Madrid Metro has spent millions on advanced machines to cover them like shacks

It was February 14, 2024 when the Community of Madrid confirmed the last investment with which he was going to get married had been committed: 145 ticket vending machines to access the Madrid underground. The deployment came in large numbers. The almost one hundred and a half devices are part of the second phase of the Metro Technological Improvement Planan investment that also includes, for example, the renovation of hundreds of Metro access turnstiles. The investment tries to give a new face to facilities that are beginning to become small after not having received large investments in the last 20 years. Now, line 6 is being modernized, line 11 is being expanded and the stations are receiving new equipment to adapt to the new transport titles. Click on the image to go to the original tweet Equipment that, in the case of these machines, will be deployed in 19 stations. The first ones, boasted the account of X of the Madrid Metrothey arrived this same week. The leap in quality is evident: 42-inch high-definition screens and even the possibility of opening a video call with Metro services to ask for help if any complications arise. Latest technology devices to be distributed at some of the busiest Metro stations in the capital such as those at the airport, Nuevos Ministerios, Feria de Madrid or Príncipe Pío, among others. Very advanced machines with “Metta’s 4.0 technology,”in the words of the company itself. Machines to which Metro de Madrid has had to put a plastic umbrella. And of course, they have unleashed mockery on social networks. 7.7 million euros and a piece of plastic “It’s plastic. Greetings” This has been the answer that the Madrid Metro has given X to a multitude of users who have asked why the company has put uralite umbrellas on its newest and most advanced machines. Despite describing the innovations and advantages of these machines, many users have focused on that plastic appendage that appears at the top of the machine. An appendix that, without a doubt, is reminiscent of the uralite roofs, everything must be said. Indeed, we could continue with the concise answers of how the person behind the social networks of the Madrid Metro has tried to appease the responses to the shabby difficult to explain solution that the company has used to protect its machines. Madrid Metro has defended itself reiterating that this plastic roof has been installed because the station is leaking. Some leaks that, according to the company, are not its responsibility and, therefore, for the moment the machines will be protected with this particular umbrella for as long as necessary. Meanwhile, Madrid Metro users will be able to use “the intelligent keyboard for destination selection” with “natural language recognition capacity” that the devices have. They can establish a video call with the operators if they need telematic help and they can even obtain new transportation tickets to travel. Of course, we recommend that users open the umbrella. There are leaks. Photo | Madrid Metro In Xataka | 1,500 tons in weight, 100 meters long and one objective: excavate Metro Line 11 in Carabanchel

In its race to make advanced chips, China has tried to copy ASML. It’s going wrong

China continues to make extraordinary progress when it comes to manufacturing its own advanced chips, but it still has a big problem: it does not currently have manufacturing equipment. extreme ultraviolet photolithography (UVE) own. Of course is working in the development of this technology, and one of the strategies it is following to overcome this challenge is unique… and almost obvious. Reverse engineering. In his 2010 book ‘Copycats’ Professor Oded Shenkar argued that it is often the case that imitators end up triumphing over innovators. Although in the West the view is the opposite, in China there is a positive view of copying and reverse engineering processes are an important tool to copy technologies. That is what the country has supposedly tried, as indicated in The National Interest (TNI). From producing for the world to producing for themselves. Already we review the conclusions from the book ‘Apple in China’, which is a perfect example of how by delegating production to China, Western companies have ended up contributing to the country’s development and its specialization. The trade war has logically made China now seek its independence in the face of the vetoes it is suffering from developing its own technological solutions. From UVP to UVE. There has already been significant progress in this area, and recently we counted as a Chinese manufacturer already has a prototype of a UVP machine (deep ultraviolet) for the creation of relatively advanced chips. If there is a crucial challenge to be able to create these even more advanced chips, it is power. have UVE photolithography machinesbut having that first problem solved is important to make the leap to EUV technology. And this is where something unique has been discovered. Let’s see how it works inside. As revealed in TNI, it has been revealed that China has been “caught” trying to reverse engineer a machine ASML UVP Photolithography. Not so much to mass produce these machines, sources indicate, but because Chinese technicians are trying to learn how they work in order to replicate them and, from them, develop more advanced machines and chips. It’s not broken just because. However, it seems that when disassembling one of these ASML systems, Chinese technicians damaged it. That made them notify the official ASML technicians to solve the problem. When they arrived, they discovered that the machine had not simply broken, but that the Chinese had tried to dismantle it and then reassemble it. ASML’s de facto monopoly. ASML’s UVE photolithography machines are considered the most complex and advanced in the world, and the truth is that today the Dutch company has a de facto monopoly with such systems. It is these machines that allow access to the production of the most advanced chips – such as those used in NVIDIA’s modern AI accelerators – and have become the true bottleneck of the semiconductor industry. Beyond the damaged machine. The incident reveals two crucial points. The first, Beijing’s extreme urgency to be able to control chip production from start to finish. The second is that the challenge of creating these machines goes beyond mere hardware copying: lithography systems require extraordinary technical mastery of components such as precision optics or materials science. Too many obstacles? China may have brilliant engineers, but ASML machines also have a highly specialized supply chain which undoubtedly makes it difficult for such a machine to be built entirely in China. A good example is Zeiss SMTthe German company that supplies the ultra-precision optical systems and mirrors needed for UVE and advanced UVP photolithography systems. A long way to go. This supposed problem reveals the difficulties that China is going through in order to have machines with advanced photolithographic technologies. At Nikkei Asia They were already talking in July about how complex it is to achieve a “Chinese ASML.” In this analysis they cited Didier Scemama, director of hardware research at BofA Global Research, who estimated that China still has years to achieve something like this. “It may take 5, 10, 15 years, we don’t know. Will it be competitive with what ASML does? It’s highly unlikely, but it will be good enough for China.” Image | Zeiss In Xataka | Holland has just declared war on China in the most important battle of the century: control of semiconductors

