that Intel and Samsung manufacture their advanced chips in the US

Apple is no longer TSMC’s largest customer. It has been since 2014 and has maintained this position for just over a decade, but in 2025 Nvidia established itself as the main customer of this Taiwanese semiconductor manufacturer. Until December 31, 2025, Nvidia generated 19% of TSMC’s revenuecompared to 17% for Apple. Even so, there is no doubt that the Cupertino company continues to be a priority customer for TSMCalthough this scenario could change in the short or medium term. And, according to BloombergApple is exploring the possibility of Intel and Samsung manufacturing the advanced chips for their devices in the US. In all likelihood, the loss of influence and priority in the TSMC production chain that it has maintained for more than a decade has led to this decision. Now Nvidia has these privileges. However, to understand why Apple is considering leaning on Intel and Samsung, we also need to look in another direction. Betting on Intel or Samsung makes sense, although it involves risks There are several compelling reasons why Apple may be interested in Intel manufacturing its integrated circuits in the US. Or Samsung in its state-of-the-art plant in Texas. Or you could even work with both companies simultaneously and not completely sever your business relationship with TSMC. Either way, this diversification strategy would allow Apple to effectively protect itself from supply chain disruptions triggered by geopolitical instability. And also the shortage of some components caused by the massive construction of data centers to artificial intelligence (AI). Apple is a candy for Intel and Samsung. There is no doubt about that In fact, last week Apple recognized during the presentation of its economic results that its current supply chain is not very flexible. And in the current situation of instability, having Intel and Samsung as partners is a very attractive option. Furthermore, for these two companies it is very important get Apple as a client. In 2024 this last company represented approximately 25.2% of annual income from TSMC. And in 2025 this figure dropped to 17%, allowing Nvidia to overtake Apple with 19% of income generated for TSMC. Still, Apple is a candy for Intel and Samsung. There is no doubt about that. For Intel, having Apple as a client would represent a definitive boost for its integrated circuit manufacturing division for third parties. And for Samsung to manufacture a part of Apple’s SoCs would be a very important boost that would probably allow it to attract other clients in the fight it has had with TSMC for years to dominate the cutting-edge chip manufacturing market. Whatever Apple executives decide, it is highly unlikely that this company will abandon TSMC. This Taiwanese chipmaker has proven for years that it is perfectly capable of manufacturing cutting-edge semiconductors on a large scale and with indisputable consistency. You don’t have to prove anything, but Intel and Samsung do because it’s currently unclear whether they can reliably deliver the kind of production and scale that has made them TSMC in the dominant custom chip maker. Apple may end up outsourcing part of the manufacturing of its SoCs to Intel or Samsung, but nothing indicates that it will break its already long-standing commercial alliance with TSMC in the medium term. Image | Apple More information | Bloomberg In Xataka | Apple had been able to maintain prices despite the crazy rise in RAM. That’s over

a cardboard kamikaze drone for $2,000

Since the invasion of Ukraine in 2022, drones have become a centerpiece of modern warfare, one marked by the massive use of cheap drones for saturate air defenses. However, even if they are much cheaper than other types of weapons, Its use as loitering ammunition makes the destruction rate very high. In this context of skyrocketing volume and costs, a Japanese startup has a radical solution: disposable drones literally made of cardboard. Disposable drones. The Japanese Minister of Defense, Shinjirō Koizumi, met with the heads of the AirKamuy company and posed with his star invention: a drone made of cardboard, designed for destruction on the battlefield. Its use is intended for countermeasures, launching swarms of drones to absorb attacks from other drones or anti-aircraft defenses. Its strong point is the cost: about $2,000 per unit. To put it in context, an Iranian Shahed drone (one of the most used by Russia) costs around $35,000, 50,000 if it is an improved model. Details. The AirKamuy 150 is made of cardboard with a finish that makes it resistant to rain. It has an electric motor and an autonomy that allows it to fly for 80 minutes. Regarding the weight it can carry, it can only carry 3 pounds (a little over one kg), so it can only move small loads of supplies or ammunition. It is not a heavy combat drone, but a saturation tool: its value is not in what one can do, but in what many can do at the same time. Why it is important. In a context where cost and scale are everything, AirKamuy’s bet has an overwhelming logic: if the enemy launches hundreds of cheap drones, then we launch even cheaper drones. Few materials are as cheap and easy to mass produce as cardboard, and in fact its creators claim that nothing special is needed to produce them, but that any cardboard production plant could do it. That a packaging company can become a military production line is a solution as ingenious as it is disturbing. IKEA-style logistics. Not only is it cheaper to produce but it can also be transported in large quantities and taking up very little space. The AirKamuy 150 comes in a completely flat package, allowing 500 units to fit into a standard cargo container. Once at the destination, assembly takes just ten minutes, without the need for special tools or qualified technical personnel. Image | Shinjiro Koizumi in X In Xataka | Ukraine has just reinvented aerial combat with a piece from the Soviet era: a plane that fires drones

