Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: stem Clear Filter

Feds investigate Tesla over inaccurate autopilot and FSD crash reports

The National Highway Traffic Safety Administration (NHTSA) just announced an investigation into Tesla regarding its Autopilot and Full Self-Driving (FSD) systems, according to a report by Electrek. The road safety regulator says the probe involves inconsistencies with how the company reports crashes regarding the aforementioned systems. The NHTSA requires automakers to report crashes involving autonomous and driver assistance systems within five days of being notified of them. The agency claims

Humans intervened every 9 minutes in AAA test of driver assists

Advanced driver assistance systems—also known as ADAS—come in a few variations. Blind spot monitoring, collision warnings, and emergency braking act like a second pair of eyes and ears, monitoring the car's environment to warn the driver, or possibly intervene, if a crash looks imminent. Other systems are better thought of as convenience features—things like adaptive cruise control and lane keeping, which relieve some of the burden of driving. Among the newer of these is the traffic jam assist.

The AI Battle’s Newest Warrior Strikes a Major Blow to Big Tech

The ongoing slugfest between tech players racing to get the most intuitive and powerful AI may have just gotten a brief knockout punch. The slammer that landed? A new version of DeepSeek’s increasingly impressive V3.1, which has a whopping 685-billion-parameter system and can deliver about $1.01 per complete coding task, compared to a beginning price of $70 for traditional systems. 🚨 BREAKING: DeepSeek V3.1 is Here! 🚨 The AI giant drops its latest upgrade — and it’s BIG: ⚡685B parameters 🧠L

Modern CI is too complex and misdirected (2021)

The state of CI platforms is much stronger than it was just a few years ago. Overall, this is a good thing: access to powerful CI platforms enables software developers and companies to ship more reliable software more frequently, which benefits its users/customers. Centralized CI platforms like GitHub Actions, GitLab Pipelines, and Bitbucket provide benefits of scale, as the Internet serves as a collective information repository for how to use them. Do a search for how to do X on CI platform Y a

Modern CI Is Too Complex and Misdirected

The state of CI platforms is much stronger than it was just a few years ago. Overall, this is a good thing: access to powerful CI platforms enables software developers and companies to ship more reliable software more frequently, which benefits its users/customers. Centralized CI platforms like GitHub Actions, GitLab Pipelines, and Bitbucket provide benefits of scale, as the Internet serves as a collective information repository for how to use them. Do a search for how to do X on CI platform Y a

Hallucinations in AI Models: What They Mean for Software Quality and Trust

Modern businesses are rushing to adopt artificial intelligence (AI) technologies, but this rapid integration comes with unexpected challenges. A phenomenon known as “hallucinations” occurs in large language models (LLMs) and deep learning systems and threatens software quality and trust. These hallucinations occur when AI presents false information as fact. The damage extends beyond technical failures, as user trust erodes, brand reputations suffer, and ethical questions multiply. Practical appr

Pharma firm Inotiv says ransomware attack impacted operations

American pharmaceutical company Inotiv has disclosed that some of its systems and data have been encrypted in a ransomware attack, impacting the company's business operations. In a filing to the U.S. Securities and Exchange Commission (SEC), Inotiv says that the cyberattack occurred on August 8 and took action to contain the breach. “On August 8, 2025, Inotiv, Inc. became aware of a cybersecurity incident affecting certain of its systems and data,” Inotiv informs. “The Company’s preliminary i

GEPA optimizes LLMs without costly reinforcement learning

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Researchers from the University of California, Berkeley, Stanford University and Databricks have introduced a new AI optimization method called GEPA that significantly outperforms traditional reinforcement learning (RL) techniques for adapting large language models (LLMs) to specialized tasks. GEPA removes the popular paradigm of learning

The looming crisis of AI speed without guardrails

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now OpenAI’s GPT-5 has arrived, bringing faster performance, more dependable reasoning and stronger tool use. It joins Claude Opus 4.1 and other frontier models in signaling a rapidly advancing cognitive frontier. While artificial general intelligence (AGI) remains in the future, DeepMind’s Demis Hassabis has described this era as “10 times big

Finding a Successor to the FHS

Finding a successor to the FHS [LWN subscriber-only content] The purpose of the Filesystem Hierarchy Standard (FHS) is to provide a specification for filesystem layout; it specifies the location for files and directories on a Linux system to simplify application development for multiple distributions. In its heyday it had some success at this, but the standard has been frozen in time since 2015, and much has changed since then. There is a slow-moving effort to revive the FHS and create a FHS 4.