In his mission to follow the movements of North Korea, South Korea has decided to bet on an advanced steering wheel

In South Korea, the surveillance of heaven It is a constant task that is never terminated. Missile tests and the use of low flight drones The need to strengthen detection systems has highlighted by the north. Radars on land, conditioned by the country’s geography, do not always offer the necessary coverage against threats that seek to go unnoticed. To respond to that challenge, Seoul has decided to bet on a new generation of Early alert planescapable of expanding surveillance and ensuring more stable control of your airspace. It is not just about incorporating technology, but ensuring that the country has sufficient means to anticipate any scenario. The search for a new early alert plane It started in 2020when the Defense Procurement Agency (DAPA) approved the second phase of its AEW & C program. By then, South Korea already had four E-737 Peace Eye acquired from Boeing in 2006 and delivered in 2012, but the experience had made it clear that they were not enough. Parliamentary documents revealed in 2019 indicated Availability problems and technical failuress that prevented maintaining the planned patrol rate. To that limitation was added the pressure of an increasingly complex strategic environment, marked by the expansion of North Korean arsenal. A jump in the air surveillance strategy Seoul has opted for an unusual combination until a few years ago: an executive reactor Bombardier Global 6500 equipped with radar The/W-2085 developed by Elta. This system, with active electronic exploration antennas on the sides and additional sensors in the nose and tailallows to monitor in all directions promising a much greater scope than that of conventional radars. With this model, the country is looking for a more compact platform and with operational costs contained compared to larger solutions. The contest was marked by a struggle between two proposals that started from the same base plane, the 6500 global. L3Harris offered to integrate it with the radar the/W-2085, while the European Saab presented its globaleye solution, equipped with the radar Erieye Extended Range. Dapa’s evaluation concluded that there were no major differences in technical performance, but in other aspects. As the agency explainedthe American proposal received more points in operability, maintenance costs and contribution to the local industry, while the Swedish firm stood out in price and contractual conditions. Conceptual Image of Global 6500 for South Korea According to Dapa, the approved budget amounts to 3.87 billion wones, about 2,820 million dollarsand contemplates the incorporation of four planes until 2032. The goal is to have permanent patrols capable of monitoring the national airspace without interruption and coordinating the response in case of crisis. Deliver planning up to that horizon will progressively integrate aircraft in the operations of the Air Force. An E-737 Peace Eye in the United States The industrial component presumably had a relevant weight in the decision. L3harris has been supplying equipment to the South Korean armed forces, from electro-optical and infrared surveillance systems to safe communications and night vision devices. The company has an authorized service center in the country, which reduces maintenance times and simplifies logistics in case of breakdowns. The 6500 global is expected to reinforce the air defense of the Asian country. These devices will be integrated into the grid national Istarconnecting combat sensors and units to generate a complete image of airspace. Its main mission will be to detect intrusions and coordinate the immediate reaction, but its regular use is also contemplated in periods of calm to maintain training and preparation of crews. Images | L3harris (1, 2) | United States Air Force In Xataka | The F-47 will not only be the most advanced hunt in the United States: the filtration of its badge has revealed what country it aims