While the hantavirus from the MV Hondius cruise makes headlines, the closest health risk is 10 km from any Mediterranean city

When the MV Hondius left Ushuaia heading to Antarctica on March 20, no one could imagine the hell they were about to live: 150 people of 23 different nationalities, a relatively small ship and a virus that has already caused the death of three passengers. The Dutch shipping company Oceanwide Expeditions consider now docking in the Canary Islandswhich guarantees extra media attention. And yet, the health risk is minimal. In fact, the true health risk for Spain lies elsewhere: much closer. “Risk”? Yes, ‘risk’ is the word and the best example is Andalusia. March 2, 2026 the Board announced that its Strategic Plan for Surveillance and Comprehensive Vector Control until now limited to the West Nile virus will incorporate (for the first time) the monitoring of dengue, chikungunya and Zika. It seems somewhat anecdotal, but what it hides is a profound epidemiological change: not only Andalusia, but the entire Spanish Mediterranean is becoming the perfect ‘breeding ground’ for the mosquitoes that spread all these diseases. What’s more, all this coincides temporally not only with the largest dengue epidemic ever recorded in the Americas (12.6 million cases)but with the historical record of indigenous chikungunya in continental Europe. Dengue in Spain. It is worth stopping at this because, according to data from the National Center for EpidemiologySpain reported 1,119 cases of dengue in 2024 (compared to 615 in 2023, 503 in 2022 and 50 in 2021). It is true that the majority are imported, but indigenous cases are growing. It is not a minor issue: before 2018 We had gone almost a century without indigenous cases in Spain. What changes for someone who lives in Spain? Today, 66% of the Spanish population already lives in municipalities with confirmed presence of tiger mosquitoes. This means that the individual risk of contracting diseases such as dengue, chikungunya or Zika remains low and localized (without having left the country), but it is certainly on the table. As Pamela Rendi-Wagner, director of the ECDC, pointed out last year, we have entered a new normal. And we have to learn that this situation is not fought with headlines but by eliminating stagnant water in patios and terraces. It is worth remembering that the (immense) majority of epidemics in the last 40 years have not been due to unknown diseasesbut to known diseases that went beyond their usual niche. That’s what we’re about to see: a bunch of diseases moving across a continent that has no recent experience managing them. Image | Mithil Girish In Xataka | Mosquitoes attack me in summer and I tried these TikTok tricks to get rid of them

Sam Altman attacked Anthropic for using fear tactics with their new AI. He then did exactly the same thing.

