Statements are colour-coded for clarity, indicating similarity to existing content (green), lack of relevant content (orange), or insufficient information for evaluation (unhighlighted).
Google’s Gemini AI users can now verify the authenticity of the content generated by the chatbot using Google. When Gemini AI offers a response to a query, users can cross-check the information provided in the AI-generated content using the Google search engine.
Gemini has added a Google toggle right below the AI-generated content labelled “double-check response,” which can quickly cross-verify the authenticity of the content generated by Gemini AI. This feature can be accessed on both the mobile app and the web version of Gemini AI.
The new feature is available on both app and web version of Gemini.
Google says, “The double-check responses feature helps you assess the credibility of Gemini’s statements using Google Search to find content that’s likely similar or different.”
For easier understanding, the cross-verification classifies statements into three different colours. Text highlighted in green suggests that Google search has found content similar to the AI-generated information and includes a link to it.
Similarly, if the text is indicated in orange, it means that Google did not find relevant content. Lastly, if part of the text is not highlighted, it indicates there isn’t much information on the web similar to the AI-generated content to evaluate it.
Depending on the response generated by Gemini AI, it could contain information similar to the generated response, and part of the response might not be relevant, with no such information accessible on the web by Google.
Large language models like Gemini AI are known to have issues such as generating inaccurate information, which can affect the credibility of their output. Google has integrated a double-checking feature using its search engine with the Gemini chatbot, making it easier for users to verify the accuracy of the AI-generated content.
Since the launch of OpenAI's ChatGPT in November 2022, Google has been racing to produce AI software to rival that of the Microsoft-backed company.
Unlike current diesel-powered ferries that emit pollutants, the hydrogen-powered Sea Change produces only heat and water vapor as byproducts.
The world’s first commercial passenger ferry powered by 100% hydrogen fuel, the MV Sea Change, was launched on Friday at the San Francisco Ferry Building. The 70-foot catamaran can transport up to 75 passengers along the waterfront between Pier 41 and the downtown San Francisco ferry terminal starting July 19.
Unlike current diesel-powered ferries that emit pollutants, the hydrogen-powered Sea Change produces only heat and water vapor as byproducts. Passengers can even drink the emissions from an onboard water fountain. The service will be free for six months as part of a pilot program.
“The implications for this are huge because this isn’t its last stop,” said Jim Wunderman, chair of the San Francisco Bay Area Water Emergency Transportation Authority. “If we can operate this successfully, there are going to be more of these vessels in our fleet and in other folks’ fleets in the United States and we think in the world.”
The Sea Change can travel about 300 nautical miles and operate for 16 hours before needing to refuel. The hydrogen fuel cells produce electricity by combining oxygen and hydrogen in an electrochemical reaction.
The project was financed and managed by SWITCH Maritime, with the vessel constructed at Bay Ship and Yacht in Alameda, California, and All-American Marine in Bellingham, Washington. Officials hope the technology can help clean up the shipping industry, which produces nearly 3% of the world’s total greenhouse gas emissions.
“The real value of this is when you multiply out by the number of ferries operating around the world,” said Frank Wolak, president and CEO of the Fuel Cell and Hydrogen Energy Association. “There’s great potential here. This is how you can start chipping away at the carbon intensity of your ports.”
The Sennheiser Momentum Sport is a unique truly wireless earphone designed for the gym-goers who prioritise fitness tracking and situational awareness alongside great sound.
Are there a pair of perfect wireless earphones for the gym? Well, Sennheiser seems to think so and its Sennheiser Momentum Sport wants to stand out in the gym by offering more than audio awesomeness.
The Sennheiser Momentum Sport is a different truly wireless earphone, in many ways than one. To start with, the design is unique, both for the earpieces as well as the charging case. The charging case is larger than usual and has a rubber finish which suggests clearly that it wants to be used in sweaty conditions or near the pool. Also, the charging port at the back is also protected by a rubber flap. The olive green colours of the review unit is something unique and will stand out for sure.
Momentum Sport comes in a large rubber charging/carry case.
The earpieces are different in their shape and size. It is not exactly larger than the largest ones I have used, but its teardrop-like shape makes it feel so for sure. Because of this, it also comes with fins that need to be looped in to keep the earpieces in place when you are on the treadmill or like me treading the local roads in the humid Delhi climate. You will have to spend a few minutes getting the fit of the fin perfect as it needs to be aligned with some dots on the earpieces.