The F-47 will not only be the most advanced hunt in the US. The filtration of his badge has revealed which country aims

Last March was the closest thing to winning the lottery in the Boeing headquarters. After spending tremendously complicated years, the United States gave him air with the contract contract: The future F-47aspiring to replace F-22 and overcome it in everything to become the New armed arm of the nation. Several months have passed since then, and now the badge that will accompany the standard of American combat fighters has been leaked. There are not many doubts about the enemy. An emblem under construction. The Network appearance of a patch with the Registration “F-47 SMO” and the central figure of a phoenix has revived speculation around the program of the sixth American generation hunting. The Air Force confirmed That the design was prepared within the F-47 system management office, although it has not yet been formalized and is in the development phase, that is, the final design may undergo some change. The patch includes several recurring elements of the military heraldry (golden deltas, red stars, books in Latin), but also, and perhaps the “nuclear”, more enigmatic symbols, such as silhouette From the Chinese oriental coastthat suggest the strategic orientation of the project towards an eventual confrontation with Beijing in the Pacific. The motto “SUPERAMUS PERSAMUS LETAMUS” (“We defeat, persevere, rejoice”), inherited from previous initiatives of the NGAD programreinforces the idea of ​​continuity of an effort that was close to canceling and that, like the mythical bird, seems to resurface from its ashes. Program symbol. The central reason for the phoenix, or Firebird, is especially significant in the trajectory of F-47. Before administration Trump will rescue himthe NGAD was about to be sacrificed to other budgetary priorities. Hence, the metaphor of the Renaissance charges strength: an immortal project that, despite political doubts, resurfaces with renewed vigor to become the pillar of US air superiority in the coming decades. The reference to the phoenix also evokes the duality of the “Firebird” Eslavacapable of being blessing or cursewhich reflects the enormous technological and financial commitment that the program implies. Although unlikely as an official name, the nickname could be popular in the same way as The A-10 It is known as “Warthog” and not for its formal denomination, Thunderbolt II. Cryptic details Beyond the phoenix, the patch accumulates symbols with open interpretations. The three yellow deltas remember the used In previous badges of the Agile Development Office, linked to the NGAD since 2019, and could refer to the competition between Boeing, Lockheed Martin and Northrop Grumman, from which it finally emerged Boeing winner. The six red stars Evoke to the Test Center Groom Lake ultrasecreto, known as area 51where NGAD prototypes were tested. With fewer doubts that white silhouette appears, with the profile of the Chinese coast, and which fits with the role assigned to F-47 as a spearhead to penetrate the EPL anti-aircraft systems in an eventual conflict. The acronym “FBC”, without official explanation, adds one more degree of mystery to the whole. History and nomenclature. The number 47 pays tribute to both the legendary P-47 Thunderbolt of World War II as a year of Foundation of the Air Force in 1947, in addition to coinciding with the presidential numbering of Trump, decisive in the relaunch of the program. The history of US military aviation offers precedents in which unofficial names surpassed the formal: the A-10, officially Thunderbolt II, is universally known as Warthog. Perhaps for this reason, in the future, the F-47 could maintain the Thunderbolt tradition, released after the withdrawal of the A-10, or adopt an alternative nickname like Phoenix, although the denomination is already reserved for Another navy plane. Projections and context. The F-47 will be the nucleus of the United States air projection capacity on the horizon of mid-century, conceived not only as a combat plane, but as part of A system system which will include accompanying drones and emerging technologies. Boeing already works on the first specimens, with an inaugural flight planned for 2028although the entry into operational service remains uncertain. Your essential mission will be drilling The denial bubbles of area (A2/AD) of the adversary and ensure the air advantage in high intensity scenarios in front of China. The aesthetics of the patch, which, as we said, is still provisional and can undergo changes, therefore works as a symbolic window to the “nuclear” mission and the narrative that the Air Force wants to build around its most ambitious air project since The F-22. Image | USAF/RAMA World, inc. In Xataka | Boeing came from difficult years. The US has just given air with the contract that can mark his return: that of the new F-47 In Xataka | Boeing F-47 images reveal that it will not be as “furtive” as expected. But it has something more suggestive: Canards

In full boom of energy drinks, Coca-Cola has decided to bet on something else: “advanced hydration”

