14.8 C
New York
Saturday, March 22, 2025
Home Blog Page 2

ios – Is it right that duplicate on write is utilized to (all) the “authentic” array if a change is made to that array whereas there occurs to be a replica extant?


Say

struct Teste: Codable {
    let a: Int
    lazy var x: Int = {
        print("I simply modified this Teste merchandise")
        return a + 1000
    }()
}

and also you

var hugeData: [Teste] // 750 million of those

So it is one thing like your knowledge from the cloud, held in a singleton or such.

Say then you definitely occur to

   let see: [Teste] = hugeData.filter{ .. }
   // 4 of those. we'll say one in all them occurs to be hugeData[109333072]

possibly to show in a view or such. Subsequent! Whereas see exists, you occur to for some purpose

let width = hugeData[109333072].x

At that second, it has to copy-due-to-write all of hugeData, simply because the silly little see exists at the moment.

  • Or it may very well be that Swift’s copy-on-write mechanisms are good sufficient, in that scenario, to really do the copy-due-to-write on the tiny one? Does anybody know if that is so?

It solely simply occurred to me that an enormous hazard (if you happen to cope with huge quantities of knowledge), that if one thing modifications within the massive authentic array, when you simply occur to have some pissant little copy-on-write array in existence, it is an enormous efficiency woe.

(And/or, as talked about within the bullet level, possibly Swift offers with this by really doing the copy-due-to-write on the toddler??)

Briefly, is it right that duplicate on write is utilized to (all) the “authentic” array if a change is made to that array whereas there occurs to be a replica extant?

This is a brief self-explanatory demo …

struct Teste: Codable {
    let a: Int
    lazy var x: Int = {
        print("I simply calculated it", a + 1000)
        return a + 1000
    }()
}
    print("yo")
    tt = [Teste(a:7), Teste(a:8), Teste(a:9)]
    let tt2 = tt.filter{ $0.a > 8 }
    print(tt)
    print(tt2)
    print("sure, nonetheless nil in tt2")
    print("go..", tt[2].x)
    print("go once more..", tt[2].x)
    print(tt)
    print(tt2)
    print("sure, copy on write was? utilized to the unique enormous array")
    print("ie YES, nonetheless nil in tt2")
    let tt3 = tt.filter{ $0.a > 8 }
    print(tt)
    print(tt3)
    print("sure, the set worth appears to hold by way of to tt3")

outcome

yo
[.Teste(a: 7, $__lazy_storage_$_x: nil), .Teste(a: 8, $__lazy_storage_$_x: nil), .Teste(a: 9, $__lazy_storage_$_x: nil)]
[.Teste(a: 9, $__lazy_storage_$_x: nil)]
sure, nonetheless nil in tt2
I simply calculated it 1009
go.. 1009
go once more.. 1009
[.Teste(a: 7, $__lazy_storage_$_x: nil), .Teste(a: 8, $__lazy_storage_$_x: nil), .Teste(a: 9, $__lazy_storage_$_x: Optional(1009))]
[.Teste(a: 9, $__lazy_storage_$_x: nil)]
sure, copy on write was? utilized to the unique enormous array
ie YES, nonetheless nil in tt2
[.Teste(a: 7, $__lazy_storage_$_x: nil), .Teste(a: 8, $__lazy_storage_$_x: nil), .Teste(a: 9, $__lazy_storage_$_x: Optional(1009))]
[.Teste(a: 9, $__lazy_storage_$_x: Optional(1009))]
sure, the set worth appears to hold by way of to tt3

So in such a case wouldn’t it copy the 750 million merchandise array?

CISA Provides NAKIVO Vulnerability to KEV Catalog Amid Energetic Exploitation

0


Mar 20, 2025Ravie LakshmananCybersecurity / Vulnerability

CISA Provides NAKIVO Vulnerability to KEV Catalog Amid Energetic Exploitation

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has added a high-severity safety flaw impacting NAKIVO Backup & Replication software program to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of lively exploitation.

The vulnerability in query is CVE-2024-48248 (CVSS rating: 8.6), an absolute path traversal bug that would permit an unauthenticated attacker to learn information on the goal host, together with delicate ones similar to “/and many others/shadow” through the endpoint “/c/router.” It impacts all variations of the software program previous to model 10.11.3.86570.

“NAKIVO Backup and Replication comprises an absolute path traversal vulnerability that permits an attacker to learn arbitrary information,” CISA stated in an advisory.