Tech in the Classroom: A History of Hype and Hysteria

If you’re a parent, an educator, or just someone who’s been to school, you’ve probably developed an opinion about generative AI in classrooms. You might fear the demise of the five-paragraph essay, the ever-increasing ease of cheating, or, worse, the end of critical thinking altogether. But don’t worry: The anxiety surrounding large language models in schools is anything but unprecedented. In 1975, teachers fretted that handheld calculators would undermine students’ capacity to “handle basic sk

SystemD Service Hardening

Controversy aside, systemd provides us a very complete, robust method of controlling services (amongst a multitude of other Linux things). For a lot of things though, this is optimized for success out of the box and not necessarily security. Such is the way of many IT endeavors. This doc though is meant to provide a snapshot of a number of hardening options that you can apply to systemd service units and podman quadlets to increase the overall security posture and reduce both the likelihood of c

AI is different

antirez 2 days ago. 20374 views. Regardless of their flaws, AI systems continue to impress with their ability to replicate certain human skills. Even if imperfect, such systems were a few years ago science fiction. It was not even clear that we were so near to create machines that could understand the human language, write programs, and find bugs in a complex code base: bugs that escaped the code review of a competent programmer. Since LLMs and in general deep models are poorly understood, and

DARPA Is Taking Its AI Fighter Jet Program to the Next Level

Imagine Top Gun without pilots. Not exactly summer blockbuster material. But that is what the Defense Advanced Research Projects Agency (DARPA) has in mind for the future of the military. According to an announcement spotted by The Register, the agency recently handed out a multi-million dollar contract that will push forward its autonomous pilot program that will eventually deploy planes into warfare without a human being behind the control stick. The contract, announced earlier this week, was

Indigenous knowledge meets artificial intelligence

Suzanne Kite’s AI art installations, for example, model a Lakota framework of data sovereignty: intelligence that emerges only through reciprocal, consensual interaction. Unlike systems that assume user consent via opaque terms of service, her kinetic machines require the viewer’s physical presence—and give something back in return. “It’s my data. It’s my training set. I know exactly what I did to train it. It’s not a large model but a small and intimate one,” Kite says. “I’m not particularly i

Study warns of security risks as ‘OS agents’ gain control of computers and phones

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Researchers have published the most comprehensive survey to date of so-called “OS Agents” — artificial intelligence systems that can autonomously control computers, mobile phones and web browsers by directly interacting with their interfaces. The 30-page academic review, accepted for publication at the prestigious Association for Computatio

James Webb Finds Evidence of Free-Floating Planets So Large They Can Gather Their Own Planetary Systems

So much for heliocentrism. An international team of astronomers using observations made with the James Webb Space Telescope have found evidence of massive planets out there that're capable of forming their own planetary systems — without a star. These planets would be the center of something like a mini version of our solar system where other, smaller planets revolve around it. But without the light of a star, these systems, if they exist, would go largely overlooked by our telescopes, lost to

MCP overlooks hard-won lessons from distributed systems

Why MCP’s Disregard for 40 Years of RPC Best Practices Will Burn Enterprises Fool me once, shame on you; fool me twice, shame on me. Julien Simon 9 min read · Jul 29, 2025 -- 19 Listen Share The Model Context Protocol (MCP) promises to standardize AI-tool interactions as the “USB-C for AI.” While its simplicity accelerates adoption, MCP systematically overlooks four decades of hard-won lessons from distributed systems. This isn’t an academic concern: enterprises deploying MCP today are buildin

MCP's Disregard for 40 Years of RPC Best Practices

Why MCP’s Disregard for 40 Years of RPC Best Practices Will Burn Enterprises Fool me once, shame on you; fool me twice, shame on me. Julien Simon 9 min read · Jul 29, 2025 -- 26 Listen Share The Model Context Protocol (MCP) promises to standardize AI-tool interactions as the “USB-C for AI.” While its simplicity accelerates adoption, MCP systematically overlooks four decades of hard-won lessons from distributed systems. This isn’t an academic concern: enterprises deploying MCP today are buildin

The FCC will review emergency alert systems in the US

The Federal Communications Commission is planning a review of the US emergency alert systems. Both the Emergency Alert System (EAS) and the Wireless Emergency Alerts (WAS) will be subject to a "re-examination" by the agency. "We want to ensure that these programs deliver the results that Americans want and need," FCC Chairman Brendan Carr posted on X. The announcement of this plan notes that the infrastructure underlying the EAS — which includes radio, television, satellite and cable systems —