Towards the inside of the earpiece, there are a host of sensors and they do more than you ever imagined. For instance, this is the first earphone I have used that works with taps near it and not exactly on it. You can pause/play or skip songs by tapping on your face, near the earpiece. Very interesting. The sensors also capture your heart rate and body temperature which you can monitor on the app — not a new feature on an earphone, but still a very useful one given it’s not very commonplace. The heart rate was exactly the same as what my Apple Watch was showing and this means you can use this as a source for fitness apps like Polar which the Sennheiser app connects to.
I am not sure I like this design as I could feel the earphones on my ears all the time. The ones that I love are those I can forget about after a few minutes and sort of become a part of your ears. These seem a few grams heavier than my ears are used to. You will need to ensure you try the fit test and get the silicone tip that keeps the earpiece in place and noise out.
I have said this before, you really don’t need to talk about the audio quality of a Sennheiser and the same holds true for the Momentum Sport as well. A few seconds into Amber Rubarth’s Strive and I knew this one had crossed the threshold of audio quality without any issue. Holly Cole’s Train Song might not be the one you will play at the gym to get pumped up, but then this one is great to sweat out any earphone worth its salt. And the Momentum Sport came out in flying colours as I could hear the small “trings and twings” in the background well, along with their movements.
As I listened to Raayan Rumble by A R Rahman, I could not help but notice that the volume was a bit low for my liking even at the highest levels and with a bass boost. This is one song you would like to hear at high volume to feel the impact, especially in a gym. But the open design means you have to be aware of the surroundings and the volume levels will be a bit lower than the regular Sennheiser Momentum for instance. I am just worried that there will be some Punjabi gym music that will seep in despite spending top dollar on this earphone.
The buds themselves are slightly bulky and heavier, as they pack additional sensors.
The Momentum Sport comes with adaptive noise cancellation and you feel this when out in the open as it automatically goes into a mode where you are aware of your surroundings. But then India is a noisy place and you want to cut out the noise at times and that is where you can use the app to switch back to full noise cancellation. The call quality is very good and does not have the tinny feel some Sennheiser earphones used to have earlier.
At Rs 27,990, the Sennheiser Momentum Sport makes great sense for those who spend a lot of time in the gym every day. Remember, this is not the earphone you would buy to lounge at home with your acoustic playlist but will take you to your gym to capture your heart rate and body temperature as you listen to your high-tempo playlist but without losing the sense of where you are. The Sennheiser Momentum Sport is a new take on the earphone, one that has been created for a special use case. This is going to add to your gym game for sure.
Explore the issues surrounding cybercrime. Learn about legal frameworks, and how cybercrime is being addressed around the world
Cybercrime
AI and cybercrime
The AI race between cybercriminals and those who try to protect systems is emerging as one of the most critical for the stability and safety of the digital world. Let’s see how AI is being used:
AI as a tool to commit cybercrime
Automated hacking uses AI to find new vulnerabilities more rapidly than human hackers. Phishing attacks are about using AI to generate fake emails and find targets for phishing. AI is used to prepare patterns for brute-force password cracking. AI facilitated a new generation of deepfakes that can produce realistic audio and video, which could be used for fraud, disinformation campaigns, and blackmail. In particular, deepfakes can be used for impersonation attacks. As data feeds into AI, data poisoning can mislead AI for cybercrime purposes. AI-powered bots can be used for Distributed Denial of Service (DDoS) attacks or for spreading misinformation on social media platforms.
AI as a tool to prevent cybercrime
AI empowers anomaly detection by identifying normal behaviour patterns within computer networks and deviations that could indicate a cyberattack. Predictive analytics can analyse historical data and identify patterns often leading to cyber-attacks. AI improves malware and phishing detection by identifying phishing emails or malicious links. Once a cyberattack happens, AI can automate incident response by automatically isolating affected systems, closing specific network paths, or even implementing patches to software vulnerabilities.
Cybercrime: Threats and attacks
The techniques used to facilitate the types of cybercrime that affect the confidentiality, integrity and availability of data and systems are very diverse and more and more sophisticated. Some of the most widespread techniques include:
Malicious software: This includes viruses, spyware, and other unwanted software that is installed on computers and other devices without permission and performs unwanted tasks, often for the benefit of the attacker. These programs can damage devices, and can be used to steal personal information, monitor and control online activity, send spam and commit fraud, as well as infect other machines on the network. They also can make devices vulnerable to viruses and deliver unwanted or inappropriate online advertisements.
