GM has already said it has what it takes to get a fleet of autonomous vehicles on the road before anyone else, and that timeline might’ve sped up further. Cruise Automation , the company GM acquired a little over a year ago, has announced it’s made a purchase of its own: Strobe, which specializes in shrinking LIDAR arrays down to a single chip. The most immediate benefit here is cost. In a post on Medium , Cruise CEO Kyle Vogt writes that LIDAR-on-a-chip will drop the price “by 99 percent” versus other LIDAR systems. “Strobe, Cruise and GM engineers will work side by side along with our optics and fabrication experts at HRL (formerly Hughes Research Labs), the GM skunkworks-like division that invented the world’s first laser, ” Vogt wrote. The new LIDAR system can apparently deal with sun reflecting off rainy streets and help differentiate between someone clad in black jaywalking at night. Vogt wrote that when combined with RADAR and cameras, the LIDAR can handle pretty much every type of sensing needed for self-driving applications. If you were looking for proof that GM might beat the competition to market, well, this could be part of it. Via: TechCrunch Source: Medium
See more here:
GM’s Cruise buys LIDAR company to drastically cut self-driving costs
An anonymous reader quotes TechCrunch: Microsoft announced today that its conversational speech recognition system has reached a 5.1% error rate, its lowest so far. This surpasses the 5.9% error rate reached last year by a group of researchers from Microsoft Artificial Intelligence and Research and puts its accuracy on par with professional human transcribers who have advantages like the ability to listen to text several times. Both studies transcribed recordings from the Switchboard corpus, a collection of about 2, 400 telephone conversations that have been used by researchers to test speech recognition systems since the early 1990s. The new study was performed by a group of researchers at Microsoft AI and Research with the goal of achieving the same level of accuracy as a group of human transcribers who were able to listen to what they were transcribing several times, access its conversational context and work with other transcribers. Read more of this story at Slashdot.
An anonymous reader shares a Bloomberg Businessweek feature: The Austrian village of Donawitz has been an iron-smelting center since the 1400s, when ore was dug from mines carved out of the snow-capped peaks nearby. Over the centuries, Donawitz developed into the Hapsburg Empire’s steel-production hub, and by the early 1900s it was home to Europe’s largest mill. With the opening of Voestalpine AG’s new rolling mill this year, the industry appears secure. What’s less certain are the jobs. The plant, a two-hour drive southwest of Vienna, will need just 14 employees to make 500, 000 tons of robust steel wire a year — vs. as many as 1, 000 in a mill with similar capacity built in the 1960s. Inside the facility, red-hot metal snakes its way along a 700-meter (2, 297-foot) production line. Yet the floors are spotless, the only noise is a gentle hum that wouldn’t overwhelm a quiet conversation, and most of the time the place is deserted except for three technicians who sit high above the line, monitoring output on a bank of flatscreens. “We have to forget steel as a core employer, ” says Wolfgang Eder, Voestalpine’s chief executive officer for the past 13 years. “In the long run we will lose most of the classic blue-collar workers, people doing the hot and dirty jobs in coking plants or around the blast furnaces. This will all be automated.” Read more of this story at Slashdot.
After WikiLeaks revealed data exposing information about the CIA’s arsenal of hacking tools, Intel Security has released a tool that allows users to check if their computer’s low-level system firmware has been modified and contains unauthorized code. PCWorld reports: The release comes after CIA documents leaked Tuesday revealed that the agency has developed EFI (Extensible Firmware Interface) rootkits for Apple’s Macbooks. The documents from CIA’s Embedded Development Branch (EDB) mention an OS X “implant” called DerStarke that includes a kernel code injection module dubbed Bokor and an EFI persistence module called DarkMatter. In addition to DarkMatter, there is a second project in the CIA EDB documents called QuarkMatter that is also described as a “Mac OS X EFI implant which uses an EFI driver stored on the EFI system partition to provide persistence to an arbitrary kernel implant.” The Advanced Threat Research team at Intel Security has created a new module for its existing CHIPSEC open-source framework to detect rogue EFI binaries. CHIPSEC consists of a set of command-line tools that use low-level interfaces to analyze a system’s hardware, firmware, and platform components. It can be run from Windows, Linux, macOS, and even from an EFI shell. The new CHIPSEC module allows the user to take a clean EFI image from the computer manufacturer, extract its contents and build a whitelist of the binary files inside. It can then compare that list against the system’s current EFI or against an EFI image previously extracted from a system. Read more of this story at Slashdot.
An anonymous reader quotes a report from The Guardian: Libraries in St Louis have been bought to a standstill after computers in all the city’s libraries were infected with ransomware, a particularly virulent form of computer virus used to extort money from victims. Hackers are demanding $35, 000 (£28, 000) to restore the system after the cyberattack, which affected 700 computers across the Missouri city’s 16 public libraries. The hackers demanded the money in electronic currency bitcoin, but, as CNN reports, the authority has refused to pay for a code that would unlock the machines. As a result, the library authority has said it will wipe its entire computer system and rebuild it from scratch, a solution that may take weeks. On Friday, St Louis public library announced it had managed to regain control of its servers, with tech staff continuing to work to restore borrowing services. The 16 libraries have all remained open, but computers continue to be off limits to the public. Spokeswoman Jen Hatton told CNN that the attack had hit the city’s schoolchildren and its poor worst, as many do not have access to the internet at home. “For many we’re their only access to the internet, ” she said. “Some of them have a smartphone, but they don’t have a data plan. They come in and use the wifi.” As well as causing the loans system to seize up, preventing borrowers from checking out or returning books, the attack froze all computers, leaving no one able to access the four million items that should be available through the service. The system is believed to have been infected through a centralized computer server, and staff emails have also been frozen by the virus. The FBI has been called in to investigate. Read more of this story at Slashdot.
Security firms have been warning us for more than a year about the possibility of Android malware jumping from phones and tablets to other Android-powered devices, such smart TVs. The latest incident involving ransomware on a smart TV involves software engineer Darren Cauthon, who revealed that the LG smart TV of one of his family members was infected with ransomware right on Christmas day. What’s worse? He claims LG wouldn’t help him with perform factory reset of the device. From a report: Based on a screenshot Cauthon posted online, the smart TV appears to be infected with a version of the Cyber. Police ransomware, also known as FLocker, Frantic Locker, or Dogspectus. The infected TV is one of the last generations of LG smart TVs that ran Google TV, a smart TV platform developed by Google together with Intel, Sony, and Logitech. Google TV launched in 2010, but Google discontinued the project in June 2014. In the meantime, LG has moved on from Google TV, and the company’s TVs now run WebOS. Cauthon says he tried to reset the TV to factory settings, but the reset procedure available online didn’t work. When the software engineer contacted LG, the company told him to visit one of their service centers, where one of its employees could reset his TV. Read more of this story at Slashdot.