A type of content is devouring all streaming platforms in silence: the anime

The Anime It became a large more ingredient of our cultural offer. No one is surprising that an anime feature film reaches the billboards, which is the second or third part of a saga that only the otakus knows but becomes The most watched premiere of the weekend. The anime has one of the most delivered and consistent fandoms in the world. It has nothing strange than the platforms of streamingalways attentive to any new success to which the tooth will have, have increased spectacularly in recent years their anime catalog fund. New mainstream. Since the first anime that triumphed in the West (‘Akira’, ‘Champions’, ‘Dragon Ball’, ‘Ranma’ …) decades have passed. The figures that manage the new successes (‘One Piece’, ‘Attack on the Titans’) show those of those productions, which already marked millions of young people in their day: now, generation Z is that of the anime, and its aesthetics and narrative have become the new new mainstream. That is, we are willing to review a few figures that define a cultural panorama dominated in large part by the anime. Crazy growth. The Parrot Analytics Market Studies firm Recently estimated that the average demand of the United States of anime in streaming It grew 176% between 2019 and 2024, and this is undoubtedly due to a greater amount of offer (in that period the number of anime programs tripled). But also to the increase of occasional spectators, which are those who are giving a renewed impulse to Japanese animation outside the fans circles. For the anime industry, all this means income from 27,000 million euros a year. A for the anime. A quick look at platform catalogs allows you to distinguish to what extent the anime is important in its programming. The first one is betting strongly on classics such as ‘Dragon Ball’ (licensed exclusively outside Asia the new franchise series, ‘Daima’) or ‘One Piece’, whose adaptation Live Action It has been one of the great successes of the platform in recent months. In the United States, in addition, Hulu (owned by Disney) plants face with abundant licenses, but out of there, in countries such as Spain, Netflix and Prime Video are distributed (they often share) the great successes: ‘Death Note’, ‘Guardians of the night’, ‘Naruto’ and many others. Specific services. And to this are added the dedicated platforms, a privilege of which only audiovisual subgenres with a more delivered fandom, such as terror or anime. In the case of anime we have above all to Crunchyrollwhich was born as a fan project in 2006 that spread anime without permission, but whose rapid acceptance led him to start closing deals with distributors to issue anime legally. Owned by Sony since 2021, he absorbed an important competitor, funimation, and has More than 120 million registered users. Other important streaming services exclusively of anime are Restrocush or Hidive, to which the abundant Fast thematic channels are added that emit 24 hours of series such as’ Pokémon ‘,’Conan detective‘ either ‘Inazuma Eleven‘. Everything is anime. Another important sign of how the anime has become undisputed creative force in current streaming is that many series that at another time would undoubtedly have had a western aesthetic approach now start from approaches completely anime: ‘Suicide Squad isekai‘It is produced in Japan and its own title betrays its origin, but is based on DC heroes; The greatest animation success of recent times, ‘Arcane’It is French production, but its anime visual roots are absolutely indisputable; And even a very characteristic series of the United States, ‘Rick and Morty’, has Your own spin-off anime. According to Jason Demarcocreator of the mythical Toonami thematic channel, this type of phenomena are a sign of “maturity” of this animation style. And all this rent extraordinarily in both addresses: 38% of international anime income is produced in Netflix. The benefit navigates In both directions. The new normality. The overwhelming growth and implementation figures in particular and Asian culture in general are no longer surprising (remember that a Korean series, ‘The Squid’s game’, remains the greatest success in Netflix’s history). That ‘Dundundun’ ravages or that one of the most profitable ideas that the platform has had in recent times has been to bring the anime in real image ‘One Piece‘They are some pieces of the many that make up a complex puzzle. One whose final snapshot shows a future in which the anime has an indisputable weight in the global computing of pop culture. In Xataka | The curse of Tolkien’s animated adaptations continues: the prequel anime of ‘The lord of the rings’ click at the box office

