• Xbox Games Showcase Followed by The Outer Worlds 2 Direct Airs June 8
    Make some space on your calendar – the Xbox Games Showcase 2025 will be livestreamed on Sunday, June 8, starting at 10am Pacific / 1pm Eastern / 6pm UK time. Following in the footsteps of the 2023 Starfield Direct and 2024 Call of Duty: Black Ops 6 Direct, this year we will again have a double feature, with the Xbox Games Showcase immediately followed by The Outer Worlds 2 Direct. It all begins with our annual Xbox Games Showcase, bringing you a look at upcoming titles from across our first-party studios, in addition to incredible new titles from our third-party partners across the globe. This year, the show will be digital-only – our livestream will bring you everything you’ll need to know about what’s next for Xbox, no matter where in the world you’re watching. Immediately following Showcase, The Outer Worlds 2 Direct will bring you inside the walls of Obsidian Entertainment, revealing new gameplay, details, and developer insights, straight from the people making the sequel to the award-winning, first-person sci-fi RPG. You’ll be able to enjoy our June 8 double feature through a variety of outlets, in over 40 languages, as well as American Sign Language, British Sign Language and English Audio Descriptions. These include (but won’t be limited to): Airtime for the Xbox Games Showcase followed by The Outer Worlds 2 Direct in local time zones: PDT: June 8, 10am EDT: June 8, 1pm BST: June 8, 6pm CEST: June 8, 7pm JST: June 9, 2am AEST: June 9, 3am The double-feature broadcast also kicks off a week’s worth of coverage here on Xbox Wire, The Official Xbox Podcast, and the Xbox YouTube channel, featuring updates, exclusive extra details, and deep-dives on many of the games you’ll see in the show. Join us on June 8 for the Xbox Games Showcase followed by The Outer Worlds 2 Direct. Be sure to check back here on Xbox Wire for more information and tune-in details ahead of the show.
    0 التعليقات 0 المشاركات 103 مشاهدة
  • 9TO5MAC.COM
    Analyst believes Apple will ‘absorb most of the cost’ of tariffs, but price hikes still coming
    Massive tariffs imposed by President Trump on the rest of the globe went into effect today. Amidst significant economic uncertainty, many are wondering what this means for the cost of goods in the US—including Apple’s products like the iPhone. One analyst lays out Apple’s tariff response options, and his belief that costs may not rise too badly for consumers. Apple’s tariff response may be more restrained than some expect Jeff Pu at GF Securities has shared a new research note outlining various expected scenarios for Apple’s tariff response. He mentions the following two options as most likely: Apple raises global prices by a small amount (3-6%) to help cover its extra costs in the US or the company raises the US market’s prices by 10-19% In either case, Pu notes, the effect on consumers is better than many have forecasted. That’s because of this key line: We believe that Apple will absorb most of the cost, given that the supply chain’s margin is thin with rising production cost. In other words, Apple can’t offload its extra expenses on supply chain partners—at least not very much. And Pu doesn’t believe Apple can realistically raise prices too much without consumer backlash. He mentions the iPhone already facing a challenging market, in part due to delays with Siri’s AI upgrades causing lukewarm demand. 9to5Mac’s Take While estimates of the iPhone costing as much as $2,300 have been shocking numbers, and no doubt tariffs will have an impact. But ultimately, if Apple raises its prices too much, it will be giving a unique opportunity to other companies who are willing to eat the short-term cost in exchange for larger market share. And if any company has the financial cushion to absorb such additional costs themselves, it’s Apple. So price increases? Yes, but probably not anything too extreme. What do you think of Pu’s expectations for Apple’s response to tariff costs? Let us know in the comments. Best iPhone accessories Add 9to5Mac to your Google News feed.  FTC: We use income earning auto affiliate links. More.You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 التعليقات 0 المشاركات 68 مشاهدة
  • FUTURISM.COM
    Tech CEOs Bent Over Backwards for Trump and Their "Reward" Has Been Horrible