Cybersecurity

Profitable exploitation of the shortcoming may permit an adversary to learn delicate knowledge, together with configuration information, backups, and credentials, which may then act as a stepping stone for additional compromises.

There are presently no particulars on how the vulnerability is being exploited within the wild, however the growth comes after watchTowr Labs revealed a proof-of-concept (PoC) exploit in direction of the top of final month. The problem has been addressed as of November 2024 with model v11.0.0.88174.

The cybersecurity agency additional famous that the unauthenticated arbitrary file learn vulnerability may very well be weaponized to acquire all saved credentials utilized by the goal NAKIVO answer and hosted on the database “product01.h2.db.”

Additionally added to the KEV catalog are two different flaws –

  • CVE-2025-1316 (CVSS rating: 9.3) – Edimax IC-7100 IP digital camera comprises an OS command injection vulnerability as a consequence of improper enter sanitization that enables an attacker to attain distant code execution through specifically crafted requests (Unpatched because of the machine reaching end-of-life)
  • CVE-2017-12637 (CVSS rating: 7.5) – SAP NetWeaver Software Server (AS) Java comprises a listing traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS that enables a distant attacker to learn arbitrary information through a .. (dot dot) within the question string
Cybersecurity

Final week, Akamai revealed that CVE-2025-1316 is being weaponized by dangerous actors to focus on cameras with default credentials so as to deploy not less than two totally different Mirai botnet variants since Might 2024.

In mild of lively exploitation, Federal Civilian Govt Department (FCEB) businesses are required to use the required mitigations by April 9, 2025, to safe their networks.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



The way forward for flight: How autonomous techniques are shaping the subsequent technology of UAVs

0


The way forward for flight: How autonomous techniques are shaping the subsequent technology of UAVs

The long-endurance SULE HALE-UAS was a part of a NASA mission with the U.S. Forest Service to assist battle wildfires. Supply: Swift Engineering

Autonomous techniques are rewriting the playbook for unmanned aerial automobiles, or UAVs. What was as soon as the area of science fiction is now unfolding. Drones are flying themselves, making split-second choices, and executing missions with a stage of precision no human pilot can rival.

In the present day’s applied sciences are obliterating previous limitations at breakneck velocity, opening up new potentialities for drone operations throughout numerous industries. In line with a latest 2025 report, the worldwide UAV market is ready to skyrocket from $28.5 billion in 2021 to $58.4 billion by 2028, and autonomy is on the coronary heart of that surge.

After all, this evolution doesn’t come with out challenges. Absolutely autonomous UAVs promise a way forward for boundless potential, however additionally they elevate severe questions:

  • How will we assure security in crowded airspace?
  • Can we belief machines to make life-or-death choices?
  • And the way will we construct regulatory frameworks that enable innovation to thrive with out compromising public welfare?

My workforce at Swift Engineering is on the entrance strains of the UAV subject, and these are the sorts of questions we encounter on a regular basis. So, let’s speak about autonomous techniques and what they imply for our world.


SITE AD for the 2025 Robotics Summit registration.
Register now so you do not miss out!


Autonomy redefines UAV potentialities

Autonomous techniques are catapulting UAVs from passive instruments to impartial aerial belongings able to maneuvering in advanced environments and executing intricate duties with out human enter. Powered by synthetic intelligence and machine studying, these techniques allow UAVs to be taught from their environment, adapt to unpredictable situations, and optimize efficiency.

Listed here are some examples of real-world UAV evolutions occurring in three industries:

Agriculture

Autonomous drones promise to revolutionize agriculture by supporting effectivity and precision in crop administration. Geared up with superior sensors and AI-powered algorithms, these drones carry out duties akin to crop spraying, soil and subject evaluation, crop well being monitoring, irrigation administration, and yield prediction with minimal human intervention.

By autonomous drone integrations, the farmers of tomorrow might obtain greater yields and value financial savings, addressing the rising demand for sustainable and environment friendly meals manufacturing world wide.

Logistics

The logistics {industry} can also be present process a radical transformation, with firms like Zipline main the cost by deploying autonomous UAVs to ship vital medical provides to distant, hard-to-reach areas. These drones are shaking up how we take into consideration provide chains, slashing supply occasions from a number of hours to only minutes.

By bypassing conventional transportation strategies, UAVs can overcome challenges like site visitors congestion and highway blockages, delivering vaccines, blood, and different important medical items on to areas which might be in any other case inaccessible.

