logo
There's a flood of reports about college students

There's a flood of reports about college students

The Verge4 days ago

Ohio State leans into 'AI fluency' for the class of 2029.
apparently using AI to cheat their way through college, and debating whether or not that's the actual problem. Now, NBC4 in Columbus points out Ohio State's new AI Fluency plan that targets the class of 2029 (with some level of assumptions that our current view of generative AI will still be relevant by then), focusing on a few steps:
All undergraduates will be introduced to generative AI basics in the required General Education Launch Seminar.
GenAI workshops will be integrated into the First Year Success Series.
The new 'Unlocking Generative AI' course will be offered and open to all majors.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

The Only Remedy for Intel's Woes May Be a Breakup
The Only Remedy for Intel's Woes May Be a Breakup

Wall Street Journal

time27 minutes ago

  • Wall Street Journal

The Only Remedy for Intel's Woes May Be a Breakup

To emerge from a yearslong financial and technological rut, Intel INTC 0.44%increase; green up pointing triangle needs to better compete with chip makers like Taiwan Semiconductor Manufacturing Co. It looks increasingly like that will require breaking up the company. The storied chip maker for decades minted money by designing and making its own chips in its own factories. The model worked well when the company was making the fastest-calculating chips with the smallest transistors in the world.

Google Chrome Warning Issued For Most Windows PC Users
Google Chrome Warning Issued For Most Windows PC Users

Forbes

time37 minutes ago

  • Forbes

Google Chrome Warning Issued For Most Windows PC Users

Beware this hidden Chrome threat. This is another interesting month for Google's 3 billion Chrome users, with a U.S. government mandate to update all browsers by June 26 and another update warning this week as further vulnerabilities are discovered. But there's a very different Chrome threat to your PC, and it's much more difficult to find and fix. Already this month we have been warned by LayerX that 'a network of malicious sleeper agent extensions" are 'waiting for their 'marching order' to execute malicious code on unsuspecting users' computers.' A huge number of Chrome users have at least one extension installed, which is one of the browser's biggest security risks. Now Symantec warns that some of the most popular extensions it has analyzed, 'expose information such as browsing domains, machine IDs, OS details, usage analytics, and more.' The research team says 'many users assume that popular Chrome extensions adhere to strong security practices,' but that's just not the case. Symantec found that even some big-brand extensions 'unintentionally transmit sensitive data over simple HTTP. By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information.' More alarmingly, 'because the traffic is unencrypted, a Man-in-the-Middle (MITM) attacker on the same network can intercept and, in some cases, even modify this data, leading to far more dangerous scenarios than simple eavesdropping.' Bugcrowd's Trey Ford told me 'this is a very common way to compromise browsers for various outcomes, ranging from stealing credentials and spying on users, to simply establishing ways to very uniquely identify and track users across the internet. Ultimately this can manifest as a form of malware, and unavoidably create new attack surface for miscreants to attack and compromise a very secure browsing experience.' There's no easy answer to this one. Symantec says that while 'none of [the extensions] appear to leak direct passwords,' the data can still fuel attacks. 'The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks.' Symantec notified the developers behind the tested extensions (details in its report.) 'The overarching lesson,' the team says, 'is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share.' According to Keeper Security's Patrick Tiquet, 'this highlights a critical gap in extension security,' if and when 'developers cut corners.' He warns that 'transmitting data over unencrypted HTTP and hard-coding secrets exposes users to profiling, phishing and adversary-in-the-middle attacks – especially on unsecured networks.' The risk is especially acute for enterprises. 'Organizations should take immediate action by enforcing strict controls around browser extension usage, managing secrets securely and monitoring for suspicious behavior across endpoints. Just because a browser extension is very popular and has a large user base doesn't mean it's secure. Businesses must scrutinize all browser extensions to protect sensitive data and identities.'

PCIe 7.0 is coming, but not soon, and not for you
PCIe 7.0 is coming, but not soon, and not for you

The Verge

time41 minutes ago

  • The Verge

PCIe 7.0 is coming, but not soon, and not for you

The PCIe 7.0 specification has now been released, while many of us are still waiting for PCIe 6.0 to materialize in consumer products. The PCI Special Interest Group (PCI-SIG) announced on Wednesday that PCIe 7.0 is now available to members of its organization, delivering a theoretical maximum bandwidth speed of 512GB per second in both directions, across a x16 connection. 'PCIe technology has served as the high-bandwidth, low-latency IO interconnect of choice for over two decades and we are pleased to announce the release of the PCIe 7.0 specification, which continues our long-standing tradition of doubling the IO bandwidth every three years,' PCI-SIG President Al Yanes said in the announcement. 'As artificial intelligence applications continue to scale rapidly, the next generation of PCIe technology meets the bandwidth demands of data-intensive markets deploying AI, including hyperscale data centers, high performance computing (HPC), automotive, and military/aerospace.' You may have noticed that consumer computing devices weren't included in that statement — the specification is targeting data-driven applications like cloud and quantum computing datacenters for now, and will take some time to even appear in those markets. PCI-SIG says that PCIe 7.0 will be backward compatible with previous PCI Express versions, but there's no mention of plans to bring it to everyday desktop SSDs or GPUs any time soon. That shouldn't be surprising, given the PCIe 5.0 spec that launched in 2019 only started trickling into consumer hardware two years ago, and is still fairly uncommon. Image: PCI-SIG

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store