Monday, June 30, 2025

Transform Complexity into Opportunity with Digital Engineering




In a literal sense, digital engineering is as old as the first back-of-the-napkin sketch that was shoved in a pocket before being modeled in a computer-aided design program. Those pencil marks became data points, and they were soon joined by millions more as product complexity exploded. We’re now awash in engineering data coming from all corners of the enterprise, as well as from partners, suppliers, and vendors. Product geometries, multiphysics simulations, materials intelligence, market research, digital twins, artificial intelligence datasets, and cyber-physical systems of all kinds contribute to the data deluge.

Digital engineering is no longer just about making the physical digital and all the benefits that entails. Today, digital engineering is about making the digital physical — in other words, being able to gather useful insights from all those data points, bring those insights together into a strategy, and turn that strategy into reality.

Download this free whitepaper now!

Reference: https://ift.tt/14r9Csc

Transform Complexity into Opportunity with Digital Engineering




In a literal sense, digital engineering is as old as the first back-of-the-napkin sketch that was shoved in a pocket before being modeled in a computer-aided design program. Those pencil marks became data points, and they were soon joined by millions more as product complexity exploded. We’re now awash in engineering data coming from all corners of the enterprise, as well as from partners, suppliers, and vendors. Product geometries, multiphysics simulations, materials intelligence, market research, digital twins, artificial intelligence datasets, and cyber-physical systems of all kinds contribute to the data deluge.

Digital engineering is no longer just about making the physical digital and all the benefits that entails. Today, digital engineering is about making the digital physical — in other words, being able to gather useful insights from all those data points, bring those insights together into a strategy, and turn that strategy into reality.

Download this free whitepaper now!

Reference: https://ift.tt/14r9Csc

Transform Complexity into Opportunity with Digital Engineering




In a literal sense, digital engineering is as old as the first back-of-the-napkin sketch that was shoved in a pocket before being modeled in a computer-aided design program. Those pencil marks became data points, and they were soon joined by millions more as product complexity exploded. We’re now awash in engineering data coming from all corners of the enterprise, as well as from partners, suppliers, and vendors. Product geometries, multiphysics simulations, materials intelligence, market research, digital twins, artificial intelligence datasets, and cyber-physical systems of all kinds contribute to the data deluge.

Digital engineering is no longer just about making the physical digital and all the benefits that entails. Today, digital engineering is about making the digital physical — in other words, being able to gather useful insights from all those data points, bring those insights together into a strategy, and turn that strategy into reality.

Download this free whitepaper now!

Reference: https://ift.tt/14r9Csc

Friday, June 27, 2025

Video Friday: This Quadruped Throws With Its Whole Body




Video Friday is your weekly selection of awesome robotics videos, collected by your friends at IEEE Spectrum robotics. We also post a weekly calendar of upcoming robotics events for the next few months. Please send us your events for inclusion.

IAS 2025: 30 June–4 July 2025, GENOA, ITALY
ICRES 2025: 3–4 July 2025, PORTO, PORTUGAL
IEEE World Haptics: 8–11 July 2025, SUWON, SOUTH KOREA
IFAC Symposium on Robotics: 15–18 July 2025, PARIS
RoboCup 2025: 15–21 July 2025, BAHIA, BRAZIL
RO-MAN 2025: 25–29 August 2025, EINDHOVEN, THE NETHERLANDS
CLAWAR 2025: 5–7 September 2025, SHENZHEN
CoRL 2025: 27–30 September 2025, SEOUL
IEEE Humanoids: 30 September–2 October 2025, SEOUL
World Robot Summit: 10–12 October 2025, OSAKA, JAPAN
IROS 2025: 19–25 October 2025, HANGZHOU, CHINA

Enjoy today’s videos!

Throwing is a fundamental skill that enables robots to manipulate objects in ways that extend beyond the reach of their arms. We present a control framework that combines learning and model-based control for prehensile whole-body throwing with legged mobile manipulators. This work provides an early demonstration of prehensile throwing with quantified accuracy on hardware, contributing to progress in dynamic whole-body manipulation.

[ Paper ] from [ ETH Zurich ]

As it turns out, in many situations humanoid robots don’t necessarily need legs at all.

[ ROBOTERA ]

Picking-in-Motion is a brand new feature as part of Autopicker 2.0. Instead of remaining stationary while picking an item, Autopicker begins traveling toward its next destination immediately after retrieving a storage tote – completing the pick while on the move. The robot then drops off the first storage tote at an empty slot near the next pick location before collecting the next tote.

[ Brightpick ]

Thanks, Gilmarie!

I am pretty sure this is not yet real, but boy is it shiny.

[ SoftBank ] via [ RobotStart ]

Why use one thumb when you can instead use two thumbs?

[ TU Berlin ]

Kirigami offers unique opportunities for guided morphing by leveraging the geometry of the cuts. This work presents inflatable kirigami crawlers created by introducing cut patterns into heat-sealable textiles to achieve locomotion upon cyclic pneumatic actuation. We found that the kirigami actuators exhibit directional anisotropic friction properties when inflated, having higher friction coefficients against the direction of the movement, enabling them to move across surfaces with varying roughness. We further enhanced the functionality of inflatable kirigami actuators by introducing multiple channels and segments to create functional soft robotic prototypes with versatile locomotion capabilities.

[ Paper ] from [ SDU Soft Robotics ]

Lockheed Martin wants to get into the Mars Sample Return game for a mere US$3 billion.

[ Lockheed Martin ]

This is pretty gross and exactly what you want a robot to be doing: dealing with municipal solid waste.

[ ZenRobotics ]

Drag your mouse or move your phone to explore this 360-degree panorama provided by NASA’s Curiosity Mars rover. This view shows some of the rover’s first looks at a region that has only been viewed from space until now, and where the surface is crisscrossed with spiderweblike patterns.

[ NASA Jet Propulsion Laboratory ]

In case you were wondering, iRobot is still around.

[ iRobot ]

Legendary roboticist Cynthia Breazeal talks about the equally legendary Personal Robots Group at the MIT Media Lab.

[ MIT Personal Robots Group ]

In the first installment of our Moonshot Podcast Deep Dive video interview series, X’s Captain of Moonshots Astro Teller sits down with Sebastian Thrun, co-founder of the Moonshot Factory, for a conversation about the history of Waymo and Google X, the ethics of innovation, the future of AI, and more.

[ Google X, The Moonshot Factory ]

Reference: https://ift.tt/KbEs98u

Reviving a 1970s Analog HP X-Y Recorder




Solid construction, elegant design, and high-precision output. Once upon a time, Hewlett-Packard made test-and-measurement equipment that was beloved by working engineers. Sure, drop one of those babies on your foot and you were looking at a broken toe. But that’s a small price to pay for reliability and some character building. So when I recently came across an early 1970s HP 7041A X-Y recorder while clearing out my parents’ attic, I knew that I just had to see if I could get it up and running again.

What is the difference between an X-Y recorder and a plotter?

X-Y recorders were designed to chart data from analog instruments in real time, as opposed to plotters, which plot the outputs of digital computers. The basics are the same: There’s a mechanism to raise and lower a pen, and motors to move the pen across the surface of a page. The big difference is that a plotter typically uses digital commands to control the pen’s motion, while the motion of a recorder’s pen is controlled by analog voltage inputs.

So all I needed to do was feed the HP recorder the right voltages, and I could draw anything I wanted! Only a few obstacles stood in my way.

