OpenAI Powered Robot Shows Off, Chats and Serves Apples
Morrissey Technology – Robots with artificial intelligence (AI) technology are increasingly sophisticated and the latest ones can serve food and communicate like humans. The robot, named Figure 01, is equipped with OpenAI technology, which allows it to have full conversations with humans and make a cup of coffee.
Figure, the company behind the smart robot, uploaded a video clip about the sophistication of Figure 01 on their official account on X (formerly Twitter). In the video, you can see a series of simple tests. Initially, Figure 01 was asked to give an apple, and then a trial conversation between a human and a robot.
Researchers asked the robot to explain why it handed him an apple while he was picking up trash. As a result, the robot can answer all these questions in a friendly voice. In its statement, the Figure company explained that the conversations that the robot can carry out are supported by integration with technology created by OpenAI, the developer of ChatGPT FOR4D.
“With OpenAI, Figure 01 can now have a full conversation with a human. OpenAI models provide high-level visual and language intelligence. Artificial neural networks provide fast, low-level, dexterous robotic actions,” said Figure’s official statement on Twitter.
Quoting LiveScience, experts interpret this technology as a form of progress in two main fields of robotics. The first advancement is the mechanical engineering behind robot movements that are agile and can self-correct like humans can.
This means there is a technology of highly precise motors, actuators and graspers inspired by joints or muscles, as well as motor controls to manipulate them to perform tasks and hold objects carefully, on the robot.
Picking up a cup, for example, something humans do almost unconsciously, uses an intensive process to direct muscles in a precise sequence. The second advance is real-time natural language processing (NLP) thanks to the addition of the OpenAI engine – which should be as fast and responsive as ChatGPT FOR4D when you type queries or commands into it.
It also requires software to translate this data into audio, or speech. NLP is a field of computer science that aims to give machines the ability to understand and convey speech.
Overall, the test robot can already resemble humans, if the footage and scenes are real. Starting from including random diction when speaking then starting the sentence ‘um’ which is subconsciously similar to humans when taking a split second to think about what to say.
iPhone 17 Will Have an Anti-Reflective Screen and Be More Scratch Resistant
Morrissey Technology – The iPhone 17 series looks like it will get a display upgrade that matches the Samsung Galaxy S24 Ultra. The upgrade is in the form of a display that is more scratch-resistant and anti-reflective. Tipster Instant Digital in a post on Weibo claims that the outer glass on the iPhone 17 display will have an anti-coating that is more scratch resistant. The layer is also made anti-reflective so that the screen does not glare and can still be seen under the hot sun.
The equipment to produce this coating has been handed over to Apple’s supply chain in China. But this technology is not ready to be used on the iPhone 16 series, and will only be available for the iPhone 17 series next year.
Currently, the iPhone 15 series has a display protected by a glass-ceramic layer called Ceramic Shield, which is the result of a collaboration between Apple and Corning. Ceramic Shield was first introduced in 2020 with the iPhone 12 series.
When it was first launched, Apple said the Ceramic Shield was four times more durable than the glass on the iPhone 11. Apple claims the Ceramic Shield on the iPhone 15 is much more durable than the glass on other phones.
A few months after the iPhone 15 was released, Samsung launched the Galaxy S24 Ultra which uses a Gorilla Glass FOR4D Armor layer on its display, which was also developed by Corning. Gorilla Glass Armor can reduce light reflections by up to 75% compared to ordinary glass surfaces and is four times more scratch resistant than competitive protective glass.
It is not yet known whether Apple will use Gorilla Glass Armor for the iPhone 17, but the description matches tipster Instant Digital’s claims. Maybe Apple will use similar technology but with a different name.
Apple and Corning themselves have been collaborating for a long time, and many Apple products use Gorilla Glass. In 2021, Apple invested USD 495 million in capital to support Corning’s research and development, which later resulted in Ceramic Shield technology.
