Home Blog Page 3867

RoboBusiness: Learn the way distant interventions can speed up robotic deployments

0


Take heed to this text

Voiced by Amazon Polly

Rosalind Shinkle will be speaking at RoboBusiness this year. Up to now, robotics corporations turned to distant edge case dealing with both as a final step within the refinement of their product or in no way. As an alternative, they relied on prospects to rent, prepare, and employees operators to have the ability to intervene when the robots fail. These teams usually do a small variety of costly pilot deployments with prospects, with skilled employees on-site to rescue the robots after they fail, and would spend years eliminating bugs earlier than lastly attending to 99.9999% reliability and with the ability to massively scale deployments.

However autonomous autos modified the best way roboticists take a look at distant edge case dealing with – we now see distant interventions as a option to speed up mass adoption of our robots by a number of years. Trendy robotics corporations at present are beginning with large-scale deployments instantly when the {hardware} exists, utilizing distant interventions to allow reliability, and fixing bugs as they come up. These corporations could make a revenue off of a robotic that works 95% of the time whereas they proceed to develop autonomous programs in the direction of 99.9999% reliability.

Adagy Robotics hopes to alter this. Adagy Robotics offers distant interventions as a service to different robotics corporations. With Adagy’s know-how, corporations can entry the advantages of distant interventions with out taking over the operational complexity of creating and staffing the programs themselves. This permits robotics corporations to speed up buyer deployments and shut extra follow-on gross sales.

Rosalind Shinkle, co-founder and CEO of Adagy Robotics, might be giving extra insights into what prospects can achieve from distant interventions throughout RoboBusiness. Produced by The Robotic Report, RoboBusiness takes place Oct. 16-17 in Santa Clara, Calif., and is the main occasion targeted on creating business robots and robotics companies. Her speak “Utilizing Distant Interventions to Speed up Deployments by Years,” will happen at 1:45 PM on October 16. 

Earlier than beginning Adagy, Shinkle was a employees robotics engineer at Boston Dynamics, the place she labored on the Spot manipulation group. At Boston Dynamics, she engineered the algorithms that inform Spot’s arm learn how to work together with the world, e.g. learn how to examine manufacturing traces and place delicate objects. Shinkle has a BSE in Mechanical Engineering and Utilized Mechanics and a Grasp’s in Robotics from the College of Pennsylvania.

Hear from Adagy Robotics and extra at RoboBusiness 2024

 

RoboBusiness will function greater than 60 audio system, over 100 exhibitors and demonstrations on the expo flooring, 10+ hours of devoted networking time, the Pitchfire Robotics Startup Competitors, and extra. 1000’s of robotics consultants from all over the world will convene on the occasion.

Along with enabling tech and robotics innovation, RoboBusiness 2024 focuses on investments and enterprise matters associated to working a robotics firm. Keynote talks on the occasion embrace:

  • Rodney Brooks, co-founder and chief know-how officer at Strong AI
  • Sergey Levine, co-founder of Bodily Intelligence and an affiliate professor at UC Berkeley
  • Claire Delaunay, the CTO at farm-ng
  • Torrey Smith, the co-founder and CEO of Endiatx

The present can even embrace a keynote panel on “Driving the Way forward for Robotics Innovation,” that includes:

  • Amit Goel, head of robotics at edge AI ecosystem at NVIDIA
  • John Bubnikovich, president of ABB Robotics US
  • Eric Truebenbach, managing director of Teradyne Robotics Ventures
  • Joan-Wilhelm Schwarze, a senior world innovation supervisor at DHL

Understanding how flies odor could have functions in robotics



Understanding how flies odor could have functions in robotics
Assistant Professor Floris van Breugel and postdoctoral researcher David Stupski of the College of Nevada (picture credit score: Chris Moran).

How does a fly discover its approach to that mouldy banana mendacity hid in a kitchen cabinet? A query of that order was posed by researchers on the College of Nevada. The reply seemingly affords clues as to how robotic techniques is likely to be educated to seek out the supply of chemical leaks or odours, as defined in a examine revealed within the journal Present Biology.

“We don’t at present have robotic techniques to trace odour or chemical plumes,” mentioned co-author Professor Floris van Breugel. “We don’t know how you can effectively discover the supply of a wind-borne chemical. However bugs are remarkably good at monitoring chemical plumes, and if we actually understood how they do it, perhaps we may prepare cheap drones to make use of an identical course of to seek out the supply of chemical compounds and chemical leaks.”

A elementary problem in understanding how bugs observe chemical plumes is that wind and odours can’t be independently manipulated.

To deal with this problem, van Breugel and co-author S. David Stupski used a brand new strategy that makes it attainable to remotely management neurons—particularly these related to odor— on the antennae of flying fruit flies by genetically introducing light-sensitive proteins, an strategy referred to as optogenetics. These experiments, a part of a $450,000 venture funded by means of the Air Drive Workplace of Scientific Analysis, made it attainable to present flies equivalent digital odor experiences in numerous wind circumstances.

