The AI ​​Claude Code “only” programmed. With Cowork, Anthropic wants its AI to take care of everything else

Claude Code has become a revolution for programmers, but at Anthropic they are not satisfied with that, and now they want their Claude family AI models to serve much more. And that’s why have created Coworka different agent, especially ambitious and who opens the door to fantastic options… if you trust him. What is Cowork. Those responsible for this project have taken the foundations of Claude Code and applied them to the Claude desktop application (for now, only the macOS one). But they have also done something equally special: giving Claude permission to access a specific folder on our computer and, from there, he can take control of those files and work with them as we want. Hello, robot-secretary. Instead of access to the “vibe coding” we will have access to a kind of “vibe working”. Thus, we can ask Cowork to do all kinds of operations with those files: If we have a folder full of disorganized icons, we can ask you to ordered them to us and reorganize them all into folders by file type or theme If there are a lot of photos of receipts in that folder, we can tell you to create an expense report If what we have is a bunch of digital voice or text notes, we can ask you to write a report summarizing and combining them all. If we have a folder full of podcasts, we can have it go through it, analyze it and summarize the top 10 points of all of them or transcribe them If you have all your financial trading and investment reports and data, you can ask them to create a final report for you. help you declare them If you have videos and want to find one of a squirrel and then convert it to another format, also does. Full autonomy. We are therefore faced with an AI agent capable of accessing our files, analyzing them and working with them to generate new information and useful content from all that data. And we only have to ask it with natural language, because the agent is capable of understanding it, asking us questions if it needs more details, and then solving the task autonomously even if it involves several steps. Cowork operates in a container. The way CoWork works allows you to grant permission to certain folders, but when the AI ​​operates on said files it does so in isolation. As explains Simon WillinsonClaude uses a virtual machine and downloads and boots a custom Linux file system to operate on those files independently and isolated, which theoretically guarantees that our files are theoretically safe and Cowork does not access anything that we have not given permission to. Connections to other apps. In addition to being able to work directly with your files, Cowork benefits from its ability to connect with other applications that you have installed on your computer. You can use ffmpeg to convert the squirrel video, Asana if you want to organize your notes into projects, or an office application if you need to create a spreadsheet. But we will have to trust. Willinson himself warns that these types of systems have the danger of someone “hacking” them with jailbreaking or prompt injection techniques that now become more dangerous because, as we say, what Cowork does is work on our files. And of course we have to be careful with the information and data we share with CoWork: those responsible for Anthropic themselves have a document to “use it safely“. Limited release. Cowork is available as a “research preview”, and is only available to users of the Claude Max subscription which costs between $100 and $200 per month. It is clear that at Anthropic they prefer to go step by step with a very powerful but also delicate feature if we do not use it with caution: in the end we are giving access to our files to an AI, and we know that AIs can make mistakes. An AI on your computer. This release from Anthropic points to what all AI agents that want to conquer our computer should theoretically point to. Since that Computer Use that Anthropic launched in October 2024, things have come a long way, and little by little we are getting closer to that future in which we will be able to work with our computer in a very different way than we did until now… if we want and trust AI, of course. In Xataka | Operator also “looks” at the screen and moves your mouse for you like other AI agents. It does it better thanks to CUA