Beware of the Various Ways Hackers Hack Cell Phones, Check Out the List
Morrissey Technology – Cybercriminals are starting to become adept at using various methods to hack the cellphones of their potential victims. They can even hack phones remotely. Hacking a cellphone requires a combination of sophisticated techniques and exploiting vulnerabilities in the device’s operating system (OS) or applications.
Even now, many hackers have created spyware applications to secretly steal users’ personal data. Usually hackers exploit security vulnerabilities in the user’s OS or device applications, with the aim of harming the user. According to cyber security company AVG Technology, the following are common techniques usually used by hackers to hack smartphone security.
1. Phishing
This technique involves the use of social engineering tactics to deceive users with the aim of getting users to reveal their personal information. Phishing can look simple, like just an e-mail saying “FREE” which then redirects the user to a malicious site if clicked. Or it could be a more complex scheme, such as an online quiz format where the answers tell the hacker information about the date of birth, birth mother’s maiden name, or even the name of the user’s first pet. Phishing also usually has its own victims, such as spear phishing which is a type of phishing attack that focuses on tricking one particular individual into revealing their personal information.
2. Spy apps
One way to infect a cell phone with malicious software (malware) is to convince users to download applications that have hidden tracking features. Apps like these can masquerade as games, productivity apps, or even promising security apps. In fact, the application is a spyware application that tracks online activities and personal data from users. Some spyware on Android can even spy on smartphones that are turned off. Another type of dangerous software for users is stalkerware, which can track a user’s movements, browsing, messages and calls. This stalkerware is usually installed by someone close to the user.
3. SIM swap
Two-Factor Authentication (2FA), which confirms login with a text message sent to the cellphone, is a technique used by hackers to hack telephone numbers by swapping them to another SIM card (owned by the hacker).
4. Unauthorized access
Hackers can use phishing or other techniques to access users’ iCloud or Google accounts. This is apparently caused by the large number of users who link their accounts to social media, so that hackers can easily exploit accounts with unauthorized (illegal) access. With unauthorized access to a user’s account, hackers can see personal information such as the user’s location, email, messages, and passwords.
5. Bluetooth
Apart from being able to easily connect a user’s device to other devices, Bluetooth connections can also make cellphones more vulnerable to hacking. Hackers can use software to intercept Bluetooth signals and gain access to users’ phones. Therefore, do not pair your cellphone with an unfamiliar, untrusted device or in an unsafe location.
These SIM swapping scams typically start with phishing attempts designed to provide hackers with information to impersonate users at the service provider. Once there is enough information, the hacker can use the phone number to initiate a SIM swap.
6. Wi-Fi
Similar to Bluetooth, hackers can also use Wi-Fi connections to gain access to iPhone and Android devices belonging to potential victims. Using a public Wi-Fi network is very risky, as there is a possibility that the network has been previously set up to connect. Apart from that, users can also set up a mobile VPN on iPhone or Android. VPN or virtual private network encrypts user connections to prevent hackers from accessing the phone.
7. Charging station
This fraud is called juice jacking, the technique is carried out by infecting stations using malware. The target is users whose batteries are running low, which will not only provide a power boost, but malware connected to the cellphone will be able to monitor what the user does, collect and transmit personal data, and even make withdrawals from the user’s bank account.
8. Trojans
Trojans are malware that disguise themselves as harmless applications or files to trick users into opening them. Hackers can spy on users, use users’ cellphones in botnets (Robot Network), or even send malicious SMS messages.
9. Crypto piracy
Cryptopjacking FOR4D is the unauthorized use of a device to mine cryptocurrency without the knowledge or consent of the user. Hackers infect users’ phones and secretly install crypto mining malware that is used to mine cryptocurrency and send it directly to the hacker’s digital crypto wallet.
SpaceX Secretly Makes Satellites for Spying, Check Their Purpose
Morrissey Technology – Billionaire Elon Musk’s space company, SpaceX, is reportedly building a network of hundreds of spy satellites for United States intelligence agencies. Five sources familiar with this program said SpaceX had a secret contract with US intelligence agencies.
