Category: Tech

Microsoft Cracks Down on Low Performers with New Performance Management Policies

2025-04-22
Microsoft Cracks Down on Low Performers with New Performance Management Policies

Microsoft is implementing stricter performance management policies, including a two-year rehire ban for underperforming employees. This reflects a broader tech industry shift towards higher performance expectations and less leniency. The new policies include options for exiting low performers and an improved Performance Improvement Plan (PIP), aiming for greater transparency and accountability. This follows recent layoffs of underperforming employees without severance.

High-Altitude Jeffrey Pine Discovery Challenges Climate Change Models

2025-04-22
High-Altitude Jeffrey Pine Discovery Challenges Climate Change Models

UC Davis Professor Hugh Safford stumbled upon a Jeffrey pine at a record-breaking 12,657 feet elevation in California's High Sierra, 1,860 feet higher than the previous record. Published in Madroño, this serendipitous discovery suggests that climate change is driving Jeffrey pines to higher altitudes, challenging existing models predicting the pace of species migration. Researchers suspect Clark's nutcrackers may be aiding this migration by carrying seeds. The finding highlights the importance of fieldwork in climate change research and calls for more on-the-ground surveys to accurately assess climate change's impact on high-elevation ecosystems.

AI Newsroom Experiment: Building a Native AI Company

2025-04-22
AI Newsroom Experiment: Building a Native AI Company

Henry Blodget, leveraging ChatGPT, created an AI news team comprising a managing editor, tech correspondent, economics and markets correspondent, and a jack-of-all-trades. This experiment explores AI's role in journalism, not as a replacement for human journalists, but as a collaborator. The AI team members demonstrated impressive efficiency and professionalism. Blodget shares humorous anecdotes, like commenting on an AI colleague's appearance. He concludes by highlighting the potential for AI and human collaboration in news production and looks forward to future explorations.

Tech

WD and Microsoft Launch Massive Hard Drive Recycling Program to Reduce Reliance on China for Rare Earths

2025-04-21
WD and Microsoft Launch Massive Hard Drive Recycling Program to Reduce Reliance on China for Rare Earths

Western Digital, in collaboration with Microsoft and recycling partners CMR and PedalPoint Recycling, has launched a large-scale hard drive recycling program to address growing e-waste and rare earth element shortages. The program utilizes acid-free dissolution recycling (ADR) technology to reclaim Rare Earth Oxides (REO), including dysprosium, neodymium, and praseodymium, along with aluminum, steel, gold, palladium, and copper. The recovered REO boasts 99.5% purity and reduces greenhouse gas emissions by 95% compared to virgin mining. This initiative aims to lessen the US tech industry's dependence on China for rare earths and promote a circular economy. The program has already successfully recycled 47,000 pounds of hard drives, achieving a reclaim rate exceeding 90%.

NVIDIA's AI Hegemony: A Looming Decline?

2025-04-21
NVIDIA's AI Hegemony: A Looming Decline?

NVIDIA, riding the wave of the AI boom and its GPU monopoly, has become the fastest-growing hardware company in history. However, its long-term dominance is facing serious challenges. Hyperscalers (Google, Microsoft, Amazon, and Meta) are aggressively consolidating AI demand, developing competitive chips, and building vertically integrated distributed systems, making it difficult for NVIDIA to supply. Simultaneously, the sheer scale of compute needs has hit limits on capex, power availability, and infrastructure development, leaving smaller cloud providers struggling. NVIDIA's revenue is increasingly reliant on a few large customers, who are actively developing alternatives, leaving NVIDIA's future uncertain.

Tech

Could Lichens Survive on Mars?

2025-04-21
Could Lichens Survive on Mars?

A study from the Space Research Center of the Polish Academy of Sciences suggests that certain lichen species could potentially survive on Mars. Researchers exposed two lichen species to simulated Martian conditions and found that even under harsh Martian environments, the fungal component of the lichen maintained active metabolism. Lichens' low metabolism, low nutritional needs, longevity, and adaptations like UV-screening metabolites and radiation-defending melanin pigments make them resilient to extreme conditions, suggesting they could be potential candidates in the search for life on Mars.