The big AI companies have set themselves a goal: practically every week They must present a new model or start warming up the atmosphere by commenting on what is to come. Delays are not tolerated because the speed at which everything happens is overwhelming, but those who continue to dominate the conversation in terms of the power of their models are OpenAI and Anthropic. And what had to happen has happened: if Anthropic has a new “dangerous” model, now OpenAI says they also have one. And it is a example very clear of “where I said I say, I say Diego.” GPT-5.5 Cyber. A few days ago, OpenAI released GPT-5.5 Cyber. This is a variant of GPT-5.5 focused and specialized in advanced cybersecurity capabilities. It is a model focused on tasks such as the exploitation of vulnerabilities, penetration tests, malware reverse engineering and other types of actions highly focused on that sector of computer security. In a reality in which, thanks to AI tools, there are systems that are more vulnerable than ever (and all this when we are on the threshold of the era of post-quantum cryptography), such specialized models seem like a very sweet tool for companies. But, of course, also for someone with other intentions. Access control. Due to concerns over potential dual use, OpenAI has made the decision to restrict access to GPT-5.5 Cyber ​​to “critical cyber defenders.” Who are these? Those that protect essential infrastructure such as electrical or financial networks. OpenAI has a certified access program with robust safeguards and rejection of malicious requests so that not everyone has access to this tool. In addition, they have a monitoring system to detect suspicious activity carried out by the model. With cannon shots. It is, in essence, the discourse of fear. Once again, an artificial intelligence company saying that they have a product so powerful that it cannot fall into the hands of just anyone. It’s not the first time that OpenAI uses this speech, but the times have been very curious. A few days ago, Anthropic presented Mythos. It is a tool very similar to that of OpenAI, one that is already giving some results in companies, with examples like Mozilla pointing out that, thanks to Mythos, the latest version of Firefox has a lot of security patches because AI has greatly streamlined the processes for finding vulnerabilities. It is one more example of the two titans of the AI ​​industry captaining ships with enormous firepower and “shooting” their best product with that speech of fear. Precisely, that’s where the problem lies. The hypocrisy. After the presentation of Cyber, Sam Altman commented at X that they were working with the Government to establish trusted access control to their tool. They have not shared the identities of those who will have initial access or, really, many details of the model. It has simply been a “oops, oops, this is very powerful and we can’t release it to the general public.” And, as we say, the problem is that Sam Altman himself harshly criticized Anthropic’s strategy when Mythos was presented. The CEO spoke about the strategy of fear and compared the maneuver of Anthropic and its declared enemy, Dario Amodei, with that of someone who manufactures an atomic bomb and, at the same time, sells you the bunker to protect you from it. This has not been overlooked by the media because he harshly criticized that strategy just before copying it word for word. At par. Despite everything, neither one nor the other is wrong. When AI companies present a model, curiously it is always better than the competition in almost everything. On this occasion, a assessment The UK AI Security Institute reflects that both Mythos and GPT-5.5 Cyber ​​are two of the most powerful models they have analyzed in their cybersecurity tests and that they are, basically, on par. Compared to previous or non-specific models, the difference is palpable. In expert-level tasks, GPT-5.5 achieved an average success rate of 71.4% compared to 52.4% for GPT-5.4. Mythos Preview, for its part, stayed at 68.6% compared to 48.6% for Opus 4.7. The Institute concludes by pointing out that this is evidence that the potential in cybersecurity is a trend among frontier models, one in which they can begin to achieve the desired benefits in order to become listed companies. Another reading is that countries that want to stop depending on cutting-edge American technology must start getting their act together as soon as possible. And that is, precisely, the message from the CEO of Mistral, the French AI company that recently pointed out that Europe had to stop being a technological vassal of the United States to become a power. In Xataka | Someone has had a simple idea so that data centers do not collapse in Spain: “unplug them” 18 days a year

