Category: Tech

800,000 Roman Nails: A Buried Secret of the Empire

2025-05-06
800,000 Roman Nails: A Buried Secret of the Empire

In 1959, the excavation of the Roman fort at Inchtuthil, Scotland unearthed an astonishing hoard: over 800,000 Roman nails! Ranging in size from small carpentry nails to massive spikes, the remarkably preserved nails were buried in a deep pit. This wasn't a result of meticulous Roman fort dismantling, but a hasty burial during a rapid retreat, designed to prevent the valuable iron from falling into the hands of local tribes. The discovery reveals not only the scale of Roman legionary construction but also the urgency and strategic shifts of the empire's withdrawal, offering a glimpse into a little-known historical episode.

Microsoft's Tough New Approach: Blocklists and 'Good Attrition'

2025-05-06
Microsoft's Tough New Approach: Blocklists and 'Good Attrition'

Microsoft is implementing two controversial management strategies signaling a tougher stance on employee performance. The company is now adding underperforming employees to a two-year blocklist, preventing rehiring. Furthermore, these layoffs are categorized as "good attrition," indicating a willingness to see these employees depart. These changes are part of a broader effort to streamline performance management, quickly removing low performers and deterring their return. While specific targets for "good attrition" haven't been publicly disclosed, it's gaining traction at the executive level as performance expectations rise. This mirrors Amazon's infamous "unregretted attrition" and similar practices at Meta, highlighting a broader industry trend toward stricter performance standards and less leniency. Earlier this year, Microsoft fired 2,000 underperformers without severance, further underscoring this shift.

Tech

Lyme Disease Breakthrough: New Antibiotic and Understanding Chronic Symptoms

2025-05-06
Lyme Disease Breakthrough: New Antibiotic and Understanding Chronic Symptoms

Northwestern University researchers have identified piperacillin, an antibiotic significantly outperforming doxycycline, the current gold standard for Lyme disease treatment. Piperacillin cured Lyme disease in mice at a dosage 100 times lower than doxycycline, with minimal impact on gut microbiota. Furthermore, the research uncovered a potential cause for Post-Treatment Lyme Disease (PTLD): lingering Borrelia cell wall remnants in the liver triggering an immune response. This discovery paves the way for more precise Lyme disease diagnostics, treatments, and strategies to prevent chronic symptoms.

Skype to Retire in May 2025, Transitioning to Microsoft Teams

2025-05-06
Skype to Retire in May 2025, Transitioning to Microsoft Teams

Microsoft announced that it will shut down Skype in May 2025, migrating users to its modern communication and collaboration platform, Microsoft Teams. This move aims to streamline free consumer communication services and better adapt to user needs. Existing Skype users can choose to migrate to Teams for free, with all chats and contacts automatically imported; or they can export their data. Teams offers core features similar to Skype, with added advanced features such as meeting hosting and community building. This transition will be phased to ensure users can stay connected during the transition.

ODF at 20: Open Document Format's Two-Decade Battle Against Microsoft

2025-05-06
ODF at 20: Open Document Format's Two-Decade Battle Against Microsoft

Twenty years ago, the Open Document Format (ODF) became a standard, aiming to break Microsoft Office's dominance. While ODF gained traction with some governments and organizations, including the UK government, the European Commission, and even NATO (which mandated its use), it failed to significantly dent Microsoft's market share. Proponents argue ODF is more than a technical specification; it symbolizes freedom of choice and interoperability. Yet, most users stick with Microsoft's default formats. This two-decade struggle reflects the ongoing tension between open standards and commercial strategies.

Hiding a Message in an eID Photo: A Failed Experiment

2025-05-06
Hiding a Message in an eID Photo: A Failed Experiment

A programmer attempts to embed a blog advertisement in his electronic ID photo. Using tools like ImageMagick, he inserts nearly invisible logos and text. However, during the ID card production process, this hidden information is removed. Although the experiment fails, he meticulously documents the entire process, including image manipulation techniques and legal analysis, showcasing the joy of technical exploration and attention to detail.

Sneakers 4K Blu-ray Review: A Classic Hackers Flick Gets a Stunning Upgrade

2025-05-06
Sneakers 4K Blu-ray Review: A Classic Hackers Flick Gets a Stunning Upgrade

The classic hacker film, *Sneakers*, gets a 4K restoration and Blu-ray release from Kino Lorber! This release boasts a stunning 4K visual upgrade, along with a wealth of bonus features including director and cast commentaries, a documentary, and vintage trailers. The film follows a group of skilled hackers as they're hired to steal a powerful decryption device from a brilliant mathematician. While some aspects might feel slightly dated, the film's clever plot twists and engaging humor remain captivating. This 4K release breathes new life into this tech thriller classic.

