Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: data Clear Filter

Alleged Verizon data breach sees 61M customer records offered for sale [U]

An alleged Verizon data breach has seen hackers offering for sale a database of 61 million customer records, which includes personal information useful for both phishing attempts and identity theft. Update: Verizon told us it has checked the data and it is not from its customers – see the end of the piece. The sample data supplied includes name, full postal address, date of birth, email address, phone number(s), tax identification code, and other ID codes. Security researchers at SafetyDetect

Esse Health says recent data breach affects over 263,000 patients

Esse Health, a healthcare provider based in St. Louis, Missouri, is notifying over 263,000 patients that their personal and health information was stolen in an April cyberattack. As the largest independent physicians' group in the Greater St. Louis area, Esse Health operates 50 locations and employs over 100 physicians. The organization was made aware of a breach after the attackers took down some primary patient-facing network systems and its phone systems on April 21. Impacted systems were

Pbf2sqlite: Reading OpenStreetMap into a SQLite Database

pbf2sqlite A simple command line tool for reading OpenStreetMap .osm.pbf files into a SQLite database. Usage: pbf2sqlite DATABASE [OPTION ...] Options: read FILE Reads .osm or .osm.pbf FILE into the database rtree Add R*Tree indexes addr Add address tables graph Add graph table The command pbf2sqlite test.db read country.osm.pbf reads the OSM PBF file country.osm.pbf and creates in the database test.db the tables. OSM data can be obtained from a provider such as Geofabrik.

Topics: add database file osm pbf

First-Class Models: The Missing Productivity Revolution

TL;DR: First-class models with branching and merging capabilities represent an almost entirely unused enormous productivity and expressiveness unlock in programming and computer systems. The Current State: Well-Designed Systems, Constrained Users Imagine you’re building an accounting system from scratch. You’d design it properly: a normalized database schema, algebraically defined operations for debits and credits, account reconciliation, and comparison functions. You’d implement data-only, in

Genesis AI launches with $105M seed funding from Eclipse, Khosla to build AI models for robots

Genesis AI, a startup that aims to build a foundational model for powering all kinds of robots, has emerged from stealth with a giant $105 million seed round co-led by Eclipse Ventures and Khosla Ventures. Founded last December by Zhou Xian (pictured above, left), a Ph.D. in robotics from Carnegie Mellon University, and Théophile Gervet, a former research scientist with the French AI lab Mistral, the startup wants to build a general-purpose model that will enable robots to automate a wide range

Web giant Cloudflare to block AI bots from scraping content by default

In this article NET Follow your favorite stocks CREATE FREE ACCOUNT Jaque Silva | Nurphoto | Getty Images Internet firm Cloudflare will start blocking artificial intelligence crawlers from accessing content without website owners' permission or compensation by default, in a move that could significantly impact AI developers' ability to train their models. Starting Tuesday, every new web domain that signs up to Cloudflare will be asked if they want to allow AI crawlers, effectively giving them

There are no new ideas in AI, only new datasets

Most people know that AI has made unbelievable progress over the last fifteen years– especially in the last five. It might feel like that progress is *inevitable* – although large paradigm-shift-level breakthroughs are uncommon, we march on anyway through a stream of slow & steady progress. In fact, some researchers have recently declared a “Moore’s Law for AI” where the computer’s ability to do certain things (in this case, certain types of coding tasks) increases exponentially with time: the

T-Mobile Data Breach Settlement Checks Are Showing Up: Here's What to Know

Could you use a little extra money this summer? Check your bank account -- there may be an unexpected deposit from a company you may not recognize. It could be the money you're due from T-Mobile's 2022 class-action settlement. Those who qualify were told to expect settlement checks in April, but then that was moved to May. And now, in mid-June, as cited by Android Authority, Reddit users are saying they are seeing money in their bank accounts. Some are saying they received $56, but others are re

The original LZEXE (A.K.A. Kosinski) compressor source code has been released

Last year, I discovered that the Kosinski compression format is actually LZEXE, which was used for compressing DOS executables back in the 90s and the late 80s. Its developer catalogues three versions on his website: v0.90, v0.91, and v0.91e. While only binaries of v0.91 and v0.91e can be found on the website, v0.90 can be found mirrored on various other websites. I got in touch with LZEXE’s developer, Fabrice Bellard, and he was able to release LZEXE’s source code, untouched since 1990! It i

Topics: code data source used v0

People Keep Inventing Prolly Trees

Multiple Discovery refers to when a scientific discovery is made independently by multiple individuals around the same time. The most well-known examples are Isaac Newton and Gottfried Leibniz's independent invention of calculus, and Charles Darwin and Alfred Russel Wallace's independent formulation of the theory of evolution. (Source: https://xkcd.com/626/) There's even a hypothesis that multiple discovery is the norm, rather than an exception: that invention is an result of social conditions