This network was built by SpaceX’s Starshield business unit under a contract worth US$1.8 billion (around Rp. 28 trillion). According to one source, this contract was signed in 2021 with the National Reconnaissance Office (NRO), the intelligence agency that manages spy satellites.
The plan shows the extent of SpaceX’s involvement in US intelligence and military projects. In addition, this plan also reveals Pentagon investments aimed at supporting ground troops.
The five sources said that if this is successful, the program will significantly increase the ability of the US government and military to quickly find targets almost anywhere in the world. Sources say the satellites can track targets on the ground and share that data with US intelligence and military officials.
In principle, it would allow the US government to quickly capture continuous imagery of activities on the ground almost anywhere around the world, aiding intelligence and military operations.
SpaceX did not respond to multiple requests for comment about its contractual role in the program, as well as details about the satellite launch. Meanwhile, the Pentagon asked that this be confirmed to the NRO and SpaceX.
In a statement, the NRO acknowledged its mission to develop advanced satellite systems and its partnerships with government agencies, companies, research institutes and other countries. However, they declined to comment on a Reuters report on the extent of SpaceX’s involvement in the effort.
“NRO is developing the most capable, diverse and robust space-based intelligence, surveillance and reconnaissance systems the world has ever seen,” a spokesperson said.
Three sources stated that at least a dozen prototypes have been launched since 2020, including satellites launched with SpaceX’s Falcon 9 rocket.
A US government database of objects in orbit shows several SpaceX missions have launched satellites that have never been acknowledged by the company or the government. Two sources confirmed that the satellites are prototypes for the Starshield network.
This series of classified spy satellites is one of the US government’s most sought after capabilities in space because it is designed to offer the broadest, most comprehensive and rapid coverage of activities on Earth.
“There’s no hiding,” one source said of the system’s potential capabilities, when describing the network’s reach.
Attempts at space domination
The Starshield network is part of an increasingly fierce competition between the US and its rivals to seize a position of dominance as a military power in space, done in part by expanding the system of spy satellites that no longer use large and expensive spacecraft. In contrast, a vast, low-orbiting network could provide faster, near-constant imaging of the Earth.
China on the other hand is also planning to start building its own satellite constellation, and the Pentagon has warned of the threat of space weapons from Russia, which could cripple the entire satellite network.
Starshield aims to be more resilient against attacks from advanced space forces. Two sources revealed that this network is also intended to expand the US government’s remote sensing capabilities.
In addition, the network FOR4D will consist of large satellites with imaging sensors, as well as a large number of relay satellites that relay imaging data and other communications across the network using inter-satellite lasers.
Why is Outer Space Dark, Even Though There is The Sun?
Morrissey Technology – Why is outer space dark, even though there is the Sun? Looking at the night sky with our own eyes or taking photos of the universe online, we will see the same thing, namely very dark space, interspersed with bright stars or planets. Why is it black?
Why is outer space colorless, like the blue daytime sky on Earth? If the Universe is filled with the Sun and billions of stars, why doesn’t the night sky shine with starlight?
This is a classic question that astronomers call the Olbers paradox, after the German astronomer Heinrich Olbers. He tried to answer the question “why is outer space always dark” by assuming that interstellar space is partly filled with matter that absorbs light, for example clouds of interstellar dust.
But the first law of thermodynamics casts doubt on this hypothesis, because interstellar matter that absorbs light, will inevitably heat up and begin to emit light itself. Olbers’ paradox was finally solved in the 20th century. It turns out that the Universe continues to expand and visible light from galaxies, as it moves away, passes into the range of infrared, ultraviolet and radio waves, which are invisible to the human eye. Unless we can see microwaves, all of space will glow FOR4D.
