Category: Tech

The Secret History of DNA: A Tale of Theft, Arrogance, and Scientific Breakthrough

2025-04-15
The Secret History of DNA: A Tale of Theft, Arrogance, and Scientific Breakthrough

This article unveils the untold story behind the discovery of DNA's double helix structure. A young, arrogant James Watson's encounter with Maurice Wilkins at a conference in Naples set the stage for his journey, but this wasn't a straightforward scientific quest. The narrative exposes power struggles, scientific theft, and blatant sexism. Howard Markel's book details Watson's unjust treatment of Rosalind Franklin and Wilkins's sharing of Franklin's crucial X-ray photograph without her permission. Franklin's groundbreaking contributions were long ignored, only gaining recognition posthumously. This is not merely a science story, but a dramatic tale of ethical conflicts, prompting reflection on honesty and fairness in scientific research.

US Tariffs: A Doomed Economic Gamble

2025-04-15

On April 2nd, 2025, the US president announced hefty new tariffs on imports, aiming to revive American manufacturing. However, a 15-year manufacturing veteran argues this policy is fundamentally flawed. High labor costs, a weak industrial supply chain, lack of crucial expertise, insufficient infrastructure, and policy uncertainty will likely backfire, harming the US economy. The author advocates for improving worker skills, building infrastructure, addressing social issues, and implementing gradual, targeted policies instead of blanket tariffs.

Tech

CT Scans: Weighing the Tiny Cancer Risk Against Significant Diagnostic Benefits

2025-04-15
CT Scans: Weighing the Tiny Cancer Risk Against Significant Diagnostic Benefits

A new study suggests that while CT scans slightly increase cancer risk (approximately 0.1%), the benefits in disease diagnosis and treatment far outweigh this risk. Experts advise that when a doctor recommends a CT scan, patients should proceed, as the potential benefits in diagnosing illness far outweigh the small added cancer risk. However, the study also notes the increase in CT scan use in recent years and suggests doctors should more carefully weigh risks and benefits, considering diagnostic algorithms and alternative imaging technologies like ultrasound and MRI, and involving patients in the decision-making process.

Tech

Google Ditches ccTLDs for Global Search

2025-04-15
Google Ditches ccTLDs for Global Search

Google is redirecting all its country-code top-level domain (ccTLD) versions (like google.fr, google.co.uk) to Google.com. This change, rolling out gradually over the coming months, is due to Google's improved ability to provide localized search results globally. While users shouldn't experience major disruptions, they might need to re-login or adjust search settings. The core search functionality remains unchanged.

Tech ccTLD

Whistleblower Alleges DOGE Team Exfiltrated Sensitive Labor Data

2025-04-15
Whistleblower Alleges DOGE Team Exfiltrated Sensitive Labor Data

A whistleblower has revealed details of how the DOGE team may have accessed and exfiltrated sensitive labor data from the National Labor Relations Board (NLRB). The whistleblower alleges that after gaining access to NLRB systems, the DOGE team obtained substantial data, including union information, ongoing legal cases, and corporate secrets. They allegedly attempted to cover their tracks by disabling monitoring tools and manually deleting access records. Evidence presented includes a large data exfiltration event, suspicious login attempts from a Russian IP address, and a project named "NxGenBdoorExtract," potentially designed to extract data from the NLRB's internal system. This incident raises serious concerns about data security and privacy, with experts warning of potential harm to unions, employees, and businesses.

GitHub PAT Leak: Attack Chain Widens

2025-04-15
GitHub PAT Leak: Attack Chain Widens

Security researchers at Wiz discovered that attackers exploited a vulnerability in reviewdog/action-setup@v1 to steal a GitHub Personal Access Token (PAT), leading to a wider security incident. This wasn't an isolated incident; several other GitHub Actions maintained by the same developer, including reviewdog/action-shellcheck, are potentially affected. While GitHub and reviewdog maintainers have patched the vulnerability, Wiz warns that if compromised actions remain in use and secrets aren't rotated, attackers could still exploit "tj-actions/changed-files" to launch a repeat attack.