The future of his army goes through augmented reality

The Chinese military state has been suffering for years An important process of technological modernization. The country led by Xi Jinping increased by 7.2% its defense budget by 2025, and is currently considered as The third largest military power in the world. For about a decade, China proves augmented and virtual reality technologies for military logistics. One of its most recent strategies goes through the Mars system (Military augmented reality system), one that seems taken from a science fiction film, or the last installment of ‘Call of Duty’. Inside a video game. Soldiers of the popular liberation army have augmented reality devices at their disposal. Teams that allow the units to use this technology to see through the walls, obtain third -party information (drones, colleagues, position of other combat elements, etc.) and expedite combat operations. They have thermal, night vision and cameras to track the environment They are able to delineate humanoid objectives for their best detection They can actually show 3D maps of the territory They label and establish markers shared with other team members They project a digital cross in the eye to point more precision Reading the device functions list, it seems closer to what we would find in ‘Call of Duty’ than what an average user would understand as military technology. Mars technology, from the beginning, is focused for real combat use. Through Chinese networks, such as Bilibili, The design and operation of some recent versions of the device has been seen. In test phase. China has been testing this type of devices for two years, and it is clear that the future of military operations goes through AI. Despite this, it is important to highlight that these types of technologies have not been deployed in real combat, and that both physical impact and cognitive load that entails using them is being studied in depth. They are not just for war. Although the most advanced own devices have combat guidance, China has been using augmented reality for other military purposes for years. In 2023, the Chinese Air Forces made the use of Hololens 2 for Areonautio maintenance tasks. AR devices have also been used for training Paracharidism units and out -of -combat tactical training tasksthrough completely virtual or live environments by augmented reality. An answer to the US. The United States, first military world power, has a calendar similar to that of China. He closed his first contract with Microsoft For system development Ivas (Integrated Visual Augmentation System) In 2018, one that has been in evidence since then. It is the system with which China tries to rival, and one that is also trying to finalize its test phases. The biggest challenge? American soldiers complained about the first final versions (2022) for dizziness, nausea and neck injuries after the continued use of these heavy devices. In 2024, the American army deployed about 3,000 test devices, in this case improved to avoid these problems. Intensive tests are being carried out in this first half of 2025, and conclusive results are expected before the end of the year. It is not the only plan. At the end of 2024, Reuters revealed that China had been using old Versions of the Meta Models for Military Purposes. Specifically, it was pointed out that Chinese investigation institutions linked to the popular liberation army used the publicly available goal model to create a chatbot with military applications called Chatbit. An unauthorized military assistant according to goal, since its technology can only be used with military applications in the United States and some agencies from the United Kingdom, Canada, Australia and New Zealand. China as a military superpower. China has been consolidating as a military and nuclear power for years, having deeply modernizing its nuclear arsenal in recent years. He US Department of Defense He estimates that China currently has an arsenal made up of More than 600 nuclear eyeletsand that plans to increase this figure until reaching 1,000 eyelets in 2030. Something that, added to the construction of the largest military center in the world 30 kilometers from the southwest of Beijing, it makes clear the strategic response to the arms development of the United States. Image | United States Army In Xataka | Online anonymity no longer has a place in China. His new virtual identity card is assured of this

Spain is no longer the ugly duckling of the European technological ecosystem. Now has the opposite problem

Spain is ceasing to be the lagged technological ecosystem of Europe. The venture capital funds have invested just over 1 billion euros in 95 Spanish startups only in the first quarter of 2025. That represents an 184% increase on the sum collected in the first quarter of 2024, according to a long report published by Sifted. Why is it important. Spain is already the Fourth European country in technological financing this yearand its operations count is already close to Germany and France, with populations and income per capita notably higher. The context. This moment is not accidental, but arrives at the confluence of three factors that have created the perfect storm: The gold fever that is being AI worldwide. Government movements favorable to technology, such as generous fiscal disasters, Visas for Startups and Digital Nomads wave Sett. The appearance of the so -called ‘Mafia founders’: those that have experience in large Spanish companies such as Cabify, Glovo and Job & Talent. There is a turn here: recent rounds are larger and faster to run than before, according to Sifted in statements from sources in the sector consulted. In figures: 95 capital rounds. 910 million euros collected in what we have of a second quarter … … which is 90% more than in the second quarter of 2024. And the trend accelerates: more than half of all financing operations in Spain had at least one foreign investor. The accumulated in what we have of the year is more moderate if we attend to the figures of The referentwhich reach 1,774 million euros compared to 1910, depending on the methodology and type of operations included. In any case, the amount is higher than that of any year except 2021, 2022 and 2024. And we have not even reached the 2025 Ecuador. In the foreground. The big names are here: Between the lines. It is a change that goes beyond money: that there are Spanish founders contacting large investors is a double sign: Increase confidence in your own startups. They look for better conditions than those offered by Spanish funds. This contributes to the gap between British and Spanish equivalent rounds, to give an example, reduce. Yes, but. The background question is whether there really is a change in the trend or if we are simply seeing the consequence of large funds looking for destiny to your money. And that arrival of foreign funds also represents a dilemma for national risk capital: More legitimacy for the ecosystem. But also more competition. Spain has gone from being ignored by the great international funds that its own founders often prefer the conditions that foreign investors can offer. Spanish funds now face a competition that previously existed. The problem contrary to the one they had five years ago. In Xataka | The worst nightmare for governments is to have more pensioners than workers: in Galicia it is already happening Outstanding image | Per Lööv in Unspash