My Database Is My Application: Rethinking Webhook Logic with DuckDB and SQL

My Database is My Application: Rethinking Webhook Logic with DuckDB and SQL Sat May 10 2025 • duckdbsqlwebhooks Back Imagine you need to build a system for processing incoming webhooks. You're probably picturing a familiar setup: a lightweight web server (FastAPI, Flask, Express.js, etc.), some Python (or Node.js, or Go) handlers to parse JSON, a sprinkle of business logic, and then maybe persisting data to a traditional database like PostgreSQL or MySQL. Perhaps you'd toss events onto a messa

The Original LZEXE (A.K.A. Kosinski) Compressor Source Code Has Been Released

Last year, I discovered that the Kosinski compression format is actually LZEXE, which was used for compressing DOS executables back in the 90s and the late 80s. Its developer catalogues three versions on his website: v0.90, v0.91, and v0.91e. While only binaries of v0.91 and v0.91e can be found on the website, v0.90 can be found mirrored on various other websites. I got in touch with LZEXE’s developer, Fabrice Bellard, and he was able to release LZEXE’s source code, untouched since 1990! It i

Topics: code data source used v0

There are no new ideas in AI only new datasets

Most people know that AI has made unbelievable progress over the last fifteen years– especially in the last five. It might feel like that progress is *inevitable* – although large paradigm-shift-level breakthroughs are uncommon, we march on anyway through a stream of slow & steady progress. In fact, some researchers have recently declared a “Moore’s Law for AI” where the computer’s ability to do certain things (in this case, certain types of coding tasks) increases exponentially with time: the

Datadog's $65M/year customer mystery solved

The internet has been speculating the past few days on which crypto company spent $65M on Datadog in 2022. I confirmed it was Coinbase, and here are the details of what happened. Originally published on 11 May 2023. 👋 Hi, this is Gergely with a bonus, free issue of the Pragmatic Engineer Newsletter. We cover one out of six topics in today’s subscriber-only The Scoop issue. To get full newsletters twice a week, subscribe here. Datadog is a leading observability tooling provider which went publi

I write type-safe generic data structures in C

June 25, 2025・7 minute read I write type safe generic data structures in C using a technique that I haven’t seen elsewhere. It uses unions to associate type information with a generic data structure, but we’ll get to that. My approach works for any type of data structure: maps, arrays, binary trees… but for this article I illustrate the ideas by implementing a basic linked list. Since many people aren’t aware you can do C generics at all, I figured I’d start simple and build up to this: typede

Topics: data foo list node type

Germany asks Google, Apple to remove DeepSeek AI from app stores

The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application stores due to GDPR violations. The commissioner, Meike Kamp, alleges that DeepSeek’s owner, Hangzhou DeepSeek Artificial Intelligence, based in Beijing, unlawfully collects data from German users and transfers them for processing in servers in China. As per the GDPR and Article 46 (1) specifically, any personal data collected from individuals in the Eur

Forecasters to Lose Hurricane Satellite Data at the Worst Possible Time

In one month, the National Oceanic and Atmospheric Administration (NOAA) and its National Hurricane Center (NHC) will lose access to critical satellite data that lets meteorologists see inside the eye of a storm. This marks the latest blow to the agency’s forecasting abilities as hurricane season gets underway. In an abrupt move that blindsided meteorologists and public officials on Wednesday, June 25, the Navy’s Fleet Numerical Meteorology and Oceanography Center (FNMOC) announced it was shutt

US lawmakers allege that OnePlus phones transmit data to Chinese servers without user consent

A pair of US lawmakers have called on the US Department of Commerce to investigate OnePlus over allegations that the company's devices transmit data to Chinese servers without user consent, according to a report by Reuters . This is a bipartisan effort, with Republican Representative John Moolenaar (MI) and Democratic Representative Raja Krishnamoorthi (IL) spearheading the calls for an investigation. There's no actual data to go along with these allegations, but the lawmakers claim to have see

A CarFax for Used PCs; Hewlett Packard wants to give old laptops new life

The United Nations’ Global E-waste Monitor estimates that the world generates over 60 million metric tons of e-waste annually. Furthermore, this number is rising five times faster than e-waste recycling. Much of this waste comes from prematurely discarded electronic devices. Many enterprises follow a standard three-year replacement cycle, assuming older computers are inefficient. However, many of these devices are still functional and could perform well with minor upgrades or maintenance. The i