You just need to enter a power shop and see the refrigerators full of cans of a thousand and one colors to get to the conclusion that if there is any saturated sector in this country that is that of drinks. But Coca-Cola believes that it is not enough. That is why he has just announced that It disembarks in Europe with ‘Bodymarmor Lyte’its commitment to “revolutionize” the segment of advanced hydration; A sub-director who, in the next three years, will grow 24%. And he will start with Spain. And that is perhaps the most interesting question: how have we gone from living in a world hooked to energy drinks to another in which the largest world giant of drinks bet everything to a product To “squeeze life to the fullest and that sometimes experiences moments of exhaustion that prevent you from maintaining your usual rhythm”? What is the ‘advanced hydration’? An almost Marketinian term to call a “hydration approach” that beyond simple water consumption. It incorporates additional components such as electrolytes, vitamins, antioxidants or other ‘technologies’ to enhance “water absorption, retention and nutrient rebalancing.” It is used in several areas, but what interests us today to understand Coca-Cola is its use in the sports field. There, it comes to basically mean the use of water with electrolytes. Water with things. That’s where Bodymor Lyte enters. As explained from the companyit is a non -isotonic drink, low in calories, designed to improve water absorption (thanks to electrolytes) and B6 vitamins. And it is curious because Coca-Cola already has two very popular brands in this range: ‘Aquarius’ (with a composition based on mineral salts) and ‘Powerade’ (especially formulated for “rehydration and resistance” in sport). More than a curiosity … While ‘Aquarius’ is a product of daily, massive and accessible hydration, ‘Powerade’ focuses a lot on the sports field. This is important because with ‘Bodyarmor Lyte’, Coca-Cola is doing something similar to the turn that Apple with the Apple Watch: a turn towards health and the premium. Because? It is true that the great phenomenon of drinks in recent years has been energy. Coca-Cola, in fact, participates with own products (such as Burn) and also with participation in others (such as Monster). However, as the energy segment grows, so does the health sector (that of drinks without caffeine). In fact, it has been the boom of the “coffee” drinks that has driven the contracting of ‘Better-For-You. That’s where Bodymor Lyte wants to settle. A vision too uniform of an increasingly segmented market. In 2004, Malcolm Gladwell He told the story of Howard Moskowitz. Moskowitz was asked to find the perfect spaghetti sauce. The problem is that, after spinning and more turns, he realized that he could not make a sauce that liked everyone. It was then that he proposed to get more from a sauce. As Gadwell explainedfollowing his advice, “Preno introduced the extra thick sauce and, during the next 10 years, they earned 600 million dollars with their line of thick extra sauces.” In 2004, RAGU had 36 varieties of pasta sauce. Something almost unimaginable 20 years before, when there was only one. The world becomes increasingly diverse (or perhaps we see more and more) and that allows them to grow totally opposite phenomena. Who was going to tell us that a drink was going to reveal the difficulty we have to design policies in today’s world? Image | Coca-Cola Company | GKGRAPHIX53 In Xataka | We already know what energy drinks cost your rest. They are bad news for your dream

NASA is so obsessed with defeating China that, instead of delaying its next flight to the moon, it has advanced it