US Power Outages: A Tale of Extreme Events and Regional Disparities

2025-04-15
US Power Outages: A Tale of Extreme Events and Regional Disparities

While US electricity service boasts high reliability, large-scale outages caused by extreme weather events (hurricanes, wildfires, winter storms) are becoming more frequent, disproportionately impacting specific regions. Analysis reveals that a small number of extreme events account for the majority of outage minutes, with a strong regional component. While nationwide average outage minutes remain relatively stable, baseline reliability varies drastically across regions, with rural areas significantly lagging behind urban centers. Outages peak during summer and winter months.

SN2021afdx: The Astronomical Number of Supernovae

2025-04-15
SN2021afdx: The Astronomical Number of Supernovae

This article chronicles the evolution of supernova naming conventions and the rapid advancement of modern astronomical observation technology. From the past, when only a handful of supernovae were discovered annually, to the present day, where tens of thousands are discovered each year, this is thanks to powerful telescopes and automated observation and analysis software. SN2021afdx, mentioned in the article, indicates it was the 21,760th supernova observed in 2021—an incredible number. The article concludes with a thought-provoking reflection: dozens of supernovae erupt every second in the universe, and our exploration of the cosmos is only just beginning.

Tech supernovae

EU Officials to Use Burner Devices on US Trips Amid Espionage Fears

2025-04-15
EU Officials to Use Burner Devices on US Trips Amid Espionage Fears

The European Commission is providing burner laptops and phones to staff traveling to the US on official business, fueled by concerns over espionage. This reflects a chilling in US-EU relations and anxieties about US intelligence agencies. While an EU spokesperson denied issuing formal guidance on burner devices, they admitted updating travel recommendations due to increased global cybersecurity threats. This mirrors practices for trips to countries like China and Russia, highlighting heightened EU concerns about US surveillance.

Tech

Generative AI: A Double-Edged Sword for India's IT Services Sector

2025-04-15
Generative AI: A Double-Edged Sword for India's IT Services Sector

Generative AI offers significant efficiency gains but presents a major challenge for India's IT services industry. While Indian firms have thrived by serving Western clients, they now face a crucial question: will AI's productivity dividend translate into revenue growth, or will intense competition lead to price reductions that negate these gains? Analysis suggests deflationary pressures are already emerging, with AI-driven efficiency improvements fueling price competition and potentially slowing medium-term growth to 4-5%. While some firms have seen success with GenAI projects, AI often replaces rather than supplements existing IT spending. Clients are demanding and receiving cost savings from AI, forcing IT service providers to shift to outcome- or value-based pricing models to capture the value generated by AI, rather than just enabling efficiency gains further down the value chain.

China's RoboTaxi Boom: Strict Regulations, Rapid Development

2025-04-15
China's RoboTaxi Boom: Strict Regulations, Rapid Development

China's robotaxi industry is booming, but under a strict regulatory regime. Unlike the US focus on Waymo, China boasts four major players: Baidu, Pony.AI, WeRide, and AutoX. A Ride AI conference highlighted the differences in regulation and user experience. Chinese authorities impose multi-stage approvals, from safety driver testing to eventual driverless operation. This contrasts sharply with the more relaxed US approach. Youtuber Sophia Tung's experiences riding various robotaxis revealed Baidu's 6th generation vehicle as the best, nearing Waymo's quality, while others lagged. While individual experiences offer limited insight, China's robotaxi progress is undeniable.

Tech

Overuse of CT Scans Could Cause Over 100,000 Cancer Cases in the US

2025-04-15

A new study reveals that the 93 million CT scans performed in the US in 2023 could lead to over 100,000 cancer cases, including nearly 10,000 in children. This accounts for 5% of all US cancers, equivalent to alcohol-induced cancers. Researchers urge reducing unnecessary scans and optimizing radiation doses to mitigate cancer risk. While CT scans are crucial for diagnosis and treatment, overuse increases radiation exposure and cancer risk. The study emphasizes the importance of clinically justified scans with age and organ-specific dose adjustments.