60 years ago they had to literally “slice” code into punched cards

Nowadays, programmers have countless resources when developing their creations. It was even before the revolution of AI and vibe coding. “Click code” is complex, but at least it is relatively comfortable thanks to modern integrated development environments (IDE) that facilitate programming in all types of languages. Not only that: programming is free, and any relatively modest PC can do it, although AI assistants have increased costs. Half a century ago things were very different, and those who dedicated themselves to programming did so with significant obstacles. There were no personal computers, access to mainframes and servers was only for the privileged and there were not even monitors on which to see how you programmed. Everything was much more artisanal and uncomfortable, and punched cards are the legacy of an era that shows that any past time was not always better. Who needs a screen? I explained it in a Foone Twitter threada technology collector and historian who recounted how programmers got by in 1962. To begin with, those programmers had a very different image than the young people who today create giant companies from scratch with flip-flops in their college dorm room or a garage. These programmers tended to be adults who also dressed in a jacket and tie: the ways were different because to access this world one had to work for large companies, the only ones where you could have access to a mainframe of the time. The example that this technological historian gave was that of IBM 7090one of the first computers based on transistors and not on vacuum tubes, like its predecessor, the IBM 709. That was a revolution in power, because the performance of the previous one was multiplied by six and the IBM 7090 managed to execute 100,000 floating point operations per second. But as we said, to program that computer there was no interface like the current one: you did not write while seeing the code on the screen. They were also not multi-user or multi-threaded systems, so only one person could use “all” that power at a time. That made these machines very precious and very expensive assets that IBM actually rented. In 1962 he rented one of these computers for a month It cost $63,500.which with inflation would be equivalent to $421,000 today. If we do a simple division (a month has about 44,000 minutes), each minute of use of that computer would cost about 10 current dollars. In a couple of hours one had spent the same amount that a good PC or laptop costs today, for example. This imposed clear restrictions when using these machines, because time was money in them. That’s where punched cards came into play, which had a capacity of 80 characters each, the maximum size of a line, although curiously the normal thing was to use only the first 72 characters and not go beyond there. The IBM template allowed you to program on paper without going overboard. To punch the cards, a special machine was used, which for example was manufactured by IBM itself and which could be mechanical or, if they were more modern, electromechanical. The idea was simple: the characters that someone typed on that machine were “translated” on the punched card, where perforations were made according to the characters on each line. To program, you didn’t sit down at that electromechanical machine and start typing commands without stopping. Instead the program was written by hand or typed. IBM had prepared templates that made it possible not to get lost and to avoid exceeding the number of characters per line. Wait, it took a while to run your program This meant that a program with all its lines ended up occupying a stack or deck of punched cards on which were all the instructions of the program, which also had to be perfectly ordered in the appropriate sequence. That deck of punched cards was given to the computer operators, who inserted them along with a task control card that told the system how and for how long it had to be executed, for example. Other programs could be in run queue (remember, it was one job at a time, and other programmers also used the same system), so it wasn’t just arriving and executing. This is what a computer program looked like in the 60s. That program could take a long time to complete its execution, so the programmer did not wait for the result to appear, but rather the operator left both the deck and the printed result in a small cubicle where the programmer could then access to pick it up. The problem, of course, is that the program could be wrong, not work or give an unexpected output. In that case, the error had to be detected, the punched card or cards that caused the error corrected, and the program run again. There were striking advances at that time such as being able to convert punched cards into stored programs on magnetic cassette tapessomething that made the reading of those punched cards faster. That was basically the process that programmers followed in their daily lives, who usually used FORTRAN or COBOL in their programs. These machines were used, for example, for the development of projects such as CTSS (Compatible Time-Sharing System), one of the first operating systems that was programmed by the MIT Computing Center. They were also used by NASA for the Mercury and Gemini space missions, and in fact an IBM 7904 was also used to run the flight planning software on the Apollo missionsbecause it had not yet been programmed for the new System/360 that had been acquired for NASA. There were also more curious applications that are still being explored today: in 1962, mathematicians Daniel Shanks and John Wrench were pioneers in using these computers for mathematical calculations and calculated the first 100,000 decimals of π. A year earlier, another mathematician, Alexander Hurwitz, used an IBM 7090 to discover the two largest prime numbers … Read more

Let’s say goodbye to Google Assistant a decade later. Google has begun to delete its code to leave only one option: Gemini