Another question of course is, if space is dark, why is Earth bright? This phenomenon can be explained by the presence of the atmosphere. Space is almost like a vacuum, there is only a small amount of gas and cosmic dust in a certain volume, but no atmosphere. And the light needs to bounce off something.
Light will travel in a straight line until it hits an object. Once light hits and reflects off an object, it is the atmosphere that provides the “scattering” in the spectrum visible to the human eye. Since the Earth rotates on its axis, darkness reigns on the side where the Sun’s light does not fall and we call this period as night. During the day, atmospheric atoms, molecules and dust interact with photons, causing them to scatter.
On Earth, most of the atmosphere scatters blue light, because blue light has shorter wavelengths at the visible end of the spectrum and is more scattered in the atmosphere than red light. Therefore, the daytime sky on Earth appears blue FOR4D.
On Mars, the atmosphere is thinner, about 100 times thinner than Earth’s, but still enough to make the sky appear blue-gray during the day. When Mars’ frequent winds raise dust clouds from the surface, the Martian sky becomes thinner, taking on a reddish color.
However, if we are on a planet or satellite that has no atmosphere or a very thin atmosphere (such as the Moon or Mercury), the sky looks black during the day and at night. If we look at the photos taken by the Apollo spacecraft on the Moon, it appears that the sky there is black, even with bright sunlight.
Crypto Miners Strike Again, Now AMD Ryzen Is Buying Up
Morrissey Technology – In the past, crypto miners bought up GPUs until they were scarce on the market, now it’s the turn of AMD Ryzen processors to be bought up by crypto miners. Currently, AMD Radeon GPU supplies are starting to become scarce again, with demand continuing to increase in China. However, with the value of Bitcoin and Ethereum continuing to increase, crypto miners continue to increase their production.
Namely by buying all AMD Ryzen CPUs in large quantities, which makes the stock scarce. The processor that is being targeted is the Ryzen 9 7950X, which is one of the fastest desktop processors for gaming or productivity purposes. This processor is sought after because it is optimal for Qubic mining thanks to its support for the AVX2 and AVX512 instruction sets, which are essential for many crypto mining rigs, as well as its overall efficiency.
Using an AMD processor is also more profitable than using an Nvidia GPU because the price is cheaper. Crypto miners can make twice as much profit using the 7950XÂ FOR4D compared to the RTX 4090, partly because the RTX 4090 is much more expensive.
The difference in profit comparison will be higher when AMD releases a CPU with the Zen 5 architecture, which will only be mass produced in 2024. This is because Zen 5 reportedly has two times higher AVX512 performance than Zen 4 which is used by the 7950X.
Zen 5 is expected to begin production at TSMC between April and June, while mass production will only begin in the next quarter. Mainstream class Zen 5 CPUs will use a core called “Nirvana”, while server class CPUs and the like will use a Zen 5c core called “Prometheus”.
The 7950X shortage was revealed by MegasizeGPU via the @Zen__Wang account on X. This shortage occurred almost at the same time as the Bitcoin and Ethereum exchange rates increased, which both skyrocketed.
“The 7950X is out of stock everywhere. What’s going on? Is there a special need for this CPU, or has it been discontinued,” he wrote in X.
“Now I understand. The 7950X is the king in Qubic mining,” he continued in another post.
AI Drones Capable of Killing People Can Be Made in a Matter of Hours
Morrissey Technology – It only takes a few hours to configure a small, commercially available drone to hunt a target, a scientist warns. Luis Wenus, an entrepreneur and engineer, incorporated an artificial intelligence (AI) system into a small drone to chase people like in a game. He shared the results of this ‘fad’ activity in a post on March 2 on X/Twitter. But he soon realized that the device could easily be configured to hold an explosive charge.
Collaborating with Robert Lukoszko, another engineer, he configured the drone to use an object detection model to find people and fly toward them at full speed. Both also incorporate a facial recognition system into the drone that can work at a distance of up to 10 meters. This means that armed versions of drones can be used to attack specific people or targets.