how to migrate memory of everything other AIs know about you to Gemini

Let’s tell you how to migrate memories from Claude or ChatGPT to Geminiand thus perform a migration of a artificial intelligence to another. Gemini has launched a function that allows you to import memories from Claude, ChatGPT or any other AI you’ve been using. This is a function that It was already available in Claudeand now it has been Google that has incorporated it. With it, you can import all the important data about you that any AI chat will save to personalize the responses to your context. Because yes, Claude or ChatGPT can remember things like your musical tastes, where you work or if you have pets. And why can it be useful to import these memories into Gemini? Well, because if you have decided to start using Google’s AI, you can make it know about you all the specific data that your other AIs use to personalize its results and adapt them to you. This way you won’t have to learn it from scratch conversation by conversation. Import memories from another AI to Gemini To use this option, you first have to enter Gemini through its application or its website, and log in with the account where you want all the information you will bring from other AIs to go. in here, enter the option Settings and help that will appear in the left column on the website. Once inside, you have to click on the option Import stored data to Geminiwhich will appear to you. In the Gemini mobile appwhat you have to do is click on your profile image, and in the drop-down menu is where you will find the option to Import stored data to Gemini. This will open the import memory screen. In it, above you have a prompt that you must copy to use in another AI to extract the memories, and below you will have a field where you have to write the imported memory that generates the prompt above. Therefore, here click on the button Copy of the text you have above. Now, the text that you have copied in Gemini you have to paste it in a chat with the AI ​​where you want to extract the memories. Just paste it exactly as you have it into ChatGPT, Claude or something else, and send it. This will make the AI generate a code with all the memories what he has on you. You will have to copy this code and stick it in the Gemini field what’s in the window we opened before. With this, Claude will recognize the memories and start saving them internally. Additionally, you also have the option to import the conversations as a Zip file. To do this, you will have to go to the other chatbot’s settings and look for the option to export your history as Zip. Google has a tutorial with the process for ChatGPT and Claude.

The world wants to verify the age of children so that they do not access social networks. Children’s solution: paint a mustache

The United Kingdom presume to have one of the strictest legislations in the world when it comes to protecting minors from social networks. The curious thing is that young people are managing to demonstrate that age verification technology has a unique Achilles heel: an eyebrow pencil. Look, I have a mustache. The British country has been forcing platforms to implement age verification measures in accordance with its Online Safety Act for months. However, a recent study from the NGO Internet Matters reveals that the limits imposed by these platforms are surprisingly easy to overcome. In fact, one of the methods is especially striking, because some children simply use an eyebrow pencil to paint a mustache and thus look older than they really are. Children 1 – Machines 0. This agency surveyed 1,000 children and parents in the United Kingdom and although it showed positive effects after activating these measures, it also made it clear that many children saw these systems as an easy obstacle to overcome rather than as a way to keep them safe. 46% of minors believe that the measures are easy to overcome. Only 17% believe that they are very difficult to avoid, while 19% say they do not know. Source: Internet Matters. Cheating machines is trivial. 46% of the children surveyed indicated that These age verification systems are easy to overcomeand only 17% found them difficult to avoid. There are several methods to overcome these systems, but most are simple. For example, using video game characters like ‘Death Stranding’ to show them in front of cameras trying to verify their age. Also show IDs of other people when asked, or simply use false birth dates. (At least) One in three skips the controls. But not everyone uses these methods: although the aforementioned 46% say that it is easy to overcome these systems and another 17% say that they are neither easy nor difficult, “only” 32% admit to having used some technique to overcome them. Of course, it is one thing that only 32% admit it and quite another that these figures are representative taking into account that they are confessing that they are doing something that they should not do. Methods vary, but many use fake birth dates or log in with their parents’ or siblings’ accounts. Complicit parents. The effectiveness of the Online Safety Act depends largely on the family environment, with data suggesting that at least a quarter of parents are uncooperative. The study indicates that 26% of parents have allowed their children to ignore or overcome these age verification systems, and in fact 17% admit have actively helped their children to evade these controls while 9% simply turn a blind eye. It’s not that big of a deal. Many parents justify this “help” by indicating that they understand the risks of their children accessing these platforms, but prefer to supervise the use of services such as TikTok or video games themselves. The idea: allow your children to bypass restrictions to play with friends or stream, but theoretically under your supervision. The failure of putting doors to the field. It’s not just that age verification systems are easy to overcome: The thing is that they do not eliminate risks completely either. In the Internet Matters study, almost half of the minors surveyed (49%) indicated that they had recently encountered toxic material on the Internet. This makes it clear that even children who do not try to bypass these controls still encounter inappropriate content. There are those who advocate going further and push for the end of online anonymity. Image | Jeremiah Lawrence In Xataka | The EU has just ready its app to verify age on the internet. And Ursula von der Leyen warns: “There are no more excuses”