Foundry (YC F24) is hiring staff-level product engineers

About Foundry We're building the foundational infrastructure to automate digital work. Today's browser-based workflows represent a potential trillion dollar opportunity—currently trapped behind inefficient manual tasks and repetitive actions. Current AI agents fail when facing complex real-world scenarios; they're brittle experiments, not scalable solutions. Foundry provides the critical, high-fidelity simulation environment necessary for training, testing, and deploying robust AI agents. Thin

Foundry (YC F24) Is Hiring Staff Level Product Engineers

About Foundry We're building the foundational infrastructure to automate digital work. Today's browser-based workflows represent a potential trillion dollar opportunity—currently trapped behind inefficient manual tasks and repetitive actions. Current AI agents fail when facing complex real-world scenarios; they're brittle experiments, not scalable solutions. Foundry provides the critical, high-fidelity simulation environment necessary for training, testing, and deploying robust AI agents. Thin

Outdated Software, Nationwide Chaos: United Grounds Flights After Meltdown

United Airlines passengers across the country found themselves stranded, confused, and angry on Wednesday as a massive technology failure triggered a nationwide grounding of flights. The culprit: Unimatic, a decades-old internal system so vital to United’s operations that when it failed, the airline had no choice but to bring the entire operation to a standstill. From major hubs in Chicago, Newark, Denver, Houston, to San Francisco, the outage rippled through the airline’s scheduling, flight

Inside the US Government's Unpublished Report on AI Safety

At a computer security conference in Arlington, Virginia, last October, a few dozen AI researchers took part in a first-of-its-kind exercise in “red teaming,” or stress-testing a cutting-edge language model and other artificial intelligence systems. Over the course of two days, the teams identified 139 novel ways to get the systems to misbehave including by generating misinformation or leaking personal data. More importantly, they showed shortcomings in a new US government standard designed to h

States take the lead in AI regulation as federal government steers clear

US state legislatures are where the action is for placing guardrails around artificial intelligence technologies, given the lack of meaningful federal regulation. The resounding defeat in Congress of a proposed moratorium on state-level AI regulation means states are free to continue filling the gap. Several states have already enacted legislation around the use of AI. All 50 states have introduced various AI-related legislation in 2025. Four aspects of AI in particular stand out from a regula

Best Home Security Systems in 2025: Safeguard Your Home With These Top Options

SimpliSafe home security systems can be easily tailored to your needs. Just add or subtract hardware and equipment as you please. CNET When choosing a home security system for your home, you may be tempted to start by deciding between a DIY setup or professionally installed systems with monitoring services. Remember to make your decision after considering the equipment, installation, monitoring options and other features you want. Here are some bits of information to keep in mind about these pa

Supporting the BEAM community with free CI/CD security audits

Keep up to date with the latest news, best practice ideas and exclusive offers. Don’t miss out. Sign up here. Sign up for our quarterly newsletter At Erlang Solutions, our support for the BEAM community is long-standing and built into everything we do. From contributing to open-source tools and sponsoring events to improving security and shaping ecosystem standards, we’re proud to play an active role in helping the BEAM ecosystem grow and thrive. One way we’re putting that support into action

Understanding the Complete Identity Management Ecosystem

Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐 Identity management has grown from simple password systems into a complex web of specialized tools and technologies. Each piece serves a specific purpose, but understanding how they all fit together can be confusing. This guide

Secure boot certificate rollover is real but probably won't hurt you

LWN wrote an article which opens with the assertion "Linux users who have Secure Boot enabled on their systems knowingly or unknowingly rely on a key from Microsoft that is set to expire in September". This is, depending on interpretation, either misleading or just plain wrong, but also there's not a good source of truth here, so.First, how does secure boot signing work? Every system that supports UEFI secure boot ships with a set of trusted certificates in a database called "db". Any binary sig

Cedana (YC S23) Is Hiring a Systems Engineer

At Cedana, we are solving what many thought was impossible: the seamless, live migration of active CPU+GPU containers across global compute. We're building the next generation of AI orchestration systems, founded on our pioneering work in checkpoint/restore technology. This isn't just an incremental improvement; it's a fundamental shift that makes distributed computing truly portable, elastic, and resilient across planet scale compute. This is an exceptionally difficult systems problem that req