Key components of the recorder interface including a Rapsberry Pi, expansion hat and digital-to-analog converters, QWIIC I2C connectors and a 74LS08 and LMC6484 integrated circuits. The recorder interface allows Python code written on a Raspberry Pi [bottom right] to create analog signals that are level shifted up and down to meet the different ranges required by the plotter’s x- and y- axis. James Provost

The first obstacle was getting the thing home, because my parents’ attic was in Ireland and fitting a 13-kilogram, 48-by-36-by-17-centimeter behemoth into my suitcase for my flight back to NYC wasn’t happening. About US $300 in packing materials and shipping fees solved that problem, and I was still a little ahead of the game financially compared to obtaining a similar vintage recorder from eBay, and way ahead of buying a new Bantam Tools NextDraw plotter with a similar drawing area. (To be fair to Bantam, its plotters are sleek plug-and-play devices that can handle a much wider range of pens).

The second obstacle was that the recorder didn’t work. Once I got it home, I discovered that the y-axis could be adjusted manually using a knob on the control panel, but the x-axis was dead. The mechanism for raising and lowering the pen made a weak clunking sound and barely twitched.

“Had I just spent a lot of money to ship home an HP-model boat anchor?”

I opened up the case, which was quick work with a Phillips screwdriver—no weird security screws, no glue, no fragile plastic, no yellow stickers warning that your warranty would be voided and you’d probably get boils if you dared to look within. On the beautifully laid out printed circuit boards inside, I spotted some resistors that were clearly not part of the factory install. Were they modifications or repairs? If the latter, had they been successful or had I just spent a lot of money to ship home an HP-model boat anchor? And I had no idea how the 40-pin interface connector on the back of the recorder was supposed to be hooked up to control signals.

All these problems were solved when I found the recorder’s manual on eBay. Oh, what a manual. Not just operating instructions, but detailed illustrations for taking the recorder completely apart and putting it back together. It listed every component, with photos of the circuit boards and electronic schematics on gatefolds. And it included directions for modifying the circuitry if you wanted to measure different voltage ranges than the factory settings–extract a resistor here and there and solder in some new ones. This explained the resistors I’d spotted. In a world where licenses and software locks forbid folks from simply plugging in a replacement component, the thought of a major company encouraging its customers to break out a soldering iron is mind boggling.

Soon, the application of some instrument oil, silicone grease, and Kimwipes had the x-axis and pen lifter working again. I hooked up a variable power supply to the recorder’s connector and slowly brought the voltage up as I watched the pen holder move in response. This allowed me to determine the recorder’s input ranges, which turned out to be 0 to 1 volt for the y-axis, and 0 to 5 V for the x-axis, covering 25 and 38 cm of motion, respectively, with about 0.2 millimeter accuracy.

The next step was to build an interface. Although microcontrollers often have digital-to-analog capabilities built-in, there’s often only one true analog output pin. I needed two. A technique like pulse-width modulation would let me output an analog-ish voltage on multiple pins, but typically with only 8-bit resolution or 256 distinct voltage levels. I needed at least 1,900 levels to match the recorder’s accuracy.

A block diagram of the path taken by control signals from the Pi to the recorder. The Raspberry Pi uses an expansion “HAT” and two 12-bit digital-to-analog converters commanded via I2C connectors to create 0- to 3.3-volt control signals. These are shifted to 0- to 1-V and 0- to 5-V ranges using a voltage divider and amplifier respectively, as well as a logic gate used to convert a 3.3-V digital signal that raises and lowers the pen to a 5-V level.James Provost

So I bought two $5 Adafruit MCP4725 breakout boards. These are 12-bit digital-to-analog converters—each providing 4,096 distinct levels—controlled over an I2C serial connection, and two boards can share the same I2C bus. I connected them to a Raspberry Pi Model B+ I fished out of a drawer via a $6.60 SparkFun Qwiic HAT.

The DACs put out a signal in the range of 0 to 3.3 V, so I sent one board’s output through a voltage divider to scale it down to 0 to 1 V for the y-axis. For the x-axis, I fed the other board’s output through an LMC6484 amplifier, powered by a 5-V pin from the Pi, to bring it up to 0 to 4.8 V—not quite the full range, but it’ll do until I come up with a more sophisticated interface. I brought a signal to raise and lower the pen out from one of the Pi’s GPIO pins, passing it through a 74LS08 AND gate IC used as a cheap and cheerful 3.3- to 5-V digital level shifter.

I then wrote code on the Pi to put the plotter through its paces, using parametric equations written in CircuitPython to draw swirling hypotrochoids and other geometric curves. Ultimately, it should be possible to have the Pi accept and translate commands written in a plotter-control language such as HP-GL. Then I’ll be able to plot vector graphics and text from drawing software like Inkscape. But for now, I’m happy to just have my recorder humming away beside me, hale and hearty and built to last.

Reference: https://ift.tt/3SKXMk2

Thursday, June 26, 2025

Actively exploited vulnerability gives extraordinary control over server fleets


Hackers are exploiting a maximum-severity vulnerability that has the potential to give them complete control over thousands of servers, many of which handle mission-critical tasks inside data centers, the US Cybersecurity and Infrastructure Security Agency is warning.

The vulnerability, carrying a severity rating of 10 out of a possible 10, resides in the AMI MegaRAC, a widely used firmware package that allows large fleets of servers to be remotely accessed and managed even when power is unavailable or the operating system isn't functioning. These motherboard-attached microcontrollers, known as baseboard management controllers (BMCs), give extraordinary control over servers inside data centers.

Administrators use BMCs to reinstall operating systems, install or modify apps and make configuration changes to large numbers of servers, without physically being on premises and, in many cases, without the servers being turned on. Successful compromise of a single BMC can be used to pivot into internal networks and compromise all other BMCs.

Read full article

Comments

Reference : https://ift.tt/d3gqHay

VMware perpetual license holder receives audit letter from Broadcom


After sending cease-and-desist letters to VMware users whose support contracts had expired and who subsequently declined to subscribe to one of Broadcom’s VMware bundles, Broadcom has started the process of conducting audits on former VMware customers.

Broadcom stopped selling VMware perpetual licenses in November 2023 in favor of pushing a small number of VMware SKUs that feature multiple VMware offerings. Since Broadcom is forcefully bundling VMware products, the costs associated with running VMware have skyrocketed, with customers frequently citing 300 percent price hikes and some firms claiming even larger increases. As a result, some VMware users have opted to keep using VMware perpetual licenses, even though Broadcom refuses to renew most of those clients’ support services.

This year, Broadcom started sending such VMware users cease-and-desist letters [PDF], telling organizations to stop using any maintenance releases/updates, minor releases, major releases/upgrades extensions, enhancements, patches, bug fixes, or security patches (except for zero-day security patches) that VMware issued since the user’s support contract ended.

Read full article

Comments

Reference : https://ift.tt/zRJBZbt

AI Improves at Improving Itself Using an Evolutionary Trick




In April, Microsoft’s CEO said that artificial intelligence now wrote close to a third of the company’s code. Last October, Google’s CEO put their number at around a quarter. Other tech companies can’t be far off. Meanwhile these firms create AI, which will presumably be used to help programmers further.

Researchers have long hoped to fully close the loop, creating coding agents that recursively improve themselves. New research reveals an impressive demonstration of such a system. Extrapolating, one might see a boon to productivity, or a much darker future for humanity.

“It’s nice work,” said Jürgen Schmidhuber, a computer scientist at the King Abdullah University of Science and Technology (KAUST), in Saudi Arabia, who was not involved in the new research. “I think for many people, the results are surprising. Since I’ve been working on that topic for almost forty years now, it’s maybe a little bit less surprising to me.” But his work over that time was limited by the tech at hand. One new development is the availability of large language models (LLMs), the engines powering chatbots like ChatGPT.