It seemed like him Artemis program It was intended to be delayed again and again, but NASA’s last movement betrays the enormous geopolitical pressure of the moment. Artemis II, the mission with which the United States will return to lunar orbit for the first time in more than 50 years, is no longer scheduled for April 2026. They have advanced the launch window to February 5. A declaration of intentions. This two -month advance is not a simple recalibration of the calendar of the Artemis missions. It is the NASA’s evening response to the feeling that the United States is staying behind the Methodical Lunar Program of China. NASA recognizes that “there is a desire that we are the first to return to the surface of the moon,” and Artemis II is a first step. The mission without a launic had been postponed from 2024 to 2025, and then to “not before April 2026”. Now the launch window opens two months before: on February 5, 2026, leaving as a deadline “not later April 2026”. Solving the ghosts of Artemis I. To understand why this advance is significant, you have to remember why Artemis II was delayed first. The main cause was the thermal shield of the Orion ship. After the return of the mission without crew Artemis I in 2022, NASA’s engineers found a disturbing surprise: the Orion shield had lost pieces of protective material. The gases generated by the heat of the reentry did not dissipate as planned, creating an overpressure that started fragments of the shield. After almost two years of research, NASA says having understood and solved the problem with “maximum trust.” Of course, the solution is quite simple: they have modified the trajectory of the ship in their return to the earth to prevent the high temperatures that caused the failure. Next to him, NASA has solved other minor failures such as liquid hydrogen leaks that plagued the launch attempts of Artemis I. The second space race. “The administration has asked us to recognize being in what is commonly called a second space race,” said the buliesha Hawkins, NASA’s attached administrator. His current boss, Sean Duffy, agency administrator and Trump’s Secretary of Transportation, has a more direct rhetoric: “We are going to win the Chinese on the moon.” The fear in Washington is that China, which plans to send its first astronauts to the lunar surface in 2030, the American Mission Artemis III is ahead. While the Artemis program accumulated delays (largely due to the slowness of the Spacex Starship ship, necessary for the Aunidation of Artemis III), the Chinese program advanced with a firm step and without making a lot of noise. Experts in China’s spatial capacities such as Dean Cheng have come to affirm which is “quite likely that the Chinese terrify on the moon before NASA.” Advance Artemis II (the previous step without alansimiza) is the form that NASA has to demonstrate that it is still in the game. What is Artemis II. Its main objective is to certify that the Orion ship and the SLS rocket can take humans to the moon safely. For ten days, American astronauts Reid Wiseman, Victor Glover and Christina Koch, as well as Canadian Jeremy Hansenthey will go around the moon without landing, following a free return trajectory that will bring them back to the earth. The mission also has an important symbolic burden. They will be the first humans in more than 50 years to leave the orbit low terrestrial, traveling further than any other human being in history, more than 9,000 kilometers from the hidden face of the moon. From this unique perspective, They will carry out crucial geological observationsphotographing craters and old lava flows. They could even be the first humans to see with their own eyes the eastern basin, a gigantic structure on the boundary between the visible face and the hidden face of the moon. Their descriptions and data will be vital for the alunage of Artemis III. The great irony. The advance of Artemis II is a calculated movement. NASA shows the world that it has overcome its technical problems and is ready to accelerate. Artemis II is not just a step towards the moon, it is a sprint in a geopolitical career and for the control of lunar resources. The great contradiction is that, while NASA accelerates the overflight of Artemis II, its star mission, the alun of Artemis III planned for 2027, remains in serious trouble. Just a few days ago, the agency’s security advisors panel launched a blunt warning: They doubt that the modified version of the Spacex Starship is ready on time. His estimate is that he could accumulate a “year” delay. Therefore, the result of this space race is still open. Image | POT In Xataka | When the first human being stepped on the moon we all believed that he had abandoned the “earth.” We were wrong

Some of the most advanced satellites in the world seemed untouchable. Two hackers showed that they could be kidnapped

In satellites, each maneuver depends on software that is rarely subjected to public security evidence. Demonstrations in controlled environments have put vulnerabilities on the table that, under certain conditions, could allow the Remote Space Systems Control. It is not a timely failure or an isolated experiment: it is a sign that security should be reviewed with magnifying glass before it becomes news for wrong reasons. In August, during conferences Black Hat USA and Def with held in Las Vegas, researchers shared their findings, According to IEEE Spectrum. The work focused on two key pieces: the Core Flight System (CFS), used in NASA multiple missions, including the telescope James Webband Yamcs, a control system of the European company Space Applications Services. The failures, however, were identified and corrected before their dissemination. The finding reopening the debate on cybersecurity in space Behind the finding are Andrzej Olchawa and Milenko Starcik, experts from Visionspace with direct experience in space operations. They analyzed open source software with the mentality of an adversary, seeking reproducible vulnerabilities. They did not need months of analysis: in a few hours they managed to locate 37 failures that, in controlled scenarios, allowed to manipulate critical systems. They acted on their own environments and coordinated with developers to patch the software before disseminating their conclusions. The analysis of the Core Flight System (CFS) revealed that, although it is a key piece in NASA missions, its exploitation would not be simple. To compromise it would take toCceso Physical to a land station and operate at frequencies reserved for space communications. Even so, researchers warn that, in the hands of a state actor with sufficient resources and coverage, this scenario is plausible. In their demonstration they explained that, with that capacity, it would be possible to raise orders to the satellite and modify their behavior. Yamcs, unlike CFS, was more accessible to an attacker. The researchers showed that a campaign would suffice Phishing Successful to load a malicious configuration in the control center. With that entrance door they could issue arbitrary orders or alter files, all from any location with Internet connection. The exercise showed how this vector opens a much larger and less protected attack surface. In Black Hat USA 2025, Andrzej Olchawa deepened the reach of the tests and shared details on how vulnerabilities exploited. He stressed that All maneuvers were executed in simulated environments and that no real satellite was at risk. His explanation sought to give unlarmed technical context, showing precisely how far actors with sufficient knowledge and access to the right systems could reach. “In some cases, we were able to send arbitrary telecomandos to the ships through the mission control system. In others, we managed to take control of the entire control center and, in other cases, if you are able to send telecomands to the ship, you can get remote execution of code directly in it.” The threat panorama has changed: where there were private networks and local stations before, there are now remote control, cloud services and connections from home. This evolution multiplies the attack possibilities, according to researchers, and explains why theoretical vulnerabilities are now a reason for alert. An example is THE ATTACK AGAINST VIASAT IN 2022which affected thousands of users and coincided with the beginning of the war in Ukraine. The case suggests that space systems are not isolated from global conflicts. Corrections arrived on time for open projects, with updates that mitigated the techniques demonstrated in the laboratory. The pending challenge is in closed systemswhere the absence of access to the code limits the review by external experts. Images | Gontran Isnard | Xataka with Grok In Xataka | Perseverance has found what, according to NASA’s director, is “the clearest indication of life we ​​have seen on Mars”