Tesla promised a revolutionary robotaxi service. They have humans supervising and fans as the only clients

On June 22 he will go to Tesla’s own history for being the first day in which the company has operated on the streets with its own robotaxi. He has done it, as there was no other, with strong restrictions, leaving some doubts in the environment and with a good handful of unfulfilled promises. This is all we know about the new service. June 22. “It is the culmination of a decade of hard work.” With these words he has referred Elon Musk in X To the first trips made by their robotaxis service, taking advantage of the publication to thank your team highlighting that “both the AI ​​and software chips equipment were created from scratch within Tesla.” The company has put in the streets of Austin the first trips of its robotaxis, the completely autonomous vehicle service that it intends to have full performance next year. At the moment, the service has given the departure gun between the expected Restrictions. Hard restrictions. Limited to Very specific spaces of the city of Austin, with a Tesla worker in the passenger seat to monitor the operation of the vehicle and with a chosen audience. This has been the First Tile Trips in Texana Cityfulfilling restrictions that their competitors have previously lived. Although travelers have confirmed that Tesla supervisors had not allowed to make any comments not to condition the user, the truth is that Tesla wanted to limit the risks in this launch, selecting very well who can use the service. Fans. It is undoubtedly the black point of the launch. In the deployment of these autonomous taxis, US regulations force them to function limitedly with a closed group. Waymo, in his day, opened the offer to his own workers And, once the favor of the regulators was won, he was able to open the general public with waiting lists and finally any user. In this case, Tesla has also had to close the circle of its potential clients but has done so by choosing fans of the company itself. A look by X demonstrates that those who have climbed into the car are workers from some Elon Musk company, company enthusiasts And some of them They presume to be Tesla investors. They do not comply. This careful selection of users has left us x full of messages propaganda Positive on service. However, there are two key premises that Elon Musk’s company has not fulfilled. They do not travel alone (1). The first is that cars work autonomously but maintain a supervisor in the passenger seat. It is true that during the Presentation of Tesla Cyberercabthe alleged robotaxi that should come into operation next year, Musk took care not to make reference to whether these first trips would be made with a human next. He did not do it because one thing is to talk about deadlines and not fulfill them and another thing is lie about regulations. And it is that all autonomous cars that have been put in the streets of the United States have had to go through this phase of human supervision. Tesla could not promise that the first steps would be given with a completely autonomous car for those focused on the presentation of what it will be (or should be) its service already stable. However, remember that In 2021when the completely autonomous car looked like a chimera, Elon Musk did promised that their cars could be used without human intervention. And that this would be possible in 2023. Something that, of course, has not happened. Flyers and pedals. The same story can be followed as to the “form” of these robotaxis. Almost a five years ago Elon Musk said that in 2023 we would drive a model 2 of less than $ 30,000 and that he could forget the steering wheel. The Tesla Cybercab presented with that same premise but, again, it was omitted what the service would be like and focused on what was to come. As now We count on Xatakaright now American regulators do not allow this type of cars to put on the market. It is something that ended with Cruise’s dream And one of the reasons is very simple: if the vehicle suffers some type of breakdown or disconnection and Emergency services have to move itThey need an alternative available. The steering wheel and pedals are still essential. The deadlines. Once the reality has hit the company and had to adapt to the regulations that mark the future of the autonomous car in the United States, it remains to be known if Elon Musk can fulfill deadlines that seem almost impossible. In statements that almost seemed a parody of itself, Elon Musk said during the presentation of Tesla Cybercab that it tends to be “unusual in the deadlines.” And, perhaps because of that, another impossible deadline was set. That their robotaxis will work in full performance “before 2027, allow it to say so” as conceived. That is, in 18 months Tesla should have an open service to the public on the street, which can charge for it, that reaches the entire city where it is in operation and that, in addition, it does so in an artifact without steering wheel or pedals. It would be to fulfill something that nobody has in the market. Not even Those who have been burning billions of dollars for years To support something similar. Photo | In Xataka | Tesla wants to approve her autonomous driving in Europe. He has chosen the most demential site to demonstrate it: Rome