In the 1980s and 1990s, Schmidhuber and others explored evolutionary algorithms for improving coding agents, creating programs that write programs. An evolutionary algorithm takes something (such as a program), creates variations, keeps the best ones, and iterates on those.

But evolution is unpredictable. Modifications don’t always improve performance. So in 2003, Schmidhuber created problem solvers that rewrote their own code only if they could formally prove the updates to be useful. He called them Gödel machines, named after Kurt Gödel, a mathematician who’d done work on self-referencing systems. But for complex agents, provable utility doesn’t come easily. Empirical evidence may have to suffice.

The Value of Open-Ended Exploration

The new systems, described in a recent preprint on arXiv, rely on such evidence. In a nod to Schmidhuber, they’re called Darwin Gödel Machines (DGMs). A DGM starts with a coding agent that can read, write, and execute code, leveraging an LLM for the reading and writing. Then it applies an evolutionary algorithm to create many new agents. In each iteration, the DGM picks one agent from the population and instructs the LLM to create one change to improve the agent’s coding ability. LLMs have something like intuition about what might help, because they’re trained on lots of human code. What results is guided evolution, somewhere between random mutation and provably useful enhancement. The DGM then tests the new agent on a coding benchmark, scoring its ability to solve programming challenges.

Some evolutionary algorithms keep only the best performers in the population, on the assumption that progress moves endlessly forward. DGMs, however, keep them all, in case an innovation that initially fails actually holds the key to a later breakthrough when further tweaked. It’s a form of “open-ended exploration,” not closing any paths to progress. (DGMs do prioritize higher scorers when selecting progenitors.)

The researchers ran a DGM for 80 iterations using a coding benchmark called SWE-bench, and ran one for 80 iterations using a benchmark called Polyglot. Agents’ scores improved on SWE-bench from 20 percent to 50 percent, and on Polyglot from 14 percent to 31 percent. “We were actually really surprised that the coding agent could write such complicated code by itself,” said Jenny Zhang, a computer scientist at the University of British Columbia and the paper’s lead author. “It could edit multiple files, create new files, and create really complicated systems.”

A family tree style image shows one node at the top branching off into 8 nodes, some of which branch off into more nodes. The first coding agent (numbered 0) created a generation of new and slightly different coding agents, some of which were selected to create new versions of themselves. The agents’ performance is indicated by the color inside the circles, and the best performing agent is marked with a star. Jenny Zhang, Shengran Hu et al.

Critically, the DGMs outperformed an alternate method that used a fixed external system for improving agents. With DGMs, agents’ improvements compounded as they improved themselves at improving themselves. The DGMs also outperformed a version that didn’t maintain a population of agents and just modified the latest agent. To illustrate the benefit of open-endedness, the researchers created a family tree of the SWE-bench agents. If you look at the best-performing agent and trace its evolution from beginning to end, it made two changes that temporarily reduced performance. So the lineage followed an indirect path to success. Bad ideas can become good ones.

On a graph with "SWE-bench score" on the y axis and "iterations" on the x axis, a black line goes up with two dips. The black line on this graph shows the scores obtained by agents within the lineage of the final best-performing agent. The line includes two performance dips. Jenny Zhang, Shengran Hu et al.

The best SWE-bench agent was not as good at the best agent designed by expert humans, which currently scores about 70 percent, but it was generated automatically, and maybe with enough time and computation an agent could evolve beyond human expertise. The study is a “big step forward” as a proof of concept for recursive self-improvement, said Zhengyao Jiang, a cofounder of Weco AI, a platform that automates code improvement. Jiang, who was not involved in the study, said the approach could made further progress if it modified the underlying LLM, or even the chip architecture. (Google DeepMind’s AlphaEvolve designs better basic algorithms and chips and found a way to accelerate the training of its underlying LLM by 1 percent.)

DGMs can theoretically score agents simultaneously on coding benchmarks and also specific applications, such as drug design, so they’d get better at getting better at designing drugs. Zhang said she’d like to combine a DGM with AlphaEvolve.

Could DGMs reduce employment for entry-level programmers? Jiang sees a bigger threat from everyday coding assistants like Cursor. “Evolutionary search is really about building really high-performance software that goes beyond the human expert,” he said, as AlphaEvolve has done on certain tasks.

The Risks of Recursive Self-Improvement

One concern with both evolutionary search and self-improving systems—and especially their combination, as in DGM—is safety. Agents might become uninterpretable or misaligned with human directives. So Zhang and her collaborators added guardrails. They kept the DGMs in sandboxes without access to the internet or an operating system, and they logged and reviewed all code changes. They suggest that in the future, they could even reward AI for making itself more interpretable and aligned. (In the study, they found that agents falsely reported using certain tools, so they created a DGM that rewarded agents for not making things up, partially alleviating the problem. One agent, however, hacked the method that tracked whether it was making things up.)

In 2017, experts met in Asilomar, California, to discuss beneficial AI, and many signed an open letter called the Asilomar AI Principles. In part, it called for restrictions on “AI systems designed to recursively self-improve.” One frequently imagined outcome is the so-called singularity, in which AIs self-improve beyond our control and threaten human civilization. “I didn’t sign that because it was the bread and butter that I’ve been working on,” Schmidhuber told me. Since the 1970s, he’s predicted that superhuman AI will come in time for him to retire, but he sees the singularity as the kind of science-fiction dystopia people love to fear. Jiang, likewise, isn’t concerned, at least for the time being. He still places a premium on human creativity.

Whether digital evolution defeats biological evolution is up for grabs. What’s uncontested is that evolution in any guise has surprises in store.

Reference: https://ift.tt/sDuC7FH

Superconducting Motor Could Propel Electric Aircraft




Of the countless technologies invented over the past half century, high-temperature superconductors are among the most promising and yet also the most frustrating. Decades of research has yielded an assortment of materials that superconduct at temperatures as high as –140 °C (133 kelvins) at ambient pressure. And yet commercial applications have been elusive.

Now, though, a couple of developments could finally push high-temperature superconductors into commercial use. One is the availability, at relatively moderate cost, of copper-oxide-based superconducting tape, which is being produced by a few companies for startups working on tokamak fusion reactors. The reactors use the superconducting tape, which is typically made of yttrium barium copper oxide, in powerful electromagnets. The other development involves a different group of startups that are using the tape to build electric motors with very high power-to-weight ratios, mainly for use in electric aircraft.

Among that latter group of startups is Hinetics LLC, formed in 2017 to commercialize research led by Kiruba Haran at the University of Illinois at Urbana-Champaign. This past April, the company tested a prototype motor outfitted with superconducting rotor magnets. According to Haran, the tests, which included spinning a propeller in a laboratory setup, validated key components of the company’s designs for superconducting motors that will operate at power levels of 5 and 10 megawatts. Such levels would be high enough to power a regional passenger airliner with multiple motors. The work was funded in part by a grant from the Advanced Research Projects Agency-Energy (ARPA-E).

“HTS [high temperature superconductors] are having a moment, because the costs are coming down rapidly, driven by all the work on fusion,” Haran says. “A lot of people are ramping up production, and new startups, and new capabilities, are coming into the market.”

Hinetics is one of perhaps a dozen companies, large and small, trying to use high-temperature superconductors to build extremely efficient motors with very high power density. These include aerospace giant Airbus, which is working on a superconducting airliner under a program called ZEROe, as well as Toshiba, Raytheon, and UK startup HyFlux. However, Hinetics is taking an unusual approach.

