Italian producers are fed up with the Parmesano stolen. So they are putting microchips

Gouda, ManchegoCheddar, Roquefort and Parmesano, of course. All have in common that they are Cheese typesbut also that, together with many others, they represent something more important: culture, tradition and even a country. Such is the importance of certain foods that the European Union created the DOP seal, A quality system To protect them. But outside the EU, products are still confused under the DOP that have a lower quality. In Italy they have tired have decided to take action on the matter armoring the Parmesan cheese. As? Inserting microchips. Parmesan. Parmesan is one of the most ‘copied’ cheeses in the world. And it is not due to its flavor, but to something that interests the industry much more: its prestige and the high value of it. Parmesan is used in recipes as dear as Pizzas Or a certain type of pasta, and if you have ever bought a Parmesan, you will know that the price is very different from other wedges. Out of Europe is the jungle. It is one of those cheeses with the seal of Denomination of Protected Origin And, although the European Union prohibits the use of the name “Parmesan” for products that are not ‘Parmigiano Reggiano Dop’, the problem is that there are markets, such as the American, in which a cheese ‘parmesan’ is sold that nothing has to do with Parmesan. Apart from the United States or Latin America, there are versions of ‘ParmesanReggianito‘Argentine after World War Ithat it was consolidated so much that it caused the creation of the Reggiano Parmigian consortium. It is estimated that this imitations market moves around 2,000 million dollars annually. To put it in context, the authentic Parmesan moved 3.2 million in 2024. The bark is like a huge barcode And the detail of the QR where the microchip goes A Burrada. Estimates point to 90% of products labeled as “Parmesan” that are not really Parmesan. These are cheese made based on cheaper cheese mixtures, with extreme cases of some stuffed with wood fibers. And, as you can imagine, it is something that entails several inconveniences for the DOP, such as direct damage to the consumer being a lower quality product, but with a high price. And also affects Parmesan’s own industry, eroding its cultural value. The Italian consortium He has managed to block some attempts to parmesan cheesebut it has not been enough and manufacturers have gone to action. Microchips in food. For a few years, the Parmesan cortex (which is a part that is not usually consumed, although it is very good to make a cream or to some popcorn) incorporates QR codes. They allow a traceability of the product and are “printed” based on dairy proteins. If you want to eat the bark that carries that QR, there would be no problem. The wheel also has a system of points that act as a kind of identity document. However, the volume of fraud forced the sector to look for new solutions. There the microchips come into play. Developed By the American company P-chipthis microchip is somewhat larger than a salt grain and is inserted into the casein label. Each has A unique code that stores all cheese information: Origin. Production date. Place of production. Origin of milk. Protecting the denomination of protected origin. It is something that allows producers and distributors to verify the authenticity of that piece and, of course, gives a guarantee to the consumer, who knows that he is paying a high price for the product he wants to buy. According to security tests, and how we can read in The Guardianalthough the chip is in contact with the food, it does not leave toxic waste and can be easily removed at home because yes or yes it is in the QR code. This began to be implemented in 120,000 of the four million wheels annually in Parmesano, but the Reggian Parmigian consortium wants this technological solution to become a standard in its industry. Beyond Parmesan. In the end, it is a measure for Protect the economic value of the product And, if the DOP seal does not say – not protect – nothing outside the European Union (a seal that shares cheeses such as Manchego or Roquefort), which at least between QR and microchips There is a traceability and a fight against “falsifications”. The objective, according to account The president of the PRC, “is to transmit the value of our product globally and distinguish it from products with similar names in the market that do not meet our strict production and area of origin.” And, precisely, the Reggian Parmigian can teach the way to other products with denominations of origin such as the Padano Grana or the aforementioned Spanish and French protected cheeses. Images | Parmigianoreggiano, Udo Schröter, Morgan Cheeses In Xataka | Bodegas have been labeling their bottles with all kinds of animals for years. It turns out that they are key to choosing wine

‘Louie Louie’ looked like a harmless song. Until the FBI examined her two and a half years in search of obscenities