I Write Type Safe Generic Data Structures in C

June 25, 2025・7 minute read I write type safe generic data structures in C using a technique that I haven’t seen elsewhere. It involves unions and typeof , but we’ll get to that. My approach works for any type of data structure: maps, arrays, binary trees… but for this article I illustrate the ideas by implementing a basic linked list. Since many people aren’t aware you can do C generics at all, I figured I’d start simple and build up to this: typedef struct { int value ; } Foo ; List ( int )

Topics: data foo list node type

There Are No New Ideas in AI Only New Datasets

Most people know that AI has made unbelievable progress over the last fifteen years– especially in the last five. It might feel like that progress is *inevitable* – although large paradigm-shift-level breakthroughs are uncommon, we march on anyway through a stream of slow & steady progress. In fact, some researchers have recently declared a “Moore’s Law for AI” where the computer’s ability to do certain things (in this case, certain types of coding tasks) increases exponentially with time: the

Switzerland says government data stolen in ransomware attack

The government in Switzerland is informing that sensitive information from various federal offices has been impacted by a ransomware attack at the third-party organization Radix. The hackers have stolen data from Radix systems and later leaked it on the dark web, the Swiss government says. The exposed data is being analyzed with the help of the country’s National Cyber Security Centre (NCSC) to determine which government agencies are impacted and to what effect. “The foundation Radix has been

Data Centers, Temperature, and Power

It’s easy to open a data center, right? All you have to do is connect a bunch of hard drives to power and the internet, find a building, and you’re off to the races. Well, not exactly. Building and using one Storage Pod is quite a bit different than managing exabytes of data. As the world has grown more connected, the demand for data centers has grown—and then along comes artificial intelligence (AI), with processing and storage demands that amp up the need even more. That, of course, has real

Alleged Verizon data breach sees 61M customer records offered for sale

An alleged Verizon data breach has seen hackers offering for sale a database of 61 million customer records, which includes personal information useful for both phishing attempts and identity theft. The sample data supplied includes name, full postal address, date of birth, email address, phone number(s), tax identification code, and other ID codes … Security researchers at SafetyDetectives said that the data was being offered for sale, but the samples posted were too small to confirm the vera

US lawmakers call for federal probe into OnePlus

Joe Maring / Android Authority TL;DR Two US lawmakers have asked the Commerce Department to investigate OnePlus phones for potential security risks. Their concern is based on an analysis shared by an unnamed firm suggesting that OnePlus may be collecting and sending sensitive user data to servers in China without user consent. US lawmakers have reportedly requested the Commerce Department to investigate whether OnePlus phones sold in the country pose security risks. The request reportedly co

Use keyword-only arguments in Python dataclasses

Python dataclasses are a really nice feature for constructing classes that primarily hold or work with data. They can be a good alternative to using dictionaries, since they allow you to add methods, dynamic properties, and subclasses. They can also be a good alternative to building your own class by hand, since they don’t need a custom __init__() that reassigns attributes and provide methods like __eq__() out of the box. One small tip to keeping dataclasses maintainable is to always construct

Loss of key US satellite data could send hurricane forecasting back 'decades'

A critical US atmospheric data collection program will be halted by Monday, giving weather forecasters just days to prepare, according to a public notice sent this week. Scientists that the Guardian spoke with say the change could set hurricane forecasting back “decades”, just as this year’s season ramps up. In a National Oceanic and Atmospheric Administration (Noaa) message sent on Wednesday to its scientists, the agency said that “due to recent service changes” the Defense Meteorological Sate

The unbearable obviousness of AI fitness summaries

is a senior reporter focusing on wearables, health tech, and more with 13 years of experience. Before coming to The Verge, she worked for Gizmodo and PC Magazine. After nearly a decade of wearables testing, I’ve amassed a truly terrifying amount of health and fitness data. And while I enjoy poring over my daily data, there’s one part I’ve come to loathe: AI summaries. Over the last two years, a deluge of AI-generated summaries has been sprinkled into every fitness, wellness, and wearable app.

Topics: ai data insights oura run

Need a good alternative to the big three? These carriers are my top 3 recommendations

Edgar Cervantes / Android Authority For years, many of us have gone directly to the big carriers for phone service. But with rising costs and the gradual disappearance of extras like streaming perks, is it time to consider an alternative? While it’s true that Verizon, AT&T, and T-Mobile control the only three mobile networks with wide national coverage, there are plenty of other carriers that piggyback off this same infrastructure. These providers can offer much cheaper alternatives to traditi

What LLMs Know About Their Users

We need to talk about data integrity. Narrowly, the term refers to ensuring that data isn’t tampered with, either in transit or in storage. Manipulating account balances in bank databases, removing entries from criminal records, and murder by removing notations about allergies from medical records are all integrity attacks. More broadly, integrity refers to ensuring that data is correct and accurate from the point it is collected, through all the ways it is used, modified, transformed, and eve