What van Breugel and Stupski wished to know: how do flies discover an odour when there’s no wind to hold it? That is, in any case, doubtless the wind expertise of a fly searching for a banana in your kitchen. The reply is within the Present Biology article, “Wind Gates Olfaction Pushed Search States in Free Flight.” The print model will seem within the Sept. 9 subject.

Flies use environmental cues to detect and reply to air currents and wind path to seek out their meals sources, in line with van Breugel. Within the presence of wind, these cues set off an automated “solid and surge” conduct, wherein the fly surges into the wind after encountering a chemical plume (indicating meals) after which casts — strikes aspect to aspect — when it loses the scent. Solid-and-surge conduct lengthy has been understood by scientists however, in line with van Breugel, it was basically unknown how bugs looked for a scent in nonetheless air.

Via their work, van Breugel and Stupski uncovered one other automated conduct: sink and circle, which entails decreasing altitude and making repetitive, fast turns in a constant path. Flies carry out this innate motion persistently and repetitively, much more so than cast-and-surge conduct.

In accordance with van Breugel, essentially the most thrilling side of this discovery is that it reveals flying flies are clearly in a position to assess the circumstances of the wind—its presence, and path—earlier than deploying a method that works effectively below these circumstances. The truth that they will do that is truly fairly stunning—are you able to inform if there’s a light breeze for those who stick your head out of the window of a shifting automobile? Flies aren’t simply reacting to an odour with the identical preprogrammed response each time like a easy robotic, they’re responding in context-appropriate method. This information doubtlessly could possibly be utilized to coach extra subtle algorithms for scent-detecting drones to seek out the supply of chemical leaks.

 

The Info About Steady Penetration Testing and Why It is Vital

0


The Info About Steady Penetration Testing and Why It is Vital

What’s Steady Assault Floor Penetration Testing or CASPT?

Steady Penetration Testing or Steady Assault Floor Penetration Testing (CASPT) is a sophisticated safety follow that entails the continual, automated, and ongoing penetration testing companies of a company’s digital belongings to determine and mitigate safety vulnerabilities. CASPT is designed for enterprises with an evolving assault floor the place periodic pentesting is now not enough. In contrast to conventional penetration testing, which is usually carried out yearly or semi-annually, CASPT is an ongoing course of that integrates immediately into the software program improvement lifecycle (SDLC), guaranteeing that vulnerabilities are found and addressed in real-time or near-real-time.

CASPT is a proactive safety measure designed to remain forward of potential attackers by constantly evaluating the safety posture of a company. It allows safety groups to determine vital entry factors that could possibly be exploited by attackers, validate the effectiveness of present safety controls, and be certain that any newly launched code or infrastructure adjustments don’t introduce new vulnerabilities. Customers can run baseline checks to share adjustments or new updates throughout belongings and related vulnerabilities offering a roadmap for pentesting groups as quickly as adjustments are detected.

What Steady Assault Floor Penetration Testing is Not

Whereas CASPT shares similarities with conventional penetration testing, there are distinct variations:

  1. Not a One-Time Evaluation: Conventional penetration testing is usually a one-time evaluation carried out periodically. CASPT, nevertheless, is an ongoing course of, with checks operating constantly or on a frequent, scheduled foundation.
  2. Not Simply Automated: CASPT shouldn’t be restricted to automated instruments. Whereas automation performs a big function, steady penetration testing additionally entails human experience to conduct extra subtle and context-aware assaults that automated instruments may miss.
  3. Not Remoted: CASPT shouldn’t be a standalone follow. It’s built-in with different safety measures akin to Assault Floor Administration (ASM) and Crimson Teaming workouts to supply a holistic view of a company’s safety posture.

How CASPT is Utilized Throughout Completely different Belongings

Steady Assault Floor Penetration Testing could be utilized throughout a wide range of digital belongings, together with:

  1. Net Functions: Steady testing of internet purposes helps in figuring out vulnerabilities like SQL injection, cross-site scripting (XSS), and damaged authentication mechanisms. Automated instruments can scan for recognized vulnerabilities, whereas handbook testing can uncover complicated logic flaws that automated instruments may miss.
  2. APIs: As APIs develop into extra prevalent, they current an rising assault floor. API Penetration Testing ensures that they’re safe towards widespread threats akin to API key leaks, damaged object degree authorization, and injection assaults.
  3. Cloud Environments: Cloud safety is vital as extra organizations transfer to cloud-based infrastructure. Steady penetration testing within the cloud entails checking configurations, entry controls, and potential vulnerabilities in cloud companies to forestall unauthorized entry and knowledge breaches.
  4. Networks: Community safety is a foundational facet of any group’s safety posture. Steady penetration testing of networks entails scanning for open ports, misconfigured firewalls, and outdated software program that could possibly be exploited by attackers.
  5. Cell Functions: With the proliferation of cellular apps, securing them is essential. Steady penetration testing for cellular apps focuses on vulnerabilities particular to cellular environments, akin to insecure knowledge storage, improper session dealing with, and weak encryption.