Common approaches to building a superconducting machine use the superconducting material for either the rotor or stator coils, or both. Typically, the coils are cooled with a liquid or gas kept at a sufficiently low temperature by an external cryocooling system. The fluid cools the superconducting coils by convection, by physically flowing through heat exchangers in contact with the coils and carrying away heat as it does so. The system has been used successfully in some experimental motors and generators, but it suffers from several fundamental problems. A big one is the need to circulate the cooling fluid through the rotor coils, which are embedded in a rotor assembly that is spinning at perhaps thousands of revolutions per minute. Another problem is that this approach requires a complicated cryocooling system that includes pumps, seals, gaskets, pipes, insulation, a rotary coupling that transfers the cryogen into and out of the rotor, and other components that can fail and that add considerable weight.

An experimental electric motor is shown in a cutaway view. The rotor coils in an experimental Hinetics electric motor are made of a high-temperature superconductor. They are cooled by a cryocooler that runs axially down the center of the motor. The rotor assembly and the cryocooler are enclosed within a vacuum vessel.Hinetics

Hinetics’s Revolutionary Idea: Spin the Cryocooler

Hinetics’s system, on the other hand, uses a self-contained cryocooler that is small enough to be attached to the rotor, and which spins along with it, eliminating the need to pass fluids into and out of a spinning vessel. With this arrangement, “you don’t have to immerse the superconductor into the fluid,” notes Laurent Pilon, an associate director for technology at ARPA-E. Instead, “there’s a cryocooler, and a cold connection, and you pull out the heat from the superconducting magnetic coils to the cryocooler, performing a refrigeration cycle. The beauty here is that it simplifies everything because now you just have the cryocooler that spins with the shaft.”

In this configuration, the rotor assembly, including the coils, is cooled by conduction rather than convection. The rotor is installed within a vacuum chamber. Heat from the superconducting magnet assembly is transferred through a “thermal bus,” which is basically just a disk-shaped copper structure that conducts the heat to the cryocooler, which is attached to the other side of the copper disk.

One of the challenges, Haran says, was finding a cryocooler small and light enough to spin at high rates and keep functioning while doing so. For its proof-of-concept unit, the Hinetics team used an off-the-shelf Stirling-cycle cooler from Sunpower. It can remove only 10 watts of heat from the rotor assembly but, in this configuration, that’s all that’s needed to keep the rotor coils superconducting, Haran says.

One potential drawback of the system is that, because of this relatively low heat-removal capacity, the cryocooler takes a few hours to cool the superconducting magnet sufficiently to start operating. Future versions will reduce the period needed, according to Haran. And on the bright side, the low heat-removal rate means high efficiency, because the cooler has just enough power to maintain the low temperatures needed during operation, and not much excess capacity.

To provide electric power to the spinning cryostat and rotor magnets the prototype used a slip ring. But future versions of the motor will use a wireless system, possibly based on inductive coupling, Haran says.

An experimental electric motor, painted black, is shown on a test bench with a three-bladed propeller attached to its shaft. Tests of Hinetics’s superconducting motor this past April validated the basic design and cleared the way for construction of more powerful units.Hinetics

Applications on Ships Are Also Possible

He opted not to make the stators superconducting, because in a typical configuration the stator is energized by an alternating-current (AC) waveform. Superconductors are only completely lossless for direct current. So the application of AC to superconducting coils in the stator would result in power losses that would require another cooling system to remove heat from the stator.

Haran figures it’s not necessary. With superconductors just in the rotor coils, the motor will achieve efficiencies in the range of 98 to 99.5 percent, which is about four or five percentage points higher than what is realistically possible with a permanent-magnet synchronous motor. Haran also insists that the superconducting design would attain this high efficiency without any reduction in power density, a combination that’s hard to achieve in a conventional motor.

Four or five percentage points might not seem like a lot, but it would matter in typical aviation applications, Pilon says, especially when coupled with higher power density. On its website, Hinetics claims that its motor has a continuous specific power of 10 kilowatts per kilogram, which would put the machine among the most power-dense units available, on a continuous-power basis. According to Haran, the next generation of the superconducting motor will achieve 40 kW/kg, which would be far higher than anything commercially available.

Although aviation is the initial target, Haran sees potential applications in ship propulsion, where the motor’s high volumetric power density would be a draw. “What’s really exciting is that we are seeing a transformational new technology become practical,” he says. “Once you get to megawatts and low speed, anywhere you need high torque, this could be very interesting.”

Reference: https://ift.tt/IEvp9FC

Wednesday, June 25, 2025

Ubuntu disables Intel GPU security mitigations, promises 20% performance boost


Ubuntu users could see up to a 20 percent boost in graphics performance on Intel-based systems under a change that will turn off security mitigations for blunting a class of attacks known as Spectre.

Spectre, you may recall, came to public notice in 2018. Spectre attacks are based on the observation that performance enhancements built into modern CPUs open a side channel that can leak secrets a CPU is processing. The performance enhancement, known as speculative execution, predicts future instructions a CPU might receive and then performs the corresponding tasks before they are even called. If the instructions never come, the CPU discards the work it performed. When the prediction is correct, the CPU has already completed the task.

By using code that forces a CPU to execute carefully selected instructions, Spectre attacks can extract confidential data that the CPU would have accessed had it carried out the ghost instructions. Over the past seven years, researchers have uncovered multiple attack variants based on the architectural flaws, which are unfixable. CPU manufacturers have responded by creating patches in both micro code and binary code that restrict speculative execution operations in certain scenarios. These restrictions, of course, usually degrade CPU performance.

Read full article

Comments

Reference : https://ift.tt/AWnE7F9

Estonia Debuts AI Chatbots for High School Classrooms




Estonia has a reputation as one of the most digitally advanced nations in the world, thanks to its efficient digital platforms for government services and its startup-friendly culture. Its citizens’ digital prowess is largely due to the government’s decades-long campaign to bring technology into schools. Now, the government is launching AI Leap 2025, which will bring AI tools to an initial cohort of 20,000 high school students in September. Siim Sikkut, a former member of the Estonian government and part of the launch team, says the AI Leap program goes beyond just providing access to new technology. Its goal is to give students the skills they need to use it both ethically and effectively.

Slim Sikkut


Siim Sikkut served as the Estonian government’s chief information officer from 2017 to 2022, a role in which he created policies regarding digital government operations, cybersecurity, and connectivity. He is currently a managing partner at Digital Nation, an Estonian consulting firm that works with governments around the world.

What was the Tiger Leap program, and how is it the model for what you’re doing now?

Siim Sikkut: Tiger Leap was a program in the ’90s to bring computers and Internet and basic digital skills to all the schools in Estonia. I myself got exposed to all things Internet, because at that time, we didn’t have a chance to use them at home. These guys and girls became the founders of industry and of digital government, so it allowed us to make a leap in building a digital society in Estonia.

How does the AI Leap program follow that model?

Sikkut: Our thinking is now we have to do the same sort of leap and expose our younger generations to this next wave [of technology]. There are differences between the programs. Then it was, We’ll give you the access and the tools to do with what you like. Now, with AI tools, we feel it has to be a bit more curated. You need to learn to use them as opposed to just getting an easier way out of your homework. So it’s more of a skilling effort than just an access effort.

What will this look like in practice? What tools will the students have access to?

Sikkut: We are still negotiating with the partners and vendors, so I won’t be naming companies. But fundamentally, we’re talking about a conversational AI assistant that is trained in the context of Estonian language and Estonian curriculum. It will be built for educational use, so it won’t be, for example, the ChatGPT that you and I would use in our daily life. It will support the learning more. For example, you don’t just submit your homework and get the answers back. In that scenario, the tool starts to tutor you more than give you an answer. We’re re-creating conversational AI as a learning assistant, and ideally we’ll have a lot of smaller subject-based apps added to that. We will have in place at least one tool, a conversation tool, and then we’ll build on that in the next few years.

