fbpx
Connect with us

The Conversation

Undersea cables are the unseen backbone of the global internet

Published

on

Undersea cables are the unseen backbone of the global internet

Special ships lay data cables across the world's oceans.
Stefan Sauer/picture alliance via Getty Images

Robin Chataut, Quinnipiac University

Have you ever wondered how an email sent from New York arrives in Sydney in mere seconds, or how you can chat with someone on the other side of the globe with barely a hint of delay? Behind these everyday miracles lies an unseen, sprawling web of undersea cables, quietly powering the instant global communications that people have come to rely on.

Undersea cables, also known as submarine communications cables, are fiber-optic cables laid on the ocean floor and used to transmit data between continents. These cables are the backbone of the global internet, carrying the bulk of international communications, including email, webpages and video calls. More than 95% of all the data that moves around the world goes through these undersea cables.

These cables are capable of transmitting multiple terabits of data per second, offering the fastest and most reliable method of data transfer available . A terabit per second is fast enough to transmit about a dozen two-hour, 4K HD movies in an instant. Just one of these cables can handle millions of people watching or sending messages simultaneously without slowing down.

About 485 undersea cables totaling over 900,000 miles sit on the the ocean floor. These cables span the Atlantic and Pacific oceans, as well as strategic passages such as the Suez Canal and isolated within oceans.

Advertisement
a map of the world showing many lines connecting the continents
Undersea cables tie the world together.
TeleGeography, CC BY-SA

Laying cable under the sea

Each undersea cable contains multiple optical fibers, thin strands of glass or plastic that use light to carry vast amounts of data over long distances with minimal loss. The fibers are bundled and encased in protective layers designed to withstand the harsh undersea , including pressure, wear and potential from fishing activities or ship anchors. The cables are typically as wide as a garden hose.

The process of laying undersea cables starts with thorough seabed surveys to chart a map in order to avoid natural hazards and minimize environmental impact. this step, cable-laying ships equipped with giant spools of fiber-optic cable navigate the predetermined route.

As the ship moves, the cable is unspooled and carefully laid on the ocean floor. The cable is sometimes buried in seabed sediments in shallow waters for protection against fishing activities, anchors and natural . In deeper areas, the cables are laid directly on the seabed.

Along the route, repeaters are installed at intervals to amplify the optical signal and ensure data can travel long distances without degradation. This entire process can take months or even years, depending on the length and complexity of the cable route.

How undersea cables are installed.

Threats to undersea cables

Each year, an estimated 100 to 150 undersea cables are cut, primarily accidentally by fishing equipment or anchors. However, the potential for sabotage, particularly by nation-states, is a growing concern. These cables, crucial for global connectivity and owned by consortia of internet and telecom companies, often lie in isolated but publicly known locations, making them easy targets for hostile actions.

Advertisement

The vulnerability was highlighted by unexplained failures in multiple cables off the coast of West Africa on March 14, 2024, which led to significant internet disruptions affecting at least 10 nations. Several cable failures in the Baltic Sea in 2023 raised suspicions of sabotage.

The strategic Red Sea corridor has emerged as a focal point for undersea cable threats. A notable incident involved the attack on the cargo ship Rubymar by Houthi rebels. The subsequent damage to undersea cables from the ship's anchor not only disrupted a significant portion of internet traffic between Asia and Europe but also highlighted the complex interplay between geopolitical conflicts and the security of global internet .

Protecting the cables

Undersea cables are protected in several ways, starting with strategic route planning to avoid known hazards and areas of geopolitical tension. The cables are constructed with sturdy materials, including steel armor, to withstand harsh ocean conditions and accidental impacts.

Beyond these measures, experts have proposed establishing “cable protection zones” to limit high-risk activities near cables. Some have suggested amending international laws around cables to deter foreign sabotage and developing treaties that would make such interference illegal.

Advertisement

The recent Red Sea incident shows that help for these connectivity challenges might lie above rather than below. After cables were compromised in the region, satellite operators used their networks to reroute internet traffic. Undersea cables are likely to continue carrying the vast majority of the world's internet traffic for the foreseeable future, but a blended approach that uses both undersea cables and satellites could provide a measure of protection against cable cuts.The Conversation

Robin Chataut, Assistant Professor of Cybersecurity and Computer Science, Quinnipiac University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

The Conversation

‘What is a fact?’ A humanities class prepares STEM students to be better scientists

Published

on

theconversation.com – Timothy Morton, Rita Shea Guffey Chair of English, Rice – 2024-04-30 07:29:12

A favorite class focuses on the tendency to see meaningful patterns where there aren't any, such as constellations of .

