7 hours ago

    China Regulates Digital Humans With New Bans On Addictive AI Services

    Key Takeaways All virtual human content must include permanent Digital Human watermarks to prevent deception. AI avatars are banned from forming virtual intimate relationships with users under 18. Creating digital likenesses using personal data without explicit consent is strictly prohibited. Platforms must enable manual takeover during user risk while ensuring…
    11 hours ago

    Google DeepMind Releases Gemma 4 Under A Fully Permissive Apache 2.0 License

    Key Takeaways Gemma 4 ships in four sizes: E2B, E4B, 26B MoE, and 31B Dense; all under Apache license. The 31B Dense model ranks third among all open models on the Arena AI text leaderboard. Google and NVIDIA collaborated to optimize all Gemma 4 variants for RTX GPUs and DGX…
    1 day ago

    NASA Artemis II Mission Reaches Earth Orbit As Crew Performs Key Deep Space Checks

    Key Takeaways For the first time in over 50 years, humans left Low Earth Orbit aboard Orion. The SLS Rocket delivered 8.8 million pounds of thrust, achieving precise orbital insertion successfully. The crew is performing proximity operations, manually piloting Orion and testing docking for Artemis II. A Canadian astronaut joins…
    2 days ago

    Intel Reclaims Full Control of Irish Fab 34 in $14.2 Billion Strategic Reversal

    Key Takeaways Intel regains full ownership of Fab 34, ending the Apollo joint venture. The deal, valued at $14.2 billion, reflects a premium over the Apollo 2024 investment. Transaction funded through cash reserves and approximately $6.5 billion in new debt. Fab 34 drives Intel 3 and Intel 4 production, supporting…
    2 days ago

    Axios Library Hit by North Korean Hackers, Raising Crypto Theft Concerns

    Key Takeaways Lazarus-linked group UNC1069 compromised the Axios npm account for three hours on Tuesday. Malicious updates 1.14.1 and 0.30.4 deliver cross-platform “WAVESHAPER.V2” remote access trojan. Experts warn of long-term cryptocurrency theft to fund North Korean missile programs. Supply chain attack bypasses traditional defenses by exploiting trusted developer account credentials.…

    Reviews

    Latest Tech Articles

    Don't Miss Latest Contents

    Featured By:

    Featured by Featured by
    Back to top button