Home Blog Page 3

Intel networking unit spinoff, earnings uproar, AI snub



It’s a shining instance of the previous cliche that those that don’t study from historical past are doomed to repeat it. When Paul Otellini took over as CEO in 2005, he needed to lower Intel’s wasted effort on communications again then as properly. Intel tried to turn out to be a participant within the comms enterprise, making over a dozen acquisitions of small firms that by no means went wherever. In the long run, it fell to Otellini to wash up the mess simply as Tan is doing now.

Popping out of the earnings name, there was appreciable misunderstanding on an announcement made by Tan relating to the 14A node course of. Tan stated the next on the quarterly earnings name with Wall Avenue analysts, as per transcript on Looking for Alpha:

“As much as and thru Intel 18A, we may generate an affordable return on our investments with solely Intel Merchandise. The rise in capital price at Intel 14A, make it clear that we want each Intel merchandise, and a significant exterior buyer to drive acceptable returns on our deployed capital, and I’ll solely make investments once I’m assured these returns exist.”

This has been interpreted by some as stating that Intel will cancel 14A if it doesn’t get sufficient exterior prospects, which isn’t the case, specialists stated. For starters, it wants 14A for its personal processors. And secondly, Tan didn’t imply he would cancel the design node.

“The rise in capital prices at Intel 14A make it clear that we want each Intel Merchandise and a significant exterior buyer to drive acceptable returns on our deployed capital, and I’ll solely make investments once I’m assured these returns exist,” Tan acknowledged.

First, Intel has beforehand introduced that it’s working with two early exterior prospects on 14A and it has its personal merchandise already dedicated to 14A. “I feel that the way in which it was offered it freaked everybody out,” stated Jim McGregor, principal analyst with Tirias Analysis. “I feel they had been making an attempt to make some extent to their prospects to say pay attention, we want you to stomach as much as the bar not simply keep on the fence.”

ios – How can an SPM library entry pictures generated by a prebuildCommand plugin? Can SPM plugins expose non-source information, like pictures, to a library goal?


Let’s think about I’ve an app that has a ton of picture sources concerned in it. My designer is at all times sending me the information in a lossless format. They’re additionally a bit too vibrant. New pictures are coming in from them steadily.

I want to be sure that after I ship the app I’ve already transformed them into a pleasant compressed format. I additionally like to use a coloration grade to make them a bit extra muted.

In a standard Xcode construct I do know I might get one thing going with a run script or construct plugin to routinely preprocess these pictures at any time when I construct the app. Is it a bit lazy of me to make use of Xcode construct for… maybe. However it positive is sweet to know which you could simply put these massive information within the challenge, write a script, configure your construct and at construct time have Xcode run the required scripts to get them right into a good condition.

Within the swift packages world I can not determine find out how to do one thing related. On its floor a plugin would appear to be what I would like. There’s even an thought of a prebuildPlugin with a outputFilesDirectory. In idea it looks like I ought to have the ability to write a plugin that does the identical factor I was doing in Xcode to ensure these pictures received processed as they got here in.

Nonetheless, this seems to not be the case. I get the purpose that modifying the sources of a package deal whilst you construct the package deal is fraught. So maybe we aren’t eager on giving builders a path to take action. However I actually really feel like I’m lacking one thing as a result of the one means I can actually discover to leverage the outputFilesDirectory is to write down a swift supply there that one way or the other embrace what I want. The swift compiler picks these swift sources up and packages every part properly for me. This appears to be what SwiftGen and the OpenAPI generator do. If I have been to write down different information they aren’t compiled into the package deal and I appear to be out of luck.

Does this imply {that a} prebuildPlugin and that outputFilesDirectory are actually solely helpful if youre outputting swift supply information? Is there actually no secure and dependable means for a library that makes use of that plugin to entry different information output?

Positive I can search through the .construct path however this hardly feels strong sufficient for manufacturing. Maybe I might determine find out how to embrace a path to the sources I write and embrace that in a swift supply file however that feels dicey too. Or is that effective?

Is there any means for a library that makes use of a plugin to generate non-swift sources to get to them safely?

Cybersecurity of Logistics Determination Fashions


Items, providers, and other people merely can not get to the place they’re wanted with out efficient logistics. Logistics are important to just about all elements of the financial system and nationwide safety. Regardless of this, numerous challenges can disrupt logistics from extreme climate and international pandemics to distribution bottlenecks. On this weblog publish we’ll deal with cyber assaults to logistics determination fashions.

Nationwide safety and army organizations take into account contested logistics as “the atmosphere wherein an adversary or competitor deliberately engages in actions or generates circumstances, throughout any area, to disclaim, disrupt, destroy, or defeat pleasant power logistics operations, amenities, and actions.” For instance, in World Battle II, the Allied Transportation Plan included strategic bombing of main highway junctions, bridges, tunnels, rail strains, and airfields to hamper German actions to the Normandy space. This performed a decisive function within the success of the D-Day landings.