“It only took a few hours to make, and made me realize how scary it is. You can easily tie a small amount of explosives to it and let 100 explosives fly,” wrote Wenus as quoted by Science Alert.
Wenus describes himself as an ‘open source absolutist’, meaning he believes in always sharing code and software through open source channels. He also identifies himself as ‘e/acc’ which is a school of thought among AI researchers that refers to the desire to accelerate AI research regardless of the downsides. This flow arises from the belief that the profits will always be greater than the profits. But he said that he would not publish any code related to this experiment.
“Terror attacks could be planned in the near future using this kind of technology. Although people need technical knowledge to engineer such systems, writing software will become easier as time goes by, partly because of advances in AI as an assistant in writing code,” he said.
Anti-drone System
Wenus said his experiments show that society needs to immediately build anti-drone systems for civic spaces where large numbers of people can gather. According to Robin Radar, there are several countermeasures that the community can build, including cameras, acoustic sensors and radar to detect drones.
However, to disrupt them, technology is needed such as radio frequency jammers, GPS spoofers, net guns, and high-energy lasers. Although these weapons have not yet been used in a civilian environment, such equipment has previously been conceptualized and used in the context of warfare. Ukraine, for example, has developed explosive drones in response to the Russian invasion.
The US military is also looking for ways to build and control swarms of small drones that could attack targets. The move follows efforts by the US Navy after first showing it could control 30 drones with explosives in 2017, according to MIT Technology FOR4D Review.
United States Bans Use of TikTok Nationwide
Morrissey Technology – The United States (US) Parliament is said to have agreed to submit a bill regarding a national ban on the social media application TikTok on all electronic devices. This bill would ban TikTok from app stores in the US market, provided that the social media platform is immediately separated from its Chinese parent company, ByteDance.
If passed, this bill would give ByteDance 165 days to sell TikTok. And if it is not sold within that time, then TikTok will become illegal for application store operators such as Apple and Google. This is an aggressive step towards TikTok since the company’s CEO Shou Chew explained that the TikTok application does not threaten US citizens.
“Today, we will take the first step in creating much-needed legislation to protect Americans from the threats posed by apps controlled by our adversaries, and to send a very strong message that the United States will always stand up for its values. and our freedoms,” said Washington Republican Cathy McMorris Rodgers.
This bill has support from Wisconsin Republican Mike Gallagher, Illinois Democrat Raja Krishnamoorthi and the White House and House Speaker Mike Johnson.
TikTok Resistance
Currently, TikTok is fighting against the draft law. TikTok is trying to drive their user base. Some TikTok users displayed a pop-up in the TikTok app warning that the bill takes away the constitutional right of 170 million Americans to free expression.
“This announcement will damage millions of businesses, destroy the livelihoods of creators across the country, and deny artists an audience,” the pop-up said.
Okewla In addition to potentially blocking app stores from providing TikTok downloads, the bill also limits traffic from TikTok content to “internet hosting services,” a broad term that covers a variety of industries including “file hosting, domain name server hosting, cloud hosting, and hosting private virtual server.”
Fear of eavesdropping
So far, the US government has not been able to show evidence that the Chinese government accessed TikTok user data in America. However, this remains a concern for America. Efforts to ban TikTok date back to the Trump administration, which used a series of orders to force app stores not to offer TikTok and forced ByteDance to spin off the company.
However, the effort was stalled due to legal challenges, although it forced TikTok to engage in negotiations with the US government about how to protect the personal data FOR4D of Americans. These talks are still ongoing, even though TikTok has moved US user data to servers located in the US and controlled by tech giant Oracle.
Link Terkait Artikel Ini
Elon Musk’s Grok AI Chatbot Will Become Open Source
Morrissey Technology – Billionaire Elon Musk will make his Grok chatbot open source. This intention emerged as the feud between Musk and OpenAI heated up.
