Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: systems Clear Filter

GEPA optimizes LLMs without costly reinforcement learning

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Researchers from the University of California, Berkeley, Stanford University and Databricks have introduced a new AI optimization method called GEPA that significantly outperforms traditional reinforcement learning (RL) techniques for adapting large language models (LLMs) to specialized tasks. GEPA removes the popular paradigm of learning

The looming crisis of AI speed without guardrails

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now OpenAI’s GPT-5 has arrived, bringing faster performance, more dependable reasoning and stronger tool use. It joins Claude Opus 4.1 and other frontier models in signaling a rapidly advancing cognitive frontier. While artificial general intelligence (AGI) remains in the future, DeepMind’s Demis Hassabis has described this era as “10 times big

Tech in the Classroom: A History of Hype and Hysteria

If you’re a parent, an educator, or just someone who’s been to school, you’ve probably developed an opinion about generative AI in classrooms. You might fear the demise of the five-paragraph essay, the ever-increasing ease of cheating, or, worse, the end of critical thinking altogether. But don’t worry: The anxiety surrounding large language models in schools is anything but unprecedented. In 1975, teachers fretted that handheld calculators would undermine students’ capacity to “handle basic sk

AI is different

antirez 2 days ago. 20374 views. Regardless of their flaws, AI systems continue to impress with their ability to replicate certain human skills. Even if imperfect, such systems were a few years ago science fiction. It was not even clear that we were so near to create machines that could understand the human language, write programs, and find bugs in a complex code base: bugs that escaped the code review of a competent programmer. Since LLMs and in general deep models are poorly understood, and

DARPA Is Taking Its AI Fighter Jet Program to the Next Level

Imagine Top Gun without pilots. Not exactly summer blockbuster material. But that is what the Defense Advanced Research Projects Agency (DARPA) has in mind for the future of the military. According to an announcement spotted by The Register, the agency recently handed out a multi-million dollar contract that will push forward its autonomous pilot program that will eventually deploy planes into warfare without a human being behind the control stick. The contract, announced earlier this week, was

Indigenous knowledge meets artificial intelligence

Suzanne Kite’s AI art installations, for example, model a Lakota framework of data sovereignty: intelligence that emerges only through reciprocal, consensual interaction. Unlike systems that assume user consent via opaque terms of service, her kinetic machines require the viewer’s physical presence—and give something back in return. “It’s my data. It’s my training set. I know exactly what I did to train it. It’s not a large model but a small and intimate one,” Kite says. “I’m not particularly i

Study warns of security risks as ‘OS agents’ gain control of computers and phones

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Researchers have published the most comprehensive survey to date of so-called “OS Agents” — artificial intelligence systems that can autonomously control computers, mobile phones and web browsers by directly interacting with their interfaces. The 30-page academic review, accepted for publication at the prestigious Association for Computatio

James Webb Finds Evidence of Free-Floating Planets So Large They Can Gather Their Own Planetary Systems

So much for heliocentrism. An international team of astronomers using observations made with the James Webb Space Telescope have found evidence of massive planets out there that're capable of forming their own planetary systems — without a star. These planets would be the center of something like a mini version of our solar system where other, smaller planets revolve around it. But without the light of a star, these systems, if they exist, would go largely overlooked by our telescopes, lost to

MCP overlooks hard-won lessons from distributed systems

Why MCP’s Disregard for 40 Years of RPC Best Practices Will Burn Enterprises Fool me once, shame on you; fool me twice, shame on me. Julien Simon 9 min read · Jul 29, 2025 -- 19 Listen Share The Model Context Protocol (MCP) promises to standardize AI-tool interactions as the “USB-C for AI.” While its simplicity accelerates adoption, MCP systematically overlooks four decades of hard-won lessons from distributed systems. This isn’t an academic concern: enterprises deploying MCP today are buildin

MCP's Disregard for 40 Years of RPC Best Practices

Why MCP’s Disregard for 40 Years of RPC Best Practices Will Burn Enterprises Fool me once, shame on you; fool me twice, shame on me. Julien Simon 9 min read · Jul 29, 2025 -- 26 Listen Share The Model Context Protocol (MCP) promises to standardize AI-tool interactions as the “USB-C for AI.” While its simplicity accelerates adoption, MCP systematically overlooks four decades of hard-won lessons from distributed systems. This isn’t an academic concern: enterprises deploying MCP today are buildin

