Category: Tech

Japanese Scientists Develop Artificial Blood with Years-Long Shelf Life

2025-06-02
Japanese Scientists Develop Artificial Blood with Years-Long Shelf Life

Scientists at Nara Medical University in Japan, led by Hiromi Sakai, have developed a new type of artificial blood compatible with all blood types. This artificial blood, created by extracting hemoglobin from expired blood and encapsulating it in a protective shell, is stable and virus-free. Remarkably, it can be stored for up to two years at room temperature and five years under refrigeration, a significant improvement over donated blood's 42-day shelf life. Human trials are underway, with the aim of practical application by 2030, promising a revolution in global healthcare, especially in low- and middle-income countries.

Google Settles Massive Antitrust Lawsuit: A Pricey Resolution

2025-06-02
Google Settles Massive Antitrust Lawsuit: A Pricey Resolution

After years of battling antitrust lawsuits, Google has settled with multiple shareholders to avoid protracted litigation. Since 2021, Google has faced numerous lawsuits alleging monopolistic practices, culminating in recent high-profile losses against Epic Games and the US Department of Justice. These defeats expose Google to billions in fines and necessitate significant business restructuring. The settlement likely entails opening Google Play, sharing advertising data, licensing its search index, and potentially even divesting the Chrome browser. This costly resolution aims to mitigate further legal battles and address the damage caused by its antitrust woes.

Tech Settlement

Drone Deliveries: Navigating the Murky Legal Airspace

2025-06-02
Drone Deliveries: Navigating the Murky Legal Airspace

The rise of drone delivery services has brought to light significant legal ambiguities surrounding airspace ownership and privacy. Current regulations are unclear, leaving many practical questions unanswered regarding homeowners' rights to prevent drones from flying over their property. The article explores the conflict between landowners' rights and the public interest in utilizing drone technology. A proposed solution involves legally defining the height to which private property extends into the airspace, perhaps 60-70 meters. Below this, drone operators would need landowner consent; above, designated air corridors would be established. This approach aims to balance the needs of homeowners and the burgeoning drone delivery industry.

Tech

Snowflake's Growth Bottlenecked by On-Prem Renewal Cycles

2025-06-02
Snowflake's Growth Bottlenecked by On-Prem Renewal Cycles

Snowflake's growth in the large enterprise market is hampered by the renewal cycles of older, on-premises data warehouse and analytics technology, according to its VP of Finance, Jimmy Sexton. While Snowflake's Q1 revenue hit nearly $1 billion, up 26 percent year-over-year, and they secured two deals exceeding $100 million in the financial services sector, growth is constrained by the lengthy migration process from on-prem systems. Customers typically only initiate migrations near contract renewals, limiting Snowflake's ability to rapidly expand in this market segment. This reliance on renewal cycles applies to various legacy systems, not just Teradata, hindering faster adoption.

Tech

DOJ Sides with ISPs in Copyright Infringement Case

2025-06-02
DOJ Sides with ISPs in Copyright Infringement Case

The Department of Justice sided with Frontier Communications in a copyright infringement lawsuit brought by record labels. The labels alleged Frontier failed to terminate accounts of numerous repeat infringers. The DOJ argued that holding ISPs liable for user infringement could incentivize them to terminate accounts indiscriminately to avoid liability, potentially harming innocent users. Frontier defended its actions, stating it had terminated many accounts flagged for infringement and hadn't directly infringed any copyrights. The case highlights the complex legal battle between copyright holders, ISPs, and users over the responsibility for online copyright infringement.

Tech ISPs

IoT Security: The Perils and Protections of the Root of Trust

2025-06-02
IoT Security: The Perils and Protections of the Root of Trust

Cyberattacks targeting critical infrastructure have surged in recent years, with the security of Internet of Things (IoT) devices a major concern. This article explores two approaches to securing IoT: basic cybersecurity hygiene and defense in depth. Basic hygiene includes strong passwords, regular software updates, update validation, and understanding the software supply chain. Defense in depth emphasizes layered security mechanisms, including protect (layered architecture with integrity checks at each level), detect (using remote attestation technologies like Trusted Platform Modules (TPMs)), and remediate (self-testing and resetting). The article highlights the Root of Trust (RoT) as the cornerstone of secure systems, requiring careful protection. As hardware vendors integrate high-security mechanisms into embedded chips, securing IoT devices is becoming increasingly feasible.