This innovation isn’t restricted to healthcare. E-commerce, meals supply, and retail industries are additionally embracing drone stock and supply to create sooner, extra environment friendly logistics networks. The flexibility to quickly deploy UAVs permits companies to answer dynamic situations and buyer wants in actual time, making logistics sooner, smarter, and less expensive.

UAVs for search and rescue

UAVs are reshaping the panorama of search-and-rescue operations, offering first responders with life-saving instruments that drastically enhance the velocity and effectiveness of rescue missions.

Geared up with industry-leading thermal imaging cameras and superior navigation techniques, these drones can cowl expansive and sometimes treacherous terrain — akin to dense forests, mountains, and catastrophe zones — in quest of lacking individuals or survivors.

In contrast to conventional search strategies, that are restricted by time, terrain, and manpower, UAVs can shortly establish warmth signatures and find people, even in essentially the most difficult environments. Their capability to autonomously traverse troublesome landscapes not solely reduces the time it takes to find folks but additionally minimizes the chance to rescuers.

These are simply three of the industries dramatically benefiting from autonomous UAVs. Many others, akin to actual property and environmental conservation, will proceed to evolve within the coming years.

Florian Schwandner (left), director of the Earth Sciences Division at NASA’s Ames Research Center, describes to U.S. Rep. Anna Eshoo the use of autonomous UAVs to carry cameras and sensors for monitoring of environmental events such as wildfires or volcanic activity.

Florian Schwandner, chief of Ames Earth Sciences Division (left), talks to Congresswoman Anna Eshoo (proper) in regards to the Photogrammetry Payload and Volcano Fuel Sensor Suite for UAVs at a wildfire showcase. Supply: Swift Engineering

The market’s urge for food for autonomous UAVs grows

The demand for autonomous UAVs isn’t simply rising — it’s exploding. Industries that depend on steady, large-scale knowledge assortment or function in high-risk environments are driving this shift.

For instance, think about the protection subject. Militaries worldwide are pouring billions into autonomous UAV improvement.

In 2024, the U.S. Division of Protection requested an estimated $10.95 billion to assist uncrewed automobile acquisition and improvement, which covers drones. This represents an roughly $1 billion enhance from the quantity of the earlier fiscal yr.

The U.S. is especially targeted on techniques that scale back human involvement in high-stakes operations. UAVs have immense potential to extend mission success charges and shield human lives by conducting reconnaissance, surveillance, and even fight missions autonomously.

Infrastructure and power enterprises are additionally adopting autonomous UAVs to examine wind generators, oil pipelines, and energy strains. This powers down upkeep prices and reduces the necessity for dangerous guide inspections.

Throughout the board, drone-powered options might ship billions of {dollars} in financial savings to the worldwide economic system, largely by improved infrastructure administration. As industries embrace this know-how, the potential for elevated effectivity and higher security will doubtless make autonomous UAVs indispensable in practically each sector.

However what about UAV challenges?

Regardless of their potential, totally autonomous UAVs nonetheless face severe technical and regulatory hurdles, as talked about earlier. This makes dependable collision-avoidance techniques, safe communication networks, and strong decision-making algorithms important for widespread adoption.

Airspace integration

One of many greatest hurdles for autonomous UAVs is integrating them safely into shared airspace with crewed plane. In contrast to conventional aviation, the place human pilots make split-second choices, drones require refined techniques to speak and keep away from collisions with different flying objects.

The Federal Aviation Administration (FAA) is actively engaged on updating and bettering air site visitors administration techniques to accommodate UAVs, however the advanced nature of airspace coordination signifies that widespread integration continues to be a piece in progress.

Cybersecurity dangers

As UAVs turn into extra linked, additionally they turn into extra vulnerable to cybersecurity threats. The reliance on wi-fi communications for knowledge switch and management will increase the chance of hacking, knowledge breaches, and unauthorized entry.

Builders are working tirelessly to implement higher encryption strategies and fail-safe protocols to guard these techniques from malicious assaults. Nonetheless, as UAVs are deployed in additional vital purposes like healthcare, protection, and infrastructure, confirming these techniques are impenetrable to cyber threats might be very important to sustaining their reliability and trustworthiness.

Public belief in UAVs should develop

For autonomous UAVs to realize widespread adoption, the general public should belief them. Folks have to consider that these techniques should not solely dependable but additionally protected, notably in high-stakes industries like healthcare and transportation, the place they’ve the potential to instantly affect human lives.

Reaching this stage of belief requires transparency, accountability, and a confirmed monitor document of efficiency. Demonstrating that UAVs can function with out failure and reply successfully to emergencies or unexpected challenges might be vital in gaining public confidence.