China showed the world an indecent amount of unpublished artillery. But the most advanced weapons remained hidden

Yesterday We enumerate And we draw the Route of China in the field of military arsenal during the parade that commemorated the 80th anniversary of the victory over Japan and the end of World War II. As We countthe message was quite clear and forceful, showing a part of the power achieved by the popular liberation army in its accelerated modernization. However, more than one AS was left in the sleeve. The hidden power. Some of those developments that have not already showed them here, others not so muchbut everyone has something in common: they are the most advanced weapons of the nation, hence their concealment in public light. Many of them remain in secret because they are still in the development phase, for their strategic sensitivity or because they cannot be exhibited in an event of these characteristics. What was seen in the Tiananmén Square was just a fraction of the real capacity of the Chinese Armed Forces, which in parallel develop disruptive technologies with deep implications for the future war. Aviation and “the” electromagnetic. We have treated it. China is testing site generation fighters, provisionally known as J-36 and J-50that after their inaugural flights they have continued in the trial phase, and whose level of sophistication remains under strict secrecy. Similarly, prototypes of Riel and coil cannonscapable of intercepting hypersonic and ballistic missiles at low cost, they are too limited in size and are restricted to large ships, making it impossible for their deployment in a terrestrial parade. The reusable space vehicle is also hidden, in Tests since 2020an analogous platform to the American X-37b which can remain months in orbit and meet classified military missions. Furtive hunt J36 What we did not see of naval power. Naval modernization has been central since the last parade of 2019, with the launch of the Fujian aircraft carriersthe construction of Future Type 004and the amphibious assault ships Type 075 and Type 076. To these is added the development of Strategic Submarine Type 096which will reinforce maritime nuclear deterrence in the next decade. None of these platforms can roll through Tiananmén, although some of its weapons and aircraft systems could be shown. Tests with an electromagnetic rail cannon Cyberdefense and Digital War. The PL considers cyberdefense one of the pillars of its national security. Since the creation in 2015 of the Strategic Support Force and, in 2024, of the new Cyberspace ForceChina has centralized intelligence, cyber attack operations and critical infrastructure defense. Although the parade It included winks To these “new forms of combat”, the authentic arsenal of cyber -cyberms and offensive capabilities, what is doubtful, will remain hidden, leaving in the shadow the true magnitude of Chinese digital operations. New furtive combat apparatus in the test phase in China AI and autonomous systems. Artificial intelligence integration is a strategic priority. The Pla Work in algorithms To process real -time combat data, optimize logistics and maintenance, and generate training scenarios. Attack and recognition drones as the GJ-11the Wing Loong and The Rainbow They already incorporate autonomous navigation, recognition of objectives and coordination with other platforms. Although some of these devices will be shown, their algorithmic “brain” will remain invisible to the public. Drone Rainbow prototype Nuclear deterrence. China deployed Intercontinental Balistic missiles and strategic bombers as a gesture of strength, but the true pillars of their nuclear deterrence did not come to light. The command, control and communications systems, designed to resist a first blow, the reinforced silos of the northwest, the vast network of underground tunnels known as known as The “Great Underground Wall” and nuclear submarines armed with ballistic missiles, both the TYPE-094A assets and The future Type-096. South China Sea, where elements of the Great Submarine Wall System are installed Early alert and antimisile defense. China currently has a strategic network that combines infrared alert satellites capable of detecting ballistic releases anywhere in the world and huge fixed matrix radars, capable of tracking missiles and furtive aircraft in full flight. These systems are vital for strategic defense And they have already overcome multiple interception tests since 2010, but their static and highly classified nature keeps them out of the parade. Fujian, the biggest war boat with China’s leading technology The “great underground wall.” As we said before, in parallel, China builds a underwater surveillance system With hydrophones, sensor nodes and autonomous vehicles to monitor enemy submarines in the Eastern and South China Sea. This framework, known as the “Great Underwater Wall”, is essential to guarantee the safety of its nuclear submarine fleet and reinforce its anti -submarine capacity. Its existence is intuited, but its location and operation remain in the strictest secret. And space. With more than 500 satellites military and double useChina is trying to achieve independence in navigation with Beidou, recognition capabilities with the Yaogan series and safe communications for command and control. It also develops antisatellite weapons, from direct ascent missiles tested in 2007 even orbital proximity maneuvers and possible directed energy weapons. None of these systems appeared in the parade, but represent a key vector of their “computerized” war strategy. The industrial force. It We comment yesterday. China’s greatest hidden trick is not only technological but industrial. The ability to produce in its own territory from rifles to aircraft carriers, through reaction engines and hypersonic missiles, ensures independenceresilience and speed of production. The Military-Civil Fusion Strategy allows civil advances in defense, as occurs in aeronautical engines, where the experience of the CJ-1000A Commercial feeds the development of The WS-10 and WS-15 that drive the J-20 furtive fighters. In short, the parade showed the world a Power showcasebut the most lethal and transformer of the Chinese armed forces was hidden. Under the surface, in tunnels, in satellites, in monitored seas and in high -tech factories, there is a framework of capacities that seeks to redefine global military balance in the next decades. Image | Planet Labs Inc, @WZZJWZ, Office of Naval Research (Flickr), X, Infinty 0 , Ministry of National Defense The People’s Republic … Read more

