaps that you can’t quite access on the social media app.

Just a day ago, Musk shared on X that WhatsApp can’t be trusted, referring to a lawsuit claiming that Meta allowed third parties access to the encrypted messages on WhatsApp. Even though WhatsApp has denied these claims, Musk’s statement added more fuel to the privacy fire. Separately, Telegram founder, Pavel Durov, claimed that WhatsApp’s encryption claims amount to the “biggest consumer fraud in history.” But that was not all.

Signal — one of the most widely trusted messaging apps out there, owing to its robust security protocols — also found itself in the line of fire. As per reports, the FBI was able to obtain the contents of Signal messages after accessing the notifications history on a suspect’s iPhone, even though the app allows a lock facility. Pavel also took a potshot at Signal, highlighting how Telegram never shows a message’s contents in the notification banner. 

It seems XChat is making a splashy public debut at a time when trust in the popular privacy-first platforms such as WhatsApp and Signal is coming under scrutiny. Moreover, it would be interesting to see if X offers all the features for free, or whether some of them will be locked behind a premium subscription, just like the sibling social media service. 

Advertisement

Source link

Continue Reading

Tech

Anthropic’s Glasswing project employs Mythos to prevent AI cyberattacks

Published

on

AI models now surpass most humans at finding and exploiting software vulnerabilities, said Anthropic.

A new Anthropic project will see global companies use Claude as part of their defence security systems.

‘Project Glasswing’ gives partnering companies access to Anthropic’s unreleased Claude Mythos, which, according to the AI giant, has already found thousands of high-severity vulnerabilities, including some in every major operating system and web browser. Mythos was launched in preview yesterday (7 April).

Anthropic’s Mythos preview is significantly more capable at generating exploits. In its research, the company noted that Mythos developed working exploits 181 times out of the several hundred attempts, while Opus 4.6 had a near 0pc success rate.

Advertisement

“We did not explicitly train Mythos preview to have these capabilities. Rather, they emerged as a downstream consequence of general improvements in code, reasoning and autonomy,” the company noted. Publications, including the New York Times and the Register have warned against the negative consequences of models such as Mythos falling into the hands of bad actors.

Fortunately, Anthropic has chosen not to release the model. Instead, the company is bringing together leading businesses, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JP Morgan Chase, the Linux Foundation, Microsoft, Nvidia and Palo Alto Networks, allowing them to access Mythos preview to boost their cyber defences.

The company has extended Mythos access to a group of more than 40 organisations that build or maintain critical software infrastructure.

“AI models have reached a level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities,” said Anthropic.

Advertisement

Anthropic has promised to share learnings from Project Glasswing to benefit the wider industry. The company has also made a commitment of up to $100m in usage credits for Mythos preview across the project, as well as $4m in direct donations to open-source security organisations.

The Claude-maker has also hired Eric Boyd, the long-term president of AI platforms at Microsoft, to lead as the company’s head of infrastructure.

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Advertisement

Source link

Continue Reading

Tech

Best Electric Cargo Bikes (2026): Urban Arrow, Lectric, Tern, and More

Published

on

Specialized’s proprietary, 700-watt motor feels natural—sometimes to an annoying extent, as the bike is designed for you to pedal and you won’t get faster than 10 mph just by using the throttle. Also, there’s no option for a dual battery. Still, the battery well exceeded Specialized’s estimated 60-mile range. Granted, I am a small person, but I was usually hauling at least one other person on the bike with me at all times, so I still found this remarkable.

It’s easily adjustable—both my 5’10” husband and my 5’2″ self were able to switch off riding, which is important if this is your family’s all-purpose hauler. The display is intuitive, and the buttons are well-spaced apart so you don’t get confused or end up button-mashing. Also, Specialized’s accessories go a long way toward making this bike so much more useful. Yes, you could jerry-rig some Home Depot buckets to the front of your bike and drill holes in the bottoms for them to drain, but the Coolcave panniers ($90) are so much more attractive, easy to use, and helpful for carting everything from kid dioramas to a dozen tiny soccer balls.

Best Value

The vast majority of people I know who buy a cargo ebike with their own money choose the Lectric XPedition2. There is just no better value for a dual-battery long-tail cargo ebike. Out of the box, Lectric has also gone above and beyond to make its bikes and accessories easy to assemble and use. You even pop the pedals in, instead of using regular screw-on pedals.

Advertisement

This bike’s specs are also wild for the price. It has a 1,310-watt rear hub motor, twice as powerful as the already-powerful Globe Haul. (It has a throttle and is a Class 2 ebike out of the box, though you can use the display to unlock its Class 3 capabilities and assist up to 28 mph.) It has hydraulic disc brakes, front suspension, an incredibly large and bright LCD color display, integrated lights, and fenders.

Source link

Continue Reading

Trending

Copyright © 2025