    Tech CEOs spent millions of dollars on donations to president Donald Trump's campaign and inauguration, and by bending the knee after he was elected.But instead of facing a reinvigorated and less regulated tech market in return, they've instead gotten a kick in the teeth.As the New York Times reports, Trump's disastrous tariff war has caused the global stock market to crater, sending economic uncertainty soaring. And the global supply chains that big tech companies have been relying on for decades have been thrown into chaos.Even investment in the hottest thing in tech right now — artificial intelligence — could take a massive hit, as the cost of building out already-expensive data centers is expected to rise dramatically.It's a bizarre situation. Trump himself has appeared keen to keep the AI gravy train going, overseeing the signing of a $500 billion AI infrastructure deal dubbed Stargate. Yet his trade war could make AI companies' commitments difficult to hold up in the longterm as foreign-made chips could soon spike in price.In short, Trump's trade war could lead to a major falling out with big tech. Apple, in particular, has felt the hurt, reportedly flying planes full of iPhones into the US ahead of Trump's latest round of tariffs coming into effect.That's despite Apple CEO Tim Cook cozying up to Trump, donating $1 million to his inauguration and promising to spend half a trillion dollars in the US back in February.But despite paying lip service to the idea of moving manufacturing to the US, Apple hasn't fulfilled that promise for any of its major products.Instead, it tried to lower its reliance on China by moving assembly lines to India and Vietnam instead — countries that have since been hit with 26 and 46 percent tariffs, respectively.Tech CEOs who were hoping to encounter fewer regulatory hurdles with the Trump administration could soon face even more headwinds. The White House has signaled that it's looking to continue Biden-era antitrust cases looking to break up big tech companies, per the NYT."Big Tech has run wild for years, stifling competition in our most innovative sector and, as we all know, using its market power to crack down on the rights of so many Americans, as well as those of Little Tech!" Trump wrote in a January post on Truth Social.In short, tech leaders' efforts to get in the president's good graces are far from paying off.Just last week, Meta CEO Mark Zuckerberg visited the White House to beg him to settle an antitrust lawsuit against the company. Legislators are worried Trump could simply drop the case, an investigation that has been going on for almost six years.Even after prostrating himself to Trump, though, it's easy to imagine that the president will simply allow the case to proceed.Share This Article
    0 التعليقات 0 المشاركات 72 مشاهدة
  • THEHACKERNEWS.COM
    Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots
    Apr 09, 2025The Hacker NewsSecrets Management / DevOps GitGuardian's State of Secrets Sprawl report for 2025 reveals the alarming scale of secrets exposure in modern software environments. Driving this is the rapid growth of non-human identities (NHIs), which have been outnumbering human users for years. We need to get ahead of it and prepare security measures and governance for these machine identities as they continue to be deployed, creating an unprecedented level of security risk. This report reveals an astounding 23.77 million new secrets were leaked on GitHub in 2024 alone. This is a 25% surge from the previous year. This dramatic increase highlights how the proliferation of non-human identities (NHIs), such as service accounts, microservices, and AI agents, are rapidly expanding the attack surface for threat actors. The Non-Human Identity Crisis NHI secrets, including API keys, service accounts, and Kubernetes workers, now outnumber human identities by at least 45-to-1 in DevOps environments. These machine-based credentials are essential for modern infrastructure but create significant security challenges when mismanaged. Most concerning is the persistence of exposed credentials. GitGuardian's analysis found that 70% of secrets first detected in public repositories back in 2022 remain active today, indicating a systemic failure in credential rotation and management practices. Private Repositories: A False Sense of Security Organizations may believe their code is secure in private repositories, but the data tells a different story. Private repositories are approximately 8 times more likely to contain secrets than public ones. This suggests that many teams rely on "security through obscurity" rather than implementing proper secrets management. The report found significant differences in the types of secrets leaked in private versus public repositories: Generic secrets represent 74.4% of all leaks in private repositories versus 58% in public ones Generic passwords account for 24% of all generic secrets in private repositories compared to only 9% in public repositories Enterprise credentials like AWS IAM keys appear in 8% of private repositories but only 1.5% of public ones This pattern suggests that developers are more cautious with public code but often cut corners in environments they believe are protected. AI Tools Worsening the Problem GitHub Copilot and other AI coding assistants might boost productivity, but they're also increasing security risks. Repositories with Copilot enabled were found to have a 40% higher incidence rate of secret leaks compared to repositories without AI assistance. This troubling statistic suggests that AI-powered development, while accelerating code production, may be encouraging developers to prioritize speed over security, embedding credentials