one with drones, missiles and ships burning

In the 1980s, during the conflict between Iran and Iraq, an American oil tanker was sailing through the Persian Gulf when a missile hit against his helmet without warning. For hours, the crew struggled to maintain control of the ship as it burned in the middle of one of the most strategic shipping routes on the planet, leaving a scene that surprised many analysts: even in apparently “protected” corridors, a single unexpected attack was enough to turn commercial transit into an high risk operation. The plan and the beginning of a new phase. It we counted yesterday. The United States launched an operation to free the ships trapped in the Strait of Hormuz, and did so by creating a kind of “safe” corridor without escort but under dense military cover that includes destroyers, aircraft carriers, more than 100 aircraft and thousands of troops, with the intention of reestablishing the commercial flow without resorting to direct escorts. The initiative sought to unblock a situation that keeps tens of thousands of sailors Nearly 1,000 paralyzed ships have already been detained, in a context where Washington is trying to balance military pressure and diplomatic output, while presenting the operation as defensive and coordinated with the maritime industry to encourage gradual transit through the area. The Iranian response. Iran has reacted immediate and calculatedunfolding a combination of drones, cruise missiles and attacks with speedboats that turn each transit attempt into an episode of maximum tension. In this case it is not a classic head-on collision, but rather a strategy designed to wear out, intimidate and complicate the American operation without necessarily crossing the threshold of total war. In this way, every movement in the strait is answered with distributed threats that force defensive systems to be activated continuously, generating a feeling of constant vulnerability even under the most sophisticated military umbrella. A strait turned into a geographical and tactical trap. As since the beginning of the war, the physical environment of Hormuz multiplies the dangerwith reduced distances that shorten the reaction time of anti-missile systems and an extensive coast from which attacks can be launched almost without warning. Hidden positions, drones at different levels, naval mines and light craft create an ecosystem multi-threat which calls into question the ability of any force to completely control the area. In this scenario, even advanced platforms face a critical challenge– Respond in seconds to simultaneous attacks coming from land, sea and air. The United Arab Emirates enters the line of fire. The crisis has ended up spilling directly to the United Arab Emirateswhich have suffered attacks with missiles and drones supposedly launched from Iranian territory against ships and strategic areas close to their ports. Emirati air defenses have reportedly intercepted multiple projectiles, although some incidents have led to boat fires and limited damage, raising the tension in one of the main energy hubs of the region. There is no doubt, this front expands the conflict beyond the strait and confirms that Iranian pressure is not limited to maritime traffic, but also seeks to impact key infrastructure to increase the political and economic cost of the US operation. The key role of helicopters and layered defense. Faced with this form of war, the United States has resorted to flexible tools like attack helicopters Apache and Seahawk, capable of detecting and neutralizing fast threats such as Iranian boats (Washington claims to have sunk six in the last few hours) before they approach commercial vessels. These assets are integrated into a layered defense which includes electronic warfare, aerial surveillance and interception systems, creating a dynamic shield that has already proven effective by shooting down drones and missiles on multiple occasions. That being said, this defense does not eliminate the riskbut manages it, maintaining constant pressure on the deployed forces. Trump between containment and escalation. On the political level, Donald Trump moves in a delicate balance between responding forcefully to Iranian provocations and avoiding an escalation that leads to open conflict. counted the wall street journal that the US president’s strategy at this time combines demonstrations of power with attempts to keep diplomatic channels open, while receiving internal pressure to act more forcefully. This ambiguity reflects the difficulty to manage a crisis in which every decision can tip the balance towards a broader war or an uncertain negotiation. A pulse that redefines the control of global trade. Beyond the immediate confrontationwhat is at stake is the effective control of one of the most important trade routes in the world, where Iran has shown that it can block or make more expensive transit without the need for a conventional fleet, while the United States tries to impose an indirect protection model that depends on the trust of shipping companies and third countries. The result is diametrically opposite to “plan A” ship release, with an unstable balance in which there are now burned and sunken ships, explosions and constant attacks coexist with attempts to normalize traffic, reflecting that new reality in which maritime warfare is no longer decided only by the large fleets of yesteryear, but by the ability to saturate, intimidate and sustain pressure at a critical point on the global map. Image | USN In Xataka | The strangest plan of the war is ready: guide the 1,000 ships trapped in Hormuz hoping that no one will shoot In Xataka | After gasoline, the war in Iran is about to skyrocket the price of something just as painful: your Zara clothes