Tech

Academic Websites Overwhelmed by AI Bot Traffic

2025-06-02
Academic Websites Overwhelmed by AI Bot Traffic

A surge in bot traffic is crippling academic websites. Sites like DiscoverLife, hosting millions of images, have experienced massive traffic spikes, rendering them unusable. The culprit? Bots scraping data, likely to train generative AI models. This isn't isolated; BMJ and Highwire Press report similar issues, with COAR finding over 90% of surveyed members affected, many experiencing service disruptions. While open access encourages reuse, the aggressive scraping is unsustainable. The release of DeepSeek, a less resource-intensive LLM, exacerbated the problem, fueling the bot explosion. Smaller organizations face extinction unless this issue is addressed.

Microsoft Aims to End USB-C Chaos: Windows 11 Update Promises Consistent Functionality

2025-06-02
Microsoft Aims to End USB-C Chaos: Windows 11 Update Promises Consistent Functionality

Microsoft is tackling USB-C port inconsistencies with an updated Windows 11 Hardware Compatibility Program (WHCP). The initiative ensures all USB-C ports will consistently support data, charging, and display functions. Additionally, USB 4 40Gbps ports will fully support both USB4 and Thunderbolt 3 peripherals. Microsoft states that certified Windows 11 laptops and tablets with Windows 11 24H2 already adhere to these rules. This should eliminate user frustration and ensure consistent functionality across all USB-C ports.

Tech

Business Insider's AI-Powered Reading List Goes Wrong

2025-06-02
Business Insider's AI-Powered Reading List Goes Wrong

Business Insider, while encouraging AI use, apologized last year for accidentally recommending non-existent books generated by AI. A reading list intended to help staff understand good business journalism included several fabricated titles, such as a nonexistent Target CEO's memoir, a Jensen Huang biography, and a Mark Zuckerberg autobiography. This incident highlights the potential risks and need for rigorous vetting of AI tools in content creation, serving as a cautionary tale for news organizations using AI.

Linux Format Magazine's 25-Year Run Ends: A Print Media Obituary

2025-06-02
Linux Format Magazine's 25-Year Run Ends: A Print Media Obituary

After 25 years, the UK-based Linux magazine, Linux Format, has ceased publication. The article explores the likely reasons behind its closure, pointing to the economic challenges faced by print media in the digital age. While some niche magazines have successfully transitioned to digital or employed other survival strategies, Linux Format's publisher ultimately decided to discontinue the title, even in a digital-only format. The author shares a personal anecdote about discovering Ubuntu through a Linux Format DVD and reflects on the future of print publications and the Linux magazine market.

The Untold Story of the US's 1950s Nuclear-Powered Aircraft Program

2025-06-02
The Untold Story of the US's 1950s Nuclear-Powered Aircraft Program

This article details the largely unknown story of the US's ambitious nuclear-powered aircraft program (ANP) in the 1950s. The decade-long endeavor aimed to create planes with nuclear reactors for unparalleled range, driven by Cold War military needs. From the initial NEPA studies to the HTRE experiments, engineers tackled immense challenges: designing nuclear reactors, developing high-temperature materials, and creating advanced radiation shielding. However, the rise of ICBMs diminished the military necessity, leading to the program's cancellation in 1961, leaving a legacy of technological innovation and an ultimately unrealized dream.

AI Adoption: Unprecedented Speed and Scale

2025-06-02
AI Adoption: Unprecedented Speed and Scale

Mary Meeker's latest report highlights the unprecedented speed and scale of AI adoption. ChatGPT reached 800 million users in 17 months, companies are seeing rapid ARR growth, and usage costs are plummeting. While training model costs reach $1 billion, inference costs have dropped 99% in two years. Fierce competition and the rise of open-source options are driving innovation, with Nvidia, Google, and Amazon heavily investing in AI infrastructure. Although AI companies are currently burning cash, the resulting lower costs will ultimately benefit consumers and businesses. The long-term winners remain to be seen.