Tech lichens

Hubble Confirms First Lone Black Hole

2025-04-21
Hubble Confirms First Lone Black Hole

A team of astronomers, using data from the Hubble Space Telescope and Gaia spacecraft, has confirmed the existence of the first isolated stellar-mass black hole. Initially spotted in 2022, this approximately seven-solar-mass black hole was detected through its gravitational microlensing effect. Unlike previously discovered black holes which all had companion stars, this discovery offers a new window into these mysterious objects and paves the way for future searches using the Nancy Grace Roman Space Telescope.

Tech

Google Faces Breakup Threat in Landmark Antitrust Case

2025-04-21
Google Faces Breakup Threat in Landmark Antitrust Case

The US Department of Justice is pushing for a radical restructuring of Google, alleging its search engine maintains an illegal monopoly. A judge ruled in Google's favor last year, finding them guilty of anti-competitive practices stemming from a 2020 lawsuit. The current hearings focus on remedies, with intense debate centering on Google's use of AI to maintain its dominance. The DOJ argues that Google leverages AI to stifle competition, while Google claims its market position is fairly earned. This case, the largest tech antitrust case since the Microsoft case, could reshape the tech landscape.

Tech

Bluesky Launches Blue Check Verification to Boost Trust

2025-04-21
Bluesky Launches Blue Check Verification to Boost Trust

To enhance user trust, decentralized social media platform Bluesky has introduced a new account verification system. This system features two types of blue checkmarks: a standard blue check issued proactively by Bluesky for notable and authentic accounts, and a scalloped blue check issued by trusted verifiers such as The New York Times. Users can see the source of verification and choose to hide all verification marks. Bluesky is not currently accepting direct applications for verification, but will open an application process in the future.

AFRINIC Election: A Power Struggle for Control of Africa's Internet Future

2025-04-21
AFRINIC Election: A Power Struggle for Control of Africa's Internet Future

Chinese national Lu Heng and his company Larus are attempting to seize control of AFRINIC, the African internet registry, through a series of lawsuits and political lobbying, aiming to privatize and commercialize IPv4 addresses. This move could lead to the control of African internet resources and hinder the development of the African internet. AFRINIC has previously experienced internal corruption and IP address theft, and is currently in financial distress, creating an opportunity for Lu Heng's actions. While Lu Heng claims his actions are for the benefit of internet users, they are actually for his own economic gain, raising concerns in the international community.

Tech

Solving Decentralized Social Media's URI Problem

2025-04-21
Solving Decentralized Social Media's URI Problem

This essay explores user experience issues stemming from URI schemes in decentralized social media platforms like the Fediverse and Bluesky. Sharing links across instances often leads to problems like inability to comment or like posts. The author proposes a solution: new URI schemes (e.g., `fedi:` or `at:`). These would allow operating systems or browsers to directly invoke relevant apps based on the scheme, resolving link sharing, client compatibility, and post migration issues. While browser support for custom schemes is limited, this approach promises to greatly improve user experience in decentralized social media and warrants further investigation.

Verizon CEO on 5G ROI, Network Building, and the Future

2025-04-21
Verizon CEO on 5G ROI, Network Building, and the Future

Verizon Consumer CEO Sowmyanarayan Sampath sits down with The Verge to discuss Verizon’s 5G investments, network operations, and future strategies. He details the actual return on investment from 5G, highlighting the importance of network capacity and 5G’s role in handling the explosion of mobile data. He also touches on Verizon’s attempts and lessons learned in content and application integration, and his views on net neutrality and government regulation. Sampath shares his unique decision-making framework and Verizon’s strategies for addressing market changes and customer needs, such as the three-year price lock plan. The conversation also covers the fiber network Fios’s construction plans, OpenRAN technology, and the outlook for future 5G applications.

