Sekėjai

Ieškoti šiame dienoraštyje

2025 m. gruodžio 1 d., pirmadienis

This is the end of human labor on production lines. This corporation will replace them with humanoids.



"Chinese giant Xiaomi announces a revolution in manufacturing. Humanoid robots are to replace people in factories within five years, and artificial intelligence will become the core of a new generation of industry. Robots will also enter homes.

 

Xiaomi CEO Lei Jun presented one of the boldest predictions to date regarding the future of manufacturing, announcing in an interview with "Beijing Daily" that the next five years will bring a huge change driven by artificial intelligence. This change will not be gradual, but very rapid, and humanoid robots, that is, those that look and work like humans, will soon become a key element of factory operations. His statements are in line with China's broader strategy, which is pushing industry towards smarter and more advanced production systems.

 

Lei emphasized that Xiaomi's electric car factory is a clear example of the transformation taking place. Large cast body parts usually require slow, manual inspection, which often leads to errors. The company replaced this stage with an X-ray system combined with an AI vision model. The entire inspection now takes two seconds – the process is ten times faster than human work and more than five times more accurate. This shows how intelligent systems increase factory efficiency.

 

Looking ahead, Lei said that Xiaomi will introduce humanoid robots into its factories within five years. These robots will take over tasks currently performed by employees, especially those that are repetitive or require high precision.

 

Humanoid robots will enter homes.

And that's just the first step. According to the Xiaomi CEO, home humanoid robots will become an even bigger market." Such devices will need to operate much more efficiently and handle more complex, everyday tasks than factory robots.

The company already has experience in robotics.

 

The CyberOne humanoid robot was unveiled in 2022.

 

 Since then, Xiaomi has developed teams conducting research on AI, working on robotics and intelligent systems for electric cars. The company considers robots a key element of its future product strategy.

Lei explained that intelligent manufacturing brings practical benefits at every stage of the manufacturing chain. AI-based quality control improves accuracy and reduces human error. It also shortens production delays and helps stabilize processes in factories.

The opening of a future market worth trillions of dollars is accompanied by an investment frenzy, and research.

Such improvements allow employees to move into more advanced roles – related to planning, design, and engineering development. As humanoid robots take over physical tasks, people will increasingly perform jobs requiring creativity and decision-making.

AI is rapidly changing manufacturing. Who is betting on humanoids?

This fits into China's national strategy for modernizing manufacturing using AI and robotics. Beijing wants to be number one in the world in these fields. Lei urged Chinese companies to avoid older industrial models based on cheap labor. Instead, he encouraged investment in next-generation technologies – automation and digital tools – that will strengthen industrial competitiveness.

 

Xiaomi is investing heavily in AI development, robotic testing, and factory modernization. Lei emphasized that the next five years will be crucial—humanoid robots, AI-based control systems, and connected factory networks will become central elements of the company's production.

 

Tesla CEO Elon Musk is also betting on humanoid robots, developing the Optimus model. He predicts that by 2040 there will be over 10 billion such machines worldwide.

 

Not everyone shares these visions. Rodney Brooks, co-founder of iRobot and former MIT professor, warns that billions of dollars invested in humanoid robots will never pay off. In his opinion, the future belongs to completely different machines. Brooks predicts that in 15 years, successful "humanoid" robots will have wheels, multiple arms, specialized sensors, and will abandon the human form. Meanwhile, he is deeply convinced that today's billion-dollar investments are financing costly experiments that will never enter mass production. This does not change the fact that the number of robots will multiply in the near future, they will play an increasingly important role, which will affect "human" jobs.”

 


 


 

 

Skaitmeninė higiena

 

„Praėjusį savaitgalį buvo minima Tarptautinė duomenų apsaugos diena – proga apmąstyti griežtą realybę: kibernetinės atakos tapo kasdienybe verslui. Duomenų nutekėjimas, šantažas ir veiklos sutrikimai yra ne tik incidentai, bet ir tiesioginė grėsmė įmonės finansinei padėčiai, reputacijai ir pačiam egzistavimui. Informacijos saugumo problemos pagaliau persikėlė iš techninės srities į strateginio valdymo lygmenį.

Ir nors daugelis organizacijų jau sukūrė informacijos saugumo sistemas – įdiegė ugniasienes, užtikrino galinių įrenginių apsaugą ir pan. – atakos nesibaigia. Formaliai viskas veikia. Tačiau bandydamos apsisaugoti nuo visko vienu metu, įmonės pamiršta konkrečius pažeidžiamumus, kuriais užpuolikai sėkmingai naudojasi.