China already has one of the most advanced observatories on the planet to hunt the most elusive particle that exists

Neutrinos are The most elusive particles of nature. They were first described from a theoretical point of view in 1930 by Austrian physicist Wolfgang Ernst Pauli, one of the parents of Quantum physics (We owe, among other contributions, known as exclusion principle). However, its experimental discovery took place two and a half decades later, in 1956. We owe it to American physicists Frederick Reines and Clyde Cowan. There is a forceful reason that explains why these particles are so difficult to detect: They barely interact with ordinary matter. In addition, its mass is very tiny, its electric charge is neutral and are not influenced by strong nuclear interaction or electromagnetic force, although due to gravity and weak nuclear interaction. There is no doubt that they are very special particles. Scientists often illustrate how difficult it is to capture a neutrino explaining that every second trillion of these particles go through both the earth and us without colliding with any other particle. You can also illustrate how elusive that they are using quantum mechanics, which ensures that it would be necessary to manufacture a lead plate with a light year thickness to ensure that half of the neutrinos that go through it collide with the particles of the lead block. The Jiangmen Observatory is ready to hunt neutrinos Despite how elusive neutrinos are, we have several observatories that are able to detect them. One of them is The Japanese Super-Kamiokande. This installation is located in Hida, a city located in the central area of ​​Honshu, the largest island in the Japanese archipelago. It is built in a mine, 1 km deep, and measures 40 meters high and another 40 meters wide, which gives a volume similar to that of a fifteen floors building. However, the authentic protagonist of this article is the Underground Observatory of Neutrinos of Jiangmen, which is housed in the Chinese province of Guangdong. Like the Super-Kamiokande Japanese, Juno, which is how this Chinese observatory is known for its English denomination (Jiangmen Underground Neutrino Observatory), It is a real monster. His heart is a cylindrical pool 44 meters deep that is housed in an underground chamber with granite walls. The neutrin detector consists of a 41.1 meters in diameter stainless steel mesh that supports an acrylic sphere of 35.4 meters in diameter The neutrin detector consists of a 41.1 meters in diameter stainless steel mesh that supports an acrylic sphere of 35.4 meters in diameter. This container is full of a very exotic liquid expressly designed to interact with neutrinos and produce a light of light that can be detected. Juno contains no less than 20,000 tons of this liquid, which allows him to erect himself as the largest neutrin detector on the planet. The composition of this fluid seeks to maximize the amount of light generated by the interaction of each neutrino. Its three fundamental components are linear alkyl benzene, which acts as a solvent; 2,5-difeniloxazole, which is the molecule that is excited when a neutrino interacts with herwhich causes the emission of a flash of light; And, finally, 1.4-bis (2-methylstiril) benzene, which absorbs the ultraviolet light that emits 2.5-difeniloxazole and re-enters it with a longer wavelength that is easier to detect. The flashes of light are collected by 45,000 photomultiplier tubes that cover the inner surface of the sphere. By measuring the intensity, position and duration of these flashes, scientists can reconstruct the trajectory and energy of each neutrino. And all this for what? Wang Yifang explains it to usJuno spokesman: “This observatory will allow scientists to address fundamental questions about the nature of matter and the universe.” Neither more nor less. Image | Generated by Xataka with Google Gemini More information | Digital Diario In Xataka | The future circular collider of CERN will cost 20,000 million euros. Can leave us cheap