in ways that traditional development practices might avoid. Docker Hub: 100,000+ Valid Secrets Exposed In an unprecedented analysis of 15 million public Docker images from Docker Hub, GitGuardian discovered more than 100,000 valid secrets, including AWS keys, GCP keys, and GitHub tokens belonging to Fortune 500 companies. The research found that 97% of these valid secrets were discovered exclusively in image layers, with most appearing in layers smaller than 15MB. ENV instructions alone accounted for 65% of all leaks, highlighting a significant blind spot in container security. Beyond Source Code: Secrets in Collaboration Tools Secret leaks aren't limited to code repositories. The report found that collaboration platforms like Slack, Jira, and Confluence have become significant vectors for credential exposure. Alarmingly, secrets found in these platforms tend to be more critical than those in source code repositories, with 38% of incidents classified as highly critical or urgent compared to 31% in source code management systems. This happens partly because these platforms lack the security controls present in modern source code management tools. Alarmingly, only 7% of secrets found in collaboration tools are also found in the code base, making this area of secrets sprawl a unique challenge that most secret scanning tools can not mitigate. It is also exasperated by the fact that the users of these systems cross all department boundaries, meaning everyone is potentially leaking credentials into these platforms. The Permissions Problem Further exacerbating the risk, GitGuardian found that leaked credentials frequently have excessive permissions: 99% of GitLab API keys had either full access (58%) or read-only access (41%) 96% of GitHub tokens had write access, with 95% offering full repository access These broad permissions significantly amplify the potential impact of leaked credentials, enabling attackers to move laterally and escalate privileges more easily. Breaking the Cycle of Secrets Sprawl While organizations increasingly adopt secret management solutions, the report emphasizes these tools alone aren't enough. GitGuardian found that even repositories using secrets managers had a 5.1% incidence rate of leaked secrets in 2024. The problem requires a comprehensive approach that addresses the entire secrets lifecycle, combining automated detection with swift remediation processes and integrating security throughout the development workflow. As our report concludes, "The 2025 State of Secrets Sprawl Report offers a stark warning: as non-human identities multiply, so do their associated secrets—and security risks. Reactive and fragmented approaches to secrets management simply aren't enough in a world of automated deployments, AI-generated code, and rapid application delivery." Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    0 التعليقات 0 المشاركات 95 مشاهدة
  • WWW.INFORMATIONWEEK.COM
    Why IT Leaders Must Prioritize Leading Over Contributing to Projects
    John Edwards, Technology Journalist & AuthorApril 9, 20255 Min ReadMatej Kastelic via Alamy Stock PhotoIT leaders typically begin their careers by working on a team. Exhibiting their knowledge and skill, they rise through the ranks to become managers and executives. Yet for many leaders, that urge to do some hands-on work never really disappears. Unfortunately, that's rarely a good idea. As a technology and business leader, it's crucial to maintain oversight of strategic and operational priorities, says Rebecca Fox, group CIO at cybersecurity consulting firm NCC Group. Actively contributing to day-to-day project delivery or operations limits the leader's ability to focus on the broader direction, she observes in an email interview. "While occasional involvement in details may be necessary for decision support or critical interventions, the leader's primary role is to delegate, inspire, and drive execution." For leaders transitioning from a subject matter expert role, mastering this shift is critical for personal success as well as the organization’s growth, Fox advises. "The larger the organization, the more essential it becomes to prioritize leadership over operational tasks." Danger Zone There are three key dangers lurking for senior leaders who become too involved as active project participants, Fox says. "Perhaps most important, the project team's autonomy is undermined, leading to constant reliance on the leader for decision-making instead of driving outcomes independently." Another risk is that critical responsibilities outside the project may be neglected, jeopardizing broader business success and operational excellence. "Finally, the leader’s role as a strategic business partner is diminished, as they become seen as part of the project rather than a leader with enterprise-wide oversight." Related:If you dive too deeply into specific projects, you risk losing sight of the overall direction your team needs to follow, warns Bill Bragg, CIO at AI technology developer SymphonyAI. "While your