Efektyviai apsaugai reikia ne kontrolinių sąrašų, o supratimo, kur infrastruktūroje yra nesaugių vietų. Ataka gali prasidėti ne tik dėl reto ar anksčiau nežinomo pažeidžiamumo, bet ir dėl paprastos klaidos: pasenusių programinės įrangos versijų, per didelių teisių ar slaptažodžio pakartotinio naudojimo.

Pažeidžiamumų paieška prasideda nuo supratimo, kurie infrastruktūros elementai gali atverti kelią atakai: pasenusi paslauga su plačiomis prieigos teisėmis, paskyra su per didelėmis privilegijomis arba pamirštas architektūrinis sprendimas. Ir jums reikia pažvelgti užpuoliko akimis. Tai yra proaktyvaus požiūrio esmė: užuot pasyviai rinkus duomenis, aktyviai modeliuojama ataka, rodanti, kiek toli galima pasiekti, pažeidus vos vieną tašką. Pažeidžiamoms vietoms rasti naudojami įvairūs metodai. Kiekvienas iš jų turi savo užduotis, privalumus ir trūkumus.

 

Vienas iš tokių metodų yra automatizuotas būdas greitai rasti žinomas problemas: pažeidžiamumus, kurie jau yra duomenų bazėse, pasenusias programinės įrangos versijas, atvirus prievadus. Šis metodas tinka reguliariam techniniam stebėjimui, tačiau jis nepaaiškina, kaip šiuos pažeidžiamumus galima išnaudoti realioje atakoje, ir neatsižvelgia į informacijos saugumo įrankių buvimą.

 

Be to, ekspertai stengiasi sekti visą įsilaužėlio kelią iki svarbių sistemų užgrobimo. „Red teaming“, tai yra įsilaužėlių atakų modeliavimas, yra sudėtingos ir ilgos atakos modeliavimas su realiais tikslais: pavyzdžiui, prieigos prie apskaitos gavimas per pažeistą paskyrą. Šis metodas leidžia įvertinti apsaugos lygį, taip pat reagavimo į ataką greitį ir informacijos saugumo tarnybos gebėjimą sumažinti jos pasekmes.

 

Kitas vis labiau populiarėjantis saugumo vertinimo metodas yra automatinis įsiskverbimo testavimas. Jis apjungia pirmų dviejų būdų privalumus: jis veikia automatiškai, paleidžiamas reguliariai, yra paprastas naudoti, nereikalauja ekspertų dalyvavimo ir pateikia realų įsilaužimo metodų vaizdą. Atlikus realią ataką, sudaromas esamų pažeidžiamumų sąrašas ir pateikiamos rekomendacijos jų ištaisymui.

 

O saugumo politikos pagrindas turėtų būti mažiausių privilegijų principas – būtina vengti suteikti pernelyg daug leidimų, privilegijų ir pan.

 

Visi šie būdai nekonkuruoja, o papildo vienas kitą, idealiu atveju sudarydami ciklą: nuo reguliarių automatinių patikrinimų iki periodinių rankinių įsiskverbimo testų ir kibernetinių testų. Tačiau norint užtikrinti visavertę apsaugą, labai svarbu įgyvendinti subalansuotą priemonių rinkinį, įskaitant, pavyzdžiui, jau egzistuojančių grėsmių paiešką.

 

Hakeriai gali slėptis tinkle savaites. Todėl būtina reguliariai audituoti žurnalus, anomalijas ir įtartiną veiklą.

 

Jei ataka įvyksta, komanda turi turėti aiškią procedūrą: kas ką ir kaip daro, kur yra atsarginės kopijos ir kam pranešti.

 

Kibernetinis saugumas nėra „iš karto paruoštas“ sprendimas, o gyvas procesas visais įmonės lygmenimis: nuo architektūros ir valdymo iki korporatyvinės kultūros. Tikrai proaktyvus požiūris – tai ne prevencinės priemonės popieriuje, o reguliari praktika: testavimas, tikrinimas, modeliavimas, taisymas. Kiekvienas turi silpnų vietų. Klausimas tik, kas jas atras pirmas – Jūs ar užpuolikas.“


Digital Hygiene

 


“This past weekend marked International Data Protection Day – a reason to reflect on the harsh reality: cyberattacks have become commonplace for businesses. Data leaks, blackmail, and operational disruptions are not just incidents, but direct threats to a company's financial position, reputation, and very existence. Information security problems have finally moved from the technical plane to the level of strategic management.

And although many organizations have already built information security systems – implemented firewalls, ensured endpoint protection, and so on – attacks do not stop. Formally, everything works. However, in trying to protect themselves from everything at once, companies lose sight of specific vulnerabilities that attackers successfully exploit.

