Vista Normal
Osum
Spiders Are Somehow Hacking Fireflies to Lure More Victims
What happens when an unfortunate bug ends up in a spider’s web? It gets bitten and wrapped in silk, and becomes a meal. But if the web belongs to an orb-weaver and the bug is a male firefly, it seems the trapped firefly — once bitten — ends up imitating a female’s flash pattern and luring other males to their doom.
Fireflies communicate with flash patterns (something you can experiment with yourself using nothing more than a green LED) and males looking to mate will fly around flashing a multi-pulse pattern with their two light-emitting lanterns. Females will tend to remain in one place and flash single-pulse patterns on their one lantern.
When a male spots a female, they swoop in to mate. Spiders have somehow figured out a way to actively take advantage of this, not just inserting themselves into the process but actively and masterfully manipulating male fireflies, causing them to behave in a way they would normally never do. All with the purpose of subverting firefly behavior for their own benefit.
It all started with an observation that almost all fireflies in webs were male, and careful investigation revealed it’s not just some odd coincidence. When spiders are not present, the male fireflies don’t act any differently. When a spider is present and detects a male firefly, the spider wraps and bites the firefly differently than other insects. It’s unknown exactly what happens, but this somehow results in the male firefly imitating a female’s flash patterns. Males see this and swoop in to mate, but with a rather different outcome than expected.
The research paper contains added details but it’s clear that there is more going on in this process than meets the eye. Spiders are already fascinating creatures (we’ve seen an amazing eye-tracking experiment on jumping spiders) and it’s remarkable to see this sort of bio-hacking going on under our very noses.
Hackaday Links: August 18, 2024
They’re back! The San Francisco autonomous vehicle hijinks, that is, as Waymo’s fleet of driverless cars recently took up the fun new hobby of honking their horns in the wee hours of the morning. Meat-based neighbors of a Waymo parking lot in the South Market neighborhood took offense at the fleet of autonomous vehicles sounding off at 4:00 AM as they shuffled themselves around in the parking lot in a slow-motion ballet of undetermined purpose. The horn-honking is apparently by design, as the cars are programmed to tootle their horn trumpets melodiously if they detect another vehicle backing up into them. That’s understandable; we’ve tootled ourselves under these conditions, with vigor, even. But when the parking lot is full of cars that (presumably) can’t hear the honking and (also presumably) know where the other driverless vehicles are as well as their intent, what’s the point? Luckily, Waymo is on the case, as they issued a fix to keep the peace. Unfortunately, it sounds like the fix is just to geofence the lot and inhibit honking there, which seems like just a band-aid to us.
From the “Tech Doesn’t Make Everything Better” department, we’ve got news of a vulnerability in high-end racing bicycles that opens up a new vector for cheating. While our bike has been sitting sadly idle for the last twenty-odd years, apparently shifting technology has changed a lot, to the point where high-end derailleurs are no longer connected to handlebar-mounted shift lever by Bowden cables but now have servos that are linked to the shifters via Bluetooth. Anyone with more than a few minutes of experience with Bluetooth accessories and their default “123456” passwords can see where this is going. While there are no specific instances of cheating detailed in the story, one can imagine the hilarity to be had with a Flipper Zero while sitting on the side of a road at a course upgrade. To be sure, there are other ways to cheat, but we’re not sure we see the advantages of wireless shifting that offset the risks in this case.
Only 94 percent? A recent study claims to have quantified business spreadsheet errors, finding that 94% have critical problems. They came to this conclusion by mining literature from journal articles dating back to 1987, but rather than looking for papers with associated spreadsheets and analyzing them for errors, they looked for papers that discussed spreadsheet quality assurance. So this is sort of a meta-study, which makes us doubt the 94% finding. Still, we’d say it’s a safe bet that there are a lot of spreadsheets out there with critical errors, and that spreadsheet abuse is pretty rampant overall.
They say that if you’re not looking for your next job, you’re just waiting to get fired. That’s pretty much a tautology since there are only two — OK, three — ways out of any job, but it’s still good to always be looking for your next opportunity. So you might want to check out eejobboard, which allows you to do a parametric job search in the electrical engineering space. Pretty cool stuff.
And finally, we don’t have any information on this other than what you see in the video, but we’d love to learn more about these hardware FFTs. The video shows two implementations, one using a Zync 7020 FPGA, and one that uses over a thousand 74HC-series chips to do the same thing. If anyone out there knows the OP on this one, we’d love to get in touch.