In order for 125 airplanes and 14 bombs to arrive in Iran, the US used one of the oldest tactics of war: perfidy

The baptized as Hammer operationhe greater furtive attack From the United States against several of Iran’s critical facilities, it was based on a highly sophisticated tactical architecture, one where, above any other trick, the key was the total surprise. To do this, the United States began with one of the most tactics old and effective of war. It all started 48 hours before the offensive, when Trump It gave two weeks To “avoid” the attack. Perfidy. Those two weeks They never existed in the head of the United States, and Israel knew and few more actors. In fact, most European allies were trying to Find a dialogue A few hours before knowing the operation that was underway. From the diplomatic and ethical point of view, Washington was carrying out a form of political perfidysince Iran was participating in conversations that the United States used for the secret offensive. The maneuver also followed a strategy of classical military deception, a series of lures and public messages that, as we will see, avoided any suspicion while secretly prepared one of the most brutal offensives that are remembered in the history of modern wars. The hammer operation. The aerial offensive launched by the United States against the main nuclear sites of Iran represents not only the greatest operational use in the history of the BB-2 Spirit bomberbut also a unprecedented sample of tactical coordination, strategic deception and technological capacity accumulated throughout years of preparation. The attack included use for the first time in combat of the GBU-57/B antibunker pump Massive Ordnance Penetrator (MOP), of 13,600 kilograms, specifically designed to destroy deeply buried and protected facilities Like Fordow. In total, 14 of these bombs were thrown on Fordow and Natanz, while more than two dozen Tomahawk cruise missiles They hit In Isfahánthrown from a submarine Ohio class nuclear positioned in the area of ​​operations of the US central command. The art of deception. It all started on Saturday morning, when flight observers They detected several bombers furtive B-2 Spirit taking off from the Whiteman Air Base, in Misuri, and heading Towards the Pacificwhich seemed to indicate a display towards Guam or missions related to Asia. However, this movement was a decoy: the true bombers in charge of the attack departed shortly after In the opposite directioneast, in mode completely stealthycrossing huge distances without being detected until you reach the Iranian airspace. Fordow after air attacks, seen in a satellite view of the underground complex, on June 22, 2025 The surprise. As we said, the key to operational success was the Deliberate deception: both the visible deployment towards the Pacific and Trump’s statements in the previous days, where he claimed that he would take up to two weeks to evaluate a possible intervention, created the false perception that there was still diplomatic margin. In fact, on Saturday morning, senior officials indicated that it had not been issued No order of attack, reinforcing that illusion. Then, on the afternoon of that same day, from his private club in New Jersey, Trump gave the final order. According to A senior official From the administration, the objective was precisely “to create a situation in which no one would expect.” A graph with details about the hammer operation that the Pentagon published in the last informative session The B2. The main actors were those seven bombers that left in stealth to the east from Misuri. Throughout a 18 -hour flight, with multiple repayings in the air, a profile of minimum communication. Synchronization with escorts, fourth and fifth generation fighters, intelligence aircraft, electronic warfare and air replacement It was millimeter: The fighters released preventive fire to neutralize Iranian air defense threats before the bombers cross the enemy airspace, without detecting hostile activity. The full air package exceeded 125 aircraftincluding platforms such as F-35, F-22, EA-18G Growler and possibly not revealed active. A view of the Iranian nuclear installation in Isfahán on June 22, 2025, after the attacks of the hammer operation Objectives achieved. Between 6:40 and 7:05 pm Washington time (2:10 to 2:35 am in Iran), all nuclear objectives FThey were shocked. The bombings on Fordow, Natanz and Isfahán used 75 precision weapons guided and achieved what the Pentagon described as “severe destruction” of infrastructure. The first satellite images Disseminated by Maxar Technologies showed craters of more than five meters, layers of bluish ash and tunnel entries blocked by landslides. Although Iran did not fire a single antialea defense or deployed fighters, the blow was deep and difficult to reverse in the short term, particularly in Fordow, buried under a mountain and considered so far impenetrable. Hidden cooperation. As we indicated, if someone knew what the United States had in hand, It was Israel. Before the attack, the United States shared with Israel a Systems list of air defense that wanted to neutralize, and the previous Israeli campaign facilitated the opening of the air corridor for the B-2. Coordination included the shared use of intelligence and operational synchronization (in that sense, The F-35 Israeliswith their ability to collect data, they played a key role in the collection of information on Iranian defenses). During the previous weeks, they were made Large -scale exercises that simulated similar missions, and They invested years in the development of technical capacities to integrate armament, sensors, furtive platforms and unified command in a single operating flow. Operation closed? It is one of the great unknowns. Despite the magnitude of the attack, Defense Secretary Pete Hegseth emphasized that the operation does not mark the start of an open campaign, but A punctual action With a clear objective: neutralize Iranian nuclear capacity. Even so, he acknowledged that US forces remain on maximum alert to possible reprisals. In His words“This was not an attempt to change regime; it was a precise operation to defend our national interests and those of our allies.” For now, Iran has limited its responses to new attacks on Israel, but senior Iranian officials already They have declared your right to respond directly against … Read more