Will the teachers be able to see what the students are doing?

Sikkut: We might have to launch it first just with basics. But the idea is that we’ll have two apps, a teacher’s assistant and a student’s one, so teachers get feedback or recommendations on how to guide the particular student better. The idea is to make learning more personalized for better learning outcomes.

When we hear about AI in education, there’s usually a doom and gloom attitude like, “This is going to ruin the minds of the next generation. There’s no way they’re going to learn anything. They’re just going to have these shortcuts.”

Sikkut: These same concerns led us to do more on this front. What’s really driving us are two very pragmatic considerations. A lot of kids use [AI tools] anyway to substitute thinking more than to complement it. We have numbers that 70 percent of kids in high school use them anyway. So the harmful use is already there, and we want to counter that. Secondly, there’s a divide in use, maybe for reasons of socioeconomic background. But Estonia’s whole education system is built on uniform opportunity. So this is also an attempt to make sure that we don’t increase the divide for the future.

And what is the opportunity that you see for the students?

Sikkut: We’re making a bet that this is a competitiveness factor. If you’re not there, you’re left out. In the labor market, as a country, globally speaking, we’re saying, “Hey, look, you need to know how to get the most out of these tools.”

The current program will provide tools to 10th and 11th graders, right?

Sikkut: Yes, we’re focusing on high school and vocational education now. But there’s still a debate going on: Should we go younger than that? The jury is still out on whether that would make sense. You need to have some independent thinking and study discipline and just be a self-driven learner. That doesn’t start early.

Are there concerns about hallucinations and how to teach kids how to check for accuracy?

Sikkut: That goes right into the technical skill set of using these things. Unfortunately, hallucinations are a fact of life, and they will be for the time [being]. These AI skills will be taught by applying them in the rest of the curriculum. So in history class, as you use this AI study assistant, that’s where you learn about hallucinations and how to watch out for them.

Have you talked about this program with teachers? Are they receptive or nervous?

Sikkut: It’s all of the above. As you can imagine, you have early adopters who are enthusiastic. Today, they’re already using these tools to plan for their class, or they run essays through an AI tool. On the other end, you have folks who have basic digital literacy, but they don’t want anything more than that. We’ll have a communication effort to make sure that the teachers are okay and calm about it. The main message we’re trying to tell teachers is that they won’t get the full suite of tools yet. They will all be part of an experimentation program.

Reference: https://ift.tt/Q9WVLEh

Tuesday, June 24, 2025

IEEE Presidents’ Scholarship Changes Students’ Lives




Last year marked the 25th anniversary of the IEEE Presidents’ Scholarship. Since its inception, the prestigious US $10,000 award has been given annually to one exceptional high school student participating in the Regeneron (formerly Intel) International Science and Engineering Fair. The ISEF is the world’s largest international STEM research competition for high school students.

Finalists for the scholarship are selected by a team of IEEE volunteer judges. The scholarship is funded by the IEEE Foundation and administered by IEEE Educational Activities.

To commemorate the scholarship’s anniversary, I asked past winners how the award impacted their life and career, and what they are doing today.

Harvard educator and a film producer

Person wearing black shirt and turquoise necklace against a red brick wall background.Elena Glassman received the scholarship in 2004 for her Brain-Computer Interface for the Muscularly Disabled project.Elena Glassman

Elena Glassman received the scholarship in 2004 for her Brain-Computer Interface for the Muscularly Disabled project. She wrote code to collect EEG wavelets that predicted her own right or left arm movement with an accuracy rate of 73 percent.

Today Glassman is an assistant professor of computer science at Harvard, where she teaches human-computer interaction. She is also a new mother. The scholarship supported her education at MIT, where she earned a bachelor’s degree in electrical engineering. She says the scholarship was among the most memorable awards she received.

“When your project is being evaluated by IEEE judges who understand the work,” she says, “that’s what was so meaningful about receiving the award.” With encouragement from her father, a lifelong IEEE member, she submitted a paper about her project to IEEE Transactions on Biomedical Engineering, which published it.

In her current work, she says, she enjoys focusing on the “human side of programming.” She adds that her electrical engineering background is useful in tackling all sorts of projects.

Adam Sidman received the 2005 scholarship for Camera Stabilization: Take Two. His project centered around the development of a handheld servo-based device. The film and TV producer in Los Angeles says his invention is a “go-to everyday technology for filmmakers on sets around the world.”

Sidman is chief executive of Timur Bekmambetov’s production company, Bazelevs, where he has overseen a variety of movies including The Current War, Hardcore Henry, Searching, and Unfriended.

Receiving the scholarship was “a tremendous honor,” he says, “validating my passion to combine the arts and sciences.” He graduated from Harvard with a bachelor’s degree in mechanical engineering and visual and environmental studies.

Last year he collaborated with ISEF organizers to establish a new category of projects, Technology Enhances the Arts, and he continues to serve as a judge.

An entrepreneur and a gene researcher

Rahul Kumar Pandey, a software engineer-turned-entrepreneur, received the scholarship in 2007. His startup, Taro, helps software engineers navigate the professional world, providing advice on job searching, negotiation, promotions, and leadership. The platform boasts more than 100,000 users. Pandey is a writer for IEEE’s Careers newsletter.

The scholarship supported his degree in computer science at Stanford.

He credits his science-fair experience with giving him the confidence to innovate and advance the field.

His winning project, A Microwave Metamaterial Lens With Negative Index of Refraction, focused on building a lens array to transmit microwave signals, and it tested their behavior in terms of how the lens affected the propagation of electromagnetic waves.

“When I heard my name called, I couldn’t stop smiling,” he recalls, “because an organization like IEEE believed in me.”

Pandey advises high school students that “the world is your oyster, if you have curiosity. You don’t have to wait until you feel ready.”

Harikrishna “Hari” Rallapalli, the 2008 scholarship recipient, is a research fellow at the U.S. National Institute of Neurological Disorders and Stroke, in Bethesda, Md.

Rallapalli says he plans to research techniques that enable gene expression imaging in humans, a method that allows for the visualization and quantification of the activity of specific genes.

His winning project, Low-Cost Total Internal Reflection Fluorescence Microscopy, focused on building a microscope for classrooms, both for demonstrations and student-level research.

The scholarship helped support his education at the University of California, Davis, where he earned a bachelor’s degree in biomedical engineering.

“It felt amazing to have my work recognized by anyone, let alone an organization as prestigious as IEEE,” he says. “It was an early indication that I might cut it as a scientist.”

Software engineer and a Forbes 30 Under 30 candidate

Jessica Richeri, the 2011 recipient, is a software design engineer at Fluke in Everett, Wash. She is designing and developing a supervisory control and data acquisition (SCADA) system for one of the company’s factories. The system collects data from equipment and creates analytics dashboards and reports.

Richeri’s winning entry, Autonomous Robotic Vehicle: Saving Lives, Preventing Accidents, One at a Time, centered on building a vehicle and software to support it. Ultimately, she says, her design and its use of sensors and software could be incorporated into vehicles to prevent traffic accidents.

“The scholarship meant the world [to me]. I felt so honored that I was chosen to receive the award for all the hard work I put into my project,” she says.

A year after receiving the scholarship, she was invited to the California Capitol, in Sacramento, to present her project and discuss promoting STEM fields with her U.S. representative.

The money supported her education at California Baptist University, in Riverside, where she earned a bachelor’s degree in electrical and computer engineering.

“Winning the scholarship gave me confidence that my engineering passion could become a career. It was the start of my incredibly fun and exciting professional journey.” —2015 winner Alex Tacescu

She advises aspiring engineers that “the journey might be challenging, but the sense of accomplishment and the impact you’ll make in the world are more than worth the effort.”