Viruses, trojan horses, adware, and spyware are all types of malware. A virus can replicate itself and spread to other devices, without the user being aware. Although some viruses are latent, most of them are intended to interfere with data or affect the performance of devices (reformatting the hard disk, using up computer memory, etc). A trojan horse is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users’ systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on users, steal sensitive data, and gain backdoor access to users’ system. Adware collects marketing data and other information without the user’s knowledge, or redirects search requests to certain advertising websites.
Spyware monitors users, gathers information about them and transmits it to interested parties, without the users being aware. Types of information gathered can include: the websites visited, browser and system information, the computer IP address, as well as more sensitive information such as e-mail addresses, and passwords. Additionally, malware can cause browser hijacking, in which the user’s browser settings are modified without permission. The software may create desktop shortcuts, display advertising pop-ups, as well as replace existing home pages or search pages with other pages.
Botnets: Botnets are networks of hijacked personal computers that perform remotely commanded tasks without the knowledge of their owners. A computer is turned into a bot after being infected with specific type of malware which allows remote control. Botnets are used for a wide variety of crimes and attacks: distributing spam, extending malware infections to more computers, contributing to pay-per-click fraud, or identity theft. One of the most worrying uses of botnets is to perform distributed denial of service (DDoS) attacks.
Researchers and cybersecurity companies have warned that botnets are becoming the biggest Internet security threat, as they are increasing the effects of viruses and other malicious programs, raising information theft, and boosting denial of service attacks. As an illustration of the dimension of this threat, the Simda botnet, taken down in April 2015, affected computers in 190 countries and involved the use of 14 command-and-control servers in five countries.
Denial of service (DoS) attacks: These attacks involve flooding a computer or website with information, preventing them to function properly. These attacks are aimed to exhaust the resources available to a network, application or service, in order to prevent users from accessing them. They are more frequently aimed at businesses, rather than individuals. Distributed denial-of-service (DDoS) attacks are those attacks in which multiple compromised computers attack a single target. A DoS attack does not usually result in the theft of information or other security loss, but it can cause financial or time loss to the affected organisation or individual, because of its effects (particular network services becoming unavailable, websites ceasing operation, targeted email accounts prevented from receiving legitimate emails, etc.)
Legal frameworks
Since cybercrime transcends borders, any legal framework needs to be common among countries and this requires improved international cooperation. This international cooperation may be bilateral, regional, continental, or universal. Most bilateral agreements on law enforcement come by way of Mutual Legal Assistance Treaties (MLATs).
This provides an effective tool for cross-border investigations and prosecution. At regional level, various regional blocks have developed frameworks for their regions in cybercrime legislation. The Organization of American States (OAS) created a framework of guidelines to manage cybercrime as early as 1999. In 2009 the Economic Community of West African States (ECOWAS) adopted a directive on fighting cybercrime, and in 2011 the Common Market for Eastern and Southern Africa (COMESA) presented the Cybersecurity Draft Model Bill. In June 2014, the African Union adopted the Convention on Cybersecurity and Personal Data Protection. Several international frameworks have already been created to fight cybercrime, the most prominent of which is the Council of Europe’s Convention on Cybercrime, which contains provisions on types of offences, procedural Laws and international cooperation among countries.
Combating cybercrime
The application of technical solutions to combat cybercrime has always been the preferred option for most cybersecurity experts. However, most law enforcement personnel are not equipped with the requisite technological knowledge while most cybercriminals are experts in computer technology.
Various organisations, such as the United States Department of Justice (DOJ) and the International Telecommunication Union (ITU), have initiated capacity building programmes for developing countries in Africa, the Caribbean, and Pacific as well as other countries in legislative drafting and prosecution of cybercrime. As measures to combat cybercrime continue to multiply, various organisations have established their individual structures for cybersecurity.
It is not uncommon for private organisations to have their own in-house rules on the acceptable use of their networks and also to educate their clients or staff on the issues of cybercrime. Some groups of organisations have also set up Computer Emergency Response Teams (CERTs) to assist in the technical handling of cybercrime, especially those targeted at computer networks. Several multinational organisations have also contributed to the fight against cybercrime.
These organisations have a unique role as some of them control the infrastructure on which the Internet runs, and include the US National Cyber Security Alliance and INTERPOL. Other regional legal instruments include: the League of Arab States Convention on Combating IT Offences (2010), the Shanghai Cooperation Organisation Agreement on Cooperation in the Field of International Information Security, and the African Union Convention on the Confidence and Security in Cyberspace (2014).