Switzerland's Cold War Relic: A Nuclear Bunker and the Illusion of Survival

2025-05-06
Switzerland's Cold War Relic: A Nuclear Bunker and the Illusion of Survival

This article recounts a visit to Sonnenberg, a seven-story underground command center built in Switzerland during the Cold War to shelter 20,000 people. While impressively engineered, the 1987 trial run revealed significant shortcomings. The article explores the historical context of Switzerland's robust civil protection program, rooted in WWII experience and a unique national identity. However, it also questions the feasibility of surviving a nuclear war and emphasizes the importance of diplomacy and non-proliferation. The piece ultimately reflects on the complex legacy of Sonnenberg—a testament to both Cold War anxieties and a persistent hope for peace.

Hyundai Deploys Boston Dynamics' Atlas Robots in US Factory

2025-05-06
Hyundai Deploys Boston Dynamics' Atlas Robots in US Factory

Hyundai Motor Group is deploying Boston Dynamics' Atlas humanoid robots at its Metaplant America facility in Georgia to boost factory automation. This marks a significant step in Hyundai's partnership with Boston Dynamics to scale robotic manufacturing and design. The move is part of Hyundai's $21 billion US investment plan aimed at increasing efficiency and lowering costs, partly in response to tariffs. Despite a global sales dip last year, Hyundai's US sales rose 4% to 1.9 million units. Hyundai plans to produce 300,000 electric and hybrid vehicles annually at the facility, eventually scaling up to 500,000.

Tech Robots

Trump's 100% Tariff on Foreign Films: A Hollywood Survival Fight

2025-05-06
Trump's 100% Tariff on Foreign Films: A Hollywood Survival Fight

Trump announced a 100% tariff on all foreign films to combat the decline of the American film industry and foreign competition. This move has sparked controversy, as many big-budget films are shot in multiple countries. While American films dominate the domestic market, other countries like China and New Zealand attract significant film productions through tax incentives, generating substantial economic benefits. The impact on the global film industry could be profound, highlighting the challenges and pressures facing the American film industry.

Tech

arXivLabs: Experimental Projects with Community Collaborators

2025-05-05
arXivLabs: Experimental Projects with Community Collaborators

arXivLabs is a framework for collaborators to develop and share new arXiv features directly on the website. Individuals and organizations involved embrace openness, community, excellence, and user data privacy. arXiv is committed to these values and only partners with those who share them. Have an idea to enhance the arXiv community? Learn more about arXivLabs.

Tech

Independent Journalist Scooped Major Story, But Legacy Media Ignored Her

2025-05-05
Independent Journalist Scooped Major Story, But Legacy Media Ignored Her

Independent journalist Marisa Kabas broke a major story about a secret US-Rwanda deportation deal, detailing the deportation of an Iraqi refugee, Omar Ameen. However, major news outlets like CBS, CNN, and the Washington Post either minimized or ignored Kabas's original reporting. This sparked a debate about the role of independent journalists in the news ecosystem. Kabas's reporting, based on verified government documents and multiple sources, was as rigorous as that of major news organizations, but her independent status hindered her from receiving proper credit. This reflects legacy media's unwillingness to acknowledge and adapt to the changing media landscape.

Databricks in Talks to Acquire Open-Source Database Startup Neon for $1B+

2025-05-05
Databricks in Talks to Acquire Open-Source Database Startup Neon for $1B+

Data and AI unicorn Databricks is in advanced talks to acquire Neon, a maker of an open-source database engine, for approximately $1 billion, according to four sources familiar with the matter. While some believe the deal is done, sources say negotiations are ongoing and could still fall apart. The final price could exceed $1 billion when employee retention packages are included. Neon and its CEO declined to comment, and Databricks did not respond to a request for comment.

Massive E-commerce Supply Chain Attack Exposes Millions

2025-05-05
Massive E-commerce Supply Chain Attack Exposes Millions

Security researchers have uncovered a supply chain attack targeting hundreds of e-commerce sites, including a $40 billion multinational company. Attackers compromised at least three software providers, implanting malware that lay dormant for six years before activating in recent weeks to steal payment card information and other sensitive data. At least 500 sites are affected, with the true number potentially double that. The malware allows attackers to execute arbitrary code in visitor browsers, enabling remote code execution and data theft. Affected software providers include Tigren, Magesolution, and Meetanshi, all offering Magento-based software.

Tech

Microsoft Cracks Down on Bulk Email: SPF, DKIM, and DMARC are Now Mandatory

2025-05-05
Microsoft Cracks Down on Bulk Email: SPF, DKIM, and DMARC are Now Mandatory

Microsoft is now strictly enforcing new email authentication rules. Senders exceeding 5,000 messages daily to Outlook.com (including hotmail.com and live.com) must be properly configured with SPF, DKIM, and DMARC to ensure deliverability. Failing to meet these requirements will result in emails being bounced, not just relegated to spam. This crackdown targets spam, spoofing, and phishing, but will impact marketers and businesses relying on mass email. Even legitimate emails risk being blocked without proper authentication. Companies must ensure their SPF records, DKIM signatures, and DMARC policies are correctly configured and regularly review mailing lists and unsubscribe links.