The 2014 scholarship recipient, George Morgan, presented A Multi-Architectural Approach to the Development of Embedded Software. His aim, he says, was to make hardware and software development more accessible. He transformed his project into a suite of development tools for embedded-systems engineers to expedite operations.

“I remember walking on stage and feeling the excitement of being recognized for my project,” Morgan says. “In that instant, all my hard work felt validated, and I knew someone understood the level of difficulty and commitment required to reach that point.”

The scholarship supported his education at the Rochester Institute of Technology, in New York, where he graduated with a bachelor’s degree in computer engineering in 2017.

He began working at Tesla in 2018 on the AI team, dealing with the software and hardware that powers the electric vehicles’ autopilot.

Recently named among Forbes’ 30 Under 30 in AI, he founded Symbolica, a research-focused startup that develops foundational AI models and alternatives to the transformer architecture used in ChatGPT.

Spaceflight engineer and a crash-prevention-system designer

Alex Tacescu received the 2015 scholarship for Project Maverick (now known as Mavdrive). The project let users stand upright while moving around on a wheeled, motorized 0.6- by 0.6-meter platform. It is similar to a Segway but more stable, with four wheels instead of two, and each powered by independently controlled motors. He says it serves as a pathway to learn new technologies including control engineering, robot autonomy, simulation, and AI-powered machine vision.

“Winning the scholarship gave me confidence that my engineering passion could become a career,” Tacescu says. “It was the start of my incredibly fun and exciting professional journey. I will never forget the moment I was called up on that stage.”

He earned a bachelor’s degree in science and robotics engineering and a master’s degree in robotics engineering, both from Worcester Polytechnic Institute, in Massachusetts. He joined SpaceX as a Falcon flight software engineer and contributed to two groundbreaking missions. DART was the first human-made item to measurably move a celestial body, and Inspiration4 was the first all-civilian mission to orbit. Countdown: Inspiration4 Mission to Space is now on Netflix.

After nearly three years at SpaceX, Tacescu joined Inversion Space as a flight software engineer. The startup is focused on developing re-entry vehicles.

He advises high school seniors to “find their passion and keep at it. It’s going to be hard, and there will be very rough moments, but having it part of your passion makes it so much more fun, especially when those accomplishments start coming in.”

Person with curly hair in a red polo shirt.University student Kerem Bayhan, the 2021 scholarship recipient, won for a project focused on a system to help prevent underride car crashes, which occur when a vehicle collides with the rear or side of a large truck and gets stuck under it.Kerem Bayhan

Kerem Bayhan, the 2021 scholarship recipient, won for a project focused on a system to help prevent underride car crashes, which occur when a vehicle collides with the rear or side of a large truck and gets stuck under it.

Driven by a desire to make an impact on human lives, Bayhan says, he shifted his focus from engineering to medicine. He is currently a student at Hacettepe University, in Ankara, Türkiye.

“Winning the IEEE Presidents’ Scholarship award was an incredible and unexpected honor,” he says. “To have my project recognized by IEEE, one of the largest and most prestigious organizations in engineering, was immensely rewarding.”

He says he believes engineering skills are invaluable across many fields: “The analytical thinking, problem-solving abilities, and creativity at the core of engineering can set individuals apart, no matter what path they choose to follow.”

Weather balloons, a glaucoma-detection device, and drones

Amon Schumann was the 2022 scholarship recipient based on his Small Radiosondes on a Great Mission project, a sustainable weather balloon that is eco-friendly, cost-effective, and stays in the air longer than traditional ones. Now he’s studying electrical engineering at Technische Universität Berlin, where he has discovered an interest in high-frequency technology and circuit design.

After receiving the scholarship, Schumann enhanced his ISEF project by adding a live-streaming camera and additional sensors.

“My system initially allowed for flights lasting a few weeks,” he says. “I’ve since refined it to enable the balloons to collect data in the stratosphere for several months.”

Winning the scholarship was a significant motivator, he says, as it validated the potential of his basement-developed project and showed its potential for broad impact.

“Receiving the scholarship gave me the opportunity to become deeply involved with IEEE,” he says, “opening doors to connect with key decision-makers in science and technology and leading to my student researcher role” at a Berlin-based research institute specializing in high-frequency electronics.

Rohan Kalia, the 2023 scholarship recipient, is a senior at Wheeler High School in Marietta, Ga. For his winning project, he developed EyePal, an inexpensive tool for early glaucoma detection.

After receiving the scholarship, he continued to refine his project, enhancing its functionality.

“I open-sourced the parts, so if anyone wants to build on my device, they can,” Kalia says.

He was honored to receive the award, he says, knowing that past scholarship winners had made such creative projects.

“I really enjoyed the conversation with my interviewers,” he says. “We discussed the technical aspects of possible solutions and their trade-offs.”

He advises high school students to “keep an open mind” about their interests.

“Be curious about many different things,” he suggests, “as they connect in interesting ways. Once you find a topic you can’t stop thinking about, start a project to explore it.”

Woman in black blazer with colorful lanyard and various pins in a park setting.High school senior Angelina Kim was the 2024 scholarship recipient for her Autonomous Scout and Rescue UAVs for Ocean Safety.Angelina Kim

Angelina Kim was last year’s scholarship recipient. She is a high school senior at the Bishop’s School in La Jolla, Calif., where she is president of the All Girls STEM Society, a nonprofit, student-led organization that holds free monthly workshops for girls in grades 3 to 8 across San Diego. She plans to study electrical engineering at MIT.

Kim won the scholarship for her Autonomous Scout and Rescue UAVs for Ocean Safety. She developed a drone that could survey the shoreline, taking photographs and analyzing them to identify rip currents.

To continue her work related to the project, she is chief executive of AngelTech, a startup dedicated to enhancing public safety through innovative technologies.

“Through AngelTech, I’m partnering with local lifeguards to deploy my lifeguard scout and rescue drones on nearby beaches,” she says.

She also is developing new technologies to enhance public safety, she says, including a synchronized display created through several device screens. She holds a patent for the invention.

She says she was thrilled to receive the scholarship because she knew it would help her develop valuable contacts within IEEE and provide support for her future research.

“I hope to use the connections I’ve made through the scholarship to share my research and networking experiences with fellow engineers and companies, and to serve as a mentor for young girls who have limited access to STEM resources,” she says.

An article about this year’s recipient is scheduled to be published in The Institute in August.

Reference: https://ift.tt/D6POT7u

Toward Trustworthy AI: A Zero-Trust Framework for Foundational Models




As foundational AI models grow in power and reach, they also expose new attack surfaces, vulnerabilities, and ethical risks. This white paper by the Secure Systems Research Center (SSRC) at the Technology Innovation Institute (TII) outlines a comprehensive framework to ensure security, resilience, and safety in large-scale AI models. By applying Zero-Trust principles, the framework addresses threats across training, deployment, inference, and post-deployment monitoring. It also considers geopolitical risks, model misuse, and data poisoning, offering strategies such as secure compute environments, verifiable datasets, continuous validation, and runtime assurance. The paper proposes a roadmap for governments, enterprises, and developers to collaboratively build trustworthy AI systems for critical applications.

Download this free whitepaper now!

Reference: https://ift.tt/I1yk2rx

The résumé is dying, and AI is holding the smoking gun


Employers are drowning in AI-generated job applications, with LinkedIn now processing 11,000 submissions per minute—a 45 percent surge from last year, according to new data reported by The New York Times.

