Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ty Clear Filter

The SSO Wall of Shame – Vendors that treat SSO as luxury feature

Why does this exist? Single sign-on (SSO) is a mechanism for outsourcing the authentication for your website (or other product) to a third party identity provider, such as Google, Okta, Entra ID (Azure AD), PingFederate, etc. In this context, SSO refers to a SaaS or similar vendor allowing a business client to manage user accounts via the client’s own identity provider, without having to rely on the vendor to provide strong authentication with audit logs, and with the ability to create and del

Call of Duty Black Ops 7 Beta Dates Have Been Revealed. Here's How to Join

Clear your calendars for early October: The Black Ops 7 beta dates have been revealed on the game's Xbox store listing, and they're only a couple months away. The next Call of Duty game is a collaboration between developers Treyarch and Raven Software, and it takes place after Black Ops 2 in the series' chronology. While the Black Ops games jump around a confusing timeline, Black Ops 7 is a direct sequel to a 13-year-old game. The game's beta will focus on classic Call of Duty multiplayer mode

Topics: beta black duty game ops

Call of Duty: Black Ops 7 arrives on November 14

Call of Duty: Black Ops 7 will launch on November 14. Microsoft revealed the release date for the upcoming shooter sequel alongside a new trailer during Opening Night Live at Gamescom 2025. Notably, while Black Ops 7 will be on PC, PlayStation and Xbox at launch, it'll skip the Switch 2, despite a binding legal agreement between Microsoft and Nintendo that requires that the company's consoles receive the same access to Call of Duty as Xbox. Similar to past games in the series, Call of Duty: Bla

Call of Duty Black Ops 7 Beta Dates Revealed. Here's How To Join

Clear your calendars for early October: The Black Ops 7 beta dates have been revealed on the game's Xbox store listing, and they're only a couple months away. The next Call of Duty game is a collaboration between developers Treyarch and Raven Software, and it takes place after Black Ops 2 in the series' chronology. While the Black Ops games jump around a confusing timeline, Black Ops 7 is a direct sequel to a 13-year-old game. The game's beta will focus on classic Call of Duty multiplayer mode

Topics: beta black duty game ops

Next Apple Watch activity challenge supports national parks

Apple Watch users can mark their calendars for the next activity challenge. The 2025 National Parks Challenge is set for this Sunday, August 24. Here’s the description for the upcoming Apple Watch activity challenge: On August 24, let’s celebrate the great outdoors and the world’s national parks. Earn this award by recording any workout of 20 minutes or more with any app that adds workouts to Health. This particular challenge supports any workout type, as long as the duration is at least 20 m

Silicon Valley Is Panicking About Zohran Mamdani. NYC's Tech Scene Is Not

In the weeks since Zohran Mamdani’s New York City Democratic primary win on June 20, a slew of tech executives who do not have a primary residence in the city or state of New York have been panicking about the prospect of him becoming mayor. Every member of the popular All-In podcast, including current White House “AI and crypto czar” David Sacks, has raised alarms on X about the prospect of a Mamdani mayoralty. “Wake up, Silicon Valley,” Sacks posted on June 29, sharing a video of Mamdani on

Staff disquiet as Alan Turing Institute faces identity crisis

When the UK government announced the creation of the Alan Turing Institute in 2014 it promised a “fitting memorial” to the renowned computer scientist and artificial intelligence pioneer. More than a decade on, Britain’s leading AI institute is in turmoil as staff warn it may be in danger of collapse and ministers demand a shift in focus to defence and security work. “The ATI brand is well recognised internationally,” says Dame Wendy Hall, a professor of computer science at the University of S

A renovation project in Turkey led to the discovery of a lost city (2023)

We live cheek by jowl with undiscovered worlds. Sometimes the barriers that separate us are thick, sometimes they’re thin, and sometimes they’re breached. That’s when a wardrobe turns into a portal to Narnia, a rabbit hole leads to Wonderland, and a Raquel Welch poster is all that separates a prison cell from the tunnel to freedom. A Fateful Swing of the Hammer Those are all fictional examples. But in 1963, that barrier was breached for real. Taking a sledgehammer to a wall in his basement, a