Tech

The Mystery of the Missing $10 eReader: Why Haven't Prices Dropped?

2025-06-02
The Mystery of the Missing $10 eReader: Why Haven't Prices Dropped?

In 2012, a promising £8 e-reader, the txtr beagle, was reviewed but never widely released. Today, the cheapest e-readers remain around £100. This article explores why. The reasons include the niche market for e-reading, high costs due to e-ink screen patents, Google's restrictions on Android for e-ink devices, and the lack of a sustainable business model for low-cost manufacturers without content cross-subsidization. The author expresses a desire for a cheap e-reader but concludes that this is unlikely until patents expire or a new business model emerges.

Unlocking arXiv: The Ultimate Guide to Scientific Paper Resources

2025-06-02
Unlocking arXiv: The Ultimate Guide to Scientific Paper Resources

This curated list provides a comprehensive collection of tools, libraries, datasets, and resources designed to streamline the process of discovering, reading, and working with scientific papers from arXiv. From semantic search engines and interactive literature maps to AI-powered reading assistants and summarization tools, this guide covers everything from paper discovery to enhanced reading and literature review generation. Several large datasets are also included to support research efforts.

Data Sovereignty Concerns Drive UK Businesses Away from US Tech Giants

2025-06-02
Data Sovereignty Concerns Drive UK Businesses Away from US Tech Giants

Amid economic uncertainty and the Trump era, dependence on American tech is a growing concern for UK businesses. A survey of 1,000 IT leaders reveals data sovereignty as a top priority. 84% worry geopolitical events threaten data access and control, with 60% believing the UK government should stop procuring cloud services from US companies. Nearly half are considering repatriating data, fearing US government seizure. However, experts warn completely eliminating reliance on global hyperscalers is difficult, with migration proving more complex than anticipated.

Tech

Local NVMe SSDs: The Future of Cloud Databases?

2025-06-02
Local NVMe SSDs: The Future of Cloud Databases?

Cloud storage was initially designed around the limitations of older hardware, using network-attached disks to enhance durability and scalability. However, today's cost-effective NVMe SSDs offer significantly superior performance. This article demonstrates that PostgreSQL databases using local NVMe SSDs outperform AWS RDS and Aurora by several times in TPC-C and TPC-H benchmarks. While network-attached storage retains advantages in elasticity and durability, the reliability and affordability of NVMe SSDs now largely compensate, making local NVMe SSDs a compelling future for cloud databases.

Reversible Computing: A Low-Energy Revolution for AI?

2025-06-02
Reversible Computing: A Low-Energy Revolution for AI?

The inherent energy loss in computer computation, like Hansel and Gretel's discarded breadcrumbs, has long been a challenge. Landauer pioneered reversible computing, but it was initially deemed a dead end. Bennett's 'uncomputation' offered a new path, cleverly avoiding data deletion to reduce energy waste, but speed remained an issue. MIT engineers attempted low-loss chip designs, but progress was slow. Recently, as computer circuits approach physical limits and the demand for parallel AI computation rises, reversible computing has gained renewed interest. Earley's research precisely quantifies the energy savings, paving the way for commercial applications. The founding of Vaire Computing marks a milestone in the transition from theory to reality.

Tech

Silicon Valley Elites Bet Big on Embryo Genetic Testing: Predicting Disease Risk Sparks Controversy

2025-06-02
Silicon Valley Elites Bet Big on Embryo Genetic Testing: Predicting Disease Risk Sparks Controversy

Over the last five years, tech giants like Anne Wojcicki, Sam Altman, and others have invested millions in direct-to-consumer polygenic testing startups such as Orchid, Nucleus, and Genomic Prediction, sparking controversy. For a few thousand dollars, these companies screen embryos, analyze DNA, and estimate the risk of developing conditions like addiction and obesity, even predicting IQ. Unlike tests for single-gene diseases, these services focus on polygenic diseases like type 2 diabetes and inflammatory bowel disease, providing parents with online reports assessing each embryo's genetic risk. This practice, while popular among Silicon Valley elites, faces widespread scientific skepticism.