It is very possible that there have been numerous songs in the history of pop that have deserved a exhaustive monitoring by the FBI. When rock’n’roll was considered a poison that destabilized youth, The songs abounded qualified by parents and educators as obsceneeven many that today sound harmless. But none reached the extreme of being investigated for two and a half years by an incomprehensible letter … In case the flies. In 1963, ‘Louie Louie’, a modest song performed by The Kingsmen Group and that was a previous version of Richard Berry in 1955 It became one of the greatest successes in the history of pop music. Sold millions of copies, forming such a notorious phenomenon that He caught the attention of FBI himself. The reason? The lyrics were so confusing that it suggested that it could include pernicious hidden messages. And that the original trail of the song came by long. Berry, in fact, had inspired a Cuban bole The title ‘El Loco Cha-Cha’. The lyrics of Berry’s version He talked about A sailor who sails back to Jamaicawhere his girl awaits him. Its simplicity (a single riff throughout the song) made Berry himself value it too much and sold the rights to the Flip Records record. In this way the song would circulate as a repertoire song, with groups like The Wailers versioning it before The Kingsmen. Interestingly, the singer of these, Jack Ely, had only heard the song once previously in a Jukebox And the melody caught badly, with what The Kingsmen song is slightly different from all the abovereceiving a special air, as a counterpoint touched. When his manager saw that the band spent an hour and a half concert playing only that song, he decided that he had to record it urgently. For that same reason, it was decided that they would try to recreate the sound of a live interpretation, hang the micros from the ceiling and with all the instruments sounding at the same time. The recording was full of problems: Ely wore orthodontics and was barely understood. And the instrumentalists did not listen to their voice, so each one goes to their air: hence the famous mistake in the 1:57 minute, when Ely advances to his entrance after the single and the battery filled his mistake with a redouble while the rest of the musicians continue. They believed that it could be correct, but there was no time to record more shots. To positive. The FBI arrives The success, which led the song to sell a million copies in its first year of life, of course, caught the attention of different associations of parents and leagues of decency that they wanted to ban it for its indecent content. Although no one was very clear about what exactly the indecency consisted. Because The singer was not even remotely understood. Although imagination could distinguish a slight Fuck Murmured half -song. The Governor of Indiana ended up prohibiting its dissemination in 1964 for its “obscene content”, which redoubled its attraction for youth. The politician came to say that his ears “buzzed” when he listened to the song, which undoubtedly turned the film into a demonic object. This triggered moral panic and led the song to get the attention of the government. The inquiries They ended up to the FBI: Cryptographers were hired by analyzing each sound And, of course, the singer was interrogated on numerous occasions. Officially, the FBI declared that the song was “incomprehensible at any speed.” But to heal in health, the seal that had edited the song published in the magazine ‘Broadcasting Magazine’, oriented to professionals and the industry, the full lyrics. So that there would be no trace of doubt. But the thing would not be there: a letter from an enraged father because of a letter “so obscene that he could not replicate it” caught the attention of Attorney General Robert Kennedy and the director of the FBI, J. Edgar Hoover. The investigation reopened, interviewed Richard Berry, the Kingsmen (curiously, there was no talk with Ely, who had left the band) and the record staff. Two and a half years later, the FBI concluded that the letter was so cryptic that it did not admit interpretations, and therefore, it was not obscene. In 2005, when ‘Louie Louie’ had become an impeccable monument in rock history, the controversy fled: the superintendent of a University of Michigan prevented the orchestra from playing ‘Louie Louie’ in a local march. There will always be paranoid delusions among high educational positionsIt is seen. Today the song is considered an icon whose influence on current rock is impossible to quantify: 4,000 versions of the theme have been counted and figure without possible discussion, again and again, in the periodic lists of the best songs of all time. Nothing bad to have been forbidden by the FBI.

To decongest Everest, Nepal allows you to access another 97 free peaks. The problem is that nobody wants to upload them