He founded two republics of which he was president

Today, millionaires are focused on his own space race for “save humanity” of itself. In the 19th century, millionaires concentrated all that impetus on conquering territories of third countries independently, using your own private army and governing their colonies like ancient feudal lords. That was the case of William Walker, considered by many to be the “last great filibuster“, who acted as an independent mercenary who conquered territories in Mexico, Nicaragua. William Walker: the Central American dictator The story of William Walker is a tale of ambition, power, and the formation of Latin American identity. Born in Tennessee in 1824, Walker was the son of businessmen who were very influential in local politics. He studied medicine, journalism and law. However, he abandoned these professions to become a filibuster, a kind of private mercenaries that promoted revolutions not authorized by any country in order to take over the territories and their resources. To understand the context of private invasions of countries, it is important to know the concept on which the Doctrine of Manifest Destiny. This doctrine, one of the pillars foundations of the United States. This 19th century doctrine justified the territorial expansion of the United States across North America, based on the belief of being a “chosen” nation with the divine right to extend its civilization. This idea is associated with the annexation to the United States from territories such as Texas and California, and wars such as those in Mexico and Spain, promoting the idea that expansion was obvious and predestined, reflected in the phrase “By divine or God’s authority.” This ideology influenced policies of interventionism and expansionism, whose maximum expression is Thomas Jefferson’s famous phrase: “America has a hemisphere to herself.” The Sonoran Desert, part of the Republic of Sonora. At only 29 years old, in 1853, Walker recruited 32 American slave mercenaries and set out to conquer the southern borders of the country like Hernán Cortés, in search of power and riches. The raid was not bad for them and they conquered the cities of La Paz and Ensenada in Mexico, proclaiming himself president of the Republic of Sonorawhere he rushed to impose new legislation permissive with slavery to obtain a quick return on his conquest. His presidency was short-lived, as five months later, Mexican resistance and a lack of supplies forced him to withdraw. In a troubled river, invaders gain Far from becoming discouraged after the failure of the first foray into private colonialism, William Walker allied himself with the Democratic Party of Nicaragua, which at that time was in the middle of a territorial dispute for control of the Central American country with the Legitimist party. Walker saw the opportunity to take advantage of the matter and offered to help the local bourgeoisie militarily to achieve their objectives, and in the process, to further enhance their own economic interests. After winning the battle in Granada with an army of mercenaries called “The immortals“, was symbolically elected president, imposing American policies and customs. William began to apply his colonialist policy in the area by initiating a policy of government by decree, in which slavery was reestablished, the English as official language and the arrival of Americans was encouraged, in addition to changing the constitution and the country’s flag. He also established by decree that all the assets of the “enemies of the State” would be confiscated in favor of the Republic and distributed by a Special Board especially generous with the interests of William Walker and the United States. Therein lies in fact the “germ” of the Panama Canal. Given the strategic nature of the area, this conquest did not go unnoticed by the United States, which was quick to recognize the legitimacy of the new republic created by William Walker. The US interest in controlling this area was based on the importance of creating a interoceanic trade route that connected the Atlantic with the Pacific. The Transit Route was immediately established that connected both oceans through the San Juan River in the south of the country. The return of the hero. Gripped by the pressures of business interests and his neighboring countries, Walker’s government is overthrown and the millionaire must return to his native Tennessee hailed as a victorious hero. His exile would not last long, since, three years later, William Walker returned to his old ways and was already planning the conquest of Honduras. This coup adventure lasted less than the previous one. Walker is captured by the British troops stationed in the area and is quickly handed over to the local authorities in Trujillo, where without further delay he is tried and sentenced to death. In Xataka | Gregor MacGregor, Prince of Poyais: the Scottish soldier who became a millionaire by selling (twice) a fake country Image | Wikimedia Commons (Mathew Benjamin Brady, Nicaragua-CIA_WFB_Map.p), Pexels (aboodi vesakaran) *An earlier version of this article was published in May 2024