It’s not official but as if it were: the end of Google Assistant or the classic Google Assistant, is scheduled. An analysis of the latest version of the Google app for Android carried out by Android Authority has revealed his almost definitive goodbye. The Mountain View company is eliminating the code that, for the moment, allows us to choose between Gemini and the old assistant. It is the chronicle of a death foretold that ends an era within the company. Where before we saw the Assistant icon and dialog window, we now have the Gemini one. Image by Iván Linares for Xataka Android failed promise. Launched in May 2016, the Google Assistant was going to be a revolution. On paper, it promised full voice control of your cell phone, car and home. In practice, like many users have experiencedits use ended up being “despairing” although the “Okay, Google” It became popular in smartphones and speakers. Your inability to understand the context or natural language and the rise of AI models, has finished burying it. The future belongs to Gemini. With the rise of generative AI, Google has bet everything on Gemini, but it has had a rather confusing rollout. For months, the American company maintained a curious mess with several duplicate names, apps and services… Bard, Assistant with Bard, Project Astra… In practice, two assistants live on the same mobile phone. In February 2024, its “transmutation” began: that was when Google launched the dedicated Gemini app (Bard was left behind) on Android, which when installed was offered as a replacement for Assistant. As we tested in its day, the new AI took over of the invocation with the famous “Hey Google” command. A more mature replacement. The problem with the Gemini assistant is that, at first, it was quite green. It was a powerful chatbot, but a not so useful assistant: it could not execute the basic tasks that the previous one could do, such as routines or orders for home automation. However, Google has spent the last year making Gemini absorb the features of its predecessor. The turning point came at the end of last year, when Gemini Live – the conversational voice mode – finally landed in Spain and in Spanish. Already approaching 2025, Gemini learned a basic function that it was missing: making calls and sending messages without having to unlock the mobile. The last big feature inherited from Assistant, the «Scheduled actions»arrived in June of this year. Google’s plan. At the same time that Gemini was learning the old Assistant tricks, Google has been dismantling the latter, removing useful functions. The objective is more than clear: Gemini is the future and will be everywhere. Now you can act like the “all-seeing” assistant thanks to Project Astra (integrated in Live mode), it is coming to Google Home speakers and its landing on Android Auto is imminent. The last step remains. And that is eliminating the escape route: Google has already consolidated the transition. Gemini is the default assistant on new mobile phones and can be installed on old ones without major impediments. The analysis of the APK of the specialized Android media only confirms that the last step is very simple: eliminate the option to go back. The king is dead, long live the king. Cover image | Composition with Google images and generated with Nano Banana by Pepu Ricca In Xataka | How to create Gemini Gems to have your personalized version of artificial intelligence

It looks like a legitimate traffic with a QR code. But behind there is a false and cybercriminal page

At first glance, it seems one more traffic fine: official paper, DGT logo and a message that invites you to pay as soon as possible. But it is a trap. Actually, it is a fraudulent impression that is appearing in car windshield in Malaga and that seeks to supplant the General Directorate of Traffic to steal bank data. The Local Police and the City of Malaga have already launched a public warning after detecting the first cases this week. As explainedthe document uses both the shield of the Ministry of Interior and the DGT logo to appear authenticity. Its objective: to make unexpected drivers with false sanctions. A scam to steal bank card data The mechanism is direct. The supposed fine incorporates a QR code That, when scanning with the mobile, redirects to a website that mimics a digital DGT environment. There the user is asked to enter the data of their bank card. Everything is designed to seem legitimate, even a “support chat” headed with the institutional image of traffic. This is how fines that have appeared in Malaga are seen in recent days The objective is evident: to capture the data of the credit or debit card of those who fall into the trap. The fraudulent website: Thus try to steal your data with the DGT appearance However, deception is not perfect. Some details betray falsification: the header says “boss” instead of “headquarters” and “apartadp” instead of “section.” Also Key elements of an authentic fine are missingsuch as the agent number, the vehicle data or the place where the infraction was supposedly committed. Even so, the risk is real. In the middle of the daily routine, and given the pressure to solve the matter as soon as possible, it is not difficult for someone to scan the code and enter their data without thinking too much. Scams through QR codes are not new. In fact, they have their own name: Qrishing. The National Institute of Cybersecurity (INCIBE) and other organisms have not been warning of this type of fraud. What is new is this campaign located in Malaga, which It could extend Easily to other cities if scammers replicate the pattern with slight adjustments. An image of an authentic fine, with all official elements The City Council has made available to citizens the phones 951 926 010 and 010 to consult doubts or verify whether a fine is real. The aspect of an authentic sanction has also been shared to help differentiate it from falsification. Who is behind? At the moment, there is no official information. What we do know is that the fraudulent website is still operational. The domain used, dgtmultamalaga.sbsis lodged under the umbrella Webnica low Asian cost registrar, which makes it difficult to track the person in charge or know if the registration data has also been supplanted. Images | Local Police of Malaga and Malaga City Council | Screen capture (xataka) In Xataka | Our password managers serve much more than passwords. So you can get the most out of them