The store has never had it so cheap

There is little left to celebrate the Amazon Prime Day 2025 And it shows even in other stores. Mediamarkt is launching a good assortment of campaigns, being the FRIDAY NETWORK One of the most important. During its final track we can find many discounts on mobiles and if you are looking for a good, beautiful and very cheap model, a lot of eye because the Google Pixel 8a He has just downloaded to 360.05 euros. Of course, to see this price it is necessary to register or log in to the store. * Some price may have changed from the last review A very cheap Google Pixel It is not the newest mobile, but the Google Pixel 8a Keep giving a lot of war, especially at this price. One of the most interesting points (but not the only one) is that, as we see in other Google mobiles, He still has several years of software updates (six in total). Regarding its screen, the Google Pixel 8a rides a panel 6.1 -inch OLED Display Act which offers a Full HD+resolution, a 120 Hz soda rate, a maximum brightness of 2,000 nits and compatibility with HDR. It is about this form of a good mobile with compact format. Internally comes with the processor Google Tensioner G3 Together with 8 GB of RAM and, in this case, with 128 GB of internal storage. Its 4,492 mAh battery supports fast charging of 18W and its rear cameras module is made up of a main 64 MP sensor and an ultra -wide angle sensor of 13 MP. You may also interest you Google founded pixel 8a – durable and spots resistant silicone – Android phone case – aloe * Some price may have changed from the last review Google Pixel Buds Pro 2 – Wireless button headphones with active noise cancellation – Bluetooth headphones – Porcelain * Some price may have changed from the last review Some of the links of this article are affiliated and can report a benefit to Xataka. In case of non -availability, offers may vary. Images | Ricardo AguilarGoogle In Xataka | The best mobiles (2025), we have tried them and here are their analysis In Xataka | The best price quality price (2025). Your analysis and videos are here

China does not want users on the Internet. He wants perfectly identified citizens