Ukraine's Drone Strike Cripples Russian Air Force

2025-06-01
Ukraine's Drone Strike Cripples Russian Air Force

A Ukrainian drone attack deep inside Russia destroyed over 40 Russian aircraft, a Ukrainian security official revealed. The operation, overseen by President Zelenskyy and spanning over a year and a half, involved transporting drones deep into Russian territory to target airfields, including Belaya air base in Irkutsk. This occurred amidst a massive Russian missile and drone barrage on Ukraine, resulting in Ukrainian military casualties. Despite this, Ukraine affirmed its commitment to continuing peace talks with Russia in Istanbul.

The End of SEO? Generative Engine Optimization (GEO) is Here

2025-06-01
The End of SEO? Generative Engine Optimization (GEO) is Here

The rise of Large Language Model (LLM) platforms is signaling the end of traditional Search Engine Optimization (SEO). A new paradigm, Generative Engine Optimization (GEO), is emerging, focusing not on page rank but on how frequently content appears in LLM-generated answers. Brands need to optimize content for easy parsing and citation by LLMs, using new GEO tools to monitor brand presence in AI-generated results, gaining a competitive edge. GEO is not just a tooling shift, but a platform opportunity. The company that integrates insights, creative input, feedback, and iteration, and masters first- and third-party data will dominate.

Blue Origin's NS-32 Mission: Six Passengers Experience Space

2025-06-01
Blue Origin's NS-32 Mission: Six Passengers Experience Space

On May 31, Blue Origin successfully launched its New Shepard rocket on the NS-32 mission, sending six passengers, including New Zealand's first space tourist, Mark Rocket, into space. The flight lasted approximately three minutes, during which passengers experienced weightlessness and breathtaking views of Earth. The diverse crew included a lawyer, entrepreneurs, educators, and an aerospace executive, all hailing from various countries and united by their passion for space. This flight marked Blue Origin's 12th human spaceflight and showcases the company's continued growth in the space tourism sector.

Google Maps Glitch Causes Massive Traffic Jams in Germany

2025-06-01
Google Maps Glitch Causes Massive Traffic Jams in Germany

During Germany's Ascension Day holiday, a widespread Google Maps malfunction wrongly marked numerous highways as closed, leading to major traffic jams across the country. Areas affected included major cities like Berlin, Düsseldorf, and Dortmund. Drivers were forced onto alternative routes, causing widespread gridlock. A Google spokesperson stated that map information comes from various sources and that they are internally reviewing the issue. This is not the first technical glitch for Google Maps; a previous incident saw users' location history wiped.

17th Century Logarithm Calculation Hack: Scientific Notation to the Rescue

2025-06-01

This article unveils a clever method for estimating logarithms, invented by John Napier in the 17th century. The core idea leverages the logarithmic property log(a^b) = b * log(a) and scientific notation. By repeatedly calculating the 10th power, the precision gradually improves. A Python script implementing this algorithm is also provided. This ingenious method transforms complex logarithm calculations into relatively simple power operations and scientific notation manipulations, showcasing the ingenuity of early mathematicians in solving complex problems with limited computational tools.

AI Tool Masquerades as Malware: Cybersecurity Alert

2025-06-01
AI Tool Masquerades as Malware: Cybersecurity Alert

Cisco Talos has uncovered new threats disguised as legitimate AI tool installers, including CyberLock ransomware, Lucky_Gh0$t ransomware, and a destructive malware called "Numero." CyberLock encrypts specific files, falsely claiming ransom payments fund humanitarian aid. Lucky_Gh0$t is a Yashma ransomware variant. Numero manipulates the Windows GUI, rendering systems unusable. Attackers use SEO poisoning and social media to spread these threats, posing a significant risk to businesses seeking AI solutions. Organizations should meticulously verify sources and rely on reputable vendors.