The AI erasing the entire code of your app

He ‘Vibe Coding‘is all A revolution. One that has even made veteran programmers who “in a year or two code editors will not exist.” However, it is also causing Very large damage in the code. Jason Lemkin, former Vice President in Adobe and the founder of the community Saastr, discovered it for the badaccording to X. Colega, where is my code? It was the eighth day of a series of ‘Vibe Coding’ by Lemkin using the online programming platform Replit (Among the favorites of developers) When he realized a huge disaster. Artificial intelligence had deleted the entire database of the application of commercial contacts that it was developing. The wizard reported what happened Without giving many details: The system worked the last time you started session, but now the database appears empty. This suggests that something happened between that moment and now that it deleted the data The AI did not follow the rules. The assistant even acknowledged that he had violated a Replit directive that tells the assistant not to make more changes without permission and always show all the proposed changes before implementing them. In the process, he deleted contacts from 1,206 executives and 1,196 companies. In the end, the assistant admitted to having made a “catastrophic error of trial”, but gave no option to go back through a backup. Replit did not differentiate that the changes made on the database were made in a production environment (with sensitive data) and not only of development, so it affected Lemkin’s real product. Except for the fact that Lemkin explained after the application was not active. “If it had been 2 to 4 weeks later, it could have been much worse,” he said. The application was almost ready, but not finished. Replit, the company, to the rescue. After becoming known in networks, Amjad Masad, CEO of Replit, confirmed the case and admitted that it was “unacceptable” and that something like that “should never be possible.” And they went to action: they introduced changes so that the development and production database are completely separatedso that the changes were made only in test environments and the Replicit agent cannot access the data. Faced with what the assistant told Lemkin, Masad said they did have backups that allow everything to be restored in a click. The problem is that the agent could not execute it, even if the platform had the option. Replit ended up refunding Lemkin his subscription for the discomfort caused. An example of a whole paradigm. The great person in charge of the case is the development platform, in the sense that it did not comply with the restrictions imposed by its developers. But the case also shows that Attendees are not magicas Massad remembered, and that they have to be used with background and caution if there are sensitive data at stake. Presume to use AI to program without having a programming idea It sounds good, but you have these problems. Software engineers will have a lot of work. Yeah, fixing pifias. “When the code can occur at lightning speed, prevention and intuitive judgment become especially important”: thus Pascal Biese summarized it (Developer and founder of ‘LLM Watch’). Also There are those who joke: “Vibe Coding: an industry of billions of dollars. Fix/maintain written code with AI: Industry of one billion dollars.” In words of Gergely OroszEngineer and influential voice in the technological sector for its Newsletter The Pragmatic Engineer, “the most important role of a software engineer in the era of coding tools with AI is to become a large code reviewer.” Instagram co -founder Mike Kriegerit was even more forceful When he said that, from here to three years, software engineers are no longer writing any code: they will only check the code created by AI. Image | Mohammad Rahmani In Xataka | Openai is raining blows on all sides: the last one signs Google “raising” his commitment to Vibe Coding