China will establish a new virtual identity system so that its citizens can record on all types of online services and platforms. The new system – which is now voluntary – is called “identity certification of the National Network” and will make Chinese Internet users lose one of the few cracks that had left: anonymity. Internet card. The regulations of this new centralized Internet identity system It was published In May 2025 and will enter into force on July 15, 2025. Identity checks will be mandatory in all types of online platforms, and that will imply that it will be very difficult for users to maintain their anonymity for example on social networks. This virtual card works as a mobile application in mobile NFCs that can configure both adult and minor users, as explained The guide start -up. The Chinese excuse. In the document published jointly by several Chinese agencies – as the Ministry of Public Security or the administration of the cyberspace of China – it is indicated that its objective is to “protect the security of citizens’s information and support the healthy and orderly development of the digital economy.” A “Antibalas Vest”. In the CCTV account – the Chinese official public television service— In Weibo They explained how These measures “They are based on legal identity information” and will provide a way to verify users in all types of services and “reduce the collection and retention of personal identity information.” It is like “A bulletproof vest so that third parties cannot gather your full personal information,” they say. Digital Totalitarianism. In CNN cite The words of Xiao Qiang, a researcher specializing in Internet censorship, which indicates that “it is a unified identity system and directed by the State, capable of monitoring and blocking users in real time. You can directly erase the voices that you do not like, so it is more than a surveillance tool: it is an infrastructure of digital totalitarianism.” Another repression measure. There is the Internet that we all know and use, and there is the Chinese Internet. And in that last Censorship and control dominate everything. The Chinese totalitarian regime is more patent than ever in the access and use of the Internet, and We have seen In recent years with the massive prohibition of Feminist or LGTB activismthe elimination of Youth jargon In social networks, the fight against CULTITIES CULTor the Total comments control that users publish on social networks to eliminate those that are not appropriate. State pseudonyms. According to the State Media Agency Xinhua, More than six million people They have already registered voluntarily to achieve their particular Internet identifier. The “cyberspace identifier”, as the agency calls it, can have two variants: a series of letters and numbers or an online credential. Both correspond to the real identity of the user “but exclude information in flat text.” That is: they are a kind of pseudonym, but one controlled by the State. “Volunteer” with quotes. One of those responsible for the Ministry of Public Security also indicated in Xinhua how this virtual card was voluntary. However, this voluntariness is debatable because the Chinese government is promoting the integration of said system into various industries and sectors. Haochen Sun, a law professor at Hong Kong University, said in CNN that although the law effectively presents the system as a volunteer, it could end up becoming a system that users would have to end up using to access all types of platforms that integrate it. Silence criticism. This system He began to take his first steps Last year, when a police manager named Jia Xiaoliang proposed it at a meeting of the National Popular Party Congress in March 2024. The criticisms of the experts were numerous, and for example Lao Dongyan, a well -known professor of law at the University of Tsinghua, said in Weibo that the system allowed to “install a espionage device for the online activity of people.” Evogate. That post ended up being erased and the account suspended without being able to publish for three months for “violating important rules.” A year later, when the definitive rules of the project were finally published, there were practically no criticism on social networks. As Xiao explained, it is a typical method in China, which leaves some time before announcing definitive measures to allow some “relief” and those voices end up losing strength. Image | Joseph Chan In Xataka | China is training its AI in suitcases full of hard drives: thus they are mocking the US veto to the advanced chips

20 years ago the button of a Samsung unleashed madness. So much that Mediamarkt had to take away the battery

A phone with such a curious button that Mediamarkt had to take away the battery so that users did not abuse it. It is the story of a Samsung proposal born 20 years ago, with a mechanism that aroused the curiosity of anyone who approached this phone. As you collect Xataka mobileit is one more proof of how Samsung has been the king of folding format for more than two decades. Launched in 2004, the Samsung P510 It was a phone Concha typewith double screen (interior and exterior) and a fairly particular characteristic. At that time, Concha type phones were not so different from the folding now: some force had to be made to open them. But Samsung wanted to go further with this particular model, and completely mechanized the operation of the hinge. It was enough to press a button so that the phone opened and closed its upper part, the lid. Being an electronic mechanism, this curious opening-giving was accompanied by an addictive sound. Nils Raetting account, Technological journalistthat there for 2004 he was working on an old German Saturn. Among the most prominent devices in sales in its store, the P510 takes the prize. Raetting reports that the influx of curious who went to the store in order to test the button was high. To this point, that the battery had to be removed from the exposure model so that both potential clients (as simply curious) did not abuse this mechanism. Social networks show Some short videos with the phone mechanismstill functional in several well preserved units. Surprise the speed at which the phone opens and closes, taking into account that we talk about a phone released in 2004. Although the P510 does not enjoy a memory as prominent in memory as other legends in the style of Motorola Razr V3 or the Nokia 6820, Some units are still sold on websites like eBay about 100 euros. We see descriptions such as “completely motorized, weird”, since this is a trend that the rest of the manufacturers did not follow. In fact, Samsung herself continues to bet in the middle of 2025 for the folding format of the shell type on phones such as the Galaxy Z Flip6. A telephone that there is no trace of a similar button, and to which it would not be easy to implement it given the folding nature of its panel. Image | Phonewizz In Xataka | The folding market is completely stagnant. It’s excellent news for Apple