Elastic rejects claims of a zero-day RCE flaw in Defend EDR

Enterprise search and security company Elastic is rejecting reports of a zero-day vulnerability impacting its Defend endpoint detection and response (EDR) product. The company's statement follows a blog post from a company called AshES Cybersecurity claiming to have discovered a remote code execution (RCE) flaw in Elastic Defend that would allow an attacker to bypass EDR protections. Elastic’s Security Engineering team "conducted a thorough investigation" but could not find "evidence supportin

Hallucinations in AI Models: What They Mean for Software Quality and Trust

Modern businesses are rushing to adopt artificial intelligence (AI) technologies, but this rapid integration comes with unexpected challenges. A phenomenon known as “hallucinations” occurs in large language models (LLMs) and deep learning systems and threatens software quality and trust. These hallucinations occur when AI presents false information as fact. The damage extends beyond technical failures, as user trust erodes, brand reputations suffer, and ethical questions multiply. Practical appr

Silicon Valley Is Panicking About Zohran Mamdani. NYC’s Tech Scene Is Not

In the weeks since Zohran Mamdani’s New York City Democratic primary win on June 20, a slew of tech executives who do not have a primary residence in the city or state of New York have been panicking about the prospect of him becoming mayor. Every member of the popular All-In podcast, including current White House “AI and crypto czar” David Sacks, has raised alarms on X about the prospect of a Mamdani mayoralty. “Wake up, Silicon Valley,” Sacks posted on June 29, sharing a video of Mamdani on

Trump administration eyes 10% stake in Intel using CHIPS Act funds, stock slides

A few days ago, news broke that following a meeting with Intel CEO Lip-Bu Tan, the Trump administration was looking to take an unspecified stake in Intel. Now, Bloomberg says the number being discussed is around $10.5 billion. Here are the details. Not what the market seemed to be expecting Intel stock slid today, following Bloomberg‘s report that the Trump administration was considering converting Intel’s $10.9 billion CHIPS Act funding into an equity stake, potentially giving the U.S. govern

Left to Right Programming

2025-08-17 Left to Right Programming Programs Should Be Valid as They Are Typed I don’t like Python’s list comprehensions: text = "apple banana cherry dog emu fox" words_on_lines = [ line . split ( ) for line in text . splitlines ( ) ] Don’t get me wrong, declarative programming is good. However, this syntax has poor ergonomics. Your editor can’t help you out as you write it. To see what I mean, lets walk through typing this code. words_on_lines = [ l Ideally, your editor would be to aut

Left to Right Programming: Programs Should Be Valid as They Are Typed

2025-08-17 Left to Right Programming Programs Should Be Valid as They Are Typed I don’t like Python’s list comprehensions: text = "apple banana cherry dog emu fox" words_on_lines = [ line . split ( ) for line in text . splitlines ( ) ] Don’t get me wrong, declarative programming is good. However, this syntax has poor ergonomics. Your editor can’t help you out as you write it. To see what I mean, lets walk through typing this code. words_on_lines = [ l Ideally, your editor would be to aut

Over 800 N-able servers left unpatched against critical flaws

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week. N-central is a popular platform used by many managed services providers (MSPs) and IT departments to monitor and manage networks and devices from a centralized web-based console. Tracked as CVE-2025-8875 and CVE-2025-8876, the two flaws can let authenticated attackers to inject commands due to improper sanitization of user input and execute commands on

Countrywide natural experiment links built environment to physical activity

Study design We conducted a countrywide, prospective, longitudinal physical activity study of US residents that evaluated their physical activity levels within the context of the walkability of their built environments before and after relocation (‘participants’). We leveraged the naturally occurring physical activity data that was captured by a health app on participants’ phones to compare each person’s physical activity levels before and after they relocated to a different area within the USA

Typechecker Zoo

This is a pet project of mine I’ve been working on for a while. We’re going to create minimal implementations of the most successful static type systems of the last 50 years. This will involve making toy implementations of programming languages and the core typechecking algorithms. These obviously have evolved a lot over the years, so we’ll start with the simple ones and proceed all the way up to modern dependent types. Basically a fun romp through half a century of programming language design.