Yuga Kurita/Moment via Getty Images

Timothy Morton, Rice University

Text saying: Uncommon Courses, from The Conversation

Uncommon Courses is an occasional from U.S. highlighting unconventional approaches to teaching.

Advertisement

Title of course:

What Is a Fact?

What prompted the idea for the course?

With all the conspiracy theories floating around in 2020 when COVID-19 hit, I wanted to help my learn to identify and deal with them. I was also concerned about political propaganda. And in my STEM-heavy school, I wanted to showcase what humanities scholars can do. So I created this class, which is distilled humanities for freshmen. Almost every student so far has been a science, technology, engineering and math major.

What does the course explore?

We start with a week called What Is Data? In Latin, “data” just means “things that are given.” Data can be in the form of measurements: “This bowlful of weighs x.” But data can also mean “it reminds me of my grandma.” How can you tell when something could be meaningful, or whether it's just nonsense?

A later class that students find especially interesting is on apophenia, the tendency to see patterns where there aren't any, like the man in the Moon, or constellations of stars.

Advertisement

chart illustrating dots of data, colored and connected in various ways as information, knowledge, insight, wisdom and conspiracy theory

Conspiracy theories connect a lot of dots, but that doesn't make them right.

Screenshot of a meme

Why is this course relevant now?

A fact is an interpretation of data. In physics class, you learn how to interpret physics data, find patterns, relate those patterns to other ones, and produce facts about them. If your argument hangs together logically, your interpretation can appear in the journal Nature Physics.

Humanities classes, however, prepare you to understand what facts are, period – whether they're based on biology or on the Bible, nutrition science or novels.

What's a critical lesson from the course?

One critical lesson is that many big conspiracy theories such as QAnon are about jumping to conclusions as quickly as possible. Being a good student and a good scholar means accepting that what you're examining might not be meaningful or might not indicate a pattern. What we're exploring here is how not to jump to conclusions. And this lesson applies as much to stuff in the real world as it does to lab work.

Advertisement

What materials does the course feature?

We watch YouTuber hbomberguy debunking global warming denialism. We read Kurt Gödel on how logical systems must always be flawed. We read poems and stories, introducing science majors to interpreting artistic data, a every bit as rigorous as interpreting scientific data.

What will the course prepare students to do?

Without the kinds of critical thinking this course teaches, scientists can be susceptible to propaganda and unable to share their ideas effectively, whether it's in the or to their colleagues, friends and .

Students learn to look at the world with fresh, skeptical eyes. They learn to identify illogical arguments and rhetorical strong-arm tactics. In the Middle Ages, humanities – grammar, logic, rhetoric – prepared you to do science. What Is a Fact? is like that, helping students see how collecting data and being skeptical don't stop once you've left the lab. A questioning, open-minded attitude is an essential skill.The Conversation

Timothy Morton, Rita Shea Guffey Chair of English, Rice University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Advertisement
Continue Reading

The Conversation

Electric vehicles are usually safer for their occupants – but not necessarily for everyone else

Published

on

theconversation.com – Jingwen Hu, Research Professor of Mechanical Engineering, of Michigan – 2024-04-30 07:28:40

A crash test car after a side impact.

Patrick Pleul/picture alliance via Getty Images

Jingwen Hu, University of Michigan

The future of automobiles is electric, but many people worry about the safety of 's electric vehicles.

Advertisement

Public opinion about EV crash safety often hinges on a few high-profile fire incidents. Those safety concerns are arguably misplaced, and the actual safety of EVs is more nuanced.

I've researched vehicle safety for more than two decades, focusing on the biomechanics of impact injuries in motor vehicle crashes. Here's my take on how well the current crop of EVs protects people:

The burning question

EVs and internal combustion vehicles undergo the same crash-testing procedures to evaluate their crashworthiness and occupant protection. These tests are conducted by the National Highway Safety Administration's New Car Assessment Program and the Insurance Institute for Highway Safety.

These analyses use crash test dummies representing midsize male and small female occupants to evaluate the risk of injuries. The tests can evaluate fire hazard either caused by thermal runaway – when lithium-ion batteries experience rapid uncontrollable heating – in ruptured EV batteries or gas tank leaks of internal combustion vehicles.