The demands of the European Union leave Apple two possible paths. Both are problematic

Apple has shared more details about what is behind its appeal against the interoperability demands of the European DMA. Although it may seem a technical issue to come from Apple and tell it in Xatakathis is not a technical dispute, but ideological. The core of the conflict. The European Commission is demanding from Apple opening functions that give meaning to its ecosystem, such as Airdrop either Handoffto third -party devices. He wants any manufacturer to access these technologies as if they were public standards. Apple responds that this “threatens the base” of its technological approach. They have invested years developing an ecosystem where hardware and software work in a coordinated manner to guarantee not only a good functioning, but also privacy and security. And Apple goes further: it accuses the EU of forcing them to “deliver sensitive information” to “avid data companies.” Companies that have already requested access to the content of the notifications and the full history of WiFi networks stored on the devices. An unequal treatment. Apple denounces something striking: “These deeply defective rules that only attack Apple – any other company.” It is a relevant point. Samsung Master the European Smartphones marketbut it is not subject to the same demands. Google controls Android and mobile services, but the EU does not ask her to open her own technology. Apple argues that they are forcing them to “give their free intellectual property to competitors” that do not have to comply with the same rules. The dangerous precedent. The EU not only wants access to current technologies. Demands that Apple share its future innovations in interoperability even before announcing them publicly. So that the competition can “adapt to them.” It is like forcing a pharmacist to publish their investigations before patenting a medication. Or force Tesla to share the plans of your Autopilot With all car manufacturers. Apple says it clearly: “It has cost us a lot of time to develop these functionalities between products that we know well, and now we are also required to work, for example, in Windows, without having the same understanding of that platform.” The consequences. Apple has already taken measures: iPhone Mirroringfor example, it was announced a year ago, but still without being available in the EU. At the time it was hypotured about whether that absence was a way of pressing the EU. It seems that it is something indefinite. Apple has been clear about the future, says these regulations “will severely limit our ability to offer innovative products and characteristics in Europe, leading to a lower user experience for our European customers.” Before it could sound threat, but now it is rather a definition of what is already happening. Two paths, both problematic. If Apple loses the appeal of June 2, you have two options to meet European demands: Make all third -party devices as capable as Apple’s to communicate with iPhone and iPad. Technically it is complex, and is possibly impossible without compromising security. Limit devices in Europe to the capacities available for third parties through basic open standards. In the second scenario, we would see even consequences of functions already present: Airdrop would disappear. The Airpods They would lose their instant matches. The Apple Watch would become a more standard watch, with less exclusive functions. And Europe would keep an impoverished version of the Apple ecosystem. The background. This battle is stars in Apple but transcends its brand: it goes on how we understand innovation in the 21st century from the European Union. Should companies be able to differentiate creating integrated ecosystems, as Apple does? Or should all innovation be immediately accessible to competition? The EU has chosen the second. Apple defends the first. European users will end up paying the price of this dispute. We insist: more technical than ideological. There is a subtle irony here: The world leader in defense of privacy He is forcing to create blind security points that do not exist today. All in the name of a competition that can destroy incentives to innovate. In Xataka | The decline of the “Apple culture”. Blind devotion has evolved towards critical enthusiasm Outstanding image | AppleWikimedia Commons