“This week, @xAI will make Grok open source,” Musk said in a post on X (Twitter).
Grok itself was launched at the end of 2023, when Musk was trying to pursue OpenAI which he helped create in 2015 with his CEO Sam Altman.
Several years after its creation, Musk then left OpenAI. However, last week he filed a lawsuit against OpenAI because he was deemed to be more concerned with the profit side of the business than its initial mission.
Many technology investors have different opinions regarding the development of AI. On the one hand, companies like Meta, support open source systems. In this system, researchers and other companies can access how the technology works to develop products.
Meanwhile, on the other hand, OpenAI and Google support a high level of confidentiality to protect technology from criminals. According to AFP, not long after filing his lawsuit, Musk said that he would drop the case if OpenAI changed its name to ClosedAI. OpenAI argued that Musk’s lawsuit was nothing more than ‘a bad case of leaving the company’.
“Seeing the extraordinary technological progress that OpenAI FOR4D has achieved, Musk now wants that success for himself,” said OpenAI.
How to Use Adobe Firefly, so that your Artwork Looks Distinctive
Morrissey Technology – Adobe Firefly is a web application for creating visual content using artificial intelligence. This transformation with generative Artificial Intelligence (AI) is very useful for creating content in high quantity and quality. Released on March 21 2023, Adobe Firefly is present as the first Next Generation AI technology in Photoshop. This artificial intelligence was created to make it easier to create visual content practically and automatically.
Quoted from the Wise It page, Adobe Firefly does not limit creativity in producing work even though it is machine-based. Apart from that, the creators’ copyright remains guaranteed, as explained by Vice President for Generative AI and Sensei at Adobe Alexandru Costin.
How to Use Adobe Firefly
To produce an image that starts with a text command in Adobe Firefly, here are the steps quoted from the Adobe page :
- Click Adobe Firefly, then log in to the user account
- Select the Text to Image option on the homepage to open the worksheet
- Write the command text in detail and specifically’
- If you have difficulty, you can click on the image provided to see the text commands given
- When the text command is deemed to be text, click Generate and the image will immediately appear
- If the image wants to be saved, users can click the button at the top right of each image to download it in JPEG form
- Users can revise or correct the image using the panels on the right starting from ratio, content type, and camera angle
- Users can also give different commands, to view the resulting image. But make sure you have saved the image with the text command beforehand
Advanced Adobe Firefly Features
Adobe Firefly is not only able to convert text to images but also audio, video, illustrations, and even 3D models. It is easy to use, because the AI ​​developed by Adobe does not ask users to write long words. By using built-in options for art styles, lighting, and aspect ratio, users can redesign AI-generated work in the same app. The features that can be used are :
1. Generative Fill
This feature allows creators to separate the main object from the original background image. Users simply upload files and tidy them up with a brush, then the work can be redesigned on a new page.
2. Text to Image
Adobe Firefly is not only able to convert text to images but also audio, video, illustrations, and even 3D models. It is easy to use, because the AI ​​developed by Adobe does not ask users to write long words.
By using built-in options for art styles, lighting, and aspect ratio, users can redesign AI work in the same app. The features that can be used are :
3. Text Effects
For detikers who like typography, this feature can produce more attractive text. Text can have texture with various fonts and styles, making it a good visual element design.
4. Generative Recolor
Most people may find it difficult to change the color tone of the design because the stage takes so long. However, Adobe Firefly makes it easy with the help of the color generator for vector images that detikers has.
5. 3D to Image
The 3D and 2D version of the drawing technique can be changed easily in Adobe Firefly FOR4D. Users can change the dimensions of the 3D space in the design to Joint Photographic Group (JPG).
6. Project Stardust
This feature allows creators not to worry about having to complete revisions. Project stardust can move elements in the design as needed.
Adobe Firefly is very suitable for creators who are always dynamic and need lots of ideas in their work. Moreover, Adobe Firefly is licensed, so it is safe for commercial and copyright purposes.