China prepares to lead the manufacture of chips for advanced weapons

China monopolizes gallium production. In fact, Up to 2022 monopolized 98% of the world gross Gallic, and this figure presumably has barely varied since then. For the country led by Xi Jinping This metal has a strategic value comparable to the one for the US due to its potential in military applications. And, in addition, Gallium export control allows China to respond to the sanctions to which the US and their allies are subjecting this Asian country in the scope of the semiconductor industry. Gallium is a very special metal. Its physicochemical properties make it suitable to be combined with other metals with the purpose of manufacturing a special type of integrated circuits called broadband semiconductors. These chips have three properties that make them very valuable to intervene in the manufacture of Advanced military teams: They support voltages, temperatures and frequencies higher than integrated conventional silicon circuits. During the 70s the US Advanced Defense Research Projects (Darpa) He dedicated many resources to the development of semiconductors in which Gallium was involved due to the potential he had in military technology projects. He Gallium Arseniuro (GAAS) played a fundamental role in the development of the global positioning system (GPS), and also in Radark tuning and precision weapons. China has taken a very important step forward Currently, Gallium Nitruro (GAN), which also has Darpa’s backing, is being used to make state -of -the -art radars that are capable of accurately identifying smaller, fast and numerous objects at more distance. Each of these radars incorporates several thousand chips in which the gallium intervenes. Everything we have just seen invites us to reach an obvious conclusion: Gallium is an essential metal for the US. But this country is not the only military superpower on the planet. The Chinese army and research institutions have been working with Gaul for many years and developing technologies that allow you to use it Third generation advanced semiconductors. As we have seen, China has Gallium in abundance, but producing integrated circuits with this metal is not easy. Neither for the country led by Xi Jinping nor for which Donald Trump is currently governing. Modifying electrons energy levels, it is possible to accurately control climbing and reduce defects To manufacture gallium nitruro, silicon and sapphire substrates are often used, but the effectiveness of the processes used so far was moderate because the hexagonal atomic structure of the GAN causes the appearance of a defect known as climbing. In broad strokes this curious phenomenon triggers the displacement of groups of atoms in a certain region of the crystal, which affects its structure and reduces its properties. In fact, GAN manufacturing defects cause electric leaks, reduce their thermal stability and reduce the performance of semiconductors. Until now the researchers who work with GAN had difficulty understanding why these defects appear in the crystalline structure of this material. And also to deal with them. But the team of scientists led by Professor Huang Bing at the University of Beijing (China) has identified the cause which triggers the production of defects during the growth of the Gan Crystals. What these scientists have discovered is that modifying the energy levels of electrons it is possible to accurately control the climbing and reduce defects. “Traditional strategies to avoid defects include the use of different substrates and the adjustment of crystallization temperatures, but these approaches only address symptoms, not the cause,” Professor Huang Bing explained. If China manages to get this research from the laboratory and bring to production chains this technology will have the ability to manufacture cheapest GAN -GAN semiconductors, of more quality and a much larger scale. And at this juncture it will not be unreasonable to anticipate that it will be done with the leadership of the application of 3rd generation semiconductors in the military field and 5G technologies. Image | TSMC More information | SCMP In Xataka | This semiconductor is spectacular. So much so that for the MIT is its nº 1 candidate to replace the silicon

His new great bet are advanced humanoid robots, according to Bloomberg

After getting rid of 5% of its workforce at the beginning of the yearMeta has created a team destined to develop its next great ambition: humanoid robots driven by artificial intelligence (AI). The news comes from Bloombergwhich states that the company led by Mark Zuckerberg will make a “significant investment” this new project. The sources point out that androids will be able to interact with users and will help them perform daily tasks. Goal aspires that its technology helps overcome current barriers where robots have certain limitations to wear a glass of water without scattering, placing them dishes on a shelf to clean them or bend clothes. A team within reality labs Instead of creating a new division, the giant of social networks has decided Metaversoglasses Quest 2, Quest 3 and Quest Proas well as smart glasses Ray-Ban Meta. The initiative will be led by Marc Whittenwho until recently served as CEO of the Cruise Autonomous Vehicle Company owned by General Motors. He previously led the Amazon entertainment devices division and worked for 17 years in Microsoft, where he was an engineer of the original Xbox team. According to the aforementioned medium, Meta seeks to focus on the underlying sensors and software of robberies, including an artificial intelligence system. It is an attempt to use part of the technology developed for its virtual and extended reality products. The glasses, for example, have multiple sensors to, for example, eye tracking. Neo Beta, a 1x robot The use of technologies that were born in other products is not new in the technology industry. Optimus de Tesla, for example, is based on a variety of advances derived from the autonomous driving technology of the firm’s cars. It is not only on software, but also of processing chips, batteries and sensors. More than manufacturing humanoid robots, goal seeks to consolidate as the reference technological ecosystem in this area, providing key components. The production and marketing will remain in the hands of other companies, and for this he already has conversations with China Unitree Robotics and the American figures AI. We will have to wait to know how this new initiative will evolve, but we can advance that goal will not be alone. There are currently many other companies that are betting on humanoid robots. In addition to those mentioned are 1x, Fourier Intelligence, Boston Dynamicsamong others. Images | Xataka with Grok | 1x In Xataka | Apple believes to have an ace in the sleeve to shine in a market as saturated as that of robots: “emotional robotics”

