Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: inf Clear Filter

How CISOs became the gatekeepers of $309B AI infrastructure spending

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Enterprise AI infrastructure spending is expected to reach $309 billion by 2032. The winners won’t be determined by who has the best models; it’ll come down to who controls the infrastructure layer that makes AI operational at scale. Security vendors are making the most aggressive moves. Palo Alto Networks, CrowdStrike and Cisco each repo

How a data processing problem at Lyft became the basis for Eventual

When Eventual founders Sammy Sidhu and Jay Chia were working as software engineers at Lyft’s autonomous vehicle program, they witnessed a brewing data infrastructure problem — and one that would only become larger with the rise of AI. Self-driving cars produce a ton of unstructured data from 3D scans and photos to text and audio. There wasn’t a tool for Lyft engineers that could understand and process all of those different types of data at the same time — and all in one place. This left engine

SourceHut moves business operations from US to Europe

[PATCH sr.ht-docs v2] Terms of service & privacy updates Export this patch --- v2: rollback the premature removal of compliance with US law Will defer this until we finish shutting down the US business entity entirely. privacy.md | 70 +++++++++++++++++++++++ ------------------------------- terms.md | 68 ++++++++++++++++++++++++++++ ------------------------ 2 files changed, 67 insertions(+), 71 deletions(-) diff --git a/privacy.md b/privacy.md index ab96a1f..ed6eb5c 100644 --- a/privacy.md +++ b

Fairphone 6 is switching to a new design that's even more sustainable

What you need to know Leaked renders reveal a modular design for the Fairphone 6, allowing for easy replacement of components. The Fairphone 6 is expected to feature a new design with flat edges and a distinct neon-themed power button, available in black, white, and green color options. The Fairphone 6 is rumored to launch on June 25th starting at €549, and could include a 6.31-inch pOLED 120Hz display, Snapdragon 7s Gen 3, and a 4415mAh battery. Fairphone is expected to launch its sixth sus

Hawaii Highways

Aloha! Click the dark green buttons on the left for lists of the Interstate, state, and some county highways on the Big Island (Hawaii island), Maui, Lanai and Molokai, Kauai, and Oahu. Go to those lists for detailed information on specific routes, including route numbers, names, termini, mileages, and sometimes historical or other information and/or links to photos and other material elsewhere on this site. Also on the left is a button for detailed guides to Oahu Freeways exits and interchange

Tesla launches robotaxi rides in Austin with big promises and unanswered questions

Tesla has started giving rides in driverless Model Y SUVs in Austin, a decade after CEO Elon Musk began making — and breaking — myriad promises about his company’s ability to launch such a service. The rollout will become the first big test of Musk’s belief that it’s possible to safely deploy fully autonomous vehicles using just cameras and end-to-end AI – an approach that differs from other players in the space like Waymo. On Sunday, numerous videos shared on social media as well as sources i

16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

28 Years Later is a bleak fever dream with rage pumping through its veins

is a reporter focusing on film, TV, and pop culture. Before The Verge, he wrote about comic books, labor, race, and more at io9 and Gizmodo for almost five years. While it wasn’t the first film to feature fast-moving ghouls, there is no denying how much of an impact 28 Days Later had on modern zombie movies. It was a gripping and nauseating wonder, whose action felt uniquely visceral thanks, in part, to director Danny Boyle’s inspired use of a digital video camera. And there was a gut-wrenching

Why ether ETF inflows have come roaring back from the dead

In this article ETH.CM= Follow your favorite stocks CREATE FREE ACCOUNT Omar Marques | Lightrocket | Getty Images Ether ETFs have finally come to life this year after some started to fear they may be becoming zombie funds. Collectively, the funds tracking the price of spot ether are on pace for their sixth consecutive week of inflows and eight positive week in the last nine, according to SoSoValue. The second largest cryptocurrency has become more attractive to institutions in recent weeks lar

16 billion passwords leaked from Apple, Google, more: Here are the facts and how to protect yourself

Moor Studio/Getty With so much news about data breaches, you have to be careful not to panic each time you hear of a new one. Take the latest report of a major breach. In the headline for a recent story published by Cybernews, the cybersecurity media outlet said that 16 billion passwords were exposed in a record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable. Sounds scary, right? But reading the story itself paints a different picture. Also:

No, the 16 billion credentials leak is not a new data breach

News broke today of a "mother of all breaches," sparking wide media coverage filled with warnings and fear-mongering. However, it appears to be a compilation of previously leaked credentials stolen by infostealers, exposed in data breaches, and via credential stuffing attacks. To be clear, this is not a new data breach, or a breach at all, and the websites involved were not recently compromised to steal these credentials. Instead, these stolen credentials were likely circulating for some time,

Krispy Kreme says November data breach impacts over 160,000 people

U.S. doughnut chain Krispy Kreme confirmed that attackers stole the personal information of over 160,000 individuals in a November 2024 cyberattack. The American multinational coffeehouse chain employed 22,800 people in 40 countries as of December 2023 and operates 1,521 shops and 15,800 points of access. It also manages four "Doughnut Factories" in the United States and 37 others internationally, and it partners with McDonald's to have its products sold in thousands of McDonald's locations wo

Fed Rate Cuts Unlikely This Summer. Are Lower Mortgage Rates Still Possible?

The Fed's interest rate decisions impact mortgages, but the relationship isn't straightforward. Tharon Green/CNET There's a wild amount of uncertainty in today's economy, but one thing is clear: The Federal Reserve isn't planning to lower interest rates this summer. Mortgage rates, which have been stuck near 7% for the past several months, are likely to stay higher for longer. On June 18, Fed officials voted to leave borrowing rates unchanged for a fourth consecutive meeting. Holding interest

Writing documentation for AI: best practices

Retrieval-Augmented Generation (RAG) systems like Kapa rely on your documentation to provide accurate, helpful information. When documentation serves both humans and machines well, it creates a self-reinforcing loop of content quality: clear documentation improves AI answers, and those answers help surface gaps that further improve the docs. This guide provides best practices for creating documentation that works effectively for both human readers and AI/LLM consumption in RAG systems. Many bes

A Vaccine for Yeast Infections Could Soon Be Reality

Hold your horses, The Last of Us. Scientists have created an experimental vaccine that could be effective against multiple types of fungal germs, including those that cause vaginal yeast infections. Researchers at the University of Georgia developed the vaccine candidate, code-named NXT-2. In their latest study with mice, NXT-2 appeared to protect the animals from a common culprit of yeast infection, Candida albicans. The team is now planning to forge ahead with human trials of the vaccine. Co

Foundry (YC F24) Hiring Early Engineer to Build Web Agent Infrastructure

Location: San Francisco, CA Why Foundry Exists: Most of what people do at work sucks—it's manual, repetitive, and wastes time. Recruiters spend hours every day on LinkedIn, CRMs, email, and tedious data entry tasks instead of focusing on the things humans actually do well: building relationships, strategy, and decision-making. We're building tools so that AI agents can use web browsers exactly like humans, navigating enterprise apps like Salesforce, SAP, or Workday without constant manual inte

Alleged Minnesota Shooter Used Data Brokers to Find Lawmakers’ Addresses

Vance Boelter, the man accused of assassinating a Democratic Minnesota state representative and shooting a state senator on Sunday, acquired the addresses of his victims and other alleged targets by using information collected by online data brokers, according to court documents obtained by Politico. According to the report, police found the names of 11 registered data brokers written in a notebook that was recovered from Boelter’s vehicle. He also allegedly wrote, “most property records in Ame

Security Bite: Infostealer malware spikes 28% among Mac users, says Jamf

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Appl

UK watchdog fines 23andMe for 'profoundly damaging' data breach

UK watchdog fines 23andMe for 'profoundly damaging' data breach 17 minutes ago Share Save Liv McMahon Technology reporter Share Save Getty Images DNA testing firm 23andMe has been fined £2.31m by a UK watchdog over a data breach in 2023 which affected thousands of people. The Information Commissioner's Office (ICO) said the company - which has since filed for bankruptcy - failed to put adequate measures in place to secure sensitive user data prior to the incident. "This was a profoundly damag