Texas law gives grid operator power to disconnect data centers during crisis

Dive Brief: Data centers and other large, non-critical power consumers connected to the Electric Reliability Council of Texas transmission grid must accept curtailment during firm load shed events under a landmark law Republican Gov. Greg Abbott signed Friday. Senate Bill 6 pairs mandatory curtailment with a voluntary demand response procurement program under which loads of 75 MW or more could ramp down or switch to backup generation at utilities’ request. It also includes new interconnection

Perplexity now supports live earnings call transcripts for Indian stocks

In Brief AI startup Perplexity is augmenting its Finance dashboard with live transcriptions of Indian public companies’ quarterly earnings calls, as well as a calendar to show schedules for post-results conference calls. Alongside surfacing news about the markets, Perplexity’s Finance dashboard shows market summaries, stock exchange charts, and top performing stocks. The dashboard also lets users create stock watchlists, track sector performance, and see cryptocurrency performance. Until now,

MCP tools with dependent types

August 17, 2025 MCP tools with dependent types This summer, I’ve been playing a bit with writing an MCP server for Defold editor. The idea was to give Claude access to evaluating Lua code in the editor scripting context, so it can use the APIs available for querying and modifying game content. The best word to describe the experience is entertaining — it has a very vague idea of the available APIs, and prefers to experiment by evaluating code instead of browsing documentation, which results in

MCP Tools and Dependent Types

August 17, 2025 MCP tools with dependent types This summer, I’ve been playing a bit with writing an MCP server for Defold editor. The idea was to give Claude access to evaluating Lua code in the editor scripting context, so it can use the APIs available for querying and modifying game content. The best word to describe the experience is entertaining — it has a very vague idea of the available APIs, and prefers to experiment by evaluating code instead of browsing documentation, which results in

Fun with Finite State Transducers

ENOSUCHBLOG Programming, philosophy, pedaling. Aug 14, 2025 Tags: devblog, programming, rust, zizmor I recently solved an interesting problem inside zizmor with a type of state machine/automaton I hadn’t used before: a finite state transducer (FST). This is just a quick write-up of the problem and how I solved it. It doesn’t go particularly deep into the data structures themselves. For more information on FSTs themselves, I strongly recommend burntsushi’s article on transducers (which is wha

SystemD Service Hardening

Controversy aside, systemd provides us a very complete, robust method of controlling services (amongst a multitude of other Linux things). For a lot of things though, this is optimized for success out of the box and not necessarily security. Such is the way of many IT endeavors. This doc though is meant to provide a snapshot of a number of hardening options that you can apply to systemd service units and podman quadlets to increase the overall security posture and reduce both the likelihood of c

Comparison of different C libraries providing generic containers capabilities

Introduction The goal of this project is to compare several C libraries that provide some STL like capabilities of the C++ (container template) but are targeting classic C language. A STL like library for C is a C library providing several classic generic containers for the C language, like vector, list, sorted set, unordered_map, and so on. A small benchmark to compare their performance is includes in the bench directory. To do this, the same simple programs will be implemented by the librar

Major Plastics Treaty Ends in Failure

This story was originally published by Grist. Sign up for Grist’s weekly newsletter here. Diplomats from around the world concluded nine days of talks in Geneva — plus a marathon overnight session that lasted into the early hours of Friday — with no agreement on a global plastics treaty. During a closing plenary that started on Friday at 6:30 a.m. — more than 15 hours after it was originally scheduled to begin — nearly all countries opposed an updated draft of the United Nations treaty that wa

Pebblebee Is Getting Serious About Personal Safety Tracking

Think of Bluetooth trackers and safety in the past few years and your first thought might be the misuse of Apple AirTags and similar devices against women in domestic abuse and stalking cases. Alongside collaborative initiatives to counter and shut down these malicious uses (such as the IETF’s Detection of Unwanted Location Trackers, or DULT, standard), tracker makers themselves are flipping the script, turning tech that has been used to monitor women against their will into tech that protects

Princeton NuEnergy's battery recycling tech recovers 97% of lithium-ion material

IN A NUTSHELL 🔋 Princeton NuEnergy launched the first U.S. commercial-scale battery recycling facility in Chester, South Carolina, achieving a recycling yield of over 97% . . 💡 The facility, fully compliant with regulatory standards, is set to expand its capacity to 15,000 tons per annum by 2026 . tons per annum by . 🌱 PNE’s low-temperature plasma-assisted separation process reduces costs by 38% and has a 69% lower environmental footprint compared to conventional methods. and has a lower envi