Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: algorithm Clear Filter

“China keeps the algorithm”: Critics attack Trump’s TikTok deal

TikTok will not shut down on Wednesday, as President Donald Trump inches nearer to closing a deal with China that will most likely see the app's majority ownership shift to US owners and US-based users shift to a new app. On Tuesday, Trump confirmed that he has extended the deadline to December 16 for TikTok owner ByteDance to divest ownership to comply with a law designed to block China from spying on US users or manipulating TikTok's algorithm to influence Americans. The president claimed th

Here’s What TikTok Under American Ownership Might Look Like

We may see a U.S.-China deal to keep TikTok alive this week, and details on how that long-delayed agreement could come together are steadily trickling out. The exact terms are yet to be unveiled, but based on initial public statements from the two countries’ representatives, it’s likely to include a U.S. spin-off of the highly popular social media app that would be owned by several American investors and would continue to rely on the Chinese algorithm running the platform. The biggest cog in C

The US version of TikTok might still use the Chinese algorithm

A potential TikTok deal emerged Monday between the US and China, two days before the Trump administration's latest sell or be banned deadline. Now, attention is shifting to the app's Chinese algorithm, with the Financial Times reporting it will be used in the US version. Wang Jingtao, deputy director of the China's national internet regulator, told reporters that the deal included "licensing the algorithm and other intellectual property rights." The Financial Times further reports that US Treas

The effects of algorithms on the public discourse

We traded blogs for black boxes, now we're paying for it 09/09/2025 Come listen to the "old man yelling at clouds" in me for a bit. tl;dr: The internet is changing for the worse (or getting 'enshittified'). In this post, I write about the effects of algorithms on the public discourse to illustrate a greater point on the enshittification of the internet. Then, I offer my personal notes and curated resources to guide you on your personal internet deshittification journey. I miss the old intern

U.S. Senator accuses Microsoft of “gross cybersecurity negligence”

U.S. Senator Ron Wyden has sent a letter to the Federal Trade Commission (FTC) requesting the agency to investigate Microsoft for failing to provide adequate security in its products, which led to ransomware attacks against healthcare organizations. The Senator started the formal asking by saying that Microsoft should be held "responsible for its gross cybersecurity negligence, resulting in ransomware attacks against critical infrastructure, including U.S. health care organizations." The Senat

TikTok has turned culture into a feedback loop of impulse and machine learning

Photo by Solen Feyissa on Unsplash As of September 2025, approximately 170 million Americans spend, on average, one hour every day in an app that is designed to maximize psychological grip. While Congress fixates on TikTok’s data collection usages, what hasn’t received enough attention is how the platform has successfully industrialized human attention itself. Where earlier media relied on polished narratives (films with arcs, shows with seasons), TikTok turned culture into a never-ending feedb

TikTok won. Now everything is 60 seconds

Photo by Solen Feyissa on Unsplash As of September 2025, approximately 170 million Americans spend, on average, one hour every day in an app that is designed to maximize psychological grip. While Congress fixates on TikTok’s data collection usages, what hasn’t received enough attention is how the platform has successfully industrialized human attention itself. Where earlier media relied on polished narratives (films with arcs, shows with seasons), TikTok turned culture into a never-ending feedb

Bootstrapping the Future: From Resource Estimation to Quantum Advantage

Quantum Algorithms That Work A central problem in quantum computing is the development of domain-specific algorithms that enable real scientific and economic contributions. Quantum algorithms in numerous domains such as finance, chemistry, physics, and biology are being developed with the intention of achieving quantum advantage, i.e. to derive deeper insights relative to established algorithms on classical machines. But these algorithms are typically evaluated through simulation and/or testing

How randomness improves algorithms (2023)

Since the very first days of computer science — a field known for its methodical approach to problem-solving — randomness has played an important role. The first program to run on the world’s first general-purpose electronic computer used randomness to simulate nuclear processes. Similar approaches have since been used in astrophysics, climate science and economics. In all these cases, plugging in random numbers at certain steps in the algorithm helps researchers account for uncertainty about th

