Category: Tech

Amazon Cloud Chief: Replacing Junior Workers with AI is 'One of the Dumbest Things'

2025-08-20
Amazon Cloud Chief: Replacing Junior Workers with AI is 'One of the Dumbest Things'

Amazon's cloud chief, Matt Garman, warns against replacing junior employees with AI, calling it "one of the dumbest things I've ever heard." He argues that junior employees are the most adept at utilizing AI tools and that cutting them would harm future talent pipelines. Garman advocates for continued hiring of graduates and training them in software development, problem-solving, and best practices. He emphasizes that critical thinking, creativity, and adaptability are more valuable than specialized skills in an AI-driven economy. This contrasts with some who believe AI can replace junior workers; data shows rising unemployment among 20-30 year olds in tech. However, others argue that young engineers offer fresh perspectives and quicker AI adoption.

Tech

Major Internet Outage Hits Pakistan

2025-08-20
Major Internet Outage Hits Pakistan

A significant internet disruption hit Pakistan on Tuesday evening, reducing connectivity to a mere 20% of normal levels, according to NetBlocks, a global internet observatory. The outage, starting late in the evening, affected multiple regions, cutting off millions from online services. NetBlocks reported a major disruption impacting the backbone operator PTCL, significantly reducing national connectivity. As of late Tuesday night, neither PTCL nor the Pakistan Telecommunication Authority (PTA) had offered an official explanation or restoration timeline. The outage disrupted businesses, banking, and communication, causing widespread frustration and concern on social media.

Apple Shifts More iPhone 17 Production to India

2025-08-20
Apple Shifts More iPhone 17 Production to India

Bloomberg reports that Apple is increasingly shifting iPhone 17 production for the US market from China to India. For the first time, the entire iPhone 17 lineup will ship from India at launch. Apple is also working on an Indian-made successor to the iPhone 16E. This move aims to reduce reliance on Chinese manufacturing, though current exports to the US from India are tariff-exempt. However, iPhone sub-assemblies are largely still produced in China. Despite this, Apple announced a massive investment in US manufacturing. Conversely, the US administration plans to raise tariffs on India due to its purchase and sale of Russian oil.

Tech

India's Demographic Time Advantage

2025-08-20
India's Demographic Time Advantage

Unlike China, which is rapidly aging, India boasts a decades-long demographic dividend. This gives it a significant time advantage in economic development. While India needs sustained high growth, it faces a less compressed timeline than China. The article highlights the need to boost female labor participation, higher education completion, and urban job creation to fully leverage this demographic dividend. Despite its reliance on Chinese technology in electronics manufacturing, India's time advantage allows it to absorb expertise and build indigenous capabilities.

Microbial Minimalism: A Newly Discovered Archaeon Challenges the Definition of Life

2025-08-20
Microbial Minimalism: A Newly Discovered Archaeon Challenges the Definition of Life

Scientists have discovered Sukunaarchaeum mirabile, an archaeon with one of the smallest genomes on Earth. Surprisingly, this organism is almost entirely dependent on its host for survival, lacking genes for essential metabolic functions. This discovery challenges fundamental understandings of life and suggests a new archaeal lineage. The researchers believe many more such life-defying microbes may exist within the 'microbial dark matter', further highlighting the vast unknowns in the microbial world.

Great Firewall Anomaly: Widespread TCP Port 443 Outage in China

2025-08-20
Great Firewall Anomaly: Widespread TCP Port 443 Outage in China

Between 00:34 and 01:48 Beijing Time (UTC+8) on August 20, 2025, the Great Firewall of China (GFW) exhibited anomalous behavior, unconditionally injecting forged TCP RST+ACK packets to TCP port 443, causing a massive disruption of internet connections between China and the rest of the world. The roughly 74-minute outage affected only port 443, with asymmetrical triggering mechanisms for inbound and outbound traffic. Analysis suggests the responsible device doesn't match known GFW fingerprints, possibly indicating a new device or a misconfigured one. Researchers urge community participation to fully understand this event.