Integration with Assault Floor Administration and Crimson Teaming

Integrating steady penetration testing with Assault Floor Administration (ASM) and purple teaming affords a sturdy, dynamic safety method that enhances a company’s resilience towards cyber threats. This is how CASPT integration works and its advantages:

1. Steady Assault Floor Pentesting

CASPT entails the continued, automated evaluation of a company’s techniques to determine vulnerabilities. In contrast to conventional, periodic pentests, this method ensures that safety assessments are all the time updated, serving to to find new vulnerabilities as they emerge.

2. Assault Floor Administration (ASM)

ASM entails constantly monitoring and analyzing a company’s digital footprint to determine weak belongings and affiliate vulnerabilities for prioritization for mitigation of potential assault vectors. This prioritization acts as a roadmap for pentesting lowering invaluable time and assets. When mixed with CASPT, ASM helps organizations preserve an up-to-date understanding of their assault floor, guaranteeing that steady penetration checks are centered on probably the most vital belongings.

3. Crimson Teaming

Crimson teaming simulates real-world cyberattacks by having a crew of moral hackers try and breach the group’s defenses. This supplies a deeper understanding of the effectiveness of the safety measures in place. When mixed with CASPT, purple teaming advantages from up-to-date information of vulnerabilities and assault surfaces, making the simulations extra correct and related.

How the Integration Works

  • Automation and Scalability: CASPT instruments are sometimes automated, permitting them to scan for vulnerabilities at scale and in real-time. When built-in with ASM, these instruments can prioritize scans based mostly on probably the most vital belongings or newly found assault surfaces, guaranteeing that probably the most important dangers are addressed first.
  • Actual-time Menace Detection: ASM supplies a real-time view of the group’s digital footprint, together with any adjustments or new belongings. CASPT can instantly take a look at these new belongings for vulnerabilities, lowering the window of alternative for attackers.
  • Enhanced Crimson Teaming: Crimson groups can use the info from ASM and steady pentesting to focus their efforts on probably the most vital and weak areas. This focused method will increase the probability of uncovering subtle assault vectors that will go unnoticed in a normal pentest.
  • Proactive Safety Posture: By constantly figuring out and testing vulnerabilities, organizations shift from a reactive to a proactive safety posture. This method not solely helps find and fixing vulnerabilities earlier than they’re exploited but additionally in understanding how an attacker may transfer laterally by means of the community.

The advantages of integrating CASPT with different offensive safety instruments like ASM and purple teaming are important together with a decreased assault floor, elevated resilience to resist real-world assaults, cost-efficiencies from decreased breaches and operational downtime, and assembly regulatory necessities by offering ongoing proof of safety practices and vulnerabilities administration.

Continuous Penetration Testing

Why Steady Assault Floor Penetration Testing is Vital

The significance of CASPT is underscored by a number of key advantages:

Price-Effectiveness

Whereas the preliminary funding in CASPT could also be larger than conventional penetration testing, the long-term value financial savings are important. By constantly figuring out and mitigating vulnerabilities, organizations can keep away from the prices related to knowledge breaches, regulatory fines, and reputational injury.

Elevated Visibility

CASPT supplies ongoing visibility into a company’s safety posture. This permits safety groups to determine and handle vulnerabilities as they come up, reasonably than ready for the subsequent scheduled penetration take a look at. For these suppliers who present automated vulnerability validation and mapping, customers may have enhanced visibility with an precise roadmap of all assault paths and routes to recognized vulnerabilities remediating exposures earlier than an precise assault can happen.

Compliance

Many regulatory frameworks and trade requirements now require organizations to conduct common safety assessments. CASPT helps organizations meet these necessities by offering a steady stream of safety testing knowledge that can be utilized to show compliance.

Assault Path Validation and Mapping

Extra revolutionary CASPT suppliers provide organizations with steady validation of their assault paths by with an automated visualization that maps out all potential routes an attacker may take to compromise vital belongings from area, subdomains, IP addresses, and found vulnerabilities. This permits safety groups to focus their efforts on securing probably the most weak areas of their setting.

Why Annual Penetration Testing Is not Sufficient Anymore

We’re all conscious that the cybersecurity panorama is continually evolving, with new threats and vulnerabilities rising day by day. Annual penetration testing, whereas invaluable, is now not enough to maintain up with the tempo of those adjustments. There are a number of the explanation why annual penetration testing falls quick:

  1. Delayed Identification of Vulnerabilities: With annual testing, vulnerabilities could stay undiscovered for months, leaving the group uncovered to potential assaults. CASPT, then again, ensures that vulnerabilities are recognized and addressed as quickly as they’re launched.
  2. Dynamic Environments: Fashionable IT environments are extremely dynamic, with frequent adjustments to code, infrastructure, and configurations. Annual or periodic pentesting doesn’t account for these steady adjustments, probably lacking vital vulnerabilities launched between checks.
  3. Elevated Assault Sophistication: Attackers have gotten extra subtle, using superior strategies that may bypass conventional defenses. Steady testing helps organizations keep forward of those evolving threats by consistently evaluating their safety posture.