Whereas defending the bodily parts of logistics operations is vital, fashionable logistic programs additionally embody in depth software-based determination assist that’s important to logistics planning phases, and this software program additionally should be shielded from assault.

Past common cybersecurity, there are not any normal strategies for monitoring, detecting, and stopping cyber assaults to logistics determination fashions. Nonetheless, there are well-studied adjoining fields comparable to synthetic intelligence (AI) safety, machine studying operations (MLOps), and extra broadly AI engineering that may contribute to the securing of our logistics determination fashions.

Hypothetical Assault to a Logistics Mannequin

Take into account a logistics mannequin that determines distribute provides to hurricane victims in Florida. We have to resolve the place to find provide storage amenities, in addition to how provides from every facility are to be distributed to surrounding populations.

Within the context of nationwide safety and army operations, situations would possibly embody designing logistics programs to move gasoline, munitions, gear, and warfighting personnel from their originating areas to the entrance strains of a battle. One other army use case may be figuring out the optimum routing of autos, ships, and airplanes in a means that minimizes casualty threat and maximizes mission effectiveness.

Determine 1 illustrates utilizing a variation of the okay-center formulation to compute an optimum coverage for the Florida hurricane situation (left panel). If a cyber-attacker had entry to this mannequin and was in a position to modify its coefficients, then we would find yourself with a plan comparable to depicted in the suitable panel. The really useful central facility location has modified, which might degrade the effectivity of our hypothetical system, or worse, forestall catastrophe victims from receiving wanted provides.

In a army battle, even seemingly refined adjustments like a really useful facility location may very well be enormously damaging. For instance, if an adversary have been to have some functionality to assault or degrade a specific location unbeknownst to the defender, then manipulating the defender’s determination mannequin may very well be a part of an effort to bodily injury the defender’s logistics system.

figure1_03192025

Determine 1: Hypothetical instance of how a cyber attacker would possibly subtly regulate mannequin parameters in such a means that the mannequin recommends suboptimal or in any other case unfavorable insurance policies.

In follow, logistics determination fashions could be extraordinarily giant. For instance, the small linear mannequin used for Determine 1 solves a system of 266 pages of linear equations, which Determine 2 depicts. If 100 areas must be lined, the mannequin would have about 20,000 determination variables, about 40,000 constraints, and as much as about 800 million coefficients. Because of the drawback of scale, practitioners usually use approximation algorithms that may generate moderately good insurance policies for his or her particular issues.

figure2_03192025

Determine 2: System of linear equations (266 pages) required to generate the optimum coverage in Determine 1. Realistically sized fashions are considerably bigger, and it will be straightforward for refined mannequin manipulations to go undetected.

There are various varieties of logistics issues, together with facility location, automobile routing, scheduling, machine project, and bin packing. Logistics issues are sometimes formulated as linear applications. Determine 3 exhibits the overall type of a linear program, which (1) minimizes an goal operate (the vector of goal coefficients, c, multiplied by a vector of determination variables, x); (2) topic to a set of constraints (the constraint coefficient matrix, A, multiplied by the vector of determination variables, x, is the same as the constraint necessities vector, b); and (3) with the choice variables, x, taking up constructive values. Most logistics issues contain a variation of this mannequin referred to as a blended integer linear program, which permits a few of the determination variables to be integer or binary. For instance, a binary determination variable would possibly symbolize whether or not to open a provide depot (one) or not (zero) at a given location. Word that Determine 3 is a compact (small) mannequin illustration, and its use of vectors and matrices ( c, x , b , and A ) can mannequin any sized drawback (for instance with hundreds of determination variables, tens of hundreds of constraints, and tens of millions of coefficients).

figure3_03192025

Determine 3: Basic type of a linear program

George Dantzig invented the simplex methodology in 1947 to resolve linear applications, that are so pervasive that the simplex methodology is taken into account one of many nice algorithms of the twentieth century. Within the early 2010’s, it was estimated that 10-to-25 % of all scientific computation was dedicated to the simplex methodology. Right this moment, even with computing developments, fixing linear applications at-scale stays an unlimited problem.

In logistics follow, these fashions could be large. Not solely are they very tough to resolve, however they are often bodily unattainable to resolve with present computing know-how. Right this moment, a lot of the operations analysis subject is dedicated to growing approximation algorithms that yield top quality (though not essentially optimum) options to real-world logistics issues. Latest analysis (see right here and right here) supplies examples of such approximation algorithms. As a result of these mathematical applications are sometimes NP-hard (i.e., the issue measurement grows exponentially, and optimum options can’t be generated in polynomial time), optimization is among the promising use circumstances for quantum computing.

Discrete occasion simulation and system dynamics are additionally modeling kinds used to resolve logistics issues. Whereas we focus on linear programming as an exemplar mannequin kind on this weblog, different mannequin kinds could be equally susceptible to cyber assaults.