Advertisement

None of the Insurance Institute for Highway Safety crash tests of EVs have sparked any fires. New Car Assessment Program crash test reports yield comparable findings. While real-world data analysis on vehicle fires involving EVs is limited, it appears that and social media scrutiny of EV fire hazard is blown out of proportion.

Weighty matters

What stands out about EV safety is that crash test results, field injury data and injury claims from the Insurance Institute for Highway Safety all reveal that EVs are superior to their internal combustion counterparts in protecting their occupants.

This EV advantage boils down to a blend of physics and cutting-edge technologies.

Thanks to their hefty battery packs positioned at the base of the car, EVs tend to carry considerably more weight and enjoy lower centers of gravity than conventional vehicles. This setup drastically reduces the likelihood of rollover accidents, which have a high rate of fatalities. Moreover, crash dynamics dictate that in a collision between two vehicles, the heavier one a distinct advantage because it doesn't slow down as abruptly, a factor strongly linked to occupant injury risks.

Advertisement

On the technology side, most EVs represent newer models equipped with -of-the-art safety , from advanced energy-absorbing materials to cutting-edge crash avoidance systems and upgraded seat-belt and -bag setups. These features collectively bolster occupant protection.

Crash tests by the Insurance Institute for Highway Safety show that most EVs are comparatively safe for their occupants.

Where risks do rise

Unfortunately, EVs also present numerous safety challenges.

While the inherent weightiness of EVs offers a natural advantage in protecting occupants, it also means that other vehicles bear the burden of absorbing more crash energy in collisions with heavier EVs. This dilemma is central to the concept of “crash compatibility,” a well-established field of safety research.

Consider a scenario in which a small sedan collides with a heavy truck. The occupants in the sedan always face higher injury risks. Crash compatibility studies measure vehicle “aggressivity” by the level of harm inflicted on other vehicles, and heavier models are almost always deemed more aggressive.

Advertisement

In addition, the increased energy associated with impacts from heavier EVs, particularly electric pickups, poses significant challenges for highway guardrails. Moreover, EVs – especially those operating silently at low speeds – pose increased risks to pedestrians, bicyclists and others who may not hear the EVs approach.

Better technologies, better safety

While EVs offer safety advancements for their own occupants, it's crucial to acknowledge and tackle the safety concerns they pose for others on the road.

I believe that technological advancements will serve as the primary catalyst for overcoming the safety hurdles by EVs. Lightweight materials, more powerful sensing technologies and safety algorithms, improved seat belts and better air bags will play pivotal roles in addressing these challenges.

Moreover, the tight connection between EVs and rapidly evolving computing capabilities is likely to foster the of new safety technologies.The Conversation

Jingwen Hu, Research Professor of Mechanical Engineering, University of Michigan

Advertisement

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

The Conversation

Teens see social media algorithms as accurate reflections of themselves, study finds

Published

on

theconversation.com – Nora McDonald, Assistant Professor of Information Technology, George Mason – 2024-04-29 07:26:15

Teens say ‘for you' algorithms get them right.

Photo illustration by Spencer Platt/Getty Images

Nora McDonald, George Mason University

Social apps regularly present teens with algorithmically selected content often described as “for you,” suggesting, by implication, that the curated content is not just “for you” but also “about you” – a mirror reflecting important about the person you are.

Advertisement

All users of social media are exposed to these signals, but researchers understand that teens are at an especially malleable stage in the formation of personal identity. Scholars have begun to demonstrate that technology is generation-shaping effects, not merely in the way it influences cultural outlook, behavior and privacy, but also in the way it can shape personality among those brought up on social media.

The prevalence of the “for you” message raises important questions about the impact of these algorithms on how teens perceive themselves and see the world, and the subtle erosion of their privacy, which they accept in exchange for this view.

Teens like their algorithmic reflection

Inspired by these questions, my colleagues John Seberger and Afsaneh Razi of Drexel University and I asked: How are teens navigating this algorithmically generated milieu, and how do they recognize themselves in the mirror it ?

In our qualitative interview study of teens 13-17, we found that personalized algorithmic content does seem to present what teens interpret as a reliable mirror image of themselves, and that they very much like the experience of seeing that social media reflection.

Advertisement

Teens we spoke with say they prefer a social media completely customized for them, depicting what they agree with, what they want to see and, thus, who they are.