These are the best PcComponentes anniversary offers

The month of May begins with one of the most outstanding promos it has PcComponentsthis time with your anniversary. It has been around for 21 years and comes with a lot of offers in technology of all kinds: from TVs to laptops, including mobile phones, robot vacuum cleaners and much more. Of course, there is also a lot to choose from if we are looking to update our gaming PC or the setup we have at home. Apple MacBook Neo 13″ Apple A18 Pro 8GB 512GB SSD GPU 5 cores macOS Touch ID Indigo The price could vary. We earn commission from these links This promo, beyond the bargains (there are discounts that go up to 60%), also comes with free shipping from 50 euros of purchase and delivery in 24 or 48 hours depending on the time we place the order. There is a lot to choose from as we say, but we have selected five offers that we find especially interesting: Smart OLED TV S90F by 749 eurosa historic low for one of Samsung’s best OLED TVs. MacBook Neo by 749 eurosApple’s affordable laptop with a 50 euro discount that is automatically applied to the cart. Roomba Plus 405 Combo by 289 euroswith good suction power and 75 days of automatic emptying. MSI Cyborg Laptop by 1,299 eurosa team with which we can play for years at a historic low. QLED Smart TV 55PUS8400 by 359 eurosminimum price for a 55-inch Philips TV with Ambilight. Smart OLED TV S90F We start with a television, in this case the Samsung S90F in its 48-inch version. It uses an OLED panel, which means that we are looking at a television that offers pure black and very vivid colors. This type of TV is ideal for watching TV, but also for playing games because it has HDMI 2.1 ports and a high refresh rate that reaches up to 144 Hz. Its size makes it ideal for small or medium-sized rooms and we consider it 749 eurosits historical minimum. Samsung OLED TQ48S90FAEXXC 48″ 4K Smart TV 144Hz Dolby Atmos Gaming Ultra Slim The price could vary. We earn commission from these links MacBook Neo He MacBook Neo It is Apple’s cheapest laptop and it is a very good quality-price option if you are looking for a device to work or study (as long as you are not going to demand a lot from it with things like, for example, video editing). It is a device that has good autonomy, a screen that is not bad at all and that, in addition, weighs just over 1.20 kilos, which makes it very comfortable to carry everywhere. The best thing is that this offer is for its version with 512 GB, which costs 749 euros. The discount is automatically applied in the cart. Apple MacBook Neo 13″ Apple A18 Pro 8GB 512GB SSD GPU 5 cores macOS Touch ID Indigo The price could vary. We earn commission from these links Roomba Plus 405 Combo If you are looking for a robot vacuum cleaner and you don’t want to spend too much, this may be Roomba Plus 405 Combo you are interested This is an option that has a double rotating mop and also scrubs. Additionally, as the mops are raised, the robot will avoid those areas or surfaces that we do not want to get wet. Another interesting point about it is that it has a base that has waste storage for up to 75 days, so we will have to do very little maintenance. It is available for 289 euros. iRobot Roomba Plus 405 Combo Robot Vacuum Cleaner with White AutoWash Self-Emptying Base + Pack of 3 Bags The price could vary. We earn commission from these links MSI Cyborg Laptop The PcComponentes anniversary also has a lot of presence of gaming devices or components. This MSI laptop is one of the best examples: it has a beautiful price (it costs 1,299 eurosits historical minimum). It is a laptop that combines an Intel Core 7 240H processor, an RTX 5070 and 32 GB of DDR5 type RAM. What does that mean? Which is a laptop that will allow us to play for many years with DLSS 4.5 (a key technology) or even for heavy tasks such as video editing. Laptop MSI Cyborg 15 B2RWGKG-422XES 15.6″ Intel Core 7 240H 32GB 1TB SSD RTX 5070 8GB RGB The price could vary. We earn commission from these links QLED Smart TV 55PUS8400 We close as we began this selection of offers: with a TV. In this case, it is a 55-inch Philips television that uses QLED technology, which means that we will have more accurate colors than conventional LED TVs. In addition, like other Philips models, it has Ambilighta technology that projects light with rear LEDs that the TV has and that increases (a lot) the immersion when watching content. It is available for 359 euros and includes six free months of Movistar Plus+. TV Philips QLED 55PUS8400 55″ 4K UltraHD Ambilight Smart TV Dolby Atmos Titan OS The price could vary. We earn commission from these links Some of the links in this article are affiliated and may provide a benefit to Xataka. In case of non-availability, offers may vary. Images | PcComponentes, Samsung, Apple, iRobot, MSI, Philips In Xataka | Best televisions in quality price. Which one to buy and seven recommended 4K smart TVs In Xataka | The best mobile phones, we have tested them and here are their analyzes