High 10 Use Circumstances for Steady Assault Floor Penetration Testing

Contemplating CASPT is determined by numerous elements associated to the group’s safety wants and enterprise targets, trade necessities, and menace panorama. This is a deeper dive into numerous eventualities and when and why a company may think about adopting CASPT:

1. Extremely Dynamic Environments

State of affairs: Organizations with quickly altering IT environments, akin to these continuously deploying new purposes, companies, or updates.

Purpose: In such environments, the assault floor is continually evolving, and conventional periodic pentesting could miss newly launched vulnerabilities. CASPT ensures that each change is examined for safety weaknesses as quickly because it’s made, lowering the danger of unpatched vulnerabilities being exploited.

2. Regulatory and Compliance Necessities

State of affairs: Industries with strict compliance requirements, akin to finance, healthcare, or vital infrastructure, the place sustaining excessive ranges of safety is obligatory.

Purpose: CASPT supplies ongoing proof of vulnerability administration and proactive safety measures, serving to organizations meet compliance necessities like PCI-DSS, HIPAA, or GDPR. This method demonstrates a dedication to safety, which is essential for audits and regulatory reporting.

3. Excessive-Worth Targets

State of affairs: Organizations which can be thought-about high-value targets for cyberattacks, akin to these in finance, healthcare, authorities, or know-how sectors.

Purpose: Excessive-value targets usually tend to be below fixed menace from subtle attackers. CASPT helps to uncover vulnerabilities earlier than attackers do, offering a vital layer of protection by consistently assessing and mitigating dangers.

4. Mature Safety Packages

State of affairs: Organizations which have already established a sturdy safety program and need to transfer in the direction of a extra proactive safety method with offensive safety instruments.

Purpose: For organizations with mature safety practices, CASPT is a pure evolution. It enhances present safety measures, balances present defensive instruments with offensive safety instruments, and supplies ongoing validation of safety controls, guaranteeing they continue to be efficient towards rising threats.

5. Cloud-Native or Hybrid Environments

State of affairs: Organizations that closely depend on cloud infrastructure or function in hybrid or multicloud environments.

Purpose: Cloud environments are sometimes extra fluid and dynamic, with belongings being spun up and down continuously. CASPT in these environments ensures that safety assessments are as agile because the infrastructure, addressing vulnerabilities in real-time and adapting to the shifting panorama.

6. Elevated DevSecOps Practices

State of affairs: Organizations present process digital transformation initiatives, akin to transferring to microservices architectures, adopting DevOps practices, or integrating IoT gadgets.

Purpose: Digital transformation typically introduces new applied sciences and processes that will not have been absolutely assessed for safety dangers. CASPT supplies a mechanism to make sure that because the group transforms, safety retains tempo with these adjustments, stopping gaps that could possibly be exploited.

7. Merger & Acquisition(M&A) Actions

State of affairs: Organizations concerned in mergers or acquisitions the place networks, software program, and folks, processes, and applied sciences merge and overlap.

Purpose: M&A actions can introduce new techniques and networks into a company, typically with little time for conventional safety assessments. CASPT ensures that any vulnerabilities in newly acquired belongings are shortly recognized and addressed, lowering the danger of integrating weak techniques.

8. Third-Social gathering Threat Administration

State of affairs: Organizations that rely closely on third-party distributors or companions the place the availability chain is altering, rising, or is fluid with incoming and outgoing distributors.

Purpose: Third-party distributors can introduce vulnerabilities into a company’s setting particularly as confidential and delicate knowledge is shared and exchanged between organizations. CASPT helps determine and mitigate these dangers by recurrently assessing third-party techniques and integrations, guaranteeing they don’t develop into an assault vector.

9. Alignment with DevSecOps

State of affairs: For organizations adopting DevSecOps practices, CASPT integrates seamlessly into the CI/CD pipeline, guaranteeing that safety is embedded into the event course of.

Purpose: This helps in figuring out vulnerabilities early within the software program improvement life cycle (SDLC), lowering the associated fee and energy of fixing them later.

10. Enhanced Incident Response

State of affairs: Steady pentesting supplies a continuing circulation of safety knowledge, which could be invaluable for incident response groups.

Purpose: This knowledge helps in understanding the group’s safety posture and in figuring out potential weaknesses that could possibly be exploited throughout an assault.

When To not Think about Steady Pentesting

Smaller organizations with restricted safety budgets or personnel could discover it difficult to implement and handle CASPT. In such circumstances, utilizing a third-party CASPT supplier will help present the experience and assets wanted. Additionally mixed with periodic pentesting and different safety measures could make CASPT extra possible.

As well as, organizations with comparatively static IT environments could not require the fixed evaluation supplied by CASPT. Periodic pentests, mixed with common safety audits, could also be enough to take care of safety.