The FCC will review emergency alert systems in the US

The Federal Communications Commission is planning a review of the US emergency alert systems. Both the Emergency Alert System (EAS) and the Wireless Emergency Alerts (WAS) will be subject to a "re-examination" by the agency. "We want to ensure that these programs deliver the results that Americans want and need," FCC Chairman Brendan Carr posted on X. The announcement of this plan notes that the infrastructure underlying the EAS — which includes radio, television, satellite and cable systems —

Foundry (YC F24) is hiring staff-level product engineers

About Foundry We're building the foundational infrastructure to automate digital work. Today's browser-based workflows represent a potential trillion dollar opportunity—currently trapped behind inefficient manual tasks and repetitive actions. Current AI agents fail when facing complex real-world scenarios; they're brittle experiments, not scalable solutions. Foundry provides the critical, high-fidelity simulation environment necessary for training, testing, and deploying robust AI agents. Thin

Foundry (YC F24) Is Hiring Staff Level Product Engineers

About Foundry We're building the foundational infrastructure to automate digital work. Today's browser-based workflows represent a potential trillion dollar opportunity—currently trapped behind inefficient manual tasks and repetitive actions. Current AI agents fail when facing complex real-world scenarios; they're brittle experiments, not scalable solutions. Foundry provides the critical, high-fidelity simulation environment necessary for training, testing, and deploying robust AI agents. Thin

Outdated Software, Nationwide Chaos: United Grounds Flights After Meltdown

United Airlines passengers across the country found themselves stranded, confused, and angry on Wednesday as a massive technology failure triggered a nationwide grounding of flights. The culprit: Unimatic, a decades-old internal system so vital to United’s operations that when it failed, the airline had no choice but to bring the entire operation to a standstill. From major hubs in Chicago, Newark, Denver, Houston, to San Francisco, the outage rippled through the airline’s scheduling, flight

Inside the US Government's Unpublished Report on AI Safety

At a computer security conference in Arlington, Virginia, last October, a few dozen AI researchers took part in a first-of-its-kind exercise in “red teaming,” or stress-testing a cutting-edge language model and other artificial intelligence systems. Over the course of two days, the teams identified 139 novel ways to get the systems to misbehave including by generating misinformation or leaking personal data. More importantly, they showed shortcomings in a new US government standard designed to h

States take the lead in AI regulation as federal government steers clear

US state legislatures are where the action is for placing guardrails around artificial intelligence technologies, given the lack of meaningful federal regulation. The resounding defeat in Congress of a proposed moratorium on state-level AI regulation means states are free to continue filling the gap. Several states have already enacted legislation around the use of AI. All 50 states have introduced various AI-related legislation in 2025. Four aspects of AI in particular stand out from a regula

Best Home Security Systems in 2025: Safeguard Your Home With These Top Options

SimpliSafe home security systems can be easily tailored to your needs. Just add or subtract hardware and equipment as you please. CNET When choosing a home security system for your home, you may be tempted to start by deciding between a DIY setup or professionally installed systems with monitoring services. Remember to make your decision after considering the equipment, installation, monitoring options and other features you want. Here are some bits of information to keep in mind about these pa

Supporting the BEAM community with free CI/CD security audits

Keep up to date with the latest news, best practice ideas and exclusive offers. Don’t miss out. Sign up here. Sign up for our quarterly newsletter At Erlang Solutions, our support for the BEAM community is long-standing and built into everything we do. From contributing to open-source tools and sponsoring events to improving security and shaping ecosystem standards, we’re proud to play an active role in helping the BEAM ecosystem grow and thrive. One way we’re putting that support into action

Understanding the Complete Identity Management Ecosystem

Confused by the growing identity management landscape? This comprehensive guide breaks down every IAM category—from traditional workforce identity to emerging AI agents. Learn how CIAM, PAM, Zero Trust, and 15+ other solutions connect in the modern security ecosystem. 🔐 Identity management has grown from simple password systems into a complex web of specialized tools and technologies. Each piece serves a specific purpose, but understanding how they all fit together can be confusing. This guide

Secure boot certificate rollover is real but probably won't hurt you

LWN wrote an article which opens with the assertion "Linux users who have Secure Boot enabled on their systems knowingly or unknowingly rely on a key from Microsoft that is set to expire in September". This is, depending on interpretation, either misleading or just plain wrong, but also there's not a good source of truth here, so.First, how does secure boot signing work? Every system that supports UEFI secure boot ships with a set of trusted certificates in a database called "db". Any binary sig