Microsoft Copilot Vulnerability: Audit Logs are Broken

2025-08-20
Microsoft Copilot Vulnerability: Audit Logs are Broken

A security researcher discovered a critical vulnerability in Microsoft Copilot: it sometimes accesses files and returns information without logging the action in audit logs. Worse, users can instruct Copilot to access files without leaving a trace. While Microsoft has fixed the vulnerability, their decision not to notify customers raises serious concerns about transparency and customer responsibility. This flaw poses a significant threat to organizations relying on audit logs for security and compliance, particularly in highly regulated industries like healthcare and finance.

Tech Audit Logs

SaaS SSO Pricing: A Security Tax or Revenue Grab?

2025-08-19

This article exposes the exorbitant pricing of Single Sign-On (SSO) features across numerous SaaS vendors. Many vendors lock SSO behind expensive 'Enterprise' plans, often increasing the price by several hundred percent or even more. The author argues that SSO is a critical security requirement, and the massive price hikes are not justified by maintenance costs but rather represent a profit opportunity. The article calls for SaaS providers to either include SSO in core offerings or provide it as a reasonably priced add-on, not a deterrent to better security practices.

Tech

Firefox's CRLite: Faster, More Private Certificate Revocation Checking

2025-08-19
Firefox's CRLite: Faster, More Private Certificate Revocation Checking

Firefox is the first browser to implement fast and comprehensive certificate revocation checking without revealing user browsing activity. Previously, the OCSP protocol leaked user privacy. Firefox's new CRLite mechanism solves this by periodically downloading a compact encoding of revoked certificates, storing and updating it locally. CRLite is a thousand times more bandwidth-efficient than traditional CRLs and significantly improves TLS handshake times. Firefox will disable OCSP in version 142, further enhancing user privacy and performance.

CodeRabbit RCE: 1M Repositories Compromised

2025-08-19
CodeRabbit RCE: 1M Repositories Compromised

Security researchers discovered a critical vulnerability in CodeRabbit, a popular AI code review tool, leading to remote code execution (RCE). By exploiting a flaw in Rubocop's configuration, attackers executed malicious code, stealing sensitive information including Anthropic and OpenAI API keys, GitHub App private keys, and gaining read/write access to 1 million code repositories (including private ones). This highlights the critical need for integrating security into the development lifecycle of AI-powered products.

Underwater Octopus Cities Discovered in Australia

2025-08-19
Underwater Octopus Cities Discovered in Australia

Off the coast of Jervis Bay, Australia, two remarkable octopus settlements, dubbed 'Octopolis' and 'Octlantis,' have been discovered. These bustling communities of gloomy octopuses (Octopus tetricus) utilize shells to construct their dens, creating unique and densely populated habitats. Octopolis, the first discovered, even contains a piece of human-made debris. While often sensationalized as 'cities' in the media, researchers emphasize this is a metaphorical description, highlighting the complex social behaviors and surprising engineering skills of these cephalopods.

Tech

UK's Age-Verification Loophole: VPNs Enable Minors to Bypass Porn Filters

2025-08-19
UK's Age-Verification Loophole: VPNs Enable Minors to Bypass Porn Filters

England's children's commissioner is urging the government to address a significant loophole in its new online safety regulations: the use of VPNs by minors to circumvent age restrictions. A recent report reveals a concerning number of young people accessing pornography before age 18, despite the implementation of mandatory age checks for commercial porn sites. The surge in VPN usage post-regulation highlights the ineffectiveness of current measures. While the government claims no plans to ban VPNs, it intends to collaborate with providers to implement robust age verification, potentially impacting the privacy and security of legitimate users, including schools relying on VPNs for secure access to internal systems. This move represents a significant challenge in balancing child safety with online freedoms.

