Connect with us

Tech

Ford accelerates fleet data capability with Pro AI | Computer Weekly

Published

on

Ford accelerates fleet data capability with Pro AI | Computer Weekly


The Ford Motor Company has launched an intelligent fleet assistant for commercial customers, offering “a deep intelligence that understands specific fleet vehicles inside and out”. 

According to the company, the Ford Pro AI is designed to act as a trusted assistant at work that organisations can depend on to help manage their fleet operations more effectively and get daily tasks done. It aims to simplify fleet management by turning responsibilities into tasks that can be completed in minutes. The intelligent fleet assistant takes the millions of data points that vehicles generate — such as seatbelt clicks to vehicle health signals — and turns them into insights that can be acted on.

Before it made the launch, Ford surveyed fleet managers to understand how much time they spend on specific job duties. The results showed that fleet managers spent more than 23 hours a week on average on juggling routine tasks, ranging from scheduling service to managing drivers and tracking costs. The sample also said that they thought AI could help them reduce the time spent on daily tasks by an average of 40% or more each week.

The multi-agent architecture is built on “clean, well-structured internal data sources” from each customer’s fleet to reduce the potential of AI hallucinations and errors.

As it made the launch, Ford said that its new product was not just a generic chatbot. “We know there’s a lot of AI buzz floating around,” it said. “Interestingly, the commercial space is seeing AI more and more as a core operational tool versus an add-on, driven by urgency for organisations to lower costs, boost efficiency and improve safety.”

The new product is powered by the proprietary Ford Pro Telematics Software to provide deeper detail and accuracy about vehicle health versus surface-level information and diagnostics trouble codes (DTC codes). 

Noting that human-in-the-loop was critical to providing oversight, feedback and making decisions without disrupting the business day, Ford Pro AI is said to be designed to handle administrative burdens so fleet managers can focus on high-value operational gains.

For example, if asked the question, “What vehicles need service this month?”, Ford Pro AI would respond with a list of vehicles in a fleet that need service based on their vehicle health data. Users could then dive deeper into a specific vehicle’s diagnostics and get quick recommendations that can help them to prioritise which vehicles to service first, thus preventing unwanted downtime.

After this, a user could navigate to the service scheduling feature in the Ford Pro Telematics Software to book a maintenance or repair appointment at one of more than 760 Ford Pro Commercial Vehicle Centres or have the service come to them with one of Ford Pro’s Mobile Service Vans.

Looking at another intended use case to solve a real-life problem, Ford said that its survey showed fleet managers spending an average of over two hours per week on tracking costs. To cut this down – for example, in managing 150 last-mile delivery vehicles – Ford said Pro AI could help to do that more quickly.

The solution is said to be able to analyse vehicle and fuel utilisation, idle times, speeding and acceleration events across the fleet to help fleet managers identify issues. As a result, managers get a get a list of recommendations to reduce fuel costs based on a fleet’s unique utilisation.

The solution is available immediately at no additional cost to subscribers of the Ford Pro Telematics Software.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

This Is the Next Wave of Political Fundraising

Published

on

This Is the Next Wave of Political Fundraising


On Monday, streamer and content creator Hasan Piker helped raise more than $56,000 in one stream for Oliver Larkin, a former Bernie Sanders campaign staffer who is seeking to primary Jared Moskowitz, a moderate Democratic congressman from Florida. It was the most the campaign had raised “in a single day,” Larkin said on X shortly after the stream ended.

Over the past few years, creators have become an essential piece of campaign messaging strategy. But Piker’s recent stream for Larkin is the latest sign that online influence is being leveraged for direct fundraising as well.

Piker isn’t alone. Trisha Paytas, a YouTuber with more than 5 million subscribers and a long history of provocative stunts, isn’t known for her political activism, but in February she donated more than $10,000 to a campaign called Creators Against ICE. The campaign, organized by the creator collective Creators for Peace, is just one in a string of fundraisers organized by coalitions of creators turning social media followings into political fundraising machines.

Unlike traditional fundraising models like super PACs that pool funds from publicly reported donors, these creator collectives pool audiences and leverage social networks and off-the-shelf tools like Shopify and Tiltify to convert followers into donors. Creators for Peace is one of the most prominent groups in a line of creator coalitions mobilizing around causes from Gaza relief to immigration aid—establishing a model that could reshape grassroots fundraising ahead of the midterm elections.

“There are a lot of creators that I think recognize the power of having a platform,” says Hassan Khadair, one of the Creators for Peace organizers. “There’s more of a call to action culturally with creators than I think there’s ever been before.”