expertise is certainly valuable, your real strength lies in crafting strategy and growing your team and colleagues' capabilities," he says in an online interview. "Your goal is to remove obstacles and steer the ship toward success, growing the people and business together." Staying Both Above and Involved Regular governance and trust in the delivery team is essential, Fox says. "Unless you're a subject matter expert, active involvement should focus on two areas: ensuring that the right people are involved and validating that the project’s objectives remain relevant." Effective governance should show when leadership intervention is necessary, such as resolving personnel issues or realigning objectives. "While cost pressures may tempt leaders to take on a contributory role without backfilling, it's crucial to prioritize long-term project success by maintaining proper resources." Related:There will be times when your expertise is crucial, or the team is short-staffed, Bragg says. "Recognizing these moments is vital to prevent burnout or mistakes within your team," he advises. "Be sure to have an exit plan and know when to step back once the gaps are addressed." Participation should be as brief as possible, but as long as necessary, Fox explains. Projects and programs require clear organizational structures, and leadership involvement should last until they are established. "Leaders must also be willing to make tough decisions, such as pausing a project until the right resources are available or reallocating resources to meet business needs." An IT leader may not be involved in the daily activities of a project, but they should always demonstrate interest and support to their teams and peers, Fox advises. She believes that engagement comes from regular communication, visible support, and showing genuine interest in the team’s challenges and successes. "Leadership isn't passive; it requires consistent effort to connect and inspire." Related:Trust and Success Leadership is primarily about creating the conditions for success, empowering teams, and ensuring alignment with strategic objectives, Fox says. "IT leaders must balance trust in their teams with timely interventions, focusing on outcomes over activity." She feels that prioritizing leadership over direct contribution enables sustainable growth and operational excellence. Maintain open communication and regularly meet with your team and other departments, Bragg recommends. "This builds trust and transparency, helping everyone understand how their work aligns with the company's goals." By sharing insights into strategies and priorities, the leader steadily builds a cohesive framework that highlights the value of team contributions. "Creating a cadence is important, as the group and staff events themselves become anchors for operationalizing the strategy and envisioning the future." A Final Thought As an IT leader, your primary role is to steer the business technology strategy that empowers the organization’s goals, Bragg explains. "It's crucial to foster strong relationships and open communication with leaders from every department to ensure that functional and product strategies move in the same direction," he says. "With a bird’s-eye view of the company's priorities, you’re in a unique position to drive alignment and facilitate the change that builds the strength to grow together." About the AuthorJohn EdwardsTechnology Journalist & AuthorJohn Edwards is a veteran business technology journalist. His work has appeared in The New York Times, The Washington Post, and numerous business and technology publications, including Computerworld, CFO Magazine, IBM Data Management Magazine, RFID Journal, and Electronic Design. He has also written columns for The Economist's Business Intelligence Unit and PricewaterhouseCoopers' Communications Direct. John has authored several books on business technology topics. His work began appearing online as early as 1983. Throughout the 1980s and 90s, he wrote daily news and feature articles for both the CompuServe and Prodigy online services. His "Behind the Screens" commentaries made him the world's first known professional blogger.See more from John EdwardsWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    0 التعليقات 0 المشاركات 119 مشاهدة
  • SCREENCRUSH.COM
    Robert Pattinson May Play ‘Dune: Messiah’ Villain