Tech

The AI Adoption Gap: Why 95% of Enterprise Pilots Fail

2025-08-19
The AI Adoption Gap: Why 95% of Enterprise Pilots Fail

A new MIT report reveals a stark reality: while generative AI holds immense promise, most enterprise initiatives aimed at rapid revenue growth are failing. Only about 5% of AI pilot programs achieve significant revenue acceleration; the vast majority stall, yielding minimal impact. The research highlights that the problem isn't the AI models themselves, but rather a 'learning gap' in enterprise integration. Successful AI deployments hinge on strategic tool selection (purchasing from specialized vendors and building partnerships boasts a 67% success rate), empowering line managers to drive adoption, and choosing tools that deeply integrate and adapt over time. The report also underscores the prevalence of 'shadow AI' and the ongoing challenge of measuring AI's impact on productivity and profit.

UK Debt Yields Surge, Echoing 2022 Crisis Fears

2025-08-19
UK Debt Yields Surge, Echoing 2022 Crisis Fears

Yields on long-term UK government bonds have surged, exceeding their US counterparts for the first time this century, sparking concerns about the UK's fiscal situation. The 30-year UK gilt yield hit 5.61%, 68 basis points higher than the US equivalent. This widening gap reflects growing investor apprehension. The UK faces long-term structural economic challenges, high inflation, slowing growth, and rising unemployment. The upcoming inflation report is crucial; hotter-than-expected data could push yields higher and potentially trigger another 2022-style pension crisis.

Tech UK Gilts

Axel Springer's Copyright Battle Against Ad Blockers: Is Website Code Software?

2025-08-19

German publisher Axel Springer has been battling ad blocker Adblock Plus for years. Initially using competition law, they lost. They then pivoted to copyright law, arguing Adblock Plus' modification of their website code constitutes infringement. The German Federal Court of Justice overturned a previous ruling, siding with Axel Springer, stating website code is copyrightable software, and its modification may be infringement. This case has drawn significant attention; its outcome could profoundly impact the software industry, internet ecosystem, and even the future of online news' pay models and access to information.

Critical Cache Poisoning Vulnerability in Dnsmasq: Single Character Attack

2025-08-19

Researchers from Tsinghua University and Nankai University discovered a critical cache poisoning vulnerability (SHAR attack) in the Dnsmasq DNS software. Attackers can inject malicious DNS records by using a single special character, bypassing Dnsmasq's defenses. This vulnerability exploits the silent handling of queries containing special characters by some upstream recursive resolvers, creating a large attack window for brute-forcing TxID and source port. The success rate is 100%, affecting all Dnsmasq versions. Mitigation includes detecting silent upstream resolvers and implementing rate limiting and spoof detection.

EloqKV: Outperforming Redis with Distributed ACID Transactions and Tiered Storage

2025-08-19
EloqKV: Outperforming Redis with Distributed ACID Transactions and Tiered Storage

EloqKV is a high-performance distributed database with a Redis/ValKey compatible API. It offers ACID transactions, full elasticity and scalability, tiered storage, and session-style transaction syntax, all while maintaining Redis' simplicity. EloqKV achieves up to 1.6 million QPS on a c6g.8xlarge instance, exceeding Redis and ValKey's performance. Its distributed ACID transactions eliminate cross-slot errors, and tiered storage automatically offloads cold data to disk, saving up to 70% on memory costs. EloqKV is designed for developers needing a robust database solution for demanding AI applications.

iPadOS: Beyond Jobs' Vision?

2025-08-19
iPadOS: Beyond Jobs' Vision?

Many argue that iPadOS has strayed from Steve Jobs' original vision, transforming the iPad from a simple content consumption device into a computer-like one. The author counters that this isn't a betrayal, but a fuller realization of Jobs' vision. Jobs aimed to create a device bridging the gap between phones and laptops, fulfilling everyday needs. iPadOS's evolution, such as the addition of the Apple Pencil, enhances creative potential without sacrificing ease of use. This mirrors the evolution of the iPhone and Mac, adding features while maintaining core usability to meet evolving user needs. iPadOS's layered design allows newcomers to experience simple joy, while power users can explore advanced features. Ultimately, the iPad is more powerful and user-friendly, achieving Jobs' vision of making computing accessible to all.