This Chinese fantasy film is destroying records in his country and has already advanced Marvel in more than one milestone

‘Ne zha 2’ is sweeping. Maybe you have not been able to talk about this animated Chinese production (the first installment was titled ‘Nezha: the rebirth of a god’ and You can see it in Netflix), but it reached Chinese cinemas taking advantage of The celebration of the Chinese New Year, the most profitable and coveted day for the premieresand in 5 days he kneaded 435 million dollars. To get an idea of ​​how much that can be, ‘Avengers: Endgame’ added something less, 427 million, in its first five days in US cinemas. If you continue on this path (And you are following: In its first week, it has reached 671 million), it has another even more spectacular milestone to exceed: become the first feature film that exceeds 1,000 million dollars of collection in a single country. Again, Disney shadows him with ‘Star Wars: the awakening of force’, which raised 936 million in the United States. It is the one that shows the greatest brand so far. Finally, ‘Ne zha 2’ has another record to overcome, and everything indicates that he will: be the first Chinese film to exceed one billion collection. ‘The battle of Lake Changjin‘He stayed at the doors, with 913 million at the box office. Finally, last milestone: ‘Ne zha 2 is about to advance to the first’ Nezha ‘, which became the first animated film that exceeded 700 million collection in a single territory. Many brands and many milestones, as can be seen, for a film that continues the argument of the first part and that remains starring Nezha, a protective deity that appears in the Buddhist, confucian and Taoist folklore. The argument of these animated films are based on a classic Chinese novel of the 16th century, which in turn has inspired other films in the country such as ‘New Gods: Nezha Reborn’. In Xataka | ‘Vaiana’ is already the greatest success in streaming history, and there is a clear responsible: the way of watching children’s films

He has just launched one of the most advanced military satellites in Europe

Spain already has one of the most advanced communications satellites of the world. Run from the United States with a Spacex rocket, the Spainsat NG 1 positions Spain as one of the NATO members with the greatest operational capacity in sovereign communications. The secret is in their antennas. The Spainsat Ng 1 communications satellite. The most advanced in Spain and the first in Europe with next -generation antennas. The spainsat Next Generation 1 was successfully deployed this morning to offer safe communications in government and military missions of the European Union, as well as its partners in the Atlantic Alliance. The satellite meets NATO’s requirements For missions and deployments, and positions Spain among the most advanced countries in sovereign communications. Adaptable to critical and emergency response operations, it is planned to remain in service until 2037, covering North and South America, Africa and the Middle East, and part of Asia to Singapore. Launch by Spacex. It is striking that a European military satellite is put into orbit by an American company. But it is not surprising, taking into account the multiple delays of Ariane 6: the only European rocket that could have launched the six -ton NG 1 spainsat. He did it Instead a Falcon 9 of Spacex From Cabo Cañaveral. The rocket loaded with 450 tons of propellants took off from the 39A platform of the Kennedy Space Center at 1:37 UTC, taking advantage of the last drop of fuel to take the satellite to a geostationary transfer orbit. His first stage was discarded without landing after 21 successful pitches, including the Japanese lunar mission Hakuto-R and the deployment of 400 Starlink satellites. Deployment in geostationary orbit. After separating from the second stage of the Falcon 9 rocket, the satellite undertook a solo trip until its final position in geostationary orbit, 35,786 km on the earth, a height of almost three times the diameter of the earth itself. The Spainsat NG 1 will undergo a series of commissioning tests before entering operation. The Spanish company Hisdesat will be in charge of its operations During the next 15 years, with the support of the Department of Connectivity and Safe Communications of ESA. What makes it so special. The 6.1 tons satellite, the size of a minibus, carries X Band Antennas with Beam Hopping technology, which means that they can modify the communications beam to different regions or users electronically, without moving. The antennas were developed by Airbus Defense and Space in Barajas, but A consortium of Spanish companies participated In the design and development of the satellite: Sener, Indra, Technobit, Arquimea, GMV and the Hisdesat itself. This industrial and institutional collaboration is included in the Pacis 3 project, which is in turn part of the Spainsat Next Generation program of Hisdesat, with an expected fleet of two satellites based on EUROPAR NEO DE AIRBUS technology. Images | ESA, Spacex In Xataka | In full brawl between Musk and Europe, Spacex prepares to launch the most advanced Spanish satellite ever built