Cedana (YC S23) Is Hiring a Systems Engineer

At Cedana, we are solving what many thought was impossible: the seamless, live migration of active CPU+GPU containers across global compute. We're building the next generation of AI orchestration systems, founded on our pioneering work in checkpoint/restore technology. This isn't just an incremental improvement; it's a fundamental shift that makes distributed computing truly portable, elastic, and resilient across planet scale compute. This is an exceptionally difficult systems problem that req

Elements of System Design

Elements of System Design System design is often taught through domain-specific solutions specific to particular domains, such as databases, operating systems, or computer architecture, each with its own methods and vocabulary. While this diversity is a strength, it can obscure cross-cutting principles that recur across domains. This paper proposes a preliminary taxonomy of system design principles distilled from several domains in computer systems. The goal is a shared, concise vocabulary that

A Periodic Table of System Design Principles

Towards a Periodic Table of System Design Principles System design is often taught through domain-specific solutions specific to particular domains, such as databases, operating systems, or computer architecture, each with its own methods and vocabulary. While this diversity is a strength, it can obscure cross-cutting principles that recur across domains. This paper proposes a preliminary “periodic table” of system design principles distilled from several domains in computer systems. The goal i

Russian airline Aeroflot grounds dozens of flights after cyberattack

Aeroflot, Russia's flag carrier, has suffered a cyberattack that resulted in the cancellation of more than 60 flights and severe delays on additional flights. Although official sources from Russia, like the General Prosecutor's Office, did not attribute the attack to specific threat groups or even origin, responsibility was taken by Ukrainian and Belarusian hacktivist collectives 'Silent Crow' and 'Cyberpartisans BY.' The latter are known for previous attacks on the Belarusian Railway, the cou

Debian plots fix for Y2K38 bug by upgrading to 64-bit timekeeping

The big picture: On January 19, 2038, at 03:14:07 UTC, certain Unix-based computer systems will encounter a critical timekeeping failure. Due to a software flaw known as the "Y2K38 bug," 32-bit Unix-like operating systems will reset their internal clocks to the start of the Unix epoch – January 1, 1970 – and begin counting time from there again. While the consequences could be widespread, developers are already working on fixes to ensure systems continue to track time correctly. The Year 2038 p

13 tech trends to watch now, according to McKinsey (and no, it's not all AI)

MF3d / Getty Images When we hear the word "technology," most of us automatically think of hardware; the physical devices that have become such a conspicuously present part of many of our day-to-day lives. But technology is a much more expansive phenomenon, encompassing not only all the various tools and gadgets we can clearly see, but also a vast and mostly invisible digital infrastructure of software and code upon which our modern world is based. When trying to understand technological change

Thunder Compute (YC S24) Is Hiring a C++ Systems Engineer

C++ Systems Engineer (Full-Time) Company Thunder Compute is a GPU cloud platform built on custom virtualization that delivers 5x better margins than competitors. 4-person team, seed-funded (approaching series A), 100%+ MoM revenue growth. 100% in-person in Atlanta, relocating to SF or NYC within 6 months. The technical challenge: We network-attach GPUs over TCP through API remoting, decoupling GPUs from instances. This lets us oversubscribe hardware aggressively—while Lambda Labs needs 100 G

AI's not the only hot tech trend - check out the year's other 11, according to McKinsey

MicroStockHub/Getty When we hear the word "technology," most of us automatically think of hardware; the physical devices that have become such a conspicuously present part of many of our day-to-day lives. But technology is a much more expansive phenomenon, encompassing not only all the various tools and gadgets we can clearly see, but also a vast and mostly invisible digital infrastructure of software and code upon which our modern world is based. When trying to understand technological change

US nuclear weapons agency breached using Microsoft SharePoint hack

The US government agency in charge of designing and maintaining nuclear weapons was among those breached by a hack of Microsoft's SharePoint server software, Bloomberg reported. However, attackers weren't able to obtain any sensitive or classified information, according to an unnamed source with knowledge of the matter. The breach occurred at the National Nuclear Security Administration, an arm of the Energy Department responsible for producing and dismantling nuclear arms. "On Friday, July 18t

Best Indoor Garden Systems (2025), Tested and Reviewed

FAQ What Are Hydroponics? In the simplest terms, hydroponic gardening means to grow plants without roots in soil. Sometimes the plants are suspended in water, like in the Rise or Gardyn; sometimes they're in pods attached to a wick, like in the Click & Grow; and sometimes they have water sprayed or misted on their roots, like in the Lettuce Grow and Plantaform. Usually this is in concert with an artificial light source, either indoors or in an outdoor enclosure. What Are the Benefits of Hydro