CASPT is especially helpful for organizations working in dynamic, high-risk environments, these with stringent compliance necessities, or these trying to undertake a extra proactive safety posture. It supplies real-time visibility into vulnerabilities, enhances threat administration, and aligns nicely with trendy safety practices like DevSecOps.

Greatest Practices for Implementing Steady Assault Floor Penetration Testing

Implementing CASPT requires cautious planning and execution. Listed here are some greatest practices to contemplate:

  1. Decide Frequency: The frequency of CASPT must be based mostly on the group’s threat profile, the criticality of belongings, and the frequency of adjustments to the setting. For instance, extremely dynamic environments could require day by day or weekly testing, whereas much less dynamic environments could solely want weekly or bi-monthly testing.
  2. Set Clear Aims and Targets: Earlier than implementing CASPT, organizations ought to outline clear targets and targets for the testing course of. This contains figuring out the belongings to be examined, the varieties of vulnerabilities to deal with, and the specified outcomes of the testing.
  3. Set up Clear Communication Channels: Efficient communication is vital to the success of CASPT. Organizations ought to set up clear communication channels between safety groups, builders, and different stakeholders to make sure that vulnerabilities are addressed promptly.
  4. Use of Each Guide and Automated Testing Strategies: Whereas automation is a key part of CASPT, handbook testing is equally necessary. Automated instruments can shortly determine recognized vulnerabilities, whereas handbook testing can uncover extra complicated points that require human experience.

Conclusion

Steady Assault Floor Penetration Testing represents a basic shift in how organizations method safety. By adopting a proactive, steady method to penetration testing, organizations can keep forward of rising threats, enhance their safety improvement cycle, and shield their most respected belongings. Whereas the preliminary funding in CASPT could also be larger, the long-term advantages—akin to value financial savings, elevated visibility, and enhanced compliance—make it a vital part of any trendy safety technique.

In a world the place cyber threats are consistently evolving, annual penetration testing is now not enough. Steady Assault Floor Penetration Testing affords a more practical, complete, and well timed method to securing a company’s digital belongings. By integrating CASPT with different offensive safety practices like Assault Floor Administration and Crimson Teaming, organizations can guarantee a sturdy offense towards even probably the most subtle attackers.

In abstract, Steady Penetration Assault Floor Testing isn’t just a safety measure—it is a strategic benefit. Organizations that embrace CASPT can count on to realize larger resilience by taking the combat again to attackers and enjoying at their very own recreation.

Discovered this text fascinating? This text is a contributed piece from considered one of our valued companions. Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



Kamala Harris’s DNC speech must take a web page from Joe Biden’s e book

0


President Joe Biden guess his reelection bid on the concept American voters in November would care about the destiny of American democracy. The typical knowledge now is that Biden was flawed and that Vice President Kamala Harris will not be solely stepping away from his technique however doing so for good causes.

Many Democratic political sorts right now imagine that “democracy” is a message that’s each drained and summary, one thing that preoccupies elites however not the important thing voting demographics. They cite information displaying ”democracy” on the backside of the checklist of voter considerations within the 2024 election, with points like inflation, immigration, and abortion inserting nicely forward of what Joe Biden handled as concern primary.

It seems Harris has taken the traditional knowledge to coronary heart. Reporting in Axios and the Washington Publish exhibits that Harris makes use of the phrase “democracy” far lower than Biden did in each promoting and stump speeches — mentioning it solely 12 instances in her first 9 marketing campaign rallies.

Reasonably than casting the Trump-Vance ticket as a menace to democracy, the Harris-Walz marketing campaign prefers to explain them as “bizarre” males aiming to curtail People’ freedom. The language of freedom has suffused the Democratic Nationwide Conference thus far, and can virtually definitely be a centerpiece of Harris’s deal with on Thursday evening.

But I feel the traditional knowledge is flawed in practically each respect. Harris mustn’t abandon democracy as a marketing campaign concern, however moderately double down on it.

Democracy is a extra highly effective concern than polling would possibly counsel: It doubtless swung the 2022 midterms Democrats’ means, and a few analysis suggests it stays potent in 2024. Democracy messaging is particularly persuasive with reasonable Trump-skeptical Republicans, an necessary voting bloc in swing states across the nation. Given its confirmed observe document of success with a vital demographic, democracy must be a big a part of Harris’s message.

Integrating democracy doesn’t require ditching the clearly efficient freedom messaging: Harris can fairly simply spend extra time highlighting assaults on democratic freedoms, speaking about “the liberty to vote” as one among a number of important liberties Trump and Mission 2025 plan to assault. That’s what a number of the Democratic pollsters who helped develop the celebration’s “freedom” message again in 2022 at the moment urge her to do.

“Saying ‘we’re making an attempt to guard your freedom to vote’ and ‘we’re making an attempt to guard your freedom to have a household whenever you wish to’… these two issues collectively body that story in a means that makes individuals care about democracy,” Jen Fernandez Ancona, vice chairman of the progressive technique group Manner To Win, informed Vox.