On the global level, the United Nations Office on Drugs and Crime (UNODC) is the leading organisation, with a set of international instruments to fight cybercrime. Since cybercrime often involves an organised approach, the UNODC’s Convention against Transnational Organised Crime could be used in the fight against cybercrime. Additionally, Interpol facilitates a global network of 190 national police organisations, which plays a key role in the cross-border investigation of cybercrime. The ITU hosts the World Summit on the Information Society (WSIS) implementation process in cybersecurity, labelled the ITU Global Security Agenda.
Robotics is the intersection of science, engineering, and technology that produces robots replicate or substitute for human actions. Robots perform basic and repetitive tasks with greater efficiency and accuracy than humans, making them ideal for industries like manufacturing. However, introducing artificial intelligence in robotics has allowed robots to handle increasingly complex situations in various industries.
What Is a Robot?
A robot is a programmable machine that can complete a task, while the term robotics describes the field of study focused on developing robots and automation. Each robot has a different level of autonomy. These levels range from human-controlled bots that carry out tasks to fully autonomous bots that perform tasks without any external influences.
In terms of etymology, the word ‘robot’is derived from the Czech word robota, which means “forced labor.” The word first appeared in the 1920 play R.U.R., about the play’s characters who were mass-produced workers incapable of creative thinking.
Robotics Aspects
Mechanical Construction
The mechanical aspect of a robot helps it complete tasks in the environment for which it’s designed. For example, the Mars 2020 Rover’s wheels are individually motorized and made of titanium tubing that help it firmly grip the harsh terrain of the red planet.
Electrical Components
Robots need electrical components that control and power the machinery. Essentially, an electric current — a battery, for example — is needed to power a large majority of robots.
Software Program
Robots contain at least some level of computer programming. Without a set of codes telling it what to do, a robot would just be another piece of simple machinery. Inserting a program into a robot gives it the ability to know when and how to carry out a task.
What Are the Main Components of a Robot?
Control System
Computation includes all of the components that make up a robot’s central processing unit, often referred to as its control system. Control systems are programmed to tell a robot how to utilize its specific components, similar in some ways to how the human brain sends signals throughout the body, to complete a specific task. These robotic tasks could comprise anything from minimally invasive surgery to assembly line packing.
Sensors
Sensors provide a robot with stimuli in the form of electrical signals that are processed by the controller and allow the robot to interact with the outside world. Common sensors found within robots include video cameras that function as eyes, photoresistors that react to light, and microphones that operate like ears. These sensors allow the robot to capture its surroundings and process the most logical conclusion based on the current moment and allow the controller to relay commands to the additional components.
Actuators
A device can only be considered to be a robot if it has a movable frame or body. Actuators are the components that are responsible for this movement. These components are made up of motors that receive signals from the control system and move in tandem to carry out the movement necessary to complete the assigned task. Actuators can be made of a variety of materials, such as metal or elastic, and are commonly operated by the use of compressed air (pneumatic actuators) or oil (hydraulic actuators) but come in a variety of formats to best fulfill their specialized roles.
Power Supply
Like the human body requires food to function, robots require power. Stationary robots, such as those found in a factory, may run on AC power through a wall outlet but more commonly, robots operate via an internal battery. Most robots utilize lead-acid batteries for their safe qualities and long shelf life while others may utilize the more compact but also more expensive silver-cadmium variety. Safety, weight, replaceability, and lifecycle are all important factors to consider when designing a robot’s power supply.
Some potential power sources for future robotic development also include pneumatic power from compressed gasses, solar power, hydraulic power, flywheel energy storage organic garbage through anaerobic digestion, and nuclear power.
End Effectors
End effectors are the physical, typically external components that allow robots to finish carrying out their tasks. Robots in factories often have interchangeable tools like paint sprayers and drills, surgical robots may be equipped with scalpels and other kinds of robots can be built with gripping claws or even hands for tasks like deliveries, packing, bomb diffusion and much more.
How Do Robots Work?
Some robots are pre-programmed to perform specific functions, meaning they operate in a controlled environment where they do simple, monotonous tasks — like a mechanical arm on an automotive assembly line.
Other robots are autonomous, operating independently of human operators to carry out tasks in open environments. In order to work, they use sensors to perceive the world around them and then employ decision-making structures (usually a computer) to take the optimal next step based on their data and mission.
Robots may also work by using wireless networks to enable human control from a safe distance. These teleoperated robots usually work in extreme geographical conditions, weather and circumstances. Examples of teleoperated robots are the human-controlled submarines used to fix underwater pipe leaks during the BP oil spill or drones used to detect landmines on a battlefield.