Journal Snatchers Turn Reputable Academic Titles into Predatory Publications

2025-04-21
Journal Snatchers Turn Reputable Academic Titles into Predatory Publications

Research integrity analysts have uncovered a disturbing trend: companies are acquiring reputable scholarly journals and transforming them into predatory publications with questionable practices. A recent study identified at least 36 journals that underwent this transformation after being purchased by a network of newly established international companies. These journals, previously indexed by databases like Scopus, were acquired for hundreds of thousands of euros each. Post-acquisition, the journals often increased article-processing charges, dramatically increased publication volume, and published papers outside their original scope, hallmarks of predatory publishing. While some companies deny the allegations, the lack of transparency and the absence of ownership information on journal websites raise serious concerns about academic integrity and the need for stronger regulation.

Handwriting's Superior Brain Connectivity: A New Study

2025-04-21
Handwriting's Superior Brain Connectivity: A New Study

A new study reveals that handwriting activates significantly more extensive and interconnected brain networks than typing, especially in areas linked to memory and sensory processing. Researchers used high-density EEG to compare brain activity during handwriting and typing, finding that handwriting promotes broader brain communication patterns crucial for learning and memory. The study suggests handwriting should remain a core part of education, particularly for young children, due to its unique ability to fully engage the brain and optimize learning conditions. Further research will explore the long-term cognitive benefits of handwriting.

Generative AI: Disrupting the SaaS Landscape

2025-04-21
Generative AI: Disrupting the SaaS Landscape

A foundational shift is underway in enterprise software, driven by generative AI. AlixPartners' new study reveals that the rise of AI agents is squeezing over 100 mid-market software companies. These firms are caught between AI-native entrants replicating applications at a fraction of the cost and tech giants investing heavily in AI. Many mid-sized enterprise software companies face existential threats within the next 24 months. AI is evolving from an assistant to the application itself, handling complex tasks and potentially rendering traditional SaaS architectures obsolete. This forces software companies to adopt outcome-based pricing, streamline product lines, and embrace M&A. Speed, relevance, and efficiency will become core competitive advantages.

Tech

Hennessey Venom F5 Evolution: 2031 HP, The World's Most Powerful Combustion Engine Car

2025-04-21
Hennessey Venom F5 Evolution: 2031 HP, The World's Most Powerful Combustion Engine Car

Hennessey unveiled the Venom F5 Evolution, boasting a mind-blowing 2,031 horsepower twin-turbo V8, making it the world's most powerful purely internal combustion engine car. This upgrade package isn't a separate model; existing Venom F5 owners can upgrade their cars. Its incredible power translates to a 0-200 mph time of 10.3 seconds, and it features a new adaptive suspension with five driver-selectable modes, balancing on-road comfort and high-performance track capabilities.

Tech

30 Lines of Code Slash Data Center Energy Consumption by Up to 30%

2025-04-21
30 Lines of Code Slash Data Center Energy Consumption by Up to 30%

Researchers from the University of Waterloo have achieved up to a 30% reduction in energy consumption in data centers by tweaking how the Linux kernel handles network traffic. They cleverly adjusted the kernel's handling of network packets, reducing unnecessary polling during low network traffic periods, thus saving CPU resources. This improvement has been integrated into Linux kernel version 6.13 and is expected to yield significant energy savings in data centers that widely use Linux. The researchers call for the industry to focus on software efficiency and sustainability, reviving the importance of resource conservation.

Superbloom: Tech's Frenzy and the Unchecked Power of Social Media

2025-04-21
Superbloom: Tech's Frenzy and the Unchecked Power of Social Media

This review examines Nicholas Carr's new book, *Superbloom*, using the California poppy incident as a springboard to discuss the negative impacts of technology, particularly social media. From the early days of the telegraph and telephone to radio and the internet, Carr reviews the evolution of American media regulation, highlighting the lack of effective oversight leading to the unchecked power of social media and resulting societal issues like information overload, privacy breaches, and alienation. The author argues that mild measures like 'friction design' are insufficient to address the problems, calling for more proactive intervention and reflection on technology.