Although some contender seeks to remove the crownEverest remains the mountaineer Grand Prix. Hundreds of people die every year During the journey to the top and arriving, it ensures personal glory and a certificate. So important is that There are those who lie about their feat. It is evident that Everest is a tourism monsterand that has led Nepal to take a radical solution: let out other peaks of the Himalayas free of charge. It won’t be so easy. Pressure. Getting to the top of Everest is not simple. Sample of difficulty are the bodies that accumulate In its corners, but mountaineering, and specifically Activity at Everestremains one of the heavyweights of the Nepali economy. It is estimated that, in 2024, of the 5.9 million dollars that the country obtained directly from the climbing permits to its peaks, more than 75% were thanks to Everest. And we would have to add expenses such as stays, food and other activities related to that activity. The problem is that it is saturatedwhich led the government to touch prices. The rates to undertake the adventure will rise 36%, from $ 11,000 to 15,000 to upload the mountain in the busiest months. And, from September to November and from December to February, when the influx is lower, the rates will be placed at $ 7,500 and $ 3,750, starting from September 1 of this year. The Himalayas opens from par. Money is not the only thing that will need those who want to crown the top: there is also debate about the need to have made a mountain of more than 7,000 meters from the country itself before climbing Everest. And there the measure that adopted from Katmandú a few weeks ago comes into play. On July 17, and during the next two climbing seasons, Nepal opened For the doors of almost a hundred mountains. Specifically97 located in the westernmost regions of the country. 77 Cumbres are in the province of Karnali and the remaining 20 in Sudurpaschim, and are not negligible picos because, after all, Nepal has eight of the ten highest mountains in the world: Saipal – 7,030 meters. API West – 7,076 meters. API – 7,132 meters Tourists, welcome (please). If we look at the figures, this measure makes all the meaning of the world for two reasons. The first and most obvious, decongesting Everest, being a huge logistics challenge to have to manage that number of visitors. The second, distribute a little tourism that, currently, are concentrated both in Everest and other central summits. The Government wants to arouse interest in little visited tops or even virgins. And if before we talked about more than 75% of the money that the climbing permits leave in Nepal come from activities at Everest, we must specify something more: in 2024 421 permits were issued to climb Everest, but there were only 68 mountaineers that They tried Go up at 97 summits that will now be free. Challenges beyond the mountain. Giving that incentive for the adventurers to explore other areas of the country, they will not only decongest their great peak, but also give an oxygen ball to more remote areas, but with equally impressive peaks. Now, the great challenge will be to convince climbers to go to those areas. Karnali and Sudurpaschim are precisely the poorest and least developed regions of Nepal. The services are limited, the scarce infrastructure and are not the most prepared areas to manage tourists efficiently, something that also moves those possible visitors away. And the big problem is that, as they point out in BBCit is not clear how local communities would face the avalanche of climbers or, even, if the authorities have plans to improve infrastructure or connection with these more remote areas. Because climbing those 7,000 -meter peaks can be free now, but if arriving is an adventure even greater than crowning the top, the climbers will continue to go to the area that is prepared: that of Everest. Image | Sebastian Pena Lambarri In Xataka | During confinement we abandon mass mountaineering. It’s time to try to get back

We believed to know what killed Napoleon’s army in Russia. The finding of a tooth has shown us something else

In 1812 there is a moment that was going to be registered in the history books. The Russia invasion by Napoleon culminated in one of the greatest military tragedies: The great arméeformed by more than half a million men, was forced to a devastating withdrawal marked by hunger, cold and disease, a combination that cost the lives of hundreds of thousands of soldiers. Or we believed. Health catastrophe. In the summer of 1812, Napoleon Bonaparte gathered up to 600,000 soldiers for his campaign against Russiathe greatest force he had ever deployed. However, the burned land strategy of Tsar Alejandro iwhich involved Evacuar Moscow and deprive the supplier of supplies, forced the withdrawal of the French army to Poland during a brutal winter. Between October and December of that year, more than 300,000 men perishedvictims of hunger, the extreme cold and a wave of diseases that devastated to an already weakened force. For a long time, the testimonies of survivors and the first scientific analyzes pointed to the TIFUS and the trench fever as the main culprits, reinforcing the idea that the bad hygienic conditions had sealed the fate of the great Armée. The new findings. Now, research carried out In the Pasteur Institute in Paris they have contributed a more precise vision thanks to metagenomic techniques, capable of identifying genetic material of any pathogen present in human remains. Nicolás Rascovan’s team analyzed Thirteen soldiers Buried in Vilna (current Lithuania), epicenter of mortality during the withdrawal. The results did not detect traces of typhus or trenches fever, but they did reveal the presence of Salmonella Entericacause of paratyphoid fever, and Borrelia recurrentis, transmitted by lice and responsible for recurring fever. These diseases, although not always fatal, would have deeply weakened soldiers already exhausted by endless marches, lack of food and glacial temperatures. In that context, even pathologies that in other circumstances could have overcome became mortal. Napoleonic invasion in Russia Lethal combination He New scenario It suggests that defeat is not explained by a single infectious agent, but by a devastating combination: physical exhaustion, starvation, extreme cold and a set of diseases that, together, undermined the resistance of tens of thousands of men. The Parathyphoid fever It would have caused diarrhea and dehydration, while recurring fever progressively weakened with cyclical episodes of high fever. All this, added to the lack of hygiene, to the spread of lice and the impossibility of adequate medical care in the middle of the chaos of the withdrawal, turned the Napoleon army into a paid field For the disease. The magnitude of the health catastrophe even exceeded combat losses, and became one of the decisive factors that precipitated the collapse of the campaign. Historical and scientific implications. Although some experts warn that the amount of recovered DNA is reduced and that the results are not entirely conclusive, The study It marks an important advance in the use of modern tools to reinterpret historical episodes. Demonstrates the Metagenomics potential To trace diseases in ancient human remains and offers new perspectives on how biology, and not only military strategy, it can explain the collapse of whole armies and populations. Researchers They point That these techniques could also be applied to the study of communities in America and Australia after European contact, where the lack of reliable records and historical biases make it difficult to understand the true impact of epidemics. The defeat that sealed the empire. The Tragedy of 1812 It is still one of the most studied inflection points in military history. The collapse of the Great Armée Not only stopped the Napoleonic expansion, but triggered the offensive of his enemies and the beginning of the end of his empire. While the epic of the campaign has traditionally been narrated in the key of battles and strategic decisions, the New evidence They confirm that biology and disease played a central role in the debacle. The withdrawal of Russia was, ultimately, both a military disaster and an epidemiological catastrophe, and the DNA of a few teeth found in Vilna has allowed to illuminate more precisely the executioners invisible and tiny that decimated the soldiers of Napoleon in one of the most lethal winters in history, starting with an unexpected “army” of lice. Image | Jean-Louis-Ernest Meissonier, Blaue Max In Xataka | “Even if I told you, you would not believe me”: the mystery of what Napoleon saw when he slept in the great pyramid of Egypt In Xataka | ‘Napoleon’ is Ridley Scott’s most controversial film in years. Not among critics: among historians