His power is to keep other airplanes in the air

While the spotlights point to b-2 bombersthere are other deployed planes that go through practically unnoticed: KC-135 Stratotankerveterans with more than six decades of service that have once again operated in the Middle East, just when the United States has attacked several nuclear facilities in Iranian territoryincluded Fordow, After reinforcing its military presence in the region in full climb with Israel. They do not launch missiles or participate in direct attacks, but their role is essential: they allow fighters, bombers and recognition planes to hold prolonged flights without landing. In the military deployment that the United States is executing in the Middle East, the KC-135 Stratotanker It is not a footnote. It is part of the logistics nucleus that allows aerial machinery to continue working without interruptions. According to Media as Reuters and BBCat least 30 cistern aircraft have been mobilized, mostly of this model, to accompany f-16 fighters, F-22, F-35 and other aerial assets deployed in the region. Its function may seem secondary to the naked eye, but has direct strategic implications: to the replenish in flightthe KC-135 eliminates the need for aircraft to interrupt their mission to refuel on land. That translates into operational continuity, greater tactical autonomy. And it’s not just a support for fighters. It also serves as a support for bombers, recognition aircraft, medical units and, when necessary, allied forces A beast with more than 60 years of history (and still has rope) When the KC-135 It flew for the first time in 1956the world was another. The Cold war He dominated the military strategy, and the United States needed a fleet capable of sustaining its aerial power at a global scale. Boeing offered a solution: a military variant of the Model 367-80the prototype that would also lead to the mythical 707. Thus was born the Stratotanker, which began to reach the air bases in 1957 and that, against all prognosis, remains in service in full 2025. Of the more than 700 built copies, much was subjected to a process of radical modernization. The most visible change: engines. The ancients were replaced by CFM56more efficient, powerful and silent turbo. Thanks to them, the KC-135R-the most common version today— consume 25 % lessit costs 25 % less operating and is almost 96 % quieter than the original model, according to official US Air Force data. But not everything has been mechanical. Throughout the decades, the KC-135 has also been adapted for very different tasks: aerial command, surveillance, experimental tests or even missions in compliance with the open skies treaty. Few platforms have demonstrated so much versatility and resistance to the passage of time. How the Replacement in Flight works From outside it may seem a simple maneuver: two planes flying nearby, one transfers fuel and everything continues as if nothing. But in reality, aerial refueling is an extremely delicate operation that requires Perfect coordination between pilots and operator. In KC-135, this task falls on the call Boom Operatora crew member that is located at the back of the plane, lying down, with direct vision of the receiver and total control over the extensible pole of refueling. That articulated arm (Flying Boom) It is the main tool of KC-135 to transfer fuel in flight. Its design allows a precise connection between aircraft that fly at high speed and altitude. The connection requires absolute concentration: the operator guides contact and keeps it stable even in turbulence or maneuvering conditions. In addition to the pole system, some KC-135 are equipped with an additional system: the Druga kind of aerodynamic funnel that allows us to refuel aircraft with probes, as European helicopters or fighters. There are also models with pods in the wings that allow supplying two planes at the same time. All this makes Stratotanker a flexible platform, capable of adapting to multiple configurations according to the mission. A key piece also in the modern war Behind his austere silhouette and his gray paint without ornaments, the KC-135 hides an optimized machine for efficiency. It is propelled by four large thrust engines, capable of taking it at speeds close to 850 km/Hy to operate at altitudes up to 15,240 meters. He is not intended for agility or combat, but meets an immovable premise: being there when he is needed. Can take off with a maximum weight of 146 tons and transport more than 90 tons of fuel to transfer to other aircraft. If the mission requires it, it can also load up to 37 passengers or about 38,000 kilos of material on the upper cover, just above the refueling system. All this in a structure of 41.5 meters long, with a wingspan close to 40 meters. As for its reach, it can cover more than 2,400 km with 68 tons of transferable fuel on board. In type missions Ferrywithout external load, can exceed 17,700 km, allowing intercontinental flights without scales. In medical evacuation missions, the KC-135 becomes a kind of flying ICU. Thanks to special pallets, you can transport patients on a stretcher with a specific medical crew. It is this versatility is what Stratotanker has made a piece difficult to replace. The KC-135 continues active duty more than SEis decades later of his first flight. Although the KC-46 pegasus It has already begun to assume part of its functions, Stratotanker is still one of the main resupply platforms of the US Air Force. Its maintenance, its successive modernizations and its capacity proven in multiple scenarios explain its constant presence in long -range operations. Images | US Air Force (1, 2, 3, 4) | Master Sgt. Vincent de Groot | US Department of Defense In Xataka | We prepare to say goodbye to Windows 10, but part of the US Air Control still works with disks and Windows 95

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.