The runway for autonomous UAVs

The trajectory of UAV know-how is undeniably tied to how far we are able to push autonomy.

As AI techniques develop extra refined and sensor know-how advances, I consider the chances for exploration, environmental monitoring, catastrophe response, and concrete logistics will broaden exponentially.

The skies are set to turn into a dynamic ecosystem the place autonomous UAVs function with unprecedented intelligence and independence. Whereas challenges stay, the query isn’t whether or not such drones will revolutionize aviation — it’s how shortly we’re prepared and keen to allow them to.

Hamed Khalkhali, president of Swift Engineering.In regards to the writer

With over 25 years of expertise in engineering and management, Hamed Khalkhali, Ph.D., MBA, is at the moment the president of San Clemente, Calif.-based Swift Engineering Inc. He’s additionally an adjunct professor at California State Polytechnic College-Pomona, the place he teaches thermal and fluid science and power administration.

Khalkhali has intensive experience in fly-by-wire flight-control techniques, necessities administration, and verification and validation (V&V). He beforehand served as vp of engineering and program administration at AeroVironment and held management roles at Parker Aerospace and Safran Electronics & Protection, main new product improvement and avionics techniques.

Albabat Ransomware Targets Home windows, Linux, and macOS through GitHub Abuse

0


Current analysis by Development Micro has uncovered a major evolution within the Albabat ransomware, which now targets not solely Home windows but additionally Linux and macOS methods.

This enlargement highlights the rising sophistication of ransomware teams in exploiting a number of working methods to maximise their affect.

The Albabat group has been leveraging GitHub to streamline its operations, utilizing the platform to handle configuration recordsdata and important elements of the ransomware.

Albabat RansomwareAlbabat Ransomware
Fiddler reveals the obtain of the ransomware configuration.

Increasing Targets and Operational Effectivity

The most recent variations of Albabat ransomware, particularly variations 2.0.0 and a couple of.5, have been designed to assemble system and {hardware} data from Linux and macOS units, along with Home windows.

Albabat RansomwareAlbabat Ransomware
A script to assemble {hardware} and system data on Linux and macOS methods.

These variations retrieve their configuration knowledge by the GitHub REST API, using a “Consumer-Agent” string labeled “Superior App.”

In response to Development Micro Report, this configuration gives essential particulars in regards to the ransomware’s habits and operational parameters, indicating a complicated method to managing and updating the malware.

Using GitHub permits the attackers to take care of a centralized management over the ransomware’s configuration, making it simpler to replace and adapt their techniques.

The ransomware encrypts a variety of file extensions, together with widespread codecs like .exe, .lnk, .dll, and .mp3, whereas skipping particular folders and recordsdata to keep away from detection or interference with system operations.

It additionally terminates varied processes, comparable to activity managers and productiveness software program, to forestall customers from interfering with its actions.

The attackers retailer stolen knowledge in a PostgreSQL database, which helps them monitor infections, monitor funds, and doubtlessly promote delicate data.

Safety Implications and Suggestions

The Albabat ransomware’s means to focus on a number of working methods and its use of GitHub for operational effectivity underscore the necessity for strong cybersecurity measures.

Organizations ought to prioritize sturdy entry controls, common system updates, and safe backups to mitigate the danger of such assaults.

Implementing community segmentation can restrict the unfold of ransomware, whereas person coaching and consciousness packages may also help stop preliminary infections.

Proactive safety options, comparable to AI-powered platforms, can present complete safety by predicting and stopping threats, thereby decreasing the danger of ransomware assaults.

The continued improvement of the Albabat ransomware, with a possible model 2.5 within the works, signifies that these threats will proceed to evolve.

Subsequently, staying knowledgeable about indicators of compromise (IoCs) and leveraging menace intelligence are essential for sustaining efficient cybersecurity defenses towards rising threats like Albabat.

Examine Actual-World Malicious Hyperlinks & Phishing Assaults With Menace Intelligence Lookup – Strive for Free

This Week’s Superior Tech Tales From Across the Internet (Via March 22)

0


Tech

Inside Google’s Two-Yr Frenzy to Catch Up With OpenAIParesh Dave and Arielle Pardes | Wired

“Wired spoke with greater than 50 present and former staff—together with engineers, entrepreneurs, authorized and security specialists, and a dozen high executives—to hint essentially the most frenzied and culture-reshaping interval within the firm’s historical past. …That is the story, being advised with detailed recollections from a number of executives for the primary time, of these turbulent two years and the trade-offs required alongside the best way.”

