Don’t Expect Juniors to Teach Senior Professionals to Use Generative AI: Emerging Technology Risks and Novice AI Risk Mitigation Tactics
Top Problems Developers Need You To Fix Now
If developers are frustrated and burned out, stop guessing and start asking them what they need to improve satisfaction and productivity.
TSMC completes risk production of 2nm process with 5,000 wafers · TechNode
TSMC has completed limited risk production of around 5,000 wafers using its 2nm process at the Baoshan fab in Hsinchu Science Park.
Chinese spies targeted sanctions intel in US Treasury raid
OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop
USB-C gets a bit more universal as the EU’s mandate goes into effect
Apple has already pulled devices to comply with the Common Charger Directive.
South Korea police search Jeju Air and airport operator over fatal plane crash
The conversion of data from the cockpit voice recorder to audio files, which could provide vital information about the final minutes of the flight, was completed Thursday, officials said.
Public Domain Day 2025 | Duke University School of Law
Tweet January 1, 2025 is Public Domain Day: Works from 1929 are open to all, as are sound recordings from 1924! By Jennifer Jenkins and James Boyle Directors, Duke Center for the Study of the Public Domain CC BY 4.0 Please note that this site is only about US law; the copyright terms in other countries are different.[1] On January 1, 2025, thousands of copyrighted works from 1929 will enter the US public domain, along with sound recordings from 1924.
AI-generated phishing emails are getting very good at targeting executives - Ars Technica
Hyper-personalized emails use “an immense amount” of scraped data.
Sony PlayStation 2 | LEGO Ideas
The PlayStation 2 has returned!The PlayStation 2 is a sixth-generation home video game console developed and released by Sony Computer Entertainment ...
8-K cybersecurity-incident disclosures to the SEC: A 2024 timeline
Here’s what the filings are all about, key insights into attack trends — and the bigger picture for cybersecurity.
RISC-V is making moves, but how will it hit the mainstream?
Can it topple x86 and Arm, or is the gap too wide to close?
Post-quantum public-key encryption: what’s it all about?
Steam On Linux Ends 2024 With A Nice Boost To Its Marketshare, AMD Linux CPU Use At 74%
Valve has just published the Steam Survey results for December 2024 and they reflect a nice upward trend for the Linux gaming statistics and a high point in recent times.
US government goes atomic as datacenter power crisis looms
Not just AWS, Microsoft et al that are betting on nuclear energy, 13 federal agencies get in on act too
KDE Internet of Things "Kiot" Started To Provide Nice Home Assistant Integration
Longtime KDE developer David Edmundson has recently been cleaning up some scripts he's been using personally for a few years to enhance the integration between the KDE desktop and Home Assistant for open-source home automation
Use iTerm to handle x-man-page URLs - BrettTerpstra.com
It started when I was playing with LaunchBar search templates. I tried the man page search and it opened a nice window in Terminal. But I didn’t want to open Terminal when iTerm was already…
The Evolution of SRE at Google
Pie Adblock called out for copying uBlock Origin code
And, magically, a repo appears on GitHub with attribution
Satellite-to-smartphone services to take off in 2025
Connectivity direct to unmodified mobes looms, thanks to Starlink and co
jj for developing Go
Biggest Privacy Erosion in 10 Years? On Google’s Policy Change Towards Fingerprinting
While I once hoped 2017 would be the year of privacy, 2024 closes on a troubling note, a likely decrease in privacy standards across the web. I was surprised by the recent Information Commissioner’s Office post, which criticized Google’s decision to introduce device fingerprinting for advertising purposes from
Zero Waste, Radical Magic, and Italian Graft – Quarkus Efficiency Secrets - Holly Cummins
What makes a platform efficient? Is it how quickly code executes, or is it how quickly developers can use it to solve problems? Quarkus…
Finland seizes suspected Russian spy ship and questions crew following cable breaks | The Record from Recorded Future News
The Eagle S, suspected of dragging its anchor to sever undersea cables, is now anchored east of Helsinki. The ship is also suspected of carrying Russian spy gear.
Turo Car Rental App Was Quietly Growing Before New Orleans and Las Vegas Attacks
Turo, which investigators say was used to acquire the vehicles involved in the attack in New Orleans and explosion in Las Vegas, was emerging as an alternative car-rental service.
How CERN uses Grafana and Mimir to monitor the world's largest computer grid | Grafana Labs
Learn how CERN uses Grafana and Mimir to help 12,000 global researchers access data from the world's largest particle physics lab.
US Arrests Army Soldier Over AT&T, Verizon Hacking
US soldier Cameron John Wagenius was arrested and charged over his suspected connection to presidential phone records leaks.
Here is How Much Power We Expect AMD and NVIDIA AI Racks Will Need in 2027
And most data centers cannot handle even the 120-140kW racks today
Next-gen Wi-Fi to focus on giving users the best connection
Eighth generation of the standard is all about ultra reliability
Cybertruck driver had likely self-inflicted gunshot wound to the head, sheriff says
Las Vegas Metropolitan Police Sheriff Kevin McMahill says the driver, Master Sgt. Matthew Alan Livelsberger, sustained the wound prior to the Cybertruck explosion in front of Trump's Las Vegas hotel.
They don't have their own website? | Californians Say X Blocked Them From Viewing Amber Alert About Missing 14-Year-Old
Many people reported they hit a screen preventing them from seeing the alert unless they signed in.