Strangler fig

Strangler fig is the common name for a number of tropical and subtropical plant species, including some banyans and unrelated vines, including among many other species:

Ficus watkinsiana on Syzygium hemilampra, Australia

These all share a common "strangling" growth habit that is found in many tropical forest species, particularly of the genus Ficus.[1] This growth habit is an adaptation for growing in dark forests where the competition for light is intense. These plants are hemiepiphytes, spending the first part of their life without rooting into the ground. Their seeds, often bird-dispersed, germinate in crevices atop other trees. These seedlings grow their roots downward and envelop the host tree while also growing upward to reach into the sunlight zone above the canopy.[2][3]

An original support tree can sometimes die, so that the strangler fig becomes a "columnar tree" with a hollow central core.[4] However, it is also believed that the strangler fig can help the support tree survive storms.[5]

gollark: As if that's possible.
gollark: Fearsome.
gollark: I might have to release apioforms from the beecloud.
gollark: It must comfort you to think so.
gollark: > There is burgeoning interest in designing AI-basedsystems to assist humans in designing computing systems,including tools that automatically generate computer code.The most notable of these comes in the form of the first self-described ‘AI pair programmer’, GitHub Copilot, a languagemodel trained over open-source GitHub code. However, codeoften contains bugs—and so, given the vast quantity of unvettedcode that Copilot has processed, it is certain that the languagemodel will have learned from exploitable, buggy code. Thisraises concerns on the security of Copilot’s code contributions.In this work, we systematically investigate the prevalence andconditions that can cause GitHub Copilot to recommend insecurecode. To perform this analysis we prompt Copilot to generatecode in scenarios relevant to high-risk CWEs (e.g. those fromMITRE’s “Top 25” list). We explore Copilot’s performance onthree distinct code generation axes—examining how it performsgiven diversity of weaknesses, diversity of prompts, and diversityof domains. In total, we produce 89 different scenarios forCopilot to complete, producing 1,692 programs. Of these, wefound approximately 40 % to be vulnerable.Index Terms—Cybersecurity, AI, code generation, CWE

References

  1. Zhekun, Zhou & Michael G. Gilbert (2003) "Flora of China" (Moraceae) 5: 21–73. hua.huh.harvard.edu Archived 2006-09-01 at the Wayback Machine
  2. Serventy, V. (1984). Australian Native Plants. Victoria: Reed Books.
  3. "Light in the rainforest" 1992 Tropical topics. Vol 1 No. 5, epa.qld.gov.au Archived 2007-07-01 at the Wayback Machine
  4. Margaret Lowman; H. Bruce Rinker (2004). Forest Canopies. Academic Press. pp. 180–. ISBN 978-0-12-457553-0.
  5. Richard, Leora.; Halkin, Sylvia (June 2017). "Strangler figs may support their host trees during severe storms". Symbiosis. 72 (2): 153–157. doi:10.1007/s13199-017-0484-5.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.