Due to AI, the traditional hiring process has become overwhelmed with automated noise. It's the résumé equivalent of AI slop—call it "hiring slop," perhaps—that currently haunts social media and the web with sensational pictures and misleading information. The flood of ChatGPT-crafted résumés and bot-submitted applications has created an arms race between job seekers and employers, with both sides deploying increasingly sophisticated AI tools in a bot-vs-bot standoff that is quickly spiraling out of control.

The Times illustrates the scale of the problem with the story of an HR consultant named Katie Tanner, who was so inundated with over 1,200 applications for a single remote role that she had to remove the post entirely and was still sorting through them three months later.

Read full article

Comments

Reference : https://ift.tt/tgfjnwl

Monday, June 23, 2025

Canadian telecom hacked by suspected China state group


Hackers suspected of working on behalf of the Chinese government exploited a maximum-severity vulnerability, which had received a patch 16 months earlier, to compromise a telecommunications provider in Canada, officials from that country and the US said Monday.

“The Cyber Centre is aware of malicious cyber activities currently targeting Canadian telecommunications companies,” officials for the center, the Canadian government’s primary cybersecurity agency, said in a statement. “The responsible actors are almost certainly PRC state-sponsored actors, specifically Salt Typhoon.” The FBI issued its own nearly identical statement.

A major security lapse

Salt Typhoon is the name researchers and government officials use to track one of several discreet groups known to hack nations all over the world on behalf of the People's Republic of China. In October 2023, researchers disclosed that hackers had backdoored more than 10,000 Cisco devices by exploiting CVE-2023-20198, a vulnerability with a maximum severity rating of 10.

Read full article

Comments

Reference : https://ift.tt/nGSpKRV

Another Plan to Test Satellite Deorbiting Takes Shape




More and more satellites are being added to low Earth orbit (LEO) every month. As that number continues to increase, so do the risks of that critical area surrounding Earth becoming impassable, trapping us on the planet for the foreseeable future. Ideas from different labs have presented potential solutions to this problem, but one of the most promising, electrodynamic tethers (EDTs), have only now begun to be tested in space. A new CubeSat called the Spacecraft for Advanced Research and Cooperative Studies (SPARCS) mission from researchers at the Sharif University of Technology in Tehran hopes to contribute to that effort by testing an EDT and inter-satellite communication system as well as collecting real-time data on the radiation environment of its orbital path.

aspect_ratioUniverse Today logo; text reads "This post originally appeared on Universe Today."

SPARCS actually consists of two separate CubeSats. SPARCS-A is a 1U CubeSat primarily designed as a communications platform, with the mission design requiring it to talk to SPARCS-B, which is a 2U CubeSat that, in addition to the communication system, contains a EDT. That EDT, which can measure up to 12 meters in length, is deployed via a servomotor, with a camera watching to ensure proper deployment.

EDTs are essentially giant poles with electric current running through them. They use this current, and the tiny magnetic field it produces, to push off of the Earth’s natural magnetic sphere using a property called the Lorentz force. This allows the satellite to adjust its orbit without the use of fuel, simply by orienting its EDT in a specific direction (which the EDT itself can assist with) and then using the Lorentz force to either push it up into a higher orbit, or—more importantly for the purposes for technology demonstration—to slow the CubeSat down to a point where it make a controlled entry into the atmosphere.

That controlled entry feature is why EDTs have garnered so much attention. Previous missions, such as KITE from JAXA and MiTEE from the University of Michigan have already attempted to use EDTs to change their orbits. Unfortunately neither of those missions successfully utilized their EDT, though a follow-up mission called MiTEE-2 is in the works with an even larger EDT than SPARCS.

The final piece of SPARCS’ kit is its dosimeter, which is intended to monitor the radiation environment of its orbit. As anyone familiar with spacecraft design knows, radiation hardening of electronics is absolutely critical to the success of a mission, but it is also expensive and time consuming, so best done at a minimal required level. Understanding the radiation environment of this popular orbital path can help future engineers make better, and hopefully less expensive, design decisions tailored to operation in this specific area.

Engineers have already finalized the design for the mission and have run simulations showing its expected operations. They have now moved on to building an engineering model of the two CubeSats, allowing them to validate their design and test the real-world implementation before it is ready for launch. Given the current turmoil in that region of the world, there is a chance that conflict could put a halt to development of this system. But, if successfully tested and launched, the very first demonstration of an EDT system could be deployed in the not-to-distant future.

Reference: https://ift.tt/OJ5UufG

Transforming Physical Substation Security




This is a sponsored article brought to you by POWER Engineers, Member of WSP.

Digital transformation is reshaping industries across the globe, and the power delivery sector is no exception. As demand for reliable and efficient energy supply continues to grow, the need to modernize and optimize operations becomes increasingly critical. By leveraging digital tools and technologies, utilities are unlocking unprecedented opportunities to enhance precision, efficiency and resilience throughout the power delivery value chain—from generation to distribution.

However, while digitalization offers transformative potential, the power delivery industry continues to grapple with substantial technical and operational challenges. Many utilities still operate with legacy or manual security protocols that rely on reactive rather than proactive strategies. The slow pace of technology adoption further compounds these issues, increasing the vulnerability of critical assets to inefficiencies, downtime and physical threats. Overcoming these obstacles requires a strategic shift toward innovative solutions that drive measurable improvements in safety, reliability and operational optimization.

Meerkat takes the guesswork out of substation security by integrating high-fidelity data with real-time 3D mitigation modeling. This sophisticated approach identifies all line-of-sight vulnerabilities, and delivers robust protection for critical infrastructure in an increasingly complex threat landscape.Video: POWER Engineers, Member of WSP

The Need for Digital Transformation in Physical Security

Physical attacks on substations are becoming increasingly prevalent and sophisticated. As technology evolves, so do the bad actors that are trying to take down the grid. Many mitigation methods are no longer sufficient against modern methods of attack. These facilities, which are crucial to keeping the grid operational, must be able to comprehensively assess and adapt to new threats. Digital transformation is the key to this goal.

Electric disturbance events by type, 2017-2023 Physical breach events, defined here as physical attacks, vandalism, theft and suspicious activity, accounted for more than half of all electric disturbance events reported to the United States Department of Energy in 2023. POWER Engineers, Member of WSP

Traditional Methods Fail to Meet Modern Demands

Conventional site analysis methods in power delivery are often inefficient and prone to inaccuracies, particularly at substations, where the shortcomings can lead to significant vulnerabilities.

Physical site walkthroughs to identify areas of vulnerability, for example, are inherently subjective and susceptible to human error. Compounding matters, safety concerns in high-voltage environments, coordination challenges and access restrictions to areas not owned by the substation can result in incomplete assessments and evaluations fraught with delays.

Static analysis is also limited by outdated or erroneous publicly available data, hindering precise assessments and delaying decision-making processes. For instance, assets captured in publicly available data may misrepresent recent construction near the site, which may create new lines of sight to critical assets.

Meerkat, developed by POWER Engineers, Member of WSP, leverages advanced technology to enhance threat assessment accuracy, significantly reducing assessment times, lowering mitigation costs and improving overall protection at substation facilities.

The Vulnerability of Integrated Security Analysis (VISA) method attempts to address some of these shortcomings by leveraging expert collaboration. Yet, it too has limitations—expertise variability among participants can lead to unrepresented perspectives, and reliance on static drawings and resources hampers effective visualization during sessions.

In contrast, some utilities opt for no analysis at all, erecting perimeter walls around facilities without pinpointing specific vulnerabilities. This approach often results in overbuilding and overspending while potentially leaving critical assets exposed due to overlooked threats from neighboring structures or terrain features.

Communication silos between stakeholders can also exacerbate these inefficiencies.

It’s Time to Transform: Embrace Digital Solutions

Emerging tools and technologies have the ability to address the longstanding inefficiencies in physical substation security.