If Harris listens to the traditional knowledge as a substitute, she’ll be leaving a robust marketing campaign concern — and doubtlessly some essential votes — on the desk.

The case that democracy issues in American politics

Sarah Longwell is a longtime Republican strategist who, since 2016, has made it her life’s work to determine the way to get her fellow conservatives to ditch the Republican Celebration. As the pinnacle of a gaggle referred to as Republican Voters Towards Trump, she has performed “lots of and lots of” of focus teams with persuadable Republican moderates — a scientific try to determine how they is perhaps satisfied to ditch the Trumpified GOP.

When she talks to former Trump voters, they are saying the identical factor over and over: that his assault on democracy pushed them out of the celebration.

“I take heed to why voters who voted for Trump now refuse to take action, and the No. 1 motive is that January 6 was a pink line for them. They had been out after that,” Longwell says.

The 2022 midterms confirmed that these voters mattered — that these voters aren’t simply necessary, however doubtlessly decisive in vital states.

We bear in mind 2022 as a Democratic victory as a result of the celebration managed to make beneficial properties within the Senate whereas struggling minimal losses within the Home — defying the historic rule that the celebration in command of the White Home loses within the midterms. However this wasn’t the results of a blue wave: Republicans acquired a number of million extra votes in Home races nationally than Democrats. What occurred as a substitute is that Democrats excelled in a handful of key races, making historical past because of this.

So what occurred in these key races? The Dobbs ruling was a significant a part of the story. However so too was democracy.

A number of separate information analyses, performed by sources starting from Stanford political scientists to the Democratic information agency Catalist, tried to estimate a “MAGA penalty”: how a lot Republicans who parroted Trump’s “large lie” about 2020 suffered on the poll field relative to different Republicans. On the entire, these estimates converge someplace within the neighborhood of a two- to three-point penalty for MAGA candidates, with some estimates going as excessive as 5 or 6.

With out this impact, Democrats doubtless wouldn’t management the Senate: Georgia Sen. Raphael Warnock beat his opponent, Trump darling Herschel Walker, by 2.8 share factors. Furthermore, extremists would virtually definitely maintain key statewide positions: Kari Lake, the Republican candidate for governor in Arizona who made the large lie central to her message, misplaced by lower than a share level.

After the election, I interviewed a number of Democratic candidates and strategists who fought and received races towards election deniers. They informed me that placing democracy first was a significant element of their victory.

“Voters are simply uninterested in the bullshit. They realize it’s nonsense, that there’s no proof behind the large lie or any of that stuff, they usually rejected it,” Adrian Fontes, Arizona’s secretary of state who was first elected in 2022, informed me on the time.

Democratic strategists are absolutely conscious of what occurred final election, however not all of them are satisfied that it’ll work the identical means in 2024.

“[Democracy messaging] labored extraordinarily nicely with the oldsters we wanted within the midterms, which was these suburban college-educated of us who voted each time and don’t like the present route of the Republican Celebration. [But] these of us are already with us,” says Lanae Erickson, a senior vice chairman on the center-left Third Manner suppose tank.

Which may not be true. Anat Shenker-Osorio, the pinnacle of the progressive messaging outfit ASO Communications, just lately performed a randomized experiment testing the impact of adverts that includes January 6. She discovered that the adverts “did an honest job” swinging voters away from Trump and towards Harris, particularly by making voters within the examine join Trump to political violence.

This tactic is particularly prone to work with reasonable Republicans. Key races in 2022 had been decided, largely, by a small group of registered Republicans who crossed the aisle to vote towards extremists. However these similar voters had been typically completely joyful to vote for a extra regular Republican: In Georgia, for instance, incumbent Republican Gov. Brian Kemp handily defeated Democrat Stacey Abrams with help from anti-Herschel Walker Republicans.

It’s removed from apparent that these voters are steady Democrats, and Harris will want them if she desires to rebuild the coalition that powered Joe Biden to victory in 2020. As such, it will be unwise to desert essentially the most confirmed line of argument for reaching them: that democracy is at stake and due to this fact partisan grievances must take a again seat to saving the republic.

It’s maybe comprehensible why Harris and her marketing campaign seemingly selected to step away from the message, given Biden’s marketing campaign struggles even earlier than the disastrous June debate, however that skepticism can be flawed. Whereas democracy was certainly on the middle of his doomed marketing campaign, it’s laborious guilty the message for its failure. All the things we’ve seen since June means that considerations about Biden’s age made it unimaginable for any message, irrespective of how good, to interrupt via with persuadable voters.

Latest proof means that Harris can successfully make a democracy argument in a means Biden couldn’t. A just-released tutorial examine — the primary to look at the impact of democracy rhetoric on help for Harris particularly — means that she may make inroads amongst persuadable Republicans by specializing in democracy.

The examine’s authors confirmed Republican voters “democracy is on the poll”-type messaging and requested them the way it affected their political opinions. On the entire, the authors discovered, the results had been minimal and at instances even counterproductive — inflicting Republicans to dig in tougher on their partisan id. This sort of rhetoric, they conclude, “doesn’t change the attitudes that allowed Trump to problem the legitimacy of the 2020 election.”