Ukraine has opened the most advanced Drone Kamikaze in Russia. Now they know what the key to their power is: nvidia

For a while to this Ukrainian part has turned the opening of the different Russian drones confiscated or fallen in combat in the closest to research pieces to third parties. Thus they have revealed from hidden messages of the troops of Moscow, until The origin of the vast majority of technology components (with big surprises). It has also been known to what extent China is part of the war machinery. Now you have to add to a new and important actor: Nvidia. Drones with ia. We have gone counting: The drone war in Ukraine has entered into A new phasewith both sides competing for deploying systems endowed with artificial intelligence capable of Resist electronic interference and attack objectives autonomously. The chip. What has now known is that Russia, despite the sanctions that should prevent access to Nvidia hardware, has managed to incorporate Its powerful Jetson processors in several of the most advanced drones models, obtained by contraband in small lots and through third countries. These chips, fundamental in the development of AI due to their parallel processing capacity, allow to integrate advanced navigation, recognition and guided functions that increase lethality and reduce dependence on control links vulnerable to blockages. Nvidia and the technological basis. Nvidia, valued in more than Four billion dollars and around 85% of the global market From chips for AI, it produces both high performance units for data centers and Jetson compact plates for edge devices, including drones. The latter, low relative cost, They have demonstrated in competitions of 2021 and 2023 its capacity to defeat human pilots In FPV races, using only sensors and processing on board. The version Jetson Orincurrent standard in advanced drones, multiply by ten the power of your predecessor Tx2opening the door to autonomous navigation algorithms, detection of complex objectives and maneuvers such as swarm. Digital predators. In 2023 It was discovered that Russian drones Lancet, with 11 kg of weight and scope of 40 km, They used the Jetson Tx2 For automatic monitoring functions, increasing impact precision even if communication was lost. After an initial phase of problems in 2024, software improvements raised from 30% to 60% the percentage of impacts guided by AI. Forbes counted that the new generation includes three key models with Jetson Orin: the Shahed modified MS001that Combine Satellite navigation, thermal chamber and objective recognition; The V2Uof four wings and 40 km of reach, with navigation by comparison of land and sequential attack capacity in basic swarm, and the Tyuvika small version of the Shahed with 32 km of reach, designed to hunt moving vehicles and manufactured with commercial components. Capacities and limitations. The MS001, in addition to its autonomous navigation, can Identify and attack Objectives without depending exclusively on preprogrammed coordinates. The V2U, with a high -resolution camera, laser telemeter and digital modem, can Tour routes Looking for whites, although his discrimination is imperfect and has registered erroneous attacks. Your mode of teamworkdistinguishing drones by color marks and attacking in shifts, represents an advance towards the coordinated swarm. The Tyuvik, lighter, points to saturate defenses by low cost and mass production. In all cases, software and hardware are scalable and compatible between platforms, which allows to incorporate simultaneously the entire fleet. Strategic implications. No doubt, these advances bring the end of the drones not endowed with in high intensity environments. With software systems as Flir prism either Auterion Skynodenew functions (from air combat to advanced swarm) can be implemented quickly and with reduced costs. Hardware proliferation Like Jetsonaccessible in the global and difficult to control market, makes this technology “out of the bottle” and available for any state or non -state actor. On the Ukrainian front, where drone saturation marks the combat rhythm, the combination of flexible production, advanced AI and autonomous capabilities multiply the threat and redefine the balance in the Low Cota Air War. Image | UKRAINE MOD In Xataka | Ukraine has hunted an “invisible” drone of Russia. The surprise has been capitalized when opening it: it is “made in USA” In Xataka | Ukraine knocked a Russian Shahed drone and opened it. A hidden message has revealed Moscow’s advantage in electronic warfare

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.