Creators for Peace was established in 2024 by Nikki Carreon in an Instagram group DM with a handful of other creators to raise money for Gaza relief. That group chat expanded into a more than 120-person Discord server that included influencers with millions of followers on platforms like Instagram, Twitch, and YouTube. People like Kurtis Conner, Hasan Piker, and the Try Guys, who collectively boast more than 15 million followers on their primary platforms, got involved. Members shared infographics with their audiences and organized a livestream. By the end of the campaign, the group had raised more than $1.6 million.

“We largely start from zero on each new campaign. I will individually reach out to several creators, we’ll get something out, and then once we allow that to catch fire on its own, a bunch of creators will reach out to us,” says Khadair. For the Creators for Peace immigration fundraiser, Khadair says, “we really wanted to try and move out of the leftist bubble just a little bit, because a lot of our audiences tend to align with us on these issues.”

By connecting with more apolitical creators like Paytas, the Creators Against ICE campaign has raised nearly $140,000 for the National Immigration Law Center, according to the group’s Tiltify fundraiser.

Creators have come under fire for remaining silent on political issues for years. During the 2020 Black Lives Matter protests, audiences began demanding that influencers creating content on anything from fashion to food publicly speak out and take sides on political issues. In these online spaces, silence is often seen as complicity.

Groups of Democratic political influencers, like UnderTheDeskNews, have also started raising funds for whistles to alert communities about the presence of ICE agents and community watch support as well. In February, around 80 creators were part of an anti-ICE merch fundraiser tied to Bad Bunny’s Super Bowl performance, selling T-shirts, hats, and stickers featuring the singer’s Sapo Concho mascot. The campaign raised more than $100,000 for immigration legal defense funds.



Source link

Continue Reading

Tech

Meta Developed 4 New Chips to Power Its AI and Recommendation Systems

Published

on

Meta Developed 4 New Chips to Power Its AI and Recommendation Systems


Meta announced Wednesday that it has developed four new computer chips that will be used to power generative AI features and content ranking systems within the tech giant’s own apps. The hardware will become part of Meta’s existing chip line known as MTIA, or Meta Training and Inference Accelerators.

Meta partnered with Broadcom to develop its latest semiconductors, which are built on top of the open-source RISC-V architecture. They’re being fabricated by Taiwan Semiconductor Manufacturing Corporation, the world’s leading chip producer.

One of the new MTIA chips, the MTIA 300, is already in production, and Meta says the other three—the MTIA 400, 450, and 500—are expected to ship sometime between early and late 2027. Putting out fresh silicon this quickly is unusual by most chip industry standards, but is essentially unheard of for a social media company that historically didn’t produce its own physical computing infrastructure.

YJ Song, a vice president of engineering at Meta, says that AI models are evolving faster than traditional chip development cycles, so AI workloads may change substantially by the time new hardware typically reaches production. “Rather than placing a bet and waiting for a long period of time, we deliberately take an iterative approach. Each MTIA generation builds on the last, using modular chiplets and incorporating the latest AI workload insights and hardware technologies,” Song said in a blog post.

The MTIA 300 will be used primarily for training algorithms that rank and recommend content to the hundreds of millions of people who use apps like Facebook and Instagram each day. The other three chips are designed to support inference, the process of running trained AI models to produce outputs like text or images.

The MTIA 400, which Meta claims delivers performance “competitive with leading commercial products,” has been tested and is expected to arrive at data centers soon. The MTIA 450 will have double the amount of high-bandwidth memory as the MTIA 400, and is supposed to ship in early 2027. Meta says the MTIA 500, which is slated to arrive later next year, will have even more memory than MTIA 450 and include “innovations in low-precision data.”

The MTIA chips are part of Meta’s broader strategy to hoard as much computing power as possible in order to develop cutting-edge artificial intelligence. Meta first shared details about its chip development plans in 2023, when it released its first product under the MTIA banner. As software companies and AI labs continue to train increasingly powerful AI models, they have begun announcing ambitious plans to build custom chips that serve their own specific AI needs. OpenAI, for example, has also said it’s partnering with Broadcom to build custom accelerators, following a path similar to Meta’s.

Earlier this year, Meta was reported to be scaling back some of its in-house efforts to make high-end chips that would compete more directly with leading players like Nvidia. The company now appears eager to dispel that narrative by announcing this new road map for MTIA chips. But making custom silicon remains enormously expensive and technically complex, which means Meta will likely continue purchasing the majority of its AI hardware from other firms, at least in the near future.

That reality is reflected in the company’s recent chip buying spree. Meta unveiled its new MTIA chips shortly after announcing multibillion dollar deals with Nvidia and AMD. The social media giant has also signed an agreement to rent chips made by Google.