Deepseek does the same as Openai’s most advanced models with much less resources. The key: “Reinforcement Learning”

The entire world is wondering how it is possible that the models of AI of Deepseek They have become overnight the great protagonists of today in the field of artificial intelligence. The answer is relatively simple. These models have managed to demonstrate that You can do more with much less. Both Deepseek V3 and Deepseek-R1 are comparable to GPT-4 or O1 OPENAI respectively, but it is estimated that their training has been much less expensive and its inference, of course, is: the prices of the Deepseek API are up to 35 sometimes lower than those of OpenAi, but that makes one wonder how it is possible. The answer is clear, and it is because we have at our disposal the technical reports of these AI models. Precisely his study has allowed us to clarify What are the techniques that this Chinese R&D laboratory has used to develop these models so efficient and capable. Many techniques, a single objective: efficiency There are several differences that make Deepseek’s new model especially efficient. Its creators explain in detail in the detailed Technical Report that is publicly available. Here are the most relevant: Deepseekmoe (“Mixture of experts”): In models such as GPT-3.5 the entire model was activated in both training and inference (when we use it). However, not all model components are necessary for our requests. The MOE technique – already introving with Deepseek V2 – precisely divides the model into multiple “experts” and only activates those that are necessary according to the request. GPT-4 is already a MOE model. But as we said, Depseekmoe even went further and differentiated between even more specialized experts, in addition to using some somewhat more generalist experts that could contribute value in certain requests. Managing all those specialized or generalist experts not only benefits inference, but also the training phase, making it more efficient. This technique is similar to the so -called “Time Scaling test” that also adjusts the size or complexity of a model during efficiency. Deepseekmla (Multi-Head Latent attention): It is another substantial improvement-even more than the previous one, and also introduced with Deepseek V2-that affects the way in which memory is managed in these models. Normally it is necessary to load both the model and the entire context window – the one that allows us to write prompts and include long texts, for example. Context windows are especially expensive because each token requires both a key and their corresponding value. With the improvement introduced with this technique, what was made possible was to compress that warehouse of keys and values, dramatically reducing memory use during inference. Auxiliary -los-Free Load Balancing: If we imagine a model like a great orchestra, each musician is an “expert” within the model. To play a complex piece, not all musicians are necessary all the time. Traditionally the so -called “auxiliary losses” were used to make sure that all musicians played enough, but these losses could interfere with that interpretation of the musical piece (model training), which could degrade general performance. With Deepseek V3 the model is able to balance the work of each expert dynamically. That does the simplest, direct and efficient training by eliminating “auxiliary losses.” In addition, the elimination of interference allows the model to learn better and with less resources … and get better results. Multi-Token Prediction Training Objective: Often predicting the following word depends on several previous words or context. With this technique instead of predicting only the following word, the model learns to predict several words at the same time. That makes more natural and understandable and less ambiguous texts generate, but also accelerates training by reducing the number of steps necessary to generate the complete text sequence. FP8 Mixed Precision Training: The use of Numbers FP8 allows significantly reducing memory consumption and accelerates calculations. Some critical parts of the model continue to use FP32 training to guarantee precision, but there is another additional benefit of FP8: the size of the models is reduced. Other models use techniques such as quantization or parameter pruning. Although Openai does not give data on GPT-4 in this section, the assumption is that it works with BF16, more expensive in terms of memory. Although FP8 theoretically leads to less precise models, other complementary techniques such as fine-grained quantization are used to reduce the negative impact of values ​​that come out of the common, which makes a stable training possible. Cross-Node All-to-Lall Communication: During training it is necessary to constantly exchange information between all nodes (computers) connected in training data centers. That can become a bottleneck, but these new Deepseek V3 techniques include efficient communication protocols, data traffic reduction and efficient synchronization to accelerate training and, once again, reduce the costs of that process. Reinforcement and “distillation” learning as keys But in addition to all these techniques, those responsible for Deepseek V3 explain how they pressed it with 14.8 billion tokens, a process to which a supervised adjustment followed (Superved Fine-Tuning, SFT) and several stages of Reinforcement Learning (Reinforcement Learning, RL). The SFT phase-which is mentioned in the Deepseek V3 report-was completely omitted in the case of Deepseek-R1. However, learning by reinforcement is an absolute protagonist in the development of both models, especially in R1. The technique is well known in the field of artificial intelligence, and it is as if we trained a dog with prizes and punishments. The model learns to respond better by giving rewards if you do well. Over time, the model learns to take actions that maximize long -term reward. In Deepseek, learning for reinforcement is used to break down complex problems in smaller steps. In it Deepseek R1 technical report It also indicates how this model makes use of RL techniques directly on the base model, without the need for supervised training. That saves computing resources. The call also comes into play here Thought chain (chain-of-though)also mentioned in the technical report. This refers to the ability of a language model to show the intermediate steps of its reasoning. The model not only … Read more