first the Pentagon, then the rest of the world

The United States had a maxim to win the AI ​​race: that there were no rules or limits. Politicians and regulators have turned a blind eye because what mattered was that US companies could develop the best AI models without restrictions. The problem is that some models have ended up being so good that now the US Government is beginning to fear their potential. Your easy solution: review them before anyone can use them. Is the open bar over? Donald Trump’s team is designing a plan intended to have a formal supervision process for new artificial intelligence models. Under this structure, a group of experts and government officials would analyze and review each new model and approve its launch. The implications are enormous, because the US Government would have preliminary and exclusive access to the model before its mass launch. Trump did not want restrictions on AI. Last summer, Donald Trump compared to AI with a “beautiful baby that has been born. We have to grow that baby and let it thrive. We can’t stop it. We can’t stop it with politics. We can’t stop it with absurd rules, not even stupid rules.” But he’s staying alone. This total support for AI is leaving the US president in an uncomfortable position. Both Democrats and Republicans they are worried over the risks posed by AI, and a Pew Research Center survey from last year Indian that half of all of them do not welcome how AI is increasingly used on a daily basis. Mythos as a turning point. This feeling of rejection has been growing among political groups, but fears have been reactivated especially after the launch of Claude Mythos Preview by Anthropic. The company only allowed access to the model to a small group of technology partners, claiming that it was too advanced in areas such as cybersecurity. The internal tests Of course They seemed to demonstrate their potential. Priority access. The White House wants to avoid political repercussions from a potential cyber attack created by AI, but at the same time the administration is assessing how these capabilities can be useful to the Pentagon and US intelligence agencies. Some government officials want this review system to be put in place that allows priority access to these models even if that does not block their launch. Good news for China. This type of plan has a big problem: it would slow down the development of new models and the innovation capacity of US companies compared to Chinese companies, which do not undergo this type of prior government review. And if they do, it is a problem that is not reflected in the advancement of the AI ​​models of Chinese companies, which are increasingly closer in terms of capacity to the best models of US companies. There is no more “AI czar”. These plans coincide with another unique event. In March, David Sacks, the so-called “AI czar” of the White House, left his position. He has been replaced by Susie Wiles and Scott Besset. While Sacks fully supported such a “no rules” policy for AI, both Wiles and Bessent intend to have more control over the policies that apply to AI. AI as a weapon. All events make it inevitable to compare the development of AI with the development of the atomic bomb in World War II. It was the US Government that led and controlled this technology in the past to have a definitive strategic advantage against its adversaries, and the same could happen with AI now that it is becoming a potential “cyber weapon.” In Xataka | Only a handful of US companies have access to Claude Mythos: the ECB already fears for the savings of all of Europe

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.