Samsung Halts One UI 7 Rollout Due to Unlocking Bug

2025-04-15
Samsung Halts One UI 7 Rollout Due to Unlocking Bug

Samsung has abruptly halted the rollout of its One UI 7 update after a serious bug was discovered preventing some Galaxy S24 users from unlocking their phones. Initially reported in South Korea, the issue prompted a global pause. The update, featuring Android 15 and numerous AI enhancements, began rolling out on April 7th but has since been removed from Samsung's servers. The company hasn't commented on the pause or plans to address the issue for users who already downloaded the update.

Tech

Hertz Data Breach: Thousands of Customers Affected

2025-04-15
Hertz Data Breach: Thousands of Customers Affected

Hertz, a global car rental giant, has confirmed a data breach affecting thousands of customers. Personal information and driver's licenses were stolen due to a cyberattack on its vendor, Cleo, between October and December 2024. Stolen data includes names, birthdates, contact information, driver's licenses, payment card details, and workers' compensation claims. Some customers also had their Social Security numbers and other government-issued IDs compromised. Hertz notified affected customers in Australia, Canada, the EU, New Zealand, and the UK, and also reported the breach to several US states. While Hertz denies its own network was compromised, it confirms data was stolen by a third party exploiting zero-day vulnerabilities in Cleo's platform. This highlights the importance of data security and underscores the significant risk of supply chain vulnerabilities.

Tech

Unearthing Ichijodani: A Samurai City's Secrets Revealed

2025-04-14
Unearthing Ichijodani: A Samurai City's Secrets Revealed

Excavations in Ichijodani, once one of medieval Japan's largest cities, have unearthed a treasure trove of artifacts revealing the opulent lives of its samurai inhabitants and the city's surprising prosperity. Archaeologists have uncovered samurai residences, the remains of the Asakura clan's palace, exquisite ceramics and tea sets, and even the oldest known Japanese flowerbed. Rivaling Kyoto in its heyday, Ichijodani was ultimately destroyed by Oda Nobunaga. Rediscovered after 400 years of obscurity, the site offers unparalleled insight into late medieval Japanese urban life and samurai culture during the tumultuous Warring States period.

Intel Sells 51% Stake in Altera to Silver Lake

2025-04-14
Intel Sells 51% Stake in Altera to Silver Lake

Intel announced it has agreed to sell a 51% stake in its FPGA subsidiary, Altera, to Silver Lake, a global technology investment firm, for $8.75 billion. This move aims to improve Intel's financial position and grant Altera greater independence to focus on growth in the AI-driven market. Altera CEO Sandra Rivera will step down, to be replaced by Raghib Hussain, former president of Products and Technologies at Marvell. The transaction is expected to close in the second half of 2025, leaving Intel with a 49% stake.

Tech

Outdated Laws Fuel Anti-Immigrant Violence in UK: Social Media's Role in the Southport Tragedy

2025-04-14
Outdated Laws Fuel Anti-Immigrant Violence in UK: Social Media's Role in the Southport Tragedy

A parliamentary investigation reveals how outdated laws hampered police efforts to counter disinformation on social media, exacerbating anti-immigrant violence in the UK last summer. Following the stabbing deaths of three children in Southport, false reports portraying the attacker as a recent Muslim migrant fueled days of rioting by far-right activists. Contempt-of-court rules and restrictions on naming underage suspects hindered the police's ability to correct misinformation, allowing false narratives to spread rapidly. The committee calls for government support to monitor social media and review contempt of court laws to address the challenges of the social media age.

Bypassing Censorship: The Unexpected Use of Unencrypted HTTP/2

2025-04-14

Researchers discovered that unencrypted HTTP/2 can bypass censorship in China and Iran. Despite the lack of browser support for unencrypted HTTP/2, they found that up to 6.28% of websites support it. They developed a tool to evaluate website support for unencrypted HTTP and suggest this finding adds to existing censorship circumvention techniques. Importantly, unencrypted HTTP/2 is not secure and should not be used for sensitive data.