Robotics

Watch the Atlas Robotic Bust a Transfer in Boston Dynamics’ Newest VideoAnna Washenko | Engadget

“Within the [new clip], [Boston Dynamics’] Atlas robotic demonstrates a number of kinds of full-body motion, beginning with a stroll and advancing to a cartwheel and even a spot of break dancing. The completely different actions have been developed utilizing reinforcement studying that used movement seize and animation as supply supplies.”

Computing

Not Everybody Is Satisfied by Microsoft’s Topological QubitsDina Genkina | IEEE Spectrum

“The Microsoft crew has not but reached the milestone the place the scientific group would agree that they’ve created a single topological qubit. ‘They’ve an idea chip which has eight lithographically fabricated qubits,’ Eggleston says. ‘However they’re not purposeful qubits, that’s the effective print. It’s their idea of what they’re transferring in direction of.'”

Future

In Las Vegas, a Former SpaceX Engineer Is Pulling CO2 From the Air to Make ConcreteAdele Peters | Quick Firm

“In an industrial park in North Las Vegas, close to an Amazon warehouse and a waste storage facility, a brand new carbon removing plant is starting to drag CO2 from the air and retailer it completely. Referred to as Challenge Juniper, it’s the primary ‘built-in’ plant of its type within the US, which means that it handles each carbon seize and storage in a single place.”

Future

Decide Disses Star Trek Icon Knowledge’s Poetry Whereas Ruling AI Can’t Writer WorksAshley Belanger | Ars Technica

“Knowledge ‘is perhaps worse than ChatGPT at writing poetry,’ however his ‘intelligence is similar to that of a human being,’ Millet wrote. If AI ever reached Knowledge ranges of intelligence, Millett prompt that copyright legal guidelines might shift to grant copyrights to AI-authored works. However that point is seemingly not now. ‘There will likely be time sufficient for Congress and the Copyright Workplace to sort out these points once they come up,’ Millett wrote.”

Is Darkish Power Getting Weaker? New Proof Strengthens the Case.Charlie Wooden | Quanta

“Final 12 months, an unlimited map of the cosmos hinted that the engine driving cosmic growth is perhaps sputtering. …[This week], the scientists [reported] that they’ve analyzed greater than twice as a lot knowledge as earlier than and that it factors extra strongly to the identical conclusion: Darkish power is shedding steam.”

Robotics

1X Will Check Humanoid Robots in ‘a Few Hundred’ Properties in 2025Maxwell Zeff | TechCrunch

“These in-home assessments will enable 1X to gather knowledge on how Neo Gamma operates within the dwelling. Early adopters will assist create a big, helpful dataset that 1X can use to coach in-house AI fashions and improve Neo Gamma’s capabilities.”

See the First Ever Footage of Sundown on the Moon Captured by Blue GhostGeorgina Torbet | Digital Developments

“With the Blue Ghost lunar mission coming to an finish this week, the spacecraft has gifted scientists and the general public with an unbelievable send-off. The moon lander captured the primary ever HD imagery of a sundown as seen from the moon, and the photographs have been stitched collectively right into a video.”

Tech

The Unbelievable Scale of AI’s Pirated-Books DrawbackAlex Reisner | The Atlantic

“LibGen and different such pirated libraries make data extra accessible, permitting individuals to learn authentic work with out paying for it. But generative-AI firms corresponding to Meta have gone a step additional: Their purpose is to soak up the work into worthwhile know-how merchandise that compete with the originals. Will these be higher for society than the human dialogue they’re already beginning to change?”

Webb Telescope Captures First Direct Proof of Carbon Dioxide on an ExoplanetIsaac Schultz | Gizmodo

“The photographs characteristic HR 8799, a multiplanet system 130 light-years from Earth. The invention not solely reveals a chemical compound important on Earth for processes together with photosynthesis and the carbon cycle, but additionally signifies that gasoline big planets elsewhere within the galaxy shaped in the same method to our native giants, Jupiter, and Saturn.”

Computing

Prime Builders Need Nvidia Blackwell Chips. Everybody Else, Not So A lotAnissa Gardizy | The Info

“Jensen Huang turned Nvidia into the third most useful firm on this planet by designing chips that have been approach forward of their time. However Huang’s remarks on Tuesday recommend he’s pulling far forward of some prospects, and the rising hole between what he’s promoting and what they’re shopping for might spell hassle.”