Types of Robotics
Humanoid Robots
Humanoid robots are robots that look like or mimic human behavior. These robots usually perform human-like activities (like running, jumping, and carrying objects), and are sometimes designed to look like us, even having human faces and expressions. Two of the most prominent examples of humanoid robots are Hanson Robotics’ Sophia and Boston Dynamics’ Atlas.
Cobots
Cobots, or collaborative robots, are robots designed to work alongside humans. These robots prioritize safety by using sensors to remain aware of their surroundings, executing slow movements, and ceasing actions when their movements are obstructed. Cobots typically perform simple tasks, freeing up humans to address more complex work.
Industrial Robots
Industrial robots automate processes in manufacturing environments like factories and warehouses. Possessing at least one robotic arm, these robots are made to handle heavy objects while moving with speed and precision. As a result, industrial robots often work in assembly lines to boost productivity.
Medical Robots
Medical robots assist healthcare professionals in various scenarios and support the physical and mental health of humans. These robots rely on AI and sensors to navigate healthcare facilities, interact with humans, and execute precise movements. Some medical robots can even converse with humans, encouraging people’s social and emotional growth.
Agricultural Robots
Agricultural robots handle repetitive and labor-intensive tasks, allowing farmers to use their time and energy more efficiently. These robots also operate in greenhouses, where they monitor crops and help with harvests. Agricultural robots come in many forms, ranging from autonomous tractors to drones that collect data for farmers to analyze.
Microrobotics
Microrobotics is the study and development of robots on a miniature scale. Often no bigger than a millimeter, microrobots can vary in size, depending on the situation. Biotech researchers typically use micro-robotics to monitor and treat diseases, improve diagnostic tools, and create more targeted solutions.
Augmenting Robots
Augmenting robots, also known as VR robots, either enhance current human capabilities or replace the capabilities a human may have lost. The field of robotics for human augmentation is a field where science fiction could become reality very soon, with bots that can redefine the definition of humanity by making humans faster and stronger. Some examples of current augmenting robots are robotic prosthetic limbs or exoskeletons used to lift hefty weights.
Software Bots
Software bots, or simply ‘bots,’ are computer programs that carry out tasks autonomously. They are not technically considered robots. One common use case of software robots is a chatbot, which is a computer program that simulates conversation both online and over the phone and is often used in customer service scenarios. Chatbots can either be simple services that answer questions with an automated response or more complex digital assistants that learn from user information.
Robotics Applications
Beginning as a major boon for manufacturers, robotics has become a mainstay technology for a growing number of industries.
Manufacturing
Industrial robots can assemble products, sort items, perform welds and paint objects. They may even be used to fix and maintain other machines in a factory or warehouse.
Healthcare
Medical robots transport medical supplies, perform surgical procedures and offer emotional support to those going through rehabilitation.
Companionship
Social robots can support children with learning disabilities and act as a therapeutic tool for people with dementia. They also have business applications like providing in-person customer service in hotels and moving products around warehouses.
Home Use
Consumers may be most familiar with the Roomba and other robot vacuum cleaners. However, other home robots include lawn-mowing robots and personal robot assistants that can play music, engage with children and help with household chores.
Search and Rescue
Search and rescue robots can save those stuck in flood waters, deliver supplies to those stranded in remote areas and put out fires when conditions become too extreme for firefighters.
Pros and Cons of Robotics
Robotics comes with some benefits and drawbacks.
Pros of Robotics
Increased accuracy. Robots can perform movements and actions with greater precision and accuracy than humans.
Enhanced productivity. Robots can work at a faster pace than humans and don’t get tired, leading to more consistent and higher-volume production.
Improved safety. Robots can take on tasks and operate in environments unsafe for humans, protecting workers from injuries.
Rapid innovation. Many robots are equipped with sensors and cameras that collect data, so teams can quickly refine processes.
Greater cost-efficiency. Gains in productivity may make robots a more cost-efficient option for businesses compared to hiring more human workers.
Cons of Robotics
Job losses. Robotic process automation may put human employees out of work, especially those who don’t have the skills to adapt to a changing workplace.
Limited creativity. Robots may not react well to unexpected situations since they don’t have the same problem-solving skills as humans.
Data security risks. Robots can be hit with cyber attacks, potentially exposing large amounts of data if they’re connected to the Internet of Things.
Maintenance costs. Robots can be expensive to repair and maintain, and faulty equipment can lead to disruptions in production and revenue losses.
Environmental waste. Extracting raw materials to build robots and having to discard disposable parts can lead to more environmental waste and pollution.