Mazda was the last redoubt in cars with physical buttons. The new CX-5 has taken them ahead

From a few years to this part, the car industry has sought that The user perceives the car as a Gadget further. The huge touch screens have invaded the splashes of almost all brands and, at a very hard speed, to the simplest and most necessary actions (change the air conditioningfor example) have become a few touches on a screen. Mazda was one of the brands that resistance exercised Against this Invasion of screensmaintaining the useful and traditional buttons. But if we talk in the past it is for a reason: The CX-5 It shows that Mazda 6e It was no exception. And, according to Mazda, it is what we want. Look, without looking! At a point where practically all the competition was betting on screens, larger and more waiting for technology to be ready to turn the moon on a screenMazda was one of the last bastions in the industry that resisted that present. In the last generations, they continued to bet on the physical buttons and controls in the cabin. The decision was based on the Safety at the wheel (which, in the end, is the most important thing) and the user’s own experience. With the buttons, our muscle memory allows us to perform actions such as controlling music, GPS or air conditioning without playing a screen and diverting the road view. And, although the last Mazda had a small screen, it was out of reach, you had to press buttons and move dials. Mazda, you too… However, it seems that market pressure has ended up making a dent. We already saw it A few months ago with Mazda 6ethe 100% electric Berlina of the Japanese company that incorporated an extremely similar interior both to Tesla as a byd and other competitors. This is an diaphanous interior governed by a huge central screen. We could think that, okay, it was 100% electric and wanted to try a different philosophy. The problem is that it was not an experiment. Presented a few weeks ago, the new CX-5, eliminated the Mazda logo of the steering wheel (this hurts more than the disappearance of the buttons), but also incorporated a 15.6-inch screen in the center of the dashboard, with multimedia and air conditioning controls. Maintain certain buttons on the steering wheel, but to change basic things, the screen will have to be wearing. Goodbye, Mazda logo. Some buttons are maintained, such as the emergency or the moons. The rest, to the screen and behind the wheel What customers ask for. But it turns out that it is not only market pressure, but, apparently, what customers want. In an interview granted by Stefan Meisterfeld, vice president of operations to The Drivewith Google as an assistant in the car, many actions can be done through voice commands. In addition, they have designed the system to be “intuitive, easy to use and easy to drive at the same time.” Meisterfeld says that it has not been a whim of the brand, since “customer opinion has definitely been part of the decision -making process.” In addition, he has talked about the steering wheel: “It is a new design with physical buttons with which most of the critical functions can be controlled quite intuitively while driving, so you can keep your hands on the steering wheel and eyes on the road,” he says. Against. When the launch approaches, we will see what these “critical functions” are, but it seems clear that there is no back and that the new generations of the compact and rest of the range of SUV They will add to this new line of design and philosophy. And they will do it at a time when there is Users who show a ‘fedow’ for this type of tactile controls and most importantly: organisms such as Euro NCAP are against. It is the most relevant in Europe to evaluate vehicle safety and, after carrying out collision tests, From 2026 there will be a new exam. If you cannot select the flashing, activate the ‘Warning’ button, sound the horn, activate the windshield wiper or the Ecall emergency button From a button, the car will not have the five stars. Are they late? They are soft measures, but between those and user complaints, there are companies like Volkswagen that have reversed. Interestingly, one of the most enthusiastic with the screens, recently hit a flying with statements by his own design chief confirming that Cars “are not a phone”. In the end, fashions come and go, although some brands prepare the return of the buttons, seen in events such as the Shanghai Motor Show show us that Lso screens have come to stay, at least for a while. Is Mazda late to this new form of control? Seeing competition, it seems not. Now we will see what users think because Mazda 6E could be an experiment, but the rest of the majority ranges had buttons that made them models other than those of the competition, and the CX-5 has sought not to uncheck. Images | Mazda In Xataka | I have bought this car for a simple reason: I’m fed up with giant screens