Tech

YouTube's Ad Problem: Low-Quality Content and Unfriendly Top Channels

2025-06-01
YouTube's Ad Problem: Low-Quality Content and Unfriendly Top Channels

For two decades, YouTube has pitched advertisers on its future as the entertainment powerhouse, simply stating: "Young people don't watch cable; they watch YouTube." However, two key issues persist: the overwhelmingly low quality of much of its content, and the fact that its most popular channels aren't always advertiser-friendly. While viewers primarily watch top-performing videos, the existence of low-quality content still impacts ad appeal, exacerbated by issues with top channels.

Musk's NASA Pick Fails, Leaving Agency Facing Budget Cuts and Uncertain Future

2025-06-01
Musk's NASA Pick Fails, Leaving Agency Facing Budget Cuts and Uncertain Future

Jared Isaacman, Elon Musk's favored nominee for NASA administrator, has unexpectedly failed to secure the position, sparking concern within the agency. Isaacman's nomination failure is attributed to Musk's controversial role in the government and opposition from within the administration. This leaves NASA facing substantial budget cuts, a 24% reduction, jeopardizing its future. NASA insiders express grave concerns, with some predicting the agency's decline. The Trump administration hasn't named a replacement, but retired Lt. Gen. Steven Kwast is a leading contender, raising concerns about his military background and its implications for NASA's civilian space mission.

Tech

Swiss Payment Terminal Flaw: Unencrypted Firmware & Accessible Root Shell

2025-06-01

A security researcher reverse-engineered a widely used Worldline Yomani XR payment terminal in Switzerland, uncovering unencrypted firmware and a publicly accessible root shell. Despite physical tamper protection, the debug port is externally accessible, allowing attackers to gain root access and deploy malware within 30 seconds. However, deeper analysis revealed the Linux system doesn't handle sensitive data (like card details); a separate, encrypted and signed processor manages security functions. While a significant software engineering oversight, the direct risk may be less than initially feared.

Andor's Cinematographer Christophe Nuyens: From Film to Digital and Beyond

2025-06-01

This interview features Christophe Nuyens, cinematographer for the second season of Andor. Nuyens discusses his journey from electrician to cinematographer, his perspective on the shift from film to digital filmmaking, and how he achieved high-quality episodic production on a budget. He details the visual bridge between Andor season one and Rogue One, his passion for technology, collaboration with VFX, and experiences filming across diverse cultural settings.

Micronozzle Accelerator: Unveiling the Physics of GeV Proton Acceleration

2025-06-01
Micronozzle Accelerator: Unveiling the Physics of GeV Proton Acceleration

This research utilizes 2D particle-in-cell simulations to reveal a novel proton acceleration mechanism called the Micronozzle Accelerator (MNA). MNA focuses laser energy onto a hydrogen rod using a micronozzle, generating strong electric fields that accelerate protons to GeV energies. The study found that the MNA proton acceleration process consists of three stages: run-up, main-drive, and afterburner. The afterburner stage, a key feature of MNA, enables continued proton acceleration even after laser irradiation ceases, attributed to the effective transfer of thermal energy from hot electrons to protons during plasma free expansion. The research also explores the effects of laser intensity and pulse width on proton acceleration and compares MNA's performance with traditional targets, showing higher energy conversion efficiency and lower angular divergence.

Brazil's Data Wallet Pilot: Empowering Citizens or Exacerbating Inequality?

2025-06-01
Brazil's Data Wallet Pilot: Empowering Citizens or Exacerbating Inequality?

Brazil has launched a groundbreaking nationwide data ownership pilot program, allowing citizens to manage, own, and profit from their digital footprint. The project, a collaboration between government-owned Dataprev and DrumWave, uses 'data wallets' to monetize personal data for loans and other uses. However, concerns have arisen that it could worsen the digital divide and exploit vulnerable populations. The initiative's success in balancing citizen rights with data economic development remains to be seen.

Tech
1 2 64 65 66 68 70 71 72 194 195