What I talk about when I talk about IRs

I have a lot of thoughts about the design of compiler intermediate representations (IRs). In this post I’m going to try and communicate some of those ideas and why I think they are important. The overarching idea is being able to make decisions with only local information. That comes in a couple of different flavors. We’ll assume that we’re compiling a method at a time, instead of a something more trace-like (tracing, tracelets, basic block versioning, etc). Control-flow graphs A function wi

Cutting cloud waste at scale: Akamai saves 70% using AI agents orchestrated by kubernetes

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Particularly in this dawning era of generative AI, cloud costs are at an all-time high. But that’s not merely because enterprises are using more compute — they’re not using it efficiently. In fact, just this year, enterprises are expected to waste $44.5 billion on unnecessary cloud spending. This is an amplified problem for Akamai Technol

Groq just made Hugging Face way faster — and it’s coming for AWS and Google

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Groq, the artificial intelligence inference startup, is making an aggressive play to challenge established cloud providers like Amazon Web Services and Google with two major announcements that could reshape how developers access high-performance AI models. The company announced Monday that it now supports Alibaba’s Qwen3 32B language mode

Google Adds Button to Generate Error-Laden AI Podcast About Your Search Results Instead of Just Reading Them Like a Functioning Member of Society

Google has released a baffling new AI feature that turns your web search into a podcast. Why anybody would want to enable the feature is unclear. Why be plagued by misleading and hallucinated AI Overviews search results when you can have a robotic voice read them out loud instead? Have we really lost the ability as a species to parse written information, nevermind original sources? The opt-in feature — which currently lives inside Google's experimental "Labs" section and has to be manually tur

How to download your information from Facebook

Once upon a time Facebook was filled with posts about the minutiae of your day and album after album of photos of just about every experience you had. By now, a lot of this media is likely hidden with the "only me" setting. But, regardless of how much you use Facebook these days, it's probably home to a lot of memories you want to hold on to — or at least have the opportunity to laugh at later. The good news is that you can download your Facebook information. You can access things such as your

No Fed Cut, No Rate Break: June Mortgage Forecast Stays Flat

As the Federal Reserve likely holds interest rates steady, mortgage rates are expected to stay in a narrow range. Tharon Green/CNET With each passing day, it seems like average 30-year mortgage rates could remain stuck near 6.8% for the rest of the year. Yet conflicting economic forces could push mortgage rates up or down in the coming months. Housing market experts say the same thing: The direction of mortgage rates depends on the economic impact of policies by the Trump administration and th

Social Media Replaced Zines. Now Zines Are Taking the Power Back

One sunny afternoon in May, a century-old power plant in Brooklyn was buzzing—not with electricity, but with hundreds of creatives congregating at the Black Zine Fair. Handmade booklets piled up on table after table, forming vast paper topographies of politics and activism and culture. Marginalized groups in skating! Fictional characters “that probably made me queer”! Someone else presented zines dedicated to all the TV shows they had recorded onto VHS. Still more tables hosted zine assembly. Ev

Delightfully irreverent Underdogs isn’t your parents’ nature docuseries

National Geographic/Eleanor Paish Madagascar's aye-aye: "as if fear and panic had a baby and rolled it in dog hair" Madagascar's aye-aye: "as if fear and panic had a baby and rolled it in dog hair" National Geographic/Eleanor Paish National Geographic/Simon De Glanville An emerald jewel wasp emerges from a cockroach. An emerald jewel wasp emerges from a cockroach. National Geographic/Simon De Glanville National Geographic/Tom Walker A pack of African hunting dogs is no match for the honey badger

The Algebra of an Infinite Grid of Resistors

The Algebra of an Infinite Grid of Resistors In a previous note we discussed the well-known problem of determining the resistance between two nodes of an “infinite” square lattice of resistors. The most common approach is to superimpose two “monopole” solutions, one representing the field for one amp of current entering a given node and flowing “to infinity”, and the other representing the field for one amp of current being withdrawn from a given node flowing in from infinity. If the two nodes

Infineon security microcontroller flaw enabled extraction of TPM secret keys

A few months ago, security researcher Thomas Roche presented his fundamental research on secure elements used in the YubiKey 5. The security element is the Infineon SLE78, which contains a proprietary implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). Using side-channel attacks and a great deal of smart research, the author discovered a vulnerability in Infineon Technologies' cryptographic library and, as a result, was able to extract the ECDSA secret key from the secure