If I look up something that is important to me that will show up as one of the top posts [and] it'll show, like, people [like me] that are having a nice discussion.

It turns out that the teens we interviewed believe social media algorithms like TikTok's have gotten so good that they see the reflections of themselves in social media as quite accurate. So much so that teens are quick to attribute content inconsistencies with their self-image as anomalies – for instance, the result of inadvertent engagement with past content, or just a glitch.

At some point I saw something about that show, maybe on TikTok, and I interacted with it without actually realizing.

When personalized content is not agreeable or consistent with their self-image, the teens we interviewed say they scroll past it, hoping never to see it again. Even when these perceived anomalies take the form of extreme hypermasculine or “nasty” content, teens do not attribute this to anything about themselves specifically, nor do they claim to look for an explanation in their own behaviors. According to teens in our interviews, the social media mirror does not make them more self-reflective or their sense of self.

One thing that surprised us was that while teens were aware that what they see in their “for you” feed is the product of their scrolling habits on social media platforms, they are largely unaware or unconcerned that that data captured across apps contributes to this self-image. Regardless, they don't see their “for you” feed as a challenge to their sense of self, much less a risk to their self-identity – nor, for that matter, any basis for concern at all.

Advertisement

The human brain continues to develop during adolescence.

Shaping identity

Research on identity has a long way since sociologist Erving Goffman proposed the “presentation of self” in 1959. He posited that people manage their identities through social performance to maintain equilibrium between who they think they are and how others perceive them.

When Goffman first proposed his theory, there was no social media interface available to hold up a handy mirror of the self as experienced by others. People were obligated to create their own mosaic image, derived from multiple sources, encounters and impressions. In recent years, social media recommender algorithms have inserted themselves into what is now a three-way negotiation among self, public and social media algorithm.

“For you” offerings create a private-public space through which teens can access what they feel is a largely accurate test of their self-image. At the same time, they say they can easily ignore it if it seems to disagree with that self-image.

The pact teens make with social media, exchanging personal data and relinquishing privacy to secure access to that algorithmic mirror, feels to them like a good bargain. They represent themselves as confidently able to tune out or scroll past recommended content that seems to contradict their sense of self, but research shows otherwise.

Advertisement

They have, in fact, proven themselves highly vulnerable to self-image distortion and other mental health problems based on social media algorithms explicitly designed to create and reward hypersensitivities, fixations and dysmorphia – a mental disorder where people fixate on their appearance.

Given what researchers know about the teen brain and that stage of social – and given what can reasonably be surmised about the malleability of self-image based on social feedback – teens are wrong to believe that they can scroll past the self-identity risks of algorithms.

U.S. Surgeon General Vivek Murthy discusses the harms teens face from social media.

Interventions

Part of the remedy could be to build new tools using artificial intelligence to detect unsafe interactions while also protecting privacy. Another approach is to help teens reflect on these “data doubles” that they have constructed.

My colleagues and I are now exploring more deeply how teens experience algorithmic content and what types of interventions can help them reflect on it. We encourage researchers in our field to design ways to challenge the accuracy of algorithms and expose them as reflecting behavior and not being. Another part of the remedy may involve arming teens with tools to restrict access to their data, limiting cookies, having different search profiles and turning off location when using certain apps.

Advertisement

We believe that these are all steps that are likely to reduce the accuracy of algorithms, creating much-needed friction between algorithm and self, even if teens are not necessarily happy with the results.

Getting the kids involved

Recently, my colleagues and I conducted a Gen Z workshop with young people from Encode Justice, a global organization of high school and college students advocating for safe and equitable AI. The aim was to better understand how they are thinking about their lives under algorithms and AI. Gen Zers say they are concerned but also eager to be involved in shaping their future, including mitigating algorithm harms. Part of our workshop goal was to call attention to and foster the need for teen-driven investigations of algorithms and their effects.

What researchers are also confronting is that we don't actually know what it means to constantly negotiate identity with an algorithm. Many of us who study teens are too old to have grown up in an algorithmically moderated world. For the teens we study, there is no “before AI.”

I believe that it's perilous to ignore what algorithms are doing. The future for teens can be one in which society acknowledges the unique relationship between teens and social media. This means involving them in the solutions, while still providing guidance.The Conversation

Nora McDonald, Assistant Professor of Information Technology, George Mason University

Advertisement

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

News from the South

Trending