Tech

US Renewable Energy Milestone: Solar and Wind Surpass Coal

2025-04-21
US Renewable Energy Milestone: Solar and Wind Surpass Coal

A milestone has been reached in the US power sector: solar and wind power generation have surpassed coal for the first time, jointly accounting for 17% of the US electricity mix. Over the past decade, solar power generation has increased more than ninefold, reaching 9.2%, and is projected to account for over half of new US generating capacity in 2025. This shift marks a significant transformation in the US energy landscape, showcasing the unstoppable rise of clean energy.

Tech wind power

UK Government's Secret Backdoor Demand to Apple Exposed, Raising Privacy Concerns

2025-04-21
UK Government's Secret Backdoor Demand to Apple Exposed, Raising Privacy Concerns

The UK government's attempt to secretly demand a backdoor into Apple's end-to-end encryption was thwarted when the Home Office failed to keep it secret on national security grounds. This highlights the dangers of government abuse of security mechanisms and the inappropriateness of secret courts in a democracy. The article draws parallels between the UK government's actions and the Trump administration's misuse of security clearances, arguing both demonstrate abuse of power and security mechanisms, threatening individual liberties and freedom of speech. The author calls for stronger legal oversight of state abuse of security mechanisms to address new security challenges in the digital age.

Tech

Tesla's Next-Gen Vehicle Network and 4680 Battery: A Technological Leap

2025-04-21
Tesla's Next-Gen Vehicle Network and 4680 Battery: A Technological Leap

Tesla is undergoing a significant vehicle architecture upgrade. They're replacing the legacy CAN bus with a next-generation network based on TDMA, enabling more efficient data transfer for high-resolution infotainment, OTA updates, and autonomous driving. Simultaneously, Tesla's 4680 battery, particularly its second-generation "Cybercell," is improving production efficiency, lowering costs, and enhancing vehicle performance. However, the launch of a cheaper Model Y has been pushed back to Q3 2025 or early 2026, suggesting Tesla is prioritizing its technological advancements and production optimization.

The Space Economy in 2025: Beyond the Hype Cycle

2025-04-21
The Space Economy in 2025: Beyond the Hype Cycle

The early months of 2025 reveal a maturing commercial space sector, moving beyond its honeymoon phase. Investment is becoming more selective, government involvement is increasing, and competitive advantages are eroding. While space remains a powerful platform for economic and technological transformation, geopolitical realities and macroeconomic constraints are increasingly influential. This analysis examines the space economy's three-layered architecture: infrastructure, distribution, and applications, highlighting the significance of software-defined layers. Macroeconomic headwinds and technological tailwinds coexist, with increased opportunities in defense-related sectors, but challenges persist in commercial applications. Competition is intensifying, with SpaceX facing challenges from Blue Origin, Rocket Lab, and others. GeoAI emerges as a new growth area, while distribution-layer companies are achieving more with less funding. Future investments should focus on AI's strategic importance, the driving force of defense spending, and the resetting of infrastructure.

Tech

Thai Pro-Democracy Movement Targeted by State-Sponsored Online Harassment Campaign

2025-04-21
Thai Pro-Democracy Movement Targeted by State-Sponsored Online Harassment Campaign

A Citizen Lab report exposes a sustained, coordinated social media harassment and doxxing campaign, codenamed "JUICYJAM," targeting Thailand's pro-democracy movement since at least August 2020. The operation used fake personas across multiple platforms (primarily X and Facebook) to dox protesters, harass them, and incite reports to the police. A leak of confidential documents in March 2025 revealed the Royal Thai Armed Forces and/or Royal Thai Police as the perpetrators. JUICYJAM's high engagement demonstrates a successful state-sponsored influence operation, part of a broader network of judicial harassment and suppression posing a significant threat to civil society. The report highlights the inadequacy of social media platforms in addressing such coordinated, harmful campaigns.

Reverse Engineering Digital Cinema Security: An Expired Certificate's Tale

2025-04-20
Reverse Engineering Digital Cinema Security: An Expired Certificate's Tale

Late 2023, the movie 'Wonka' couldn't play in some cinemas due to an expired distributor certificate. This sparked a cinema operator's curiosity, leading to a deep dive into the Digital Cinema Initiatives (DCI) standard and its movie encryption. The article details the DCI workflow, DCP file format, KDM/DKDM key distribution, and MXF file encryption. While decryption is complex, involving AES-128, RSA signatures, and unique IVs, the author believes the DCI standard itself is secure, relying on unique keys and protected private keys. Open-source libraries and tools are mentioned, along with how distributors use a trusted device list to protect content.