    Robert Pattinson is reportedly being considered for a villain role in Dune: Messiah.The upcoming sci-fi blockbuster will be director Denis Villeneuve’s third installment in his Dune trilogy, and Deadline has now reported Pattinson, 38, is being eyed to play the antagonist Scytale.The villain is a Face Dancer and secret agent of the Bene Tleilax, who plays a central role in Dune: Messiah as part of a conspiracy to overthrow Paul Atreides by using deception, genetic manipulation, and political intrigue.While Warner Bros. and Legendary are supposedly interested in the Mickey 17 star, Deadline reports no formal offer has been presented to Pattinson yet.If The Batman actor does sign on to Dune: Messiah, he will be joining a star-studded cast, consisting of Timothee Chalamet, Zendaya, Florence Pugh, Josh Brolin, Rebecca Ferguson, Javier Bardem and Jason Momoa, who will be reprising his role as the resurrected Duncan Idaho.Warner Bros.Warner Bros.loading...READ MORE: Live-Action Movies That Should Be Remade in AnimationDune: Messiah, which will be based on author Frank Herbert’s 1969 novel of the same name, follows Paul Atreides (Chalamet) 12 years into his reign as Emperor of the Universe, as the religious cult built around him begins to spiral beyond his control, with a catastrophic war that claims billions of lives across the galaxy being fought in his name.Dune: Messiah is reportedly set to begin filming in June ahead of its December 2026 release date.Meanwhile, Pattinson is preparing to shoot The Batman Part II, though the actor admitted he fears he will be “old” by the time the DC superhero movie is made.Speaking with his Mickey 17 co-star Naomi Ackie about whether he’d play Batman again soon for Hero magazine, Pattinson said: “I f—ing hope so. I started out as young Batman and I’m going to be f—ing old Batman by the sequel.”As well as Pattinson’s Caped Crusader, The Batman Part II will see the return of Zoe Kravitz’s Catwoman, Colin Farrell’s Penguin, Andy Serkis’ Alfred Pennyworth and Jeffrey Wright’s Commissioner Gordon.The Batman Part II was originally due to land in theaters in October 2026, though the movie was delayed to the following year to give director Matt Reeves more time to finish the story. In February, Pattinson said principal photography on The Batman Part II should begin at the end of 2025.Get our free mobile app
    0 التعليقات 0 المشاركات 91 مشاهدة
  • WEWORKREMOTELY.COM
    CData Software: Senior Software Support Engineer (remote/US timezones)
    OverviewCData Virtuality is a strong data integration and management solution and Product Unit of CData Software. We are known for our powerful data virtualization capabilities that enable companies to access, integrate, and manage data from multiple sources in real-time without the need for extensive data replication. CData Virtuality's platform supports a variety of data sources and formats, making it a powerful tool for organizations looking to streamline their data infrastructure and improve decision-making processes. The PositionJoin our team as a Senior Software Support Engineer and become a pivotal part of a leading data virtualization software provider that is transforming the way businesses access and manage their data globally. With our innovative data virtualization solutions, we empower companies worldwide to make data-driven decisions efficiently. Your role will ensure optimal operation and seamless support for our diverse customer base, enhancing their experience with our software. The working hours range across all American time zones. Your Role and ImpactAs a Senior Software Support Engineer, you will play a crucial role in both the proactive and reactive aspects of our service delivery. You should consider yourself a highly technical person and be familiar with our type of technology to be able to solve very complex software problems. Your responsibilities will span across various support levels, monitoring, and operational tasks, including:SaaS Support: Handle customer inquiries through in-product Intercom, providing all from 1st to 3rd level support, with a higher focus on 2nd and 3rd level.CData Virtuality Platform Support: Offer support to EU and US customers, focusing on ticket-based troubleshooting and problem resolution.SaaS Monitoring: Utilize monitoring systems and tools to identify and address incidents proactively.Setup and Operations: Set up, configure, and use cloud management and monitoring tools, as well as manage cloud environments, perform software updates/upgrades on our customers' Windows and Linux machines (remote via RDP and SSH), and support the operation of our software and servers.What We're SeekingMust-have Requirements:Personal:Strong communication skills and fluency in English.Self-organized, highly motivated, and responsible.Empathic with an analytical approach.Exceptional problem-solving skills and an inquiring mindset.Professional:Understanding of database technology and Linux.Proficiency in SQL and ability to debug source code.Experience in software support/consulting or a comparable function.Highly skilled in troubleshooting and understanding documentation for desired behavior.Ability to simplify complex topics and work independently under pressure.Experience with SLA-bound operations and screen-sharing/phone support.Familiarity with bug trackers, Cloud Platforms (AWS, Azure), and container platforms.Your AdvantagesJoining our team means you'll be at the forefront of the tech industry's latest trends, working with a group of dedicated professionals who are passionate about data virtualization. You'll have the opportunity to grow your skill set in a dynamic, supportive environment, and make a significant impact on our