Effective protection requires not checklists, but an understanding of where there are insecure places in the infrastructure. An attack can begin not only through a rare or previously unknown vulnerability, but also due to a simple oversight: the presence of outdated software versions, excessive rights, or password reuse.

The search for vulnerabilities begins with understanding which elements of the infrastructure can open the way for an attack: an outdated service with broad access rights, an account with excessive privileges, or a forgotten architectural solution. And you need to look through the eyes of the attacker. This is the essence of a proactive approach: instead of passively collecting metrics, actively modeling an attack that shows how far one can advance by compromising just one point. Different methods are used to find vulnerable points. Each of them has its own tasks, advantages, and disadvantages.

One such method is an automated way to quickly find known problems: vulnerabilities that are already in databases, outdated software versions, open ports. This method is suitable for regular technical monitoring, but it does not explain how these vulnerabilities can be exploited in a real attack, and it does not take into account the presence of information security tools.

In addition, experts try to follow the entire path of a hacker up to the capture of important systems. Red teaming, that is, the simulation of hacker attacks, is the modeling of a complex and lengthy attack with real goals: for example, gaining access to accounting through a compromised account. This method allows you to assess the level of protection, as well as the speed of response to an attack and the ability of the information security service to minimize its consequences.

Another increasingly popular method of assessing security is automated penetration testing. It combines the advantages of the first two approaches: it works automatically, is launched regularly, is easy to use, does not require the involvement of experts, and provides a realistic picture of hacking methods. After conducting a realistic attack, a list of current vulnerabilities is formed and recommendations for their correction are given.

And the basis of the security policy should be the principle of least privilege - it is necessary to avoid granting excessive permissions, privileges, and so on.

All these approaches do not compete, but complement each other, ideally forming a cycle: from regular automated checks to periodic manual penetration testing and cyber testing. However, for full-fledged protection, the implementation of a balanced set of measures is critically important, including, for example, the search for already existing threats.

Hackers can hide inside the network for weeks. Therefore, regular auditing of logs, anomalies, and suspicious activity is necessary.

If an attack does occur, the team must have a clear procedure: who does what and how, where the backups are located, and who to notify.

Cybersecurity is not an "out-of-the-box" solution, but a living process at all levels of the company: from architecture and management to corporate culture. A truly proactive approach is not preventive measures on paper, but regular practice: testing, checking, modeling, correcting. Everyone has weak points. The only question is who will discover them first – you or the attacker.”


River of Our, Lithuanians, Money Started Flowing into the Bank Accounts of Arms Manufacturers


“However, obtaining materials may become an increasingly challenging task. Europe’s armament plans may be particularly complicated by dependence on key minerals,” she added.

 

Examples of such dependency risks include the trans-European company Airbus and France’s Safran, which until 2022 imported half of their titanium from Russia and had to look for new suppliers. In addition, in view of China’s export restrictions on critical minerals, France’s Thales, Germany’s Rheinmetall and others warned in 2024 of the potential high costs associated with restructuring their supply chains.

 

This restructuring is a pipe dream, because no one else has the necessary technologies and will not have them for at least five years. Therefore, our entire armament drive is a Potemkin village building, a gigantic deception that is completely demoralizing the population.

 


Mūsų, lietuvių, pinigų upė pajudėjo į ginklų gamintojų banko sąskaitas


„Tačiau vis didesniu iššūkiu gali tapti medžiagų gavimas. Europos ginklavimosi planus gali ypač apsunkinti priklausomybė nuo svarbiausių mineralų“, – pridūrė ji.

 

Tokios priklausomybės rizikos pavyzdžiais įvardijamos transeuropinė bendrovė „Airbus“ ir Prancūzijos „Safran“, kurios iki 2022 m. pusę reikiamo titano importuodavo iš Rusijos ir turėjo ieškoti naujų tiekėjų. Be to, atsižvelgdamos į Kinijos eksporto apribojimus kritiškai svarbiems mineralams, Prancūzijos „Thales“, Vokietijos „Rheinmetall“ ir kitos bendrovės 2024 m. įspėjo apie galimas dideles išlaidas, susijusias su tiekimo grandinių restruktūrizavimu.”

 

Tas restruktūrizavimas yra svajuko dramblonė, nes niekas kitas reikalingų technologijų neturi ir bent penkis metus neturės. Todėl visas mūsų ginklavimasis yra Potiomkino kaimas, gigantiška apgavystė, galutinai demoralizuojanti gyventojus.