However there was a notable exception to those dour findings: vote alternative within the 2024 election.

After a Republican viewers heard “democracy is on the poll”-type rhetoric, Harris’s help within the group greater than tripled — going from 2.3 p.c to 7.3 p.c. “The remedy induces a damaging emotional response in Republicans and successfully shames them to report help for Harris,” the examine’s authors write.

Unsurprisingly, the impact light as time handed; it’s laborious to alter somebody’s thoughts completely after a single experiment. However maybe repeating anti-authoritarian messaging via a complete marketing campaign might need extra sturdy results.

For all their considerations concerning the limits of this strategy, the authors concede that democracy messaging “has fascinating results within the short-term (a single election).”

How Harris can marketing campaign on democracy — and win

Registered Republicans aren’t the one sort of persuadable voters who matter. There’s a a lot bigger group of independents who don’t usually pay very a lot consideration to politics or particularly like both main celebration. These voters are more likely to end up in presidential elections than in midterms, and, per polling, are largely unmoved by pro-democracy rhetoric.

“Our mantra has turn out to be ‘you defend democracy by training it.’ And also you apply it by specializing in voters within the center,” says Liam Kerr, co-founder of the Democratic WelcomePAC. “A number of gettable voters — particularly at this level, after eight years — don’t imagine that stormtroopers are going to come back into the streets the day after the election.”

However no matter message you suppose this group desires — be it tough-on-the-border centrism, a liberal deal with abortion bans, or middle-class financial populism — it’s not apparent that it trades off with pro-democracy messaging.

Any good marketing campaign develops totally different messages for various teams: There’s little alternative value in focusing extra on democracy when reaching out to reasonable suburban Republicans than disaffected downscale Democrats. Even a high-profile deal with like her DNC speech can embody a fairly sized part on such a vital concern with out dragging.

Furthermore, it’s attainable to tie a number of messages collectively, particularly via overarching themes like “freedom.”

In my new e book The Reactionary Spirit, I examine how pro-democracy candidates — in the US and around the globe — beat authoritarian rivals in elections. One of the vital constant findings is that it’s attainable, and fairly efficient, to marketing campaign on democracy along side different points: displaying how anti-democratic politics impacts voters’ lives in concrete methods.

In Brazil’s 2022 presidential election, the left-wing candidate Luiz Inacio Lula da Silva linked democracy to his core message of advancing financial equality, describing it as a automobile to construct shared prosperity. In Budapest’s 2019 mayoral election, the opposition candidate Gergely Karácsony tied democracy to housing, arguing that the focus of energy within the fingers of the ruling Fidesz celebration was answerable for the federal government’s failure to handle excessive prices of dwelling.

Within the e book, I name this technique “linkage” and argue that Democrats used a model of it successfully within the midterms. In linking abortion restrictions and January 6 as shared assaults on American freedoms, they made a powerful case that Republicans had been an extremist celebration attacking cherished American values.

Harris’ “freedom” marketing campaign makes a linkage technique exceptionally simple to execute. She doesn’t want to transform her marketing campaign rhetoric or technique, however moderately spend extra effort and time explaining why the best to decide on your personal leaders is one among a number of necessary freedoms imperiled by the Trump-Vance ticket.

One other efficient avenue for making democracy really feel actual is by attacking Trump’s concepts, particularly these contained in the Mission 2025 planning doc.

Simply over every week earlier than Joe Biden dropped out, I attended a method assembly on the Heart for American Progress (CAP) — the Democratic institution’s main DC suppose tank — concerning the celebration’s Mission 2025 messaging. The information confirmed that Democrats had performed a outstanding job at each elevating consciousness of Mission 2025 and convincing People that it was a foul factor.

CAP’s researchers wished to know why, and the way Democrats may take benefit in November. So that they performed in depth interviews with voters, with a particular deal with Black and Latino voters who some polls confirmed shifting into the Trump column. As a part of this analysis, they introduced voters with a sequence of assault strains on Mission 2025 and requested them to charge which had been most and least regarding.

All 4 of the top-performing messages — those voters persistently ranked as most regarding — targeted on the menace its proposals posed to democracy. The most effective was a so-called “robust man” message, arguing that “the restructuring of presidency that Mission 2025 lays out is much like the playbook dictators and authoritarian governments have used repeatedly during the last century.”

After I spoke with the researchers once more after Biden dropped out, they argued that Harris wanted to maintain up this theme. It labored, they mentioned, as a result of it picked up on one thing necessary to many citizens — their freedom to decide on who governs them — and linked it to one thing new.

“There’s 800 pages of the identical outdated conservative nonsense in right here. However what’s so totally different is the strategy, the means to finish it — it’s the takeover. And other people freak out about that,” says Joe Radosevich, CAP’s vice chairman for campaigns and outreach.