Tech

UK Drops Demand for Apple iCloud Backdoor

2025-08-19
UK Drops Demand for Apple iCloud Backdoor

The UK will no longer compel Apple to provide backdoor access to its iCloud encryption, according to US Director of National Intelligence Tulsi Gabbard. This follows a January order demanding access to encrypted data globally. Apple challenged the order, citing the CLOUD Act, a bilateral agreement preventing such data demands between the US and UK. US pressure reportedly led the UK to withdraw its request. It remains unclear if Apple will reinstate its enhanced encryption service in the UK.

Tech

Google's War on the Open Web: The Slow Kill of XML

2025-08-19

This article exposes Google's long-running campaign against XML and its implications for the open web. From shutting down Google Reader to attempting to remove XSLT, Google leverages its browser market dominance and influence within the WHATWG to gradually undermine the foundations of the open web. The author argues this isn't a technical issue but a strategic move by Google to consolidate its centralized approach, ultimately aiming to stifle independent, decentralized ecosystems. The article calls on developers to use XML and XSLT, provide feedback, and build alternatives to combat Google's monopolistic practices.

Tech open web

Ted Chiang: Beyond Hard Sci-Fi, a Philosophical Deep Dive

2025-08-19
Ted Chiang: Beyond Hard Sci-Fi, a Philosophical Deep Dive

This review delves into the unique writing style of acclaimed science fiction author Ted Chiang. He transcends the typical 'hard' vs. 'soft' sci-fi dichotomy, crafting universes with internally consistent scientific laws that serve as vehicles for exploring profound philosophical questions and human relationships. Chiang uses science not as mere backdrop, but as a central driver of the narrative. For instance, in 'Story of Your Life,' the Sapir-Whorf hypothesis (language shaping thought) becomes key to understanding alien intelligence. The review praises Chiang's masterful portrayal of compatibilism (reconciling free will and determinism) while pointing out his relative weakness in depicting society's interaction with technology and a lack of diversity in his philosophical explorations.

Tech Ted Chiang

Netflix Ditches Kafka and Cassandra for In-Memory Database on Tudum

2025-08-19
Netflix Ditches Kafka and Cassandra for In-Memory Database on Tudum

Netflix's fan website, Tudum, initially used a CQRS architecture with Kafka and Cassandra, but suffered from delays in previewing content updates. To address this, the Netflix team replaced Kafka and Cassandra with RAW Hollow, an internally developed in-memory object store. RAW Hollow's in-memory dataset dramatically improved content preview and page rendering speeds, offering a better experience for both editors and visitors.

Tech

Microsoft Bets Big on AI Agents: The Demise of Traditional Business Apps?

2025-08-19
Microsoft Bets Big on AI Agents: The Demise of Traditional Business Apps?

Microsoft executives boldly predict that traditional business applications will be a relic of the past by 2030, replaced by AI-powered "business agents." These AI agents will leverage generative AI and vector databases to dynamically adapt to user needs and optimize workflows in a goal-oriented manner. This prediction has sparked industry debate, with some questioning its optimism and the feasibility of rapid enterprise transformation, while others see it as a major shift requiring businesses to embrace AI to avoid obsolescence. Microsoft plans to gradually transition customers to this new model by offering AI agents as add-on services for existing applications.

Tech

AI-Powered Precision Mapping Tracks Woody Plant Spread on the Great Plains

2025-08-19
AI-Powered Precision Mapping Tracks Woody Plant Spread on the Great Plains

Researchers at Kansas State University have developed a cost-effective, high-accuracy system for mapping grassland vegetation using publicly available aerial imagery and machine learning. The system achieves 97% accuracy in classifying grass, shrubs, and trees, and is being used to monitor the rapid spread of woody plants across the Great Plains. This research not only aids in better grassland ecosystem management but also provides valuable hands-on experience for students and offers data support for other research areas, such as livestock carrying capacity assessment and fire risk assessment.