Now we are discovering reality

Passwords are a gain. Remembering them is an almost impossible mission, creating safe versions makes us entering several special symbols, and to top it off, we see leaks of these data from time to time. Therefore, the different technology companies seek a definitive solution to end them. One of the alternatives that is gaining more popularity is apparently simple and elegant: Enter the email or phone and receive a single -use code. But it is not completely safe. Large companies adopt the ‘Magic Link’. The login without password has been adopted by different companies such as Microsoft. The promise is clear: eliminate friction and risk of reused passwords in different services. However, what seems like an ingenious solution is becoming a security nightmare, a system that, in certain scenarios, can be even worse than the denoted passwords, as the expert Daniel Huang recognizes. And it is not a theoretical threat; It is already actively exploited. Introducing the email is the first step of deception. A priori seems like a simple and harmless system, and as users we are getting used to that If we receive a code you have to use it. But where? This is where a cyber of the intention finds a new reef for attacks of Phishing improperly effective. It all starts receiving an email or a SMS of Phishing Very convincing. It can be an irresistible offer or a security notice that attracts a lot of attention that is accompanied by access to a web page, which is a perfect clone to the original through which they are being passed in the SMS. This is where they ask that the phone or email be introduced, and it only remains to wait for the next step. Behind the screen is where the attacker is located. Where it is not seen, the hacker introduces the email or phone on the legitimate website, which makes the real service Send a six -digit code completely valid to the input tray or the mobile messages section. And here it is where the false website Ask that the verification code that has been received be introduced, taking advantage of the previous times where doing this had happened absolutely nothing. Here the damage is done. The code is received by the attacker who will use it on the Real website, starting session and changing all the login information as email or telephone to seize an account. And defense systems serve as little, since a password manager cannot self -model anything and as the code is legitimate and sent from a real service spam filters They will not jump either. A security problem that has already been exploited. This does not remain alone in theory, but has been put into practice. One of the most notorious examples is Microsoft’s login system for Minecraft accounts, as shown In the company forums either In Reddit threads. Many players point to how they lost access to the account of the morning due to this type of fraud. The employer was always the same: they received an email with some excuse about their Mojang account and following the steps delivered the hint access code in the silver tray. Classic access code or passwords. This is the great decision that must now be made by large companies. And one of the solutions that would guarantee have a safe password is A good password manager. In the event that it is of quality, access credentials are linked to a specific URL, and that is why if an illegitimate website will be accessed, the web address will not coincide and will not be self -realized. The best defense is common sense. With both access systems, 100% security is not achieved. In the past we have seen Very important password leaks, Like hackers They published very extensive files with credentialsthe robbery scams that have been reported either the strategies that are followed To make the robbery of credentials, Even in Chrome. That is why, as security councils, the most important thing is Check web addresses and distrust everything that can get out of the normal. Images | Brett Jordan Towfiqui Barbhuiya In Xataka | Si fraud: what is and why it is not recommended with a “yes” when it calls you an unknown number