company's success and customer satisfaction. We offer a competitive salary, flexible working conditions, and the chance to be part of an exciting journey in a rapidly growing industry.Apply NowIf you're a technically inclined individual passionate about solving complex problems and eager to contribute to our team's success, we want to hear from you! Submit your application today and take the first step towards a fulfilling career with us.What our amazing team worldwide loves about working with CData Virtuality:A stable and reliable job with the freedom and flexibility of a freelancerWorking as a contractor worldwide or as an employee in GermanyFlexible working hours and workplacePaid vacation days and paid sick leavesFast and dependable monthly payment – in EUR, USD, or Crypto, as you preferContributing to the success of a growing companyWorking with cutting-edge technologiesKnowledgeable and approachable C-LevelContinuity and growth potentialSmart, friendly, and international colleaguesFull integration into our teams and invitations for our team events worldwide-------------------------------------------------------------------------------------We are committed to creating a diverse environment and are proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status.Important Notice: The CData recruitment team does not use SMS or WhatsApp to communicate with job applicants. If you receive a message from these platforms claiming to be from CData regarding a job opportunity, please be aware that it is a scam. All current open positions are listed on our CData Careers page. Please use the Apply Now link or apply via LinkedIn.Apply NowLet's start your dream job Apply now Automatically Apply to Remote Design JobsLet your copilot automatically search and apply to remote jobs from We Work Remotely
    0 التعليقات 0 المشاركات 105 مشاهدة
  • WWW.TECHNOLOGYREVIEW.COM
    The Download: detecting bird flu, and powering industrial processes with nuclear energy
    This is today's edition of The Download, our weekday newsletter that provides a daily dose of what's going on in the world of technology. A new biosensor can detect bird flu in five minutes Over the winter, eggs suddenly became all but impossible to buy. As a bird flu outbreak rippled through dairy and poultry farms, grocery stores struggled to keep them on shelves. The shortages and record-high prices in February raised costs dramatically for restaurants and bakeries and led some shoppers to skip the breakfast staple entirely. But a team based at Washington University in St. Louis has developed a device that could help slow future outbreaks by detecting bird flu in air samples in just five minutes.Read the full story.—Carly Kay This story is from the next edition of our print magazine, which is all about the body. Subscribe now to read it and get a copy of the magazine when it lands! This Texas chemical plant could get its own nuclear reactors Nuclear reactors could someday power a chemical plant in Texas, making it the first with such a facility onsite. The factory, which makes plastics and other materials, could become a model for power-hungry data centers and other industrial operations going forward. The plans are the work of Dow Chemical and X-energy, which last week applied for a construction permit with the Nuclear Regulatory Commission, the agency in the US that governs nuclear energy.While it’ll be years before nuclear reactors will actually turn on, this application marks a major milestone for the project, and for the potential of advanced nuclear technology to power industrial processes. Read the full story.—Casey Crownhart MIT Technology Review Narrated: Exosomes are touted as a trendy cure-all. We don’t know if they work. People are spending thousands of dollars on unproven exosome therapies for hair loss, skin aging, and acne, as well as more serious conditions like long covid and Alzheimer’s. This is our latest story to be turned into a MIT Technology Review Narrated podcast, which  we’re publishing each week on Spotify and Apple Podcasts. Just navigate to MIT Technology Review Narrated on either platform, and follow us to get all our new content as it’s released. The must-reads I’ve combed the internet to find you today’s most fun/important/scary/fascinating stories about technology. 