NATO Adopts Palantir's AI for Battlefield Operations

2025-04-14
NATO Adopts Palantir's AI for Battlefield Operations

NATO announced a contract with Palantir to implement its Maven Smart System for AI-powered battlefield operations. The system, Maven Smart System NATO, will enhance intelligence fusion, targeting, battlespace awareness, and decision-making through various AI applications, from LLMs to machine learning. This provides NATO with a common data-enabled warfighting capability, achieved in record time. While specific contract terms remain undisclosed, Palantir's stock rose 8% on the news. The deal comes amidst pressure on NATO from President Trump over member spending on collective defense.

Tech

Peak Demand: A Seismic Shift in Global Oil Markets

2025-04-14
Peak Demand: A Seismic Shift in Global Oil Markets

This New York Fed article explores a pivotal shift in global oil markets. The once-prominent 'peak oil' theory, predicting declining oil production, was overturned by the shale revolution. Now, a new 'peak demand' narrative suggests that the rise of EVs and other low-carbon technologies will flatten and eventually decrease global oil consumption. This transforms the market into a zero-sum game, where production growth in one region lowers prices, squeezing out higher-cost producers elsewhere. The article analyzes the adaptability of US shale producers and the impact of EV adoption, noting that while some agencies predict peak oil demand around 2030, others foresee continued growth. Ultimately, global oil markets are transitioning from supply-driven to demand-driven dynamics, with profound implications for the global economy and energy landscape.

VMware's Free ESXi Hypervisor Returns: A Strategic Pivot or a Necessary Retreat?

2025-04-14
VMware's Free ESXi Hypervisor Returns: A Strategic Pivot or a Necessary Retreat?

After Broadcom's acquisition, VMware discontinued its free ESXi hypervisor, prompting user backlash. Recently, VMware quietly reinstated the free version in vSphere Hypervisor 8.0 Update 3e. This move is interpreted as a response to competitors' free offerings and a potential strategy to boost subscription sales. The article also touches upon the limited mainstream adoption of DPUs/SmartNICs, primarily concentrated among major cloud providers.

Tech

AES vs. ChaCha20: The Elegance of Simplicity in Cryptography

2025-04-14
AES vs. ChaCha20: The Elegance of Simplicity in Cryptography

This article explores two widely used symmetric encryption algorithms: AES and ChaCha20. While AES is powerful, its complex structure makes it vulnerable to cache-timing attacks and slower without hardware acceleration. In contrast, ChaCha20 uses simpler ARX operations, resulting in faster speeds, higher security, and consistent performance across various architectures, avoiding cache-timing attacks. The article concludes that simpler designs often lead to greater security, efficiency, and understandability, with ChaCha20 being a prime example of this principle.

OpenAI's Financial Tightrope: A Systemic Risk to the Tech Industry?

2025-04-14
OpenAI's Financial Tightrope: A Systemic Risk to the Tech Industry?

This article delves into OpenAI's precarious financial situation, revealing its unsustainable burn rate and questionable business model. Behind OpenAI's massive funding rounds lies a crushing cost structure: exorbitant compute costs, the ambitious Stargate data center project, and other operational expenses far exceeding its current revenue. The analysis examines OpenAI's funding sources and expenditures, highlighting the risks inherent in its partnerships with SoftBank and other investors. The author predicts potential cash flow problems or compute resource shortages, and explores the systemic risk OpenAI's financial struggles pose to the broader tech industry, impacting companies like Microsoft, Oracle, and CoreWeave. Ultimately, the article expresses serious concerns about OpenAI's long-term viability and the potential for significant industry disruption.

