Toggle light / dark theme

There are a wealth of light fleet, business, and commercial applications where single occupants dominate,” says Paul Rivera, Electra Meccanica president and CEO. “From fast food franchise delivery and pizza delivery, to grocery delivery, small parcel and post, to tech repair and security firms, the Solo Cargo EV is the ideal solution to help companies minimize operational costs and maximize efficiency.


A hatchback is usually a solid choice for hauling cargo, but when the hatchback in question is a single-seat three-wheeler, things get a little more cramped. Canadian EV maker Electra Meccanica looks to solve this dilemma with a new cargo version of its three-wheeled all-electric Solo, replacing the usual lift-gate with a dedicated cargo trunk.

Adding a big rear box to a car as tiny and curvy as the Solo would usually be a drag on aesthetics, but Electra Meccanica has managed to integrate it pretty well. From the front 3/4 position, the new trunk looks almost like an aerodynamic Kamm tail element … or maybe a hyper-boost jet thruster.

We’re sure some will disagree on how well the cargo trunk blends with the pre-existing Solo design, but there’s no arguing with a dedicated 226 liters of storage in a car as small and space-deprived as the Solo. That’s an increase from the standard model’s 142 liters. Electra has developed the Solo Cargo with commercial customers in mind and says that the cargo box can be customized with third-party upgrades like warming/refrigeration, lighting, internal shelves and bins, and more.

A now-patched high-severity security vulnerability in WhatApp’s image filter feature could have been abused to send a malicious image over the messaging app to read sensitive information from the app’s memory.

Tracked as CVE-2020–1910 (CVSS score: 7.8), the flaw concerns an out-of-bounds read/write and stems from applying specific image filters to a rogue image and sending the altered image to an unwitting recipient, thereby enabling an attacker to access valuable data stored the app’s memory.

Eight states will roll out a feature allowing users to add driver’s license and state IDs to Apple Wallet for iPhone and Apple Watch to use at security at participating airports, Apple announced Wednesday.

Arizona and Georgia are the first states to adopt the feature and Connecticut, Iowa, Kentucky, Maryland, Oklahoma and Utah will follow, though the company did not specify a timeline.

The news comes just months after Apple said at its Worldwide Developers Conference in June that it was working on the feature with the Transportation Security Administration. The update is a crucial step in Apple’s plan to replace physical wallets and will offer more convenience to travelers looking for a touchless airport experience, the company said.

# On the Opportunities and.
Risks of Foundation Models.

AI is undergoing a paradigm shift with the rise of models (e.g., BERT, DALL-E, GPT-3) that are trained on broad data at scale and are adaptable to a wide range of downstream tasks. We call these models foundation models to underscore their critically central yet incomplete character.

This report provides a thorough account of the opportunities and risks of foundation models, ranging from their capabilities (e.g., language, vision, robotics, reasoning, human interaction) and technical principles (e.g., model architectures, training procedures, data, systems, security, evaluation, theory) to their applications (e.g., law, healthcare, education) and societal impact (e.g., inequity, misuse, economic and environmental impact, legal and ethical considerations).

Though foundation models are based on conventional deep learning and transfer learning, their scale results in new emergent capabilities, and their effectiveness across so many tasks incentivizes homogenization.

Homogenization provides powerful leverage but demands caution, as the defects of the foundation model are inherited by all the adapted models downstream.

Despite the impending widespread deployment of foundation models, we currently lack a clear understanding of how they work, when they fail, and what they are even capable of due to their emergent properties.

To tackle these questions, we believe much of the critical research on foundation models will require deep interdisciplinary collaboration commensurate with their fundamentally sociotechnical nature.

## Original Full Paper (211 pages)

https://arxiv.org/pdf/2108.07258.pdf.

Thanks to Folkstone Design Inc.

#AI #ML #FoundationModels #ComputerAndSociety #SocialImlications.

Photo by yuyeung lau on unsplash.

https://arxiv.org/abs/2108.07258?sf149288348=1

Qualcomm has unveiled the world’s first drone platform and reference design that will tap in both 5G and AI technologies. The chipmaker’s Flight RB5 5G Platform condenses multiple complex technologies into one tightly integrated drone system to support a variety of use cases, including film and entertainment, security and emergency response, delivery, defense, inspection, and mapping.

The Flight RB5 5G Platform is powered by the chipmaker’s QRB5165 processor and builds upon the company’s latest IoT offerings to offer high-performance and heterogeneous computing at ultra-low power consumption.

Facebook and Google have both already laid thousands of miles of undersea internet cable together, and are in the process of laying thousands of miles more.

Google announced in June it would lay a cable linking the US East Coast to Argentina, and both companies announced in March they were funding two cables hooking up the US West Coast with Singapore and Indonesia.

Over the course of 2020 and early 2021, Google and Facebook both scrapped numerous projects linking the US with Hong Kong in response to political pressure with the US government, which cited security concerns.

It must be stressed an underlying condition to any 2FA alternative is the user themselves must have some level of active participation and responsibility.

At the same time, further work must be carried out by service providers, developers, and researchers to develop more accessible and secure authentication methods.

Essentially, these methods need to go beyond 2FA and towards a multi-factor authentication environment, where multiple methods of authentication are simultaneously deployed and combined as needed.

While other energy superpowers such as the United States, Saudi Arabia, and Russia have clung to their prodigious oil and gas industries to varying degrees, China has gone all-in on establishing their own energy security and independence, a large portion of which will soon be sourced from clean energy resources.


As the global energy transition accelerates, China appears to be miles ahead of the competition when it comes to securing itself for a future without fossil fuels.

A study by NASA has used precision-tracking data from the Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer (OSIRIS-REx) spacecraft to more accurately plot the route of potentially hazardous asteroid Bennu from now until the year 2300.

The agency’s new data, published this week in Icarus, has significantly reduced the uncertainties related to its future orbit, and improved scientists’ ability to determine the total impact probability and predict the orbits of other asteroids.

“NASA’s Planetary Defense mission is to find and monitor asteroids and comets that can come near Earth and may pose a hazard to our planet,” said Kelly Fast, program manager for the Near-Earth Object Observations Program at NASA Headquarters in Washington. “We carry out this endeavour through continuing astronomical surveys that collect data to discover previously unknown objects and refine our orbital models for them. The OSIRIS-REx mission has provided an extraordinary opportunity to refine and test these models, helping us better predict where Bennu will be when it makes its close approach to Earth more than a century from now.”