1 Donald Trump is confident Apple can make iPhones in the US  Tim Cook is probably less sure about that. (9to5Mac)+ Politicians are obsessed with the fantasy of an America-made iPhone. (404 Media)+ If you need a new phone, you’re better off buying one now. (Wired $)2 Trade groups are weighing up suing Trump to fight his tariffs The Chamber of Commerce and other groups feel they may not have another option. (WSJ $)+ Trump has hit China with a 104% tariff. (CNBC)+ What does he really hope to achieve? (Vox)+ Even the conservative podcasters that helped him win aren’t happy. (FT $)+ Trump’s tariffs will deliver a big blow to climate tech. (MIT Technology Review) 3 The UK government is building a “murder prediction” tool But research shows that algorithmic crime prediction systems don’t work. (The Guardian)+ Predictive policing algorithms are racist. They need to be dismantled. (MIT Technology Review)4 DOGE has converted magnetic tapes to digital records The problem is, magnetic tapes are stable and safe. Digital records are both hackable and vulnerable to bit rot. (404 Media)+ Government technologists aren’t happy about the switch. (Economist $)+ Can AI help DOGE slash government budgets? It’s complex. (MIT Technology Review)5 The crypto industry isn’t benefiting from Trump quite yet In fact, VC investment has fallen. (Bloomberg $)+ However, prosecutors are being told to stop pursuing certain crypto crimes. (WP $)6 Tech bros are building a Christian utopia in AppalachiaThese groups have traditionally existed only online. Can building a town bring them together? (Mother Jones $) 7 California’s only nuclear power plant is using AIIt’s the first time generative AI has been used onsite at a power plant.(The Markup) + Interest in nuclear power is surging. Is it enough to build new reactors? (MIT Technology Review)8 Custom 3D-printed railway shelters are being trialed in JapanIn a bid to help rural stations replace ageing infrastructure. (Ars Technica) 9 We’re learning more about how the Titanic sank Thanks to a new scan of its wreckage. (BBC)10 Would you ride this headless horse robot? Kawasaki’s outlandish concept model looks decidedly unsafe. (Vice)+ A skeptic’s guide to humanoid-robot videos. (MIT Technology Review) Quote of the day “iPhone manufacturing isn’t coming back to America.” —An anonymous source familiar with Apple’s plans has some bad news for the Trump administration, the Washington Post reports. The big story Inside effective altruism, where the far future counts a lot more than the present Since its birth in the late 2000s, effective altruism has aimed to answer the question “How can those with means have the most impact on the world in a quantifiable way?”—and supplied methods for calculating the answer. It’s no surprise that effective altruisms' ideas have long faced criticism for reflecting white Western saviorism, alongside an avoidance of structural problems in favor of abstract math. And as believers pour even greater amounts of money into the movement’s increasingly sci-fi ideals, such charges are only intensifying. Read the full story. —Rebecca Ackermann We can still have nice things A place for comfort, fun and distraction to brighten up your day. (Got any ideas? Drop me a line or skeet 'em at me.) + Why is everybody suddenly obsessed with Dubai chocolate? 🍫+ Inside one academic’s quest to locate the famous photograph hanging on the wall of The Shining’s Overlook Hotel.+ Adorable: a Japanese town has created its own trading card game featuring older men in the community.+ I think it’s safe to say Val Kilmer really didn’t enjoy being in the largely forgotten film Spartan.
    0 التعليقات 0 المشاركات 119 مشاهدة
  • WWW.CNET.COM
    Netflix Privacy: How to Delete Shows and Movies From Your History
    Keeping your viewing history private isn't the only reason to remove the shows and movies you watched.
    0 التعليقات 0 المشاركات 81 مشاهدة
  • WWW.SCIENTIFICAMERICAN.COM
    Mpox Outbreak in Africa Traced Back to Squirrels
    April 9, 20254 min readScientists May Have Finally Found the Mysterious Animal Hosts of MpoxA team of researchers traced the wild animal source of the mpox virus to the fire-footed rope squirrelBy Jane Qiu & Nature magazine Cuvier's fire-footed squirrel (Funisciurus pyrrhopus) in a tree. ANT Photo Library/Science SourceOne of the great mysteries of the monkeypox virus has been pinpointing its ‘reservoir’ hosts—the animals that carry and spread the virus without becoming sick from it.Now, an international team of scientists suggests that it has an answer: the fire-footed rope squirrel (Funisciurus pyrropus), a forest-dwelling rodent found in West and Central Africa.Although the name ‘monkeypox’ comes from the virus’s discovery in laboratory monkeys in 1958, researchers have long suspected rodents and other small mammals in Africa of being reservoir hosts. And studies published in the past year have demonstrated that African outbreaks of mpox, the disease caused by the virus, have been fueled by several transmission events from animals to humans.On supporting science journalismIf you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.Pinpointing viral reservoirs is crucial to breaking the vicious cycle of transmission, says Placide Mbala, an epidemiologist at the National Institute of Biomedical Research in Kinshasa, the capital of the Democratic Republic of the Congo. By identifying the sources, scientists could work with local communities to design strategies to shield people from infection—for instance, safe handling of wild-animal meat.The identification of the squirrel is “exceptional” detective work and provides compelling evidence, says Alexandre Hassanin, who studies the evolution of monkeypox at Sorbonne University in Paris. He and others