Encryption made for police and military radios may be easily cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Encryption made for police and military radios may be easily cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Encryption Made for Police and Military Radios May Be Easily Cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Breaking the sorting barrier for directed single-source shortest paths

If you want to solve a tricky problem, it often helps to get organized. You might, for example, break the problem into pieces and tackle the easiest pieces first. But this kind of sorting has a cost. You may end up spending too much time putting the pieces in order. This dilemma is especially relevant to one of the most iconic problems in computer science: finding the shortest path from a specific starting point in a network to every other point. It’s like a souped-up version of a problem you n

The Ski Rental Problem

Ski Rental Problem The ski rental problem is a classic example problem in online algorithms. It feels like a small but interesting problem that can be explained relatively easily while some clever tricks can be applied to it. In this article, I took these lecture notes by Debmalya Panigrahi and Hangjie Ji and tried to rewrite them in a way that is easier to understand (at least for me). Formulation You are going skiing in the mountains but you are unsure about the weather reports and don't k

Roundtables: Why It’s So Hard to Make Welfare AI Fair

Amsterdam tried using algorithms to fairly assess welfare applicants, but bias still crept in. Why did Amsterdam fail? And more important, can this ever be done right? Hear from MIT Technology Review editor Amanda Silverman, investigative reporter Eileen Guo, and Lighthouse Reports investigative reporter Gabriel Geiger as they explore if algorithms can ever be fair. Speakers: Eileen Guo, features & investigations reporter, Amanda Silverman, features & investigations editor, and Gabriel Geiger

Trump, who promised to save TikTok, threatens to shut down TikTok

Donald Trump vowed to save TikTok before taking office, claiming only he could make a deal to keep the app operational in the US despite national security concerns. But then, he put Vice President JD Vance in charge of the deal, and after months of negotiations, the US still doesn't seem to have found terms for a sale that the Chinese government is willing to approve. Now, Trump Commerce Secretary Howard Lutnick has confirmed that if China won't approve the latest version of the deal—which coul

Major quantum computing advance made obsolete by teenager (2018)

A teenager from Texas has taken quantum computing down a notch. In a paper posted online earlier this month, 18-year-old Ewin Tang proved that ordinary computers can solve an important computing problem with performance potentially comparable to that of a quantum computer. In its most practical form, the “recommendation problem” relates to how services like Amazon and Netflix determine which products you might like to try. Computer scientists had considered it to be one of the best examples of

Major Quantum Computing Advance Made Obsolete by Teenager (2018)

A teenager from Texas has taken quantum computing down a notch. In a paper posted online earlier this month, 18-year-old Ewin Tang proved that ordinary computers can solve an important computing problem with performance potentially comparable to that of a quantum computer. In its most practical form, the “recommendation problem” relates to how services like Amazon and Netflix determine which products you might like to try. Computer scientists had considered it to be one of the best examples of

Major Quantum Computing Advance Made Obsolete by Teenager

A teenager from Texas has taken quantum computing down a notch. In a paper posted online earlier this month, 18-year-old Ewin Tang proved that ordinary computers can solve an important computing problem with performance potentially comparable to that of a quantum computer. In its most practical form, the “recommendation problem” relates to how services like Amazon and Netflix determine which products you might like to try. Computer scientists had considered it to be one of the best examples of

Elon Musk’s X Says ‘Nope’ to French Authorities Trying to Access Its Algorithm

Onlookers have long suspected that Elon Musk’s X (formerly Twitter) has a right-wing bias embedded in its digital DNA, and, in January of this year, cybercrime authorities in France took it upon themselves to uncover whether this was true or not. The investigation has sought to determine whether the site is guilty of algorithmically manipulating the visibility of content on its website. NBC reports that, earlier this month, the probe was transferred to a “key unit of France’s national police.” N

Researcher threatens X with lawsuit after falsely linking him to French probe

Elon Musk's X is refusing to hand over data to French authorities, claiming it's defending its users' free speech and privacy while branding a criminal investigation into alleged algorithm manipulation as "politically motivated." In a post on Monday, X's Global Government Affairs account denied the allegations, insisting the French investigation "egregiously undermines X’s fundamental right to due process and threatens our users’ rights to privacy and free speech." Preparing to fight the alleg