Hackers Weaponize Legitimate Websites to Spread Malicious Links

2025-05-05

A security researcher uncovered a shocking method of distributing malicious links: attackers leverage websites belonging to government agencies, universities, and others, exploiting vulnerabilities in outdated WordPress plugins and CMS systems. Using SEO optimization and cache poisoning, they disguise links leading to fraudulent Robux, OnlyFans content, and more, bypassing antivirus and VPN detection. These links funnel victims through an affiliate network, generating small profits for the attackers. This isn't new; similar incidents occurred as early as 2020. The researcher emphasizes the need for enhanced cybersecurity measures and caution when clicking unfamiliar links.

Say Goodbye to Tracking: Setting up a Pi-hole at Home

2025-05-05
Say Goodbye to Tracking: Setting up a Pi-hole at Home

Tired of constant online tracking and ads? This article guides you through setting up a Pi-hole, a DNS proxy running on a Raspberry Pi, to effectively block ads, trackers, and other malicious domains, protecting your network privacy. The author details the setup process, including hardware requirements, software installation, configuring domain blocklists, and advanced techniques like using iptables rules to prevent devices from bypassing DNS settings. The result? Significantly reduced network traffic and improved network security and online experience.

Tech

High-Res Digitization Opens Up Newberry's Rare Map Collection

2025-05-05
High-Res Digitization Opens Up Newberry's Rare Map Collection

The Newberry Library and The Digital Archive Group have partnered to digitize the Novacco map collection, overcoming challenges posed by the maps' oversized format. Using specialized cameras and lenses, they created high-definition images allowing researchers worldwide to study these maps in unprecedented detail. This project significantly expands the library's digital collection, making these renowned archival documents accessible to a global audience and contributing to the Newberry's broader goal of increasing collection accessibility. High-resolution images are freely available for public reuse.

SpaceX Explosion: The FBI Investigation That Went Nowhere

2025-05-05
SpaceX Explosion: The FBI Investigation That Went Nowhere

The 2016 SpaceX rocket explosion prompted widespread concern. SpaceX attributed the incident to possible sabotage, submitting evidence to the FAA and FBI. However, the FBI investigation found no evidence of criminal activity. Although the failure of the Amos-6 mission briefly threatened SpaceX's financial viability, the company quickly rebounded, achieving remarkable success in subsequent years and ultimately surpassing ULA in the commercial launch market.

Meta's AI Copyright Battle: Did Using Pirated Books to Train AI Cross the Line?

2025-05-05
Meta's AI Copyright Battle: Did Using Pirated Books to Train AI Cross the Line?

Meta faces a copyright lawsuit from authors including Sarah Silverman and Ta-Nehisi Coates over its AI tools. The judge is questioning whether Meta illegally used their books, obtained through 'shadow libraries,' to train its AI and whether this harms the authors' sales. Meta claims 'fair use,' but the judge suggests that significantly impacting or destroying the market for their work might invalidate this defense. This case will set a precedent for future AI copyright cases, hinging on proving actual harm to the authors' commercial prospects.

Tech

Gandi's Major Outage: A Cascade of Failures Triggered by SSD Storage

2025-05-05

On March 9th, 2025, Gandi experienced a significant service disruption caused by an SSD storage filer failure, impacting numerous services including email. The outage lasted for hours, with some mailboxes remaining inaccessible until the following day. While no data was lost, the incident highlighted weaknesses in Gandi's redundancy and fault tolerance, including insufficient redundancy in internal monitoring, flawed VM architecture, and insufficient capacity in some redundant systems. Gandi has implemented improvements to redundancy mechanisms, enhanced monitoring, and upgraded storage systems to prevent recurrence.

Iberian Power Outage: Mobile Data Reveals Resilience

2025-05-05
Iberian Power Outage: Mobile Data Reveals Resilience

A major power outage hit the Iberian Peninsula on April 28, 2025. Analysis of mPulse data reveals the impact on Spain and Portugal's internet traffic. Desktop traffic plummeted by 80% during the outage, while mobile traffic only dropped by 40%, even surpassing desktop traffic at times. People relied heavily on mobile networks (cellular and some hotspots), prioritizing news, government, and food safety websites. Battery data showed slightly increased phone battery drain. The event highlights the role of mobile networks and edge nodes in keeping critical information services available during power disruptions.