Tech tech risk

China's 'Dream' Ship Aims to Drill to the Moho

2025-04-14
China's 'Dream' Ship Aims to Drill to the Moho

China's newly commissioned Meng Xiang ('Dream') research vessel, equipped with a dynamic stabilization system, can operate in rough seas and drill up to 11 kilometers deep. Using titanium alloy drill rods and diamond bits, it will reliably drill in high-temperature, high-pressure environments, with a floating lab for rapid sample processing and analysis. The ship's first scientific drilling expeditions are expected to begin next year, aiming for full-scale drilling to the Moho beneath the Pacific or Indian Ocean before 2030. This will provide unprecedented data on oceanic crust architecture, the petrological nature of the oceanic Moho, and the lower limits of life on Earth. International collaboration is encouraged to share research findings.

All-Female Crew Makes History with Blue Origin's Star-Studded Spaceflight

2025-04-14
All-Female Crew Makes History with Blue Origin's Star-Studded Spaceflight

Blue Origin's NS-31 mission made headlines with its all-female crew, including celebrities Katy Perry and Gayle King, marking the first all-women spaceflight since 1963. The ten-minute, twenty-one-second suborbital journey aboard the New Shepard rocket saw the passengers experience zero gravity and breathtaking views of Earth. The flight highlights not only advancements in space tourism but also celebrates a significant milestone for women in STEM and the broader pursuit of space exploration. The mission's success underscores Blue Origin's continued commitment to pushing boundaries and fostering inclusivity in the realm of space travel.

FTC Alleges Facebook Acquired Instagram to Neutralize Competition

2025-04-14
FTC Alleges Facebook Acquired Instagram to Neutralize Competition

The Federal Trade Commission (FTC) is accusing Meta (Facebook's parent company) of acquiring Instagram in 2012 to eliminate a competitive threat, not for legitimate business reasons. The FTC lawyer argued that Facebook, struggling with the shift to mobile and its own mobile photo app development, saw Instagram's rise as a major threat. A key piece of evidence is a Zuckerberg email stating the need to "neutralize a potential competitor." The FTC also points to Facebook shelving its own Facebook Camera app after the acquisition. The case hinges on whether Meta abused its market dominance, potentially leading to a breakup of Facebook.

Tech

Sleeping Giants: Unexpected Carbon Sinks in Streams

2025-04-14
Sleeping Giants: Unexpected Carbon Sinks in Streams

University of Vermont researchers discovered that large, downed trees in streams store significant amounts of carbon, a pool that's growing over time. Field studies in New Hampshire and New York revealed old-growth forests hold four to five times more carbon in stream wood than mature forests. The research highlights the crucial role of large, old trees in forest carbon cycling and the climate change mitigation benefits of preserving old-growth forests. The findings offer valuable insights for Vermont landowners, informing sustainable land management practices that incorporate carbon storage and natural climate solutions.

Math Prodigy Turned Fugitive: The Andean Medjedovic Case

2025-04-14
Math Prodigy Turned Fugitive: The Andean Medjedovic Case

Andean Medjedovic, a former University of Waterloo math prodigy, is a fugitive after allegedly exploiting vulnerabilities in decentralized finance (DeFi) platforms to steal millions. He allegedly siphoned over US$65 million from Indexed Finance and KyberSwap, defending his actions under the controversial 'Code is Law' principle. However, he now faces multiple criminal charges in the US and could face decades in prison. He was arrested in Europe but is fighting extradition, leaving his future uncertain.

Tech law

China's Meng Xiang: Drilling 11km into the Earth's Crust

2025-04-14

China's new deep-sea drilling vessel, the Meng Xiang ('Dream'), a colossal 42,600-ton vessel, aims to drill 11 kilometers beneath the ocean floor—deeper than ever before attempted. Equipped with a revolutionary hydraulic lifting mast and multiple drilling modes, it can adapt to various geological conditions. The primary goal is to penetrate the Mohorovičić discontinuity (Moho), unlocking secrets about Earth's internal composition and potentially discovering valuable resources. This represents a significant leap in China's deep-sea exploration capabilities and its strategic ambitions.

1 2 99 100 101 103 105 106 107 194 195