France launches criminal probe of X's alleged algorithm 'manipulation'

France is investigating whether X has manipulated its algorithm and engaged in "fraudulent data extraction." Prosecutors are looking into if the social media platform engaged in election interference. They launched the investigation on July 11, following reports in January. It has labelled X as an "organized gang." X's Global Government Affairs account issued a scathing breakdown of what it calls France's "politically-motivated criminal investigation" and its refusal to cooperate. The French g

Delaunay Mesh Generation (2012)

Delaunay Mesh Generation Our book is a thorough guide to Delaunay refinement algorithms that are mathematically guaranteed to generate meshes with high quality, including triangular meshes in the plane, tetrahedral volume meshes, and triangular surface meshes embedded in three dimensions. It is also the most complete guide available to Delaunay triangulations and algorithms for constructing them. We have designed the book for two audiences: researchers, especially graduate students, and engin

Algorithms for making interesting organic simulations

Algorithms for making interesting organic simulations The purpose of this article is to explain techiques that enabled me to make simulations like the one below, along with a lot of other organic looking things. We will focus on algorithmic techniques for artistic purpose rather than scientific meaning. 1. Physarum algorithm from Jeff Jones (2010) Jeff Jones presented a simulation algorithm that reproduces the behavior of organisms such as Physarum polycephalum. It is explained in this paper.

Your Fitbit Could Become Your Post-Surgery Best Friend

A Fitbit a day just might help keep your post-surgery woes at bay. Research today finds that wearable data can predict children’s risk of health problems following a removed appendix. Scientists in Chicago conducted the study, which equipped over a hundred children with Fitbits after their appendectomy. Using a specially designed algorithm, the Fitbits accurately detected whether children would develop postoperative complications, often days before they were formally diagnosed. The findings sug

An Algorithm for a Better Bookshelf

Drop in at a library, and you’ll likely notice that most shelves aren’t full—librarians leave some empty space on each shelf. That way, when they get new books, they can slot them into place without having to move too many other books. It’s a simple-enough idea, but one that arises in a host of settings in computer science that involve sorted data, such as an alphabetically ordered census repository, or a list of connections between members of a social network. In such situations, where the ent

Quantum Hardware Readiness for Two-Step Quantum Search Algorithm

The traveling salesman problem (TSP) has challenged computer scientists for decades. Finding the shortest route that visits all cities exactly once sounds simple, but it becomes computationally explosive as the number of destinations grows. With applications spanning logistics, manufacturing, and network optimization, any breakthrough in solving TSP efficiently could transform entire industries. A recent paper published in IEEE Transactions on Quantum Engineering by Rei Sato, Cui Gordon, Kazuhi

A New Standard for Ethical Hiring: Combining Human Judgement with AI Fairness Tools

The ability of AI-powered systems to make decisions based on complicated sets of data has introduced speed and efficiency to hiring, the loan approval process, fraud detection, and more. But has it enhanced accuracy? Many would argue no, especially those impacted by biased hiring algorithms, including employees and employers. One of the most elusive conundrums is how to fight age-based bias by AI-powered hiring systems. For the 2024 IEEE International Conference on Big Data and Smart Computing

What does it mean for an algorithm to be “fair”?

Van der Vliet and other welfare advocates I met on my trip, like representatives from the Amsterdam Welfare Union, described what they see as a number of challenges faced by the city’s some 35,000 benefits recipients: the indignities of having to constantly re-prove the need for benefits, the increases in cost of living that benefits payments do not reflect, and the general feeling of distrust between recipients and the government. City welfare officials themselves recognize the flaws of the sy

SIMD-friendly algorithms for substring searching (2016)

Introduction Popular programming languages provide methods or functions which locate a substring in a given string. In C it is the function strstr , the C++ class std::string has the method find , Python's string has methods pos and index , and so on, so forth. All these APIs were designed for one-shot searches. During past decades several algorithms to solve this problem were designed, an excellent page by Christian Charras and Thierry Lecroq lists most of them (if not all). Basically these al