Critical AWS Tool Flaw: Privilege Escalation Vulnerability

2025-05-05
Critical AWS Tool Flaw: Privilege Escalation Vulnerability

Security firm Token Security uncovered a critical vulnerability in AWS's Account Assessment tool. Intended to audit cross-account access, its deployment instructions inadvertently encouraged users to deploy the hub role in less secure accounts (like development), creating dangerous trust paths from insecure to highly sensitive environments (like production). This allowed for privilege escalation, potentially granting attackers control over the entire AWS organization. AWS fixed the issue on January 28, 2025, updating documentation to recommend deploying the hub role in an account as secure as the management account. Affected organizations should check their deployments and remediate accordingly.

Meta's AI Gamble: Reshaping Global GDP?

2025-05-05
Meta's AI Gamble: Reshaping Global GDP?

Meta CEO Mark Zuckerberg envisions AI as the key to boosting Meta's core advertising business and significantly increasing advertising's share of global GDP. Meta's massive AI investment isn't just about better ad targeting; it encompasses business messaging, Meta AI, AI devices, and enhanced user experiences. This ambitious strategy positions Meta to challenge Google Search, Apple's iPhone, and ChatGPT. While some investors remain skeptical about the ROI, early results are promising, with a new Reels ad model boosting conversion rates by 5% and nearly a third of advertisers using AI creative tools.

Tech

Pilot Study: rTMS Shows Promise in Treating Sleep Bruxism

2025-05-05

A small, open-label pilot study investigated the effects of repetitive transcranial magnetic stimulation (rTMS) on sleep bruxism (SB). Twelve SB patients underwent five days of rTMS treatment. Results showed significant reductions in both the intensity of jaw-closing muscle electromyographic (EMG) activity during sleep and self-reported muscle soreness during and after treatment. This pilot study suggests potential therapeutic benefits of rTMS for SB, warranting further, more controlled studies.

EU to Ban Anonymous Crypto Accounts by 2027

2025-05-05
EU to Ban Anonymous Crypto Accounts by 2027

The European Union is set to implement sweeping Anti-Money Laundering (AML) rules, banning privacy-preserving tokens and anonymous cryptocurrency accounts starting in 2027. Credit institutions, financial institutions, and crypto-asset service providers (CASPs) will be prohibited from maintaining anonymous accounts or handling privacy coins like Monero (XMR) and Zcash (ZEC). The regulation also increases oversight of CASPs, with direct AML supervision for those operating in at least six member states. This is part of a broader EU push to regulate the crypto industry.

Tech AML

Toyota Hit with Class-Action Lawsuit Over Illegal Data Sharing

2025-05-05
Toyota Hit with Class-Action Lawsuit Over Illegal Data Sharing

A federal class-action lawsuit accuses Toyota and its affiliated telematics data aggregator, CAS, of illegally collecting and selling driver data to Progressive Insurance. Plaintiff Philip Siefke, a Toyota RAV4 owner, discovered Progressive possessed his driving data without his consent. The suit alleges Toyota failed to inform Siefke of the data sharing and claims the practice violated customer privacy. The lawsuit seeks damages and an injunction against further data collection. This highlights the challenges automakers and insurers face regarding data privacy.

Tech

Decentralized Social Media vs. Censorship: Bluesky and the Fediverse

2025-05-05
Decentralized Social Media vs. Censorship: Bluesky and the Fediverse

This essay examines how decentralized social media platforms, like Bluesky and the Fediverse, handle government censorship. Bluesky's composable moderation services allow clients to choose which services to subscribe to, but its centralized architecture makes it vulnerable to government pressure. The Fediverse, with its interconnected network of independent instances, presents a far greater challenge to censors, requiring attacks on numerous nodes for effective blockage. The author argues that decentralized architecture without single points of failure is key to censorship resistance, but ongoing improvements are needed to withstand more powerful censorship mechanisms.

Tech

Cicada Cyborgs Play Pachelbel: Insect-Based Bio-Robotics Take a Leap

2025-05-04
Cicada Cyborgs Play Pachelbel:  Insect-Based Bio-Robotics Take a Leap

Scientists at the University of Tsukuba have transformed cicadas into cyborg insects capable of producing sounds resembling Pachelbel's Canon. By implanting electrodes into the cicadas' tymbals (sound-producing organs), researchers can control their muscle contractions, altering the pitch and rhythm of their chirps. This builds upon previous research using cockroaches as cyborgs, and holds potential for future applications in emergency communication.

3D Scanning Brooklyn While Rollerblading

2025-05-04

The author created a device called "Helmdar" by combining rollerblading, LiDAR, and smartphone AR technology to scan urban environments while rollerblading. Helmdar fuses LiDAR data with the phone's 6DoF pose tracking data to generate 3D point cloud maps. The author shares the creation process, software implementation, and stunning 3D scans of Brooklyn at night, showcasing a unique urban exploration method and data visualization technique.

1 2 83 84 85 87 89 90 91 194 195