Landmark Achievement: Precise Map of Mouse Brain's Visual Centers Unveiled

2025-04-20
Landmark Achievement: Precise Map of Mouse Brain's Visual Centers Unveiled

After nine years of painstaking work, an international team has created a precise map of a mouse brain's visual centers. This is the largest and most detailed rendering of neural circuits in a mammalian brain to date. The map reveals the intricate structures and functional systems of mammalian perception and promises to accelerate research into normal brain function (seeing, memory, navigation) and neurological disorders like autism and schizophrenia. The study, published in Nature, used AI to trace tens of thousands of neurons and billions of connections, combining this structural data with functional brain imaging to link structure and function. This groundbreaking work paves the way for a digital transformation of brain science, opening doors to unprecedented discoveries in neuroscience.

First Lone Black Hole Confirmed

2025-04-20
First Lone Black Hole Confirmed

Astronomers have confirmed the existence of a lone black hole—one without an orbiting star—for the first time. Initially detected in 2011, its gravity caused a background star's light to bend and shift as it passed. Years of observations from Hubble and Gaia spacecraft confirmed its mass is about seven times that of the sun, settling a previous debate about its nature. This discovery is significant for understanding black hole formation and distribution. Future missions aim to find more such lone black holes.

Tech

De-extinction: A Distraction from Real Conservation?

2025-04-20
De-extinction: A Distraction from Real Conservation?

While the Trump administration cuts funding for crucial research, it champions de-extinction. Colossal Biosciences' creation of gray wolf pups with dire wolf genes is used to justify weakening the Endangered Species Act. Bioethicists and conservationists express concern, highlighting the inefficiency and ethical questions surrounding this technology. They argue it distracts from addressing the root causes of extinction: habitat loss and human-wildlife conflict. The focus should remain on protecting existing species and ecosystems, rather than pursuing the flashy but potentially flawed pursuit of de-extinction.

Tech

Will OAuth Save MCP? A Look at Security in Model Context Protocols

2025-04-20
Will OAuth Save MCP? A Look at Security in Model Context Protocols

Anthropic's Model Context Protocol (MCP) offers a simple way to integrate models, tools, and APIs, but its security is a concern. This article explores whether using OAuth as an identity layer for MCP is sufficient. While OAuth provides tokens, identifying clients and accessed resources, it doesn't solve all security problems, such as strong authentication, preventing credential theft, device identification, attribute-based access control, etc. The author argues that relying solely on OAuth is insufficient to address the new security risks posed by MCP. Infosec teams need to delve deeper into identity proxies and access policies to address the internal and external attack surfaces introduced by MCP.

Tech

Fudan University Achieves Breakthrough: 400-Picosecond Flash Memory

2025-04-20

Researchers at Fudan University have developed a groundbreaking 400-picosecond flash memory device, boasting a program speed of 25 billion times per second. This surpasses existing speed limits in information storage, achieving a record-breaking speed by leveraging two-dimensional Dirac band structure and ballistic transport characteristics for super-injection of charge. This technology promises significant applications in ultra-fast AI models, driving upgrades in storage technology and strengthening China's leadership in the field.

San Francisco: A Tech Utopia Divided

2025-04-20
San Francisco: A Tech Utopia Divided

San Francisco, the heart of the tech industry, presents a stark duality. On one hand, lavish parties thrown by tech giants; on the other, ordinary citizens struggling with high housing costs and poverty. The rapid growth of the tech sector hasn't benefited everyone, exacerbating inequality and raising concerns about the future. The author, through personal experiences and observations, reveals the social issues hidden beneath the veneer of tech prosperity, highlighting the widening gap between the promised tech utopia and the harsh realities.

1 2 94 95 96 98 100 101 102 194 195