Notifications killed our concentration. Now they are kidnapping our mobiles

For more than and a half, the applications of our mobiles They are perfect machines to suck time that hook us with techniques such as Scroll infinite. We have ended with A generation that lives decentralized Even when we do not receive relevant notifications of work, school, friends or family. And that is precisely one of the big problems we face today: an enormous amount of useless, irrelevant notifications and in many absurd cases that kidnap our mobile. What’s happening. It is increasingly common to receive unwanted notifications on our mobile. And the pity is that, in the face of email, there is no Spam filter. The problem is that there are applications of banks, neoboncos, transport, electronic commerce, food at home or second -hand sale, for putting examples, which do not stop riding advertising notifications without relation to the reason why they are installed. The problem. The engineer and hacker Jaime Gómez-Obregón told Recently the behavior of some of the most popular applications you had installed on your iPhone. Blablacar sent him promotions notifications, despite having deactivated trade communications. Without authorizing offers, they arrived from Cabify, Uber or N26. His followers told him that the same thing happens with Revolution, Wallapop and Banks Applications such as BBVA. A server can talk about your experience with OpenBank: receive more promotional notifications than bizums, payments or transfers, despite having requested that they do not send me more advertising to your customer service by phone. When deactivating notifications as a final measure is dangerous. We talk about kidnapping because, although both in iOS and Android we can deactivate the notifications of the applications we choose, the important thing is what we lose in doing so. If I am waiting for the Uber driver to arrive, I can’t deactivate his applications. If I am waiting for a possible Wallapop buyer to respond to which I am interested in selling something quickly, I cannot deactivate notifications. The same happens if I am waiting for the notification of my payroll or a transfer in the bank or the message of a Blablacar driver for a journey that I cannot do with any other means of transport, and that of not seeing it, I risk not being able to reach a destination. In the end, it is similar to deactivating notifications in a WhatsApp group where a lot about important things are discussed. With the difference of our contacts they know that they can talk to us in private to let us know that something relevant is cooked and we have not heard. In Wallapop you can individually deactivate promotional notices. Without losing user messages notifications. The solution we expect and does not arrive (with exceptions). The rain of promotional notifications is easily solved, if applications developers want. In the APP notification settings it can be offered separately stop receiving notifications of direct messages, a public mention, or advertising. The problem of many applications is that everything gets into a sack, and you cannot deactivate only advertising, or not in an obvious way (without having to send mails, make calls, etc. In this sense, my partner Javier Lacort complained on Twitter a long time ago Wallapop behavior. Without defining the type of promotional message he was learning, Javier learned thanks to The response of a follower That Wallapop is one of the companies that incur this good proposed practice: it lets you deactivate the promotions separately. The general reality? Insufferable. Google is clear that it is wrong. Apple not so much. On its documentation website on developers, Google makes clear “When not using a notification“The reality is that with their services they send similar messages. Apple prohibited notifications with ads until 2020. Changed the rulesand now Send notifications promoting savings in tickets to see ‘F1’ In the portfolio application. Even so, in the Standard 4.5.4 They modified continue to mention the following: Push notifications should not be used for promotional or direct marketing purposes, unless customers have explicitly accepted to receive them through a consent text shown in the user interface of your application. This is how Google explains to developers the bad practices on promotional notifications. And when requesting the notification permit, Wallapop, for example, does not inform in any way that it will later send promotional messages (although in your case we can deactivate them separately). When asking for notifications, applications do not report that they can contain promotional content, as Apple establishes in their terms. In full era of AI, both Google and Apple could implement filters to detect notifications not requested by the user and whose relevance is very questionable. They could also provide the system of functions to filter keywords or list of words allowed and prohibited according to each application. It is just what he does Bullkill Notification Manager on Androidand its users mention being Very happy Just to combat promotions. Android offers control of notifications by category, but, again, it is something that the developer has to activate so that the user can choose what type of messages he wants according to the app. Image | Generated with chatgpt and Jonas Leupe in Unspash In Xataka | I have been following the advice of those who point to the mobile and its notifications such as the tobacco of the 21st century

In silence, Morocco is becoming a peculiar economic power: the "Türkiye" of the teeth

In recent years, Morocco is becoming a proper name in several sectors. His relevance in the geopolitical panorama, economic and energetic It is now out of any doubt, but also wants to do A elbow hole in the tourism sector. Rather, to bites, since a trend that has taken traction between tourists is to travel to Morocco to visit the country and return home with a new mouth. And has made Spanish dentists raise an eyebrow. All inclusive tooth tourism. When we travel, many opt for complete packages that guide the experience. What is happening in countries like Morocco is that travel agencies and dental clinics themselves offer all inclusive packages that combine everything we need to enjoy both the country and extra services. These packages include flights, cultural experiences and, to finish off, Dental treatment. If you have ever had to undergo some mouth treatment, you will know that they have been between previous analysis, the procedure itself and the reviews, but these clinics highlight their ability to perform the treatment in a few days. The goal is to arrive, receive medical attention, do tourism and return home. In Xataka The Canary Islands will tend an underwater cable to Morocco. If Morocco decides to extend it, Spain will have a problem Usual treatments. They make it clear that they have 3D scanners, CAD/CAM technology (scanning tools, virtual design and automated manufacturing thanks to 3D printers) and the specialized personnel necessary to carry out the procedures. Which is it? Well, some quite helped and “from here I catch you, here I kill you”, and others somewhat more complex: Aesthetic veneers. Dental implants. Crowns and complete reconstructions. Whitening Orthodontics. {“videoid”: “x8px49v”, “Autoplay”: True, “Title”: “Antibiotics are ceasing to be effective and the problem is superbacteria”, “Tag”: “Webedia-prod”, “Duration”: “327”} Price and record time. And, apart from the times, if you have had to touch your mouth you will know perfectly what it costs. Prices vary depending on what treatment we do, but the most common seems to be the veneers. They are what we can see with the naked eye in a smile and may, influenced by the media pressure and beauty standards With perfect smiles On television, Tiktok and InstagramIt is also the most popular. It is estimated that the prices of this procedure in Morocco are between 70 and 80% cheaper than in countries such as the United States or the United Kingdom. It all depends on the material (composite or porcelain veneers can be made, for example), but there are also couple offers with resin veneers composed of 1,250 euros per person … or 2,000 euros for two people. Not only Morocco. It must be said that Morocco It is not the only destination that we can see publicized in networks or the web if we want to make any touch -up. Türkiye (also popular for other aesthetic procedures) and Albania have been one of the Main destinations for dental tourism. The veneers, again, are the protagonists, with cheaper prices than in other markets. The arguments are exactly the same as we see in the case of Morocco: “A recklessness “. The big question is what Spanish dentists think. And the answer is evident: not very well. The General Council of Dentists published on July 1 a release On this type of tourism, recommending that we be cautious about this type of advertising. The main argument that wields against these dental treatments Express is that the necessary time is not dedicated to it. In Xataka There are young Spaniards earning $ 10,000 a month in the Australian coal mines. But everything that shines is not gold All treatment entails risks, and if the oral state of each person is not correctly evaluated, short and long -term inconveniences, such as dental sensitivity, gum problems and even dental loss may arise. Traveling to another country to undergo a health process is not an adventure, it is a recklessness, ”says Oscar Castro, president of the Council. In addition, it ensures that leisure and health cannot be mixed and that, if something happens with the pieces that the patient has put in Morocco, who is responsible. In Xataka | Spain has been an untouchable power of Mediterranean tourism for years. A country steps on your heels: Türkiye Image | CAROLINE LM (Function () {Window._js_modules = Window._js_modules || {}; var headelement = document.getelegsbytagname (‘head’) (0); if (_js_modules.instagram) {var instagramscript = Document.Createlement (‘script’); }}) (); – The news In silence, Morocco is becoming a peculiar economic power: the “Türkiye” of the teeth It was originally posted in Xataka by Alejandro Alcolea .