Idea of Operations

There’s little printed analysis, and even working expertise, concerning cyber assaults on logistics determination fashions. An assault would require undetected community intrusion; persistence to permit reconnaissance on the goal mannequin and assault planning; adopted by mannequin or knowledge manipulations which might be adequately subtle to be undetected whereas strategic sufficient to be damaging.

In follow, a profitable assault would require a classy mixture of abilities seemingly solely obtainable to motivated and skilled risk teams. Such risk teams do exist, as evidenced by intrusions into U.S. vital infrastructure and know-how enterprises like Google.

The Cyber Kill Chain developed by Lockheed Martin is a 7-step mannequin of how refined cyber assaults are sometimes carried out. The seven steps are: reconnaissance, weaponization, supply, exploitation, set up, command and management, and eventually appearing on the attacker’s targets. Attacking a call mannequin would equally require these steps to ascertain a persistent community intrusion, entry to the mannequin, and eventually manipulate the mannequin or its output.

As soon as attackers acquire entry to a logistics mannequin, the injury that they’ll inflict is determined by many components. Like AI safety, a lot is determined by the kind of entry gained (e.g., mannequin read-only entry, mannequin write entry, coaching knowledge read-only entry, coaching knowledge write entry, means to exfiltrate a duplicate of the mannequin or knowledge, and so on.). In contrast to many AI functions, logistics usually introduces sprawling provide chains of contractors and subcontractors. If an higher echelon determination mannequin is determined by knowledge from organizations at decrease echelons within the provide chain, then the mannequin might conceivably be attacked by poisoning knowledge in programs past the mannequin operator’s management.

Suggestions for Securing Logistics Determination Fashions

We name on the logistics, cybersecurity, and operations analysis communities to systematically examine the susceptibility of determination fashions to cyber assault and to offer formal suggestions for a way greatest to guard these fashions.

Within the meantime, there are well-studied adjoining fields that provide present logistics mannequin operators alternatives to enhance safety. For instance, machine studying operations (MLOps) is a scientific framework for making certain dependable deployments into manufacturing environments. Extra broadly, the SEI is main the Nationwide AI Engineering Initiative, which systematizes what is required to develop, deploy, and keep AI programs in unpredictable and chaotic real-world environments. Monitoring is a central tenet of MLOps and AI engineering, together with strategies to establish important mannequin and knowledge adjustments between revisions.

Lastly, we suggest that AI safety organizations take into account logistics determination fashions inside their purview. The linear programing that underpins logistics fashions shares many attributes with AI: each could be huge scale, compute intensive, depend on knowledge, and be tough to interpret. Like AI, assaults to logistics determination fashions can create important, real-world injury.

High 5 AppSec Shopping for Pitfalls from Gartner’s 2025 Report


Selecting the unsuitable AST (Software Safety Testing) platform does not simply waste your finances. It results in:

ios – Why does dependency evaluation work for script that outputs folder that’s copied as bundle useful resource however not if that script is in an mixture goal?


Principally in my app I’ve a script that outputs a folder with a couple of information inside it. This folder is output to $(BUILT_PRODUCTS_DIR)/construct/ and is referenced through a PBXBuildFile. As a result of I put a wait within the script (to simulate an extended construct I’ve in my actual venture) it is vitally apparent when the script is or is not run. The purpose can be for it to run solely when its dependencies have modified.

The trick is that if I put this script as a “run script” part inside my closing goal dependency evaluation works nice. The script solely runs when the dependencies are up to date. Nonetheless if I put the “run script” part into an mixture goal then add it as a Goal Dependency in the principle goal Xcode needs to run the script each time. No matter if the dependencies have modified. Nonetheless for those who construct simply the mixture goal alone every little thing goes simply superb. It solely builds when it has to.

To me this doesn’t fairly make sense. I assumed that dependency evaluation of the script inside my mixture goal can be the identical no matter whether or not that script was throughout the mixture goal or the principle goal.

In my app I ideally want the mixture goal to be shared by a number of different targets. Whereas I may put the script in every it might be extra foolproof to have them share an mixture goal.

Why would dependency evaluation come to a special conclusion when the script is inside an mixture goal that could be a goal dependency of the principle goal?

If it helps right here is the script and your entire venture could be discovered right here on GitHub if you need to play with it.

mkdir -p "${SCRIPT_OUTPUT_FILE_0}/construct/"

echo "Pausing for 10 seconds earlier than creating information..."
sleep 10

cat "${SCRIPT_INPUT_FILE_0}"

cat > "${SCRIPT_OUTPUT_FILE_0}/construct/index.html" << EOF



    Easy Web page


    
    

Generated at: $(date)

EOF cat > "${SCRIPT_OUTPUT_FILE_0}/construct/web page.html" << 'EOF' Easy Web page EOF