who spoke to Nature, however, aren’t sure that the study definitively establishes F. pyrropus as a monkeypox reservoir, but they applaud the long-term wildlife-surveillance work.The report was posted as a preprint, ahead of peer review, to the Research Square server on 8 April. (Research Square is owned by Springer Nature, Nature’s publisher.)Long-term surveillanceAlthough mpox has affected Africa for decades, it captured headlines worldwide in 2022 when the virus sparked a global outbreak, fueled by human-to-human transmission. Last August, the World Health Organization declared another global emergency after a worrisome strain of the virus spread to previously unaffected African countries.As these outbreaks have become more common, one question on researchers’ minds has been their animal sources. A clue emerged in 2023 in Taï National Park in Côte d’Ivoire, where a team of researchers has been monitoring a group of sooty mangabeys (Cercocebus atys) for many years. In late January that year, Carme Riutord-Fe, a disease ecologist at the Swiss Centre of Scientific Research in Abidjan, noticed an infant mangabey with red skin lesions on its forehead, chest and legs. The fluid-filled lesions, characteristic of mpox, quickly spread across its body, and it died two days later.Within two months, the disease had spread to nearly one-third of the group of 80 mangabeys; 4 of them died. The team identified the monkeypox virus as causing the outbreak and successfully sequenced the full viral genome from two of the infected animals. They were identical, suggesting that the outbreak originated from a single source, says Livia Patrono, a disease ecologist at the Helmholtz Institute for One Health in Greifswald, Germany, and a study author.But what was the source?For most outbreak investigations, scientists begin collecting animal samples weeks or months after the first reported cases. Animals don’t always carry detectable levels of the virus, and those responsible for the outbreak might have left the “crime scene” by the time researchers arrive, says Fabian Leendertz, leader of the work and founding director of the Helmholtz Institute. This makes it difficult to pinpoint disease origins, he says.In the case of the mangabey outbreak, however, “we were there when it happened,” Leendertz says. His team has been monitoring several populations of free-living, non-human primates in the Taï forest on a daily basis since 2001 to better understand pathogens relevant to humans.When mpox struck in 2023, archived samples of the mangabeys’ urine and faeces, as well as tissues and swabs from dead animals found in the forest, proved invaluable. Monkeypox virus showed up in faecal samples collected as early as 6 December 2022 from a mangabey called Bako—the mother of the infant that first drew researchers’ attention.Three pieces of evidence then led the researchers to conclude that Bako, who survived the infection without developing symptoms, had caught the virus after eating a fire-footed rope squirrel. The first was that they observed mangabeys hunt and eat F. pyrropus. The second was that they found an F. pyrropus carcass teeming with a virus identical to the one infecting the mangabeys one month before Bako’s faecal samples turned positive. And finally, they identified F. pyrropus DNA in the earliest positive faecal sample from Bako.“It’s unbelievable how well things fit together,” Leendertz says.A network of reservoirs?Although scientists had occasionally found monkeypox virus in squirrels, this was the first evidence for cross-species transmission.However, Délia Doreen Djuicy, a disease ecologist at Centre Pasteur of Cameroon in Yaoundé, says that the jury is still out on whether fire-footed rope squirrels are a reservoir host, or whether they are merely a susceptible species that occasionally contracts monkeypox and transmits it.To prove that a species is a reservoir host, Djuicy says, there must be evidence that most of the animals can maintain and shed the virus without getting sick. But there is not yet proof of this for F. pyrropus, she adds.Other rodent species, such as pouched rats (Cricetomys spp.), have been implicated in monkeypox transmission, too, Mbala says. So fire-footed rope squirrels might be part of a network of animal species responsible for sustaining the virus.Leendertz says his team will next investigate both ongoing and past monkeypox infections in small mammals, including squirrels, in the national forest. They will study how these animals use the forest habitat and interact with humans.Consuming wild animals is popular in many parts of Africa for complex reasons, including tradition, subsistence, civil unrest and commercial demand, Leendertz says. Those factors, he adds, along with waning immunity in people after vaccination against smallpox stopped in 1980, might be driving the acceleration of mpox emergence in humans in the past two decades.This article is reproduced with permission and was first published on April 8, 2025.
    0 التعليقات 0 المشاركات 92 مشاهدة