Source link

Continue Reading

Tech

Iran war a melting pot for other cyber threats | Computer Weekly

Published

on

Iran war a melting pot for other cyber threats | Computer Weekly


State-backed cyber threat actors from the likes of Belarus, China and Pakistan are all ramping up their activity in the wake of the joint Israeli-US attack on Iran, even though their government paymasters are not directly involved in the war.

This is according to intelligence published by Proofpoint, which claims to have observed several such campaigns unfolding in the wild. It believes this wave of malicious activity reflects a mixture of threat actors opportunistically using the conflict to create lures in their routine options, and intelligence collection directly related to Middle Eastern governments and their allies.

“These campaigns were conducted by both known groups and previously unobserved actors, with suspected attribution to China, Belarus, Pakistan and Hamas,” wrote Proofpoint’s research team.

“The campaigns heavily relied on aspects of the conflict as topical lure content to engage the targets and often used compromised accounts belonging to government organisations to send phishing emails,” they said.

In one such campaign, Belarussian threat actor TA473, or Winter Vivern, impersonated a European Council president spokesperson relaying a statement on the European Union’s (EU’s) position on human rights, regional security and Iran’s alleged weapons of mass destruction.

It was sent to government organisations in both Europe and the Middle East – the first time Winter Vivern has been seen targeting the Middle East – and contained an HTML file which, if opened, displayed a decoy image while conducting an HTTP request in the background. However, said Proofpoint, for now at least, this request is likely intended for target tracking purposes only, as it neither observed nor retrieved any next-stage payloads.

At the same time, the China-linked UNK_InnerAmbush actor ran a phishing exercise targeting diplomats and government officials in the region. Using a compromised email address, it used the death of Ayatollah Khamenei as a lure, purporting to share “secret on-site images” obtained via the US Department of Foreign Affairs – which should be a dead giveaway to anybody with knowledge of American politics, as US foreign affairs are handled by the State Department.

Images of strikes

Days later, UNK_InnerAmbush pivoted to images of Israel’s strikes on Iran’s fossil fuel infrastructure, which have induced a major ecological disaster – but in all instances, the images were actually disguised Microsoft Shortcut (LNK) files, hosted in a password-protected ZIP or RAR archive on Google Drive. If opened, they ran executables that decrypted Cobalt Strike command and control (C2) payloads and loaded them into memory.

Meanwhile, despite their government’s non-involvement, Pakistan-aligned threat actor UNK_RobotDreams has been targeting the offices of Middle Eastern government organisations in neighbouring India, impersonating India’s Ministry of External Affairs – which is at least the correct terminology – with phishing emails purporting to advise on the security impacts of the war.

These emails contained a blurred decoy PDF attachment and a fake Adobe Reader button which, if opened, redirected to a threat actor-controlled URL that used geofencing to serve a tainted executable to its intended targets. The executable functioned as a .NET loader that retrieved a Rust backdoor from the threat actor’s C2 host via PowerShell.

“While several of these groups incorporated the war-themed lure content in operations that are largely consistent with typical targeting remits, others demonstrated a shift toward intelligence collection against Middle Eastern government and diplomatic entities,” wrote Proofpoint’s research team.

“This likely reflects an effort to gather regional intelligence on the standing, trajectory and broader geopolitical implications of the conflict. This suggests the conflict is being used both as a topical social engineering pretext and a driver of collection priorities for a range of state-aligned threat actors.”

Iran’s state APTs stirring

In contrast to the opening days of the war, during which they appeared to be lying low, leaving the virtual battlefield largely to hacktivists, Iran’s own network of state-linked threat actors is now beginning to make itself known.

Proofpoint said it had now observed TA453, or Charming Kitten, conducting phishing exercises against a US-based think tank, with its lures themed around a roundtable on air defence capabilities – although strictly speaking, this activity began before the outbreak of war.

Other Iranian threat actors, notably the Ministry of Intelligence and Security (MoIS)-linked Seedworm (aka MuddyWater, Static Kitten), have been targeting US airports, banks, non-profits and tech companies, according to intelligence from Cisco Talos.

While, as with Charming Kitten, much of this activity began in February, Cisco Talos noted the use of a previously unknown custom backdoor, dubbed Dindoor, which uses Deno – an open source JavaScript runtime – to execute.

Dindoor was first highlighted by Symantec and Carbon Black last week, and was linked to Seedworm by the use of certificates issued to aliases linked to other Seedworm malwares.

Brigid O’Gorman, senior intelligence analyst at the Symantec and Carbon Black Threat Hunter team, told our sister title, Cybersecurity Dive, that while this particular Seedworm campaign began before the current conflict, it puts the gang in a “potentially dangerous” position to be able to launch further attacks.



Source link

Continue Reading

Trending