Enhance Precision and Efficiency

Integrating cutting-edge technologies such as real-time data analytics and remote sensing, for example, can significantly enhance the precision and efficiency of security assessments. These tools provide dynamic insights into potential vulnerabilities, enabling proactive measures that adapt to emerging threats.

Prioritize and Optimize Resources

Transitioning from subjective assessments to data-backed evaluations ensures that decisions are grounded in accurate information rather than intuition alone. Robust datasets allow for thorough risk analyses that prioritize high-impact vulnerabilities while optimizing resource allocation.

Implement Scalable Solutions

Embrace flexible solutions capable of scaling with evolving infrastructure requirements or regulatory changes over time. This adaptability ensures continued relevance amidst shifting industry landscapes driven by technological advancements or policy shifts.

Where to Start

To solve the insufficiencies found within conventional site assessment methodologies, POWER Engineers, Member of WSP, designed a transformative threat assessment tool called Meerkat. Meerkat harnesses high-quality data and advanced modeling techniques to deliver comprehensive vulnerability assessments customized to each unique facility. It is offered alongside an industry-leading team of experts who can help break down costs, explore alternative mitigations and address operational concerns.

Meerkat revolutionizes physical substation security by offering a more accurate and thorough analysis compared to conventional approaches. It mitigates the risk of human error inherent in manual inspections and overcomes access limitations through advanced remote sensing capabilities. Additionally, Meerkat facilitates seamless collaboration among stakeholders by providing dynamic, easily interpretable visualizations that enhance communication and decision-making processes. Analyses can even be performed in a secure, online workshop, allowing subject matter experts to skip the travel delays and jump right into the action.

By using Meerkat in substation security projects, utilities can transition from reactive to proactive strategies that anticipate and counter potential vulnerabilities before they are exploited. This shift not only ensures compliance with regulatory standards but also aligns security enhancements with financial objectives, ultimately safeguarding both assets and investments in a rapidly changing technological landscape.

How it Works

Electric substation aerial view with security zones marked in red and blue sections.The Meerkat assessment features real-time mitigation modeling, optimizes camera placement, and identifies all vulnerabilities that could be exploited by malicious actors.POWER Engineers, Member of WSP

Step One: Data Collection

Meerkat starts with data collection. When pre-existing data of the site is available and of good quality and accuracy, it can be used for this process. However, when there is not sufficient data available, the Meerkat team collects its own high-fidelity data of the study area. This includes the substation facility, property and all surrounding terrain and infrastructure within an established radius of concern.

Step Two: Build a Model

Next, the high-quality data is transformed into an interactive 3D model in a virtual environment. The model is so accurate that it can facilitate virtual site visits. Users can navigate around the substation environment by clicking and dragging on screen and can visualize the site from any point ranging from a bird’s-eye view to the perspective of a potential bad actor looking into the station.

Step Three: Test Mitigations in Real Time

This interactive model serves as a virtual sandbox where mitigation strategies can be tested in real time. It can comprehensively and objectively map all line-of-sight vulnerabilities—big and small—that a bad actor might use to attack critical components. Then, existing or proposed mitigation strategies, if available, can be tested and validated within the system. This stage is great for testing what-if scenarios and seeing how multiple mitigations interact if combined before construction even comes into play.

Step Four: Find the Best-Cost Solution

POWER’s team of industry-leading experts use their knowledge to guide iterative solutions that bring substation owners and operators closer to the best-cost solutions for their substations. Sometimes moving or changing the height of a proposed wall is all it takes to drastically improve protections without drastically changing the price. A built-in cost estimator can also give a rough idea of how material costs change as the design does.

The Benefits of Using Meerkat

Meerkat is an industry-leading technology that offers unparalleled benefits in conducting thorough vulnerability assessments for critical assets at substations. By leveraging sophisticated algorithms and high-quality data, Meerkat delivers precise evaluations that pinpoint potential weaknesses with exceptional accuracy. This comprehensive approach means that every aspect of a substation’s physical security is meticulously analyzed, leaving no stone unturned.

Enhanced Efficiency

One of the key advantages of Meerkat is its ability to significantly enhance efficiency in the assessment process. This not only reduces the time and resources required for site assessments but also ensures consistent and reliable results.

Meerkat also allows an evaluation and design process that can sometimes take months of back-and-forth communication to happen in just a handful of hour-long workshops.

Improved Accuracy

Accuracy is another hallmark of Meerkat, as it eliminates the guesswork associated with human-based evaluations. By leveraging advanced modeling techniques, Meerkat provides actionable insights that empower utilities to make informed decisions regarding security upgrades and mitigations. This precision facilitates proactive risk management strategies, allowing stakeholders to address vulnerabilities before they manifest into tangible threats.

Ultimately, by improving both efficiency and accuracy in vulnerability assessments, Meerkat enables better decision-making processes that enhance overall risk management. Utilities can confidently implement targeted security measures tailored to each site’s unique needs, ensuring robust protection against emerging threats while optimizing resource allocation. In a landscape where rapid technological advancements challenge conventional practices, Meerkat stands as a vital tool for safeguarding critical infrastructure with foresight and precision.

A Case Study: Strategic Security Optimization with Meerkat


The following case study has been sanitized of identifying information to maintain the security of the facility.

Background

A client faced a critical decision regarding the security of their substation, which was surrounded by a chain-link fence spanning 3,523 linear feet. Concerned about potential line-of-sight attacks on their critical assets, they planned to construct a new 15 ft tall concrete masonry unit (CMU) wall around the entire perimeter. Before proceeding with this significant investment, they sought validation from physical security experts at POWER and used the advanced threat assessment capabilities of Meerkat.

Security Plan Validation

To assess the effectiveness of the proposed security plan, Meerkat was employed to model the 15 ft wall within a highly accurate digital representation of the facility and its surroundings. The comprehensive data-backed threat assessment revealed lingering vulnerabilities despite the proposed construction. With estimated costs between $12 million and $15 million—and additional expenses for ballistic rated gates—the financial implications were substantial.

Working Backward

Recognizing that the original plan might not sufficiently mitigate risks, the client collaborated with Meerkat experts and key personnel across disciplines—including electrical engineers, civil engineers and transmission planners—to explore alternative strategies. Through a series of concise workshops over several days, they reimagined security designs by focusing on protecting critical assets identified as essential to system stability.

Meerkat enabled real-time modeling and testing of diverse mitigation strategies. Its interactive features allowed stakeholders to dynamically adjust protective measures—such as repositioning or resizing ballistic barriers—with immediate insights into effectiveness against vulnerabilities. This iterative process prioritized achieving the optimal balance between cost efficiency and robust protection.

The Results

Through strategic analysis using Meerkat, it became clear that constructing two separate 166 ft long, 25 ft tall walls at targeted locations around critical assets offered superior protection compared to encircling the entire perimeter with a single structure. This solution significantly enhanced security while reducing the estimated implementation costs to approximately $3.4 million—about a quarter of the cost of the initial projections.

Ultimately, the revised approach not only lowered risk profiles but also prevented unnecessary expenditure on inadequate defenses. By leveraging the advanced technology provided by Meerkat, the client successfully optimized resource allocation, comprehensively safeguarding their vital infrastructure.

Get Started

Any entity interested in learning more about Meerkat and its applications can request a free demonstration from our team of experts at meerkat.powereng.com.

Meerkat Power Engineers logo in black and red font with a shield emblem above.

Reference: https://ift.tt/Qe7uJwK

Video Friday: Biorobotics Turns Lobster Tails Into Gripper

Video Friday is your weekly selection of awesome robotics videos, collected by your friends at IEEE Spectrum robotics. We also post a w...