Campaigning on democracy, in different phrases, isn’t nearly repeating the phrase “democracy” like a mantra. It’s about determining artistic methods to make the protection of democracy really feel important and related. And there are many methods for Harris to do exactly that.

finder – Easy methods to take away a file on a SMB share named “.”?

0


Overview

Incorrect specification of an argument in a commandline device (particulars beneath) has led to the creation of a file actually named “.”. I’ve already discovered that straight making an attempt to delete in Finder will set off deletion of all content material within the containing folder (thankfully this can be a non permanent folder), however nonetheless not the “.” file itself. Furthermore, no folders containing this file may be efficiently deleted, neither with Finder nor from bash/zsh shell.

How can one truly delete (or rename) such a file?


Makes an attempt to delete from zsh

For instance:

mytmp % ls -hal
whole 65
drwx------  1 consumer  employees    16K Aug 21 11:20 .
-rwx------  1 consumer  employees     0B Aug 21 09:51 .
drwx------  1 consumer  employees    16K Aug 16 16:30 ..

mytmp % ls -aB
.   .   ..

mytmp % rm -rf '.'                   
rm: "." and ".." will not be eliminated

mytmp % cd ..

scratch % rm -rf mytmp
rm: mytmp: Permission denied

scratch % sudo rm -rf mytmp
rm: mytmp: Permission denied

I’ve additionally tried variations with out -r, since actually it’s the non-directory model that’s to be deleted.

I moreover tried the suggestion of @bmike to use the inode. Whereas we are able to determine the inode, the deletion doesn’t seem to work:

scratch % ls -ila mytmp
whole 65
8056451580272514705 drwx------  1 consumer  employees  16384 Aug 21 11:20 .
8652239633868421122 -rwx------  1 consumer  employees      0 Aug 21 09:51 .
                  2 drwx------  1 consumer  employees  16384 Aug 21 11:43 ..

scratch % discover mytmp -inum 8652239633868421122 -delete

## no change
scratch % ls -ila mytmp
whole 65
8056451580272514705 drwx------  1 consumer  employees  16384 Aug 21 11:20 .
8652239633868421122 -rwx------  1 consumer  employees      0 Aug 21 09:51 .
                  2 drwx------  1 consumer  employees  16384 Aug 21 11:43 ..

Is it actually named “.”?

@nohillside proposed to delimit the listings with x and y to see if it actually is called “.”. From bash:

bash-3.2$ for i in .*; do echo x${i}y; completed
x.y
x.y
x..y

Seems so.

@fd0 instructed printing non-printing characters with cat -vet. From bash:

bash-3.2$ ls -1a | cat -vet
.$
.$
..$

Once more, appears identically named.

@nohillside Steered working a Python server from the listing and show its listing itemizing:

Directory listing from Python server is empty


Further Background

The folder is on a community Quantity, format SMB (OS X).

The device that resulted on this was haplogrep, a Java-based CLI. One can set up it by way of Conda by way of

conda set up -c conda-forge -c bioconda haplogrep

The subcommand used was haplogrep classify, which has the next choices:

mytmp % haplogrep classify

mtDNA Haplogroup Classifiction v2.4.0
https://github.com/seppinho/haplogrep-cmd
(c) Sebastian Schönherr, Hansi Weissensteiner, Lukas Forer, Dominic Pacher
[email protected]

[classify]
Lacking required choices: '--input=', '--output=', '--format='
Utilization: haplogrep classify [--chip] [--extend-report] [--rsrs]
                          [--skip-alignment-rules] [--write-fasta]
                          [--write-fasta-msa] --format=
                          [--hetLevel=] [--hits=] --in=
                          [--lineage=] [--metric=] --out=
                          [--phylotree=]
      --chip                VCF knowledge from a genotype chip
                              Default: false
      --extend-report       Add flag for a prolonged closing output
                              Default: false
      --format=     Specify enter file format: vcf, fasta or hsd
      --hetLevel= Add heteroplasmies with a stage > X from the VCF
                              file to the profile (default: 0.9)
      --hits=         Calculate finest n hits
      --in, --input=    Enter VCF, fasta or hsd file
      --lineage=   Export lineage info as dot file, n0=no
                              tree, 1=with SNPs, 2=solely construction, no SNPs
      --metric=     Specifiy different metrics (hamming or jaccard) than
                              default (kulczynski)
      --out, --output= Output file location
      --phylotree=    Specify phylotree model
      --rsrs                Use RSRS Model
                              Default: false
      --skip-alignment-rules
                            Skip mtDNA nomenclature fixes based mostly on guidelines for
                              FASTA import
                              Default: false
      --write-fasta         Write leads to fasta format
                              Default: false
      --write-fasta-msa     Write a number of sequence alignment (_MSA.fasta)
                              Default: false

I misinterpreted the “Output file location” description of the --out argument as asking for a path, main me to make use of --out . and thus leading to making a file named “.”.

Renaming

The file itself can’t be renamed in Finder or with mv, nevertheless, the containing folder may be renamed.