The US wants China to become addicted to Nvidia chips. His problem is that his greatest rival is not for the work

The administration led by Donald Trump has realized that her predecessor and herself have made a very serious mistake. SANCTION PACKAGES that have deployed during the last three years To prevent China from doing with the most advanced semiconductor manufacturing equipment, and also with avant -garde chips for artificial intelligence (AI), have forced the Government of Xi Jinping to become independent of foreign technologies. The Chinese industry of the integrated circuits has advanced a lot during the last five years, and will surely continue to do so. It is very likely that in 2026 Chinese manufacturers have their own extreme ultraviolet lithography equipment (UVE). And currently Huawei, Moore Threads and other Chinese companies have GPU for some scenarios They compete with the Nvidia and AMD chips. The independence of the Chinese semiconductor industry is underway. The best output given this juncture for the US is none other than to deliver to China in a controlled way advanced chips for AI, but less powerful than the most capable that design Nvidia, AMD or brains. In this way this Asian country may relax a bit its ambition for development and independence. This is exactly what the Trump administration is doing by allowing Nvidia to give back to its Chinese clients Your GPU for IA H20as Chris Miller holdsthe author of ‘The chips war’in his Newsletter. China is getting out of Nvidia The future of Nvidia in China is largely in the hands of the administration of the cyberspace of China, known as CAC for its English denomination (Cyberspace Administration of China). This institution is the main Internet regulatory body in China and is thoroughly investigating NVIDIA H20 GPU Because it suspects that this chip could incorporate a back door of difficult location by Chinese experts. If so, the possibility of China to use this GPU could be possible. David reber Jr., Nvidia Security Director, published last week An article in the blog of this company entitled “There are no rear doors in the Nvidia chips. There are no deactivation switches. There are no spy software” in an obvious attempt to defend the company’s reputation and appease the growing distrust to which he faces in China. There is a lot at stake. If the final resolution of the CAC turns out to be unfavorable with all probability NVIDIA will lose a good part of the income currently obtained in this country. The Chinese government is urging Chinese companies that are dedicated to the development of large models of the use in their Chinese chip servers However, this is not all. Whatever the CAC verdict is a fact that the Chinese government He is urging Chinese companies that are dedicated to the development of large models of AI to use in their servers integrated circuits of Chinese origin. In this scenario their best bazas are now Huawei and Moore Threads. The first of these companies has lists its own GPU for iathe chips ascend AI, for more than five years. During this period of time it has been refining them and increasing their abilities with the purpose of matching or even overcoming the performance of the chips A100 and H100 of Nvidia. His most ambitious proposal right now is the chip Ascend 910dwhich seeks to overcome the performance of the H100 GPU. However, this Chinese company has also recently presented its chip Ascend 920a solution that is clearly destined to occupy in the Chinese market The H20 GPU space. This proposal will enter large -scale production during the second half of 2025 using 6 NM integration technology that have presumably developed elbow with Huawei elbow and SMIC. On the other hand, Moore Threads He has developed several GPU for AI applications that, on paper, rivaize some of the advanced solutions that have placed in the Nvidia, AMD or Huawei market. The MTT S4000 and MTT S3000 cards are its most interesting proposals right now, although, curiously, in its porpholio the MTT S80 card, a proposal for games and content creation that, according to Moore Threads itself, has a 14.4 TFLOPS calculation capacity also appears in Floating Coma operations of simple precision. It doesn’t impress, but it’s not bad at all. Image | Gage Skidmore | Wikipedia More information | Financial Times In Xataka | Ten Chinese companies in Chips and IA have allied with a common goal: to put an end to the domain of Nvidia