This is how this silent (and advanced) system called XProtect works

Malware is not an exclusive threat to PCs. Macs can also become infected. For this reason, there are different third-party security solutions, such as Bitdefender, Intego, Malwarebytes or Avast, among others. What not many people know is that Apple computers have, for more than a decade, had a integrated antivirus called XProtect. XProtect It has been running silently in the background since it landed on Mac OS Unlike Windows Defender, there are no icons in the menu bar, nor do we have an application to manually perform system scans. How does XProtect work on macOS? The Apple ecosystem has a variety of protection measures, and XProtect is one of them. If we focus on macOS, the Mac operating system, Apple tries to avoid the malware from the App Store. The company reviews the applications so that no malicious software lives in its store, but let’s be honest, we don’t always use the App Store. Computers have always given us the freedom to install any compatible external software. To address the issue of external threats, Apple has a certification mechanism, where developers who do not use the App Store to distribute their applications can obtain a trusted certificate for macOS. Apple does not take this task lightly. Scans the applications and grants the certificate only when it cannot find known malware. Once this instance is passed, developers receive a certificate that they can attach to their application so that the target system can verify it, even when it does not have an Internet connection. At this point we find another of the protection measures. This is Gatekeeper, which looks for that certificate in the application that the user is trying to open or install. If the program does not have the corresponding certificate, the system warns users that they are trying to use software that cannot be verified. Since not all developers go through the certification processwe can ignore that message to use the application in question. Sometimes we will have to allow the installation of applications from the App Store and well-known developers from System settings > Privacy and security > Security > Allow applications from… XProtect is responsible for preventing the execution of malicious software. If for any reason the protection measures mentioned above have been violated, XProtect is responsible for preventing the execution of malicious software for the first time or detecting malware that has been executed on the computer. This integrated antivirus uses YARA signatures that are automatically updated periodically. XProtect comes into action at three key moments: when opening an application for the first time, when modifying an application in the file system, and when updating security signatures. If you detect known malware, blocks it immediatelynotifies the user and offers the option to send the software in question to the recycle bin. XProtect’s scope does not end there. Apple has improved the system to address problems that certain infections can cause. Once malicious software is removed, the built-in antivirus continues to scan for threats using a behavioral analysis engine. Of course, it does not have the ability to restart the computer. How do you update macOS built-in antivirus? XProtect updates automatically. However, you can buy if the system is installing the updates automatically. To do this, click the apple icon in the toolbar and then go to System settings > Software Update. Then tap the information icon under Security Answers. In the Automatic Updates category make sure the Install security responses and system files switch is turned on. So am I completely sure now? Although macOS has a solid security system, it is important to clarify that no system is 100% secure. In the world of cybersecurity it is often said that what is sought is to increase the level of difficulty for cybercriminals. And we achieve this in many ways. Integrated system tools are only part of this. The security features of the applications themselves, our security practices and, if necessary, third-party security tools also come into play. The level of difficulty varies according to the needs of each user. For example, for a long time iPhones and Macs can activate Isolation Mode. This is an extreme solution, but it is a good example of what it means to put higher barriers. This mode limits the functionality of applications, web pages, and certain system features. As a result, we obtain a more protected system, but much less useful than in its standard configuration. Images | Apple | Jakub Zerdzicki | Screenshot In Xataka | The Bank of Spain warns of malware capable of “capturing banking credentials.” His name: TrickMo

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.