Guédelon Castle: A Living Experiment in Medieval Archaeology

2025-08-19
Guédelon Castle: A Living Experiment in Medieval Archaeology

Guédelon Castle in Burgundy, France, isn't just a reconstruction; it's a living experiment in medieval archaeology. Using only 13th-century tools and techniques, a team of skilled artisans is building a real 13th-century castle. The project, decades in the making, reveals historical mysteries, from window materials (initially goatskin, later beeswax-stiffened linen) to mortar recipes and scaffolding techniques. Each obstacle encountered is an opportunity to solve a medieval-style problem, illuminating the ingenuity and teamwork of medieval builders. Guédelon is more than a castle; it's a vibrant historical lesson, attracting visitors and scholars worldwide.

Non-Destructive Unrolling of Ancient Scroll via AI-Assisted X-ray Tomography

2025-08-19
Non-Destructive Unrolling of Ancient Scroll via AI-Assisted X-ray Tomography

German scientists used 3D X-ray tomography and AI to virtually 'unroll' a delicate antique Buddhist scroll crafted by Mongolian nomads, preserving its fragile state. The centuries-old scroll, tightly wound within silk pouches, revealed its contents—a Tibetan Buddhist mantra written in Sanskrit script—without physical manipulation. The analysis also unexpectedly uncovered metal particles in the ink. While labor-intensive, this technique offers invaluable opportunities for studying otherwise inaccessible artifacts.

EV Battery Degradation: Overblown Fears?

2025-08-18
EV Battery Degradation:  Overblown Fears?

Concerns about short lifespan of EV batteries are widespread. This article debunks this myth, analyzing two types of battery degradation: calendar aging and cycle aging. Real-world data shows degradation is far slower than feared, especially after 20,000 miles. Studies of thousands of EVs show over 80% capacity retention even at 200,000 miles. Manufacturer warranties of 8-10 years or 100,000 miles further support this. While degradation is unavoidable, mitigating factors include avoiding extreme temperatures, charge levels, and frequent fast charging. In short, anxieties around EV battery life are largely overblown; they last far longer than many believe.

Anna's Archive: The Fight to Preserve Humanity's Legacy Continues

2025-08-18

Anna's Archive team releases an update, announcing significant progress in their fight against knowledge censorship. They've successfully backed up tens of millions of books, scientific articles, and more. Despite facing increasing attacks, they're working to improve security. The team thanks volunteers and partners (including LibGen forks, STC/Nexus, and Z-Library) for their contributions and regrets the disappearance of a LibGen fork. They also caution users against using the emerging WeLib platform due to its lack of community contribution. Looking ahead, they'll continue processing hundreds of terabytes of data and call for volunteer and donation support.

Tech

Image Fulgurator: Secretly Embedding Images in Photos

2025-08-18

The Image Fulgurator is a device capable of seamlessly embedding images into other people's photographs in milliseconds. It cleverly utilizes feedback flash projection technology, projecting a pre-prepared color slide image onto the target object at the same time someone else is taking a picture. The process is discreet and undetectable, as it functions in reverse of a traditional camera: using a pre-exposed slide as a light source, a built-in sensor detects flashes from nearby cameras to synchronize the projection with the exact moment of exposure. The Image Fulgurator is housed in a standard SLR camera case, reusing many of the camera's original components.

Texas Law Mandates Data Center Curtailment to Ensure Grid Reliability

2025-08-18
Texas Law Mandates Data Center Curtailment to Ensure Grid Reliability

Facing a potential threat to grid reliability from the explosive growth of data centers in Texas, Governor Abbott signed SB 6 into law. The bill establishes mandatory and voluntary demand response programs, requiring large data centers (75 MW and above) to curtail electricity consumption during grid emergencies or switch to backup generation. New interconnection disclosure and cost-sharing rules, along with protocols for co-locating large loads with existing generators, are also included. This aims to balance data center growth with grid stability, preventing a repeat of the 2021 Winter Storm Uri crisis and providing regulatory certainty for independent power producers and data centers seeking colocation arrangements.

Tech
1 2 3 4 5 6 8 10 11 12 180 181