The disaster was such that for 40 years it was silenced

Spy stories And authentic paws weather will be many, and we are sure that we do not know a good number of them. However, few can approach what happened in one of the most famous and majestic mountains on our planet. There a peculiar excursion took place several decades. Everything that could go wrong, went worse. In fact, Plutonium is still there. For those who do not know what we are talking about, NANDA DEVI It is the Second High Mountain in India and the twentieth third in the world, with a height of 7,816 meters. It is not just any peak, since it has a deep cultural and spiritual meaning, especially in the Uttarakhand region, where it is considered sacred. The area surrounding Nanda Devi has been recognized for its unique biodiversity as a World Heritage by UNESCO. The park protects a variety of species and is an example of the wealth of Himalayas. In addition to its natural and cultural importance, the enclave has been a symbol of adventure and mountaineering. Since his first ascent in 1936, it is a challenge for mountaineers around the world. On the other hand, its ecological fragility has restricted the region to protect its environment. This last point, as we will see next, was not always the case. Hopefully nature is not vindictive … The first nuclear test Not far from the mountain, in October 1964, the First nuclear test in China In the immediate vicinity of Lap Nur Lake, a region that bordered the Kuruk-Tagh mountains. This test was followed by several tens and put on the US on alert. The CIA investigated how far the Chinese were advancing. Two years before, China had defeated India’s army and those first evidence were an example of power and strength. The American agency concluded that they were staying behind in the nuclear race in a delicate context such as the cold war. And not only USA, India felt inferior after its border defeat. The alliance between the two countries soon arrived. What did they do? In an era where there was no satellite espionage technology like the current one, both nations signed A secret pact to combine efforts and spy on Asians. As? Literally, sending secret agents to the field “battle”. In other words, sending spies to the confines of the world, to some of the most imposing mountains on the planet where Chinese nuclear tests were being carried out. If the idea seems somewhat movie, it is because it is. The proposal of both nations consisted of using some of the mountains of India from which to see what they were doing from the Chinese side. It may seem naif, or even innocent, that the espionage agencies of both countries watched with good guy watch another nation thousands of kilometers for the simple fact of being in one of the “peaks” of the planet, but history shows that it was so, and In 1965 the “Master” plan was given green light. The CIA begins to search and recruit the spies that would bring the plan to fruition. One of them was Robert SchallerMedicine student in Seattle to which a proposal worthy of a Hollywood film is sent. They needed A doctor in Himalayas With experience in electronics and mountaineering, a combination of requirements that took them to the student, the first on the list that was filled. When the team had formed, intense training in a secret enclave began for months. Together with Schaller there were a large number of celebrities who were going to become citizen spies like him. For example, the famous Yosemite climber, Tom Frost, or the one who was going to be the captain of the expedition and famous mountaineer for the expeditions to Everest, Mohan Singh Kohli. Others were not so well known, but they were elites, researchers or teachers whose knowledge in nuclear technology put them at the service of the secret alliance between the US and India. We are not talking about normal training, of course. After the first tests the level was raised for several months with jumps from a helicopter, or demolishing objectives with explosivesthey even managed Experimental Atomic Energy Hardware that had been developed exclusively for the mission. Last and not least, the team had to prepare for the ascent crawling next to the mission material by the Alaska cliffs. A year after the first Chinese nuclear test, this team of intrepid citizens turned to spies is ready. All are found in the sanctuary, a kind of natural strength of the summits that surround the Nanda Devi, the final objective. A detail nothing trivial: until then, only six people had managed to make a summit in the peak, and of those six, only three had managed to go down alive. Be that as it may, the plan continued with an unexpected partner. It had not been revealed until then, but the team had to ascend with an extremely heavy surveillance package, a monitoring system that required atomic energy to work. We talk about An artifact containing a 19C Snap generator which converted the heat of the plutonium into electricity, which subsequently allowed monitoring possible nuclear activity (in this case, of China). Climbing with plutonium If up a mountain with the right material is a complicated activity, with an atomic artifact of extremely heavy motorization was a matter of faith. In addition, we talk about types that came from very different fields, many very poorly prepared for such a physical mission, no matter how much they were training for months. Therefore, during the day the artifact made their lives impossible and advanced up the ramps as turtles. However, at night the thing changed, and The device was able to provide extra heat to spies. And, inside the generator, there was enough plutonium to feed the surveillance system for more than a thousand years, which for practical purposes would mean that both USA and India could monitor the Chinese for centuries. During a … Read more

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.