If their spies spoke Basque as a secret code

The espionage stories They are fascinating. Video games like Spanish ‘Commandos‘They have one of their best characters in the spy and the sagas of’Impossible mission‘ either ‘007‘are sustained (At least in the first deliveries) in that work of espionage and Double agents. Something fundamental is the encryption of conversations, but … why devise a complex system so that the enemy does not discover what you speak if they exist languages ​​that do not speak so many people? In Spain there is one that is homeless: The Basque. And, precisely, one of the legends of the spies Spaniards is the use of Basque so that enemies do not discover the plans. But as usually happens, there is as much reality as a myth in this story. Felipe II’s networks. Let’s start at the beginning and one of the clearest uses of Basque in a espionage network. In the second half of the 16th century, things in Spain were uneasy. The reason was that Henry III of Navarra, king of Navarra since 1572, had religious ideas contrary to the Spanish monarch Felipe II. While Felipe was a staunch Catholic, Enrique became Protestantism. The problem is that in 1589 Enrique III of France and ‘Our’ Enrique III inherited the French throne as Henry IV. Felipe did not make a hint of grace because he did not want a Protestant to occupy the throne of a great neighboring country and, as a defender of Catholicism and Spanish hegemony, supported the Catholic League and proposed to his daughter Isabelgranddaughter of Enrique II of France, as queen of the Gallic country. He did not set the proposal and that caused a rivalry that made the Pyrenean situation complex. Lady of Urtubia. Enrique, in the end, returned to the path of Catholicism in 1593, so things have already calmed down and was recognized in full as king of France. Now, although Enrique IV’s conversion calmed the situation, the tension did not disappear at all, and our spy comes into play: Aimée de Urtubia. This woman belonging to the nobility shipment Between 1597 and 1598, at least 19 letters to the mayor of Fuenterrabía and Captain General of Guipúzcoa. In them there was relevant information about military and political events in France and Navarra during the Religion wars and allowed the Catholics of Felipe II to record the situation in France. The peculiarity is that the letters were written in Basque, which assured that they would only be “decipherd” if they fell into someone who controlled the language. And it was his native language, detail that is not less. In whatever, their letters were referred to the Secretary General for the North, which speaks well of the importance that the information of the ‘Lady of Urtubia’ had in the strategy of the administration of Felipe II. In 1598 the Paz de Vervins with which Felipe stopped intervening in French affairs. Although the agreement had not been reached, Felipe would not have interfered with more because he died that year. Second World War. There is proof of Aimée’s letters, but … the legend of the Basque among the Spanish spies comes from there? Well, not quite. Time to make a leap to Second World War. Spies are key to operations such as day d or even for war stratagems that confuse the enemy. The Enigma machine It was the great Nazi tool to encrypt messages and Basque … too? Myth. The United States, of course, considered the use of little known languages ​​to make secret communications. Instead of creating language, Americans used Native American languages ​​such as Navajo or CREE to generate safe messages. It would be rare for a German to speak Navajo, go. And, to expand networks in Europe, they also thought of the ‘Basque Code Talkers‘. This was basically reused Euskera to produce indecipherable messages for the enemy. To the Not being an Indo -European languageor the enemy had a dictionary, or would not find out anything. In fact, some publications of years ago affirm that Basque was used as a code in the battle of Guadalcanal in 1942. The problem is that it is … false. And reality. A subsequent investigation carried out by historians Pedro J. Oiarzabal and Guillermo Taberilla, demonstrated that Americans may consider the use of Basque as ‘Code Talk’, but it was not carried out. Investigating American and British military archives, they did not find that they support the use of Basque in that context. American captain Frank Carranza, grandson of Basque emigrants, would have been one of the architects of the legend, supported by the historical fact of the relationship between the secret services of the Basque Government In exile and the OSS American. Now, something that could feed the myth is that there were Basque spies involved in the conflict. José Laradogoitia Menchaca, or “Bromine”, He was a Basque pastor who worked as a double agent during the war. For whom? First for the Nazis, but then he went to the allied side, transmitting false information to the Nazis. And the investigation of Oiarzabal and Tabernilla, regardless of denying the myth, He left a pearl: Vicelehendakari of the Basque Government in exile worked as a spy for the British. In the end, Basque soldiers may speak in Basque between them and I find it funny to think that some Nazi intercepted that communication and gave mental somersaults trying to decipher the ‘code’. Image | Screen of ‘Call of Duty ww2’ In Xataka | The US landed on an empty island during World War II. In nine days it had more than 300 casualties

Valve has released its source code and the possibilities are huge

Valve just Release the source code of ‘Team Fortress 2’. This game, considered one of the parents of the Hero Shootershas been spinning since 2007 (how hard it has been to write that) and is one of Steam’s best known and popular titles. Few online games that have been in the market for almost 20 years can say that they bring together more than 20,000 players daily. Today your code become free (With certain conditions) and that means one thing: that a huge range of possibilities opens. What happened. Valve, the company behind Steam, has published a huge update of the Source SDK that adds “the entire client and server code of ‘Team Fortress 2′”. Basically, from now on any person with the appropriate knowledge could make their own ‘TF 2’. This sdk, They explain from Valve“It offers mods creators the possibility of changing, expanding or rewriting ‘TF2’, making possible from small touch -ups to complete conversions.” But huh, no money. Valve has covered his back well with this. The SDK is licensed with a non -commercial base, that is, “any mod created using the SDK must be free”, as well as any content included in these mods. However, if someone uses the ‘Team Fortress 2’ code to create, for example, an action and adventure game in the first person, they can publish it in Steam and appear as a new game. Whenever it is free, there are no limitations. Se (can come) little things. The world of mods is spectacular. There are many games that we have today whose origin dates back to Mods of other games. For example, ‘Counter Strike‘It was, in the beginning, a mod of’Half life‘. The first ‘Team Fortress’ was a mod of’Quake‘ and ‘Deta Auto Chess‘It is, indeed, a mod of’ dota 2 ‘whose origin is, in turn, a mod of’Warcraft III: Reign of Chaos‘Call’ Defense of the Ancients’ (hence the acronym, Dota). As regards ‘Team Fortress 2’, if it was already a living game now has all the ballots to be even more. We are not talking about modders can Add maps or weapons modelsbut to make deep changes to the point that new games look like. Let’s think about making a racing game, a tactical shooter, an Moba, the options are practically infinite. Valve’s future. Everything points to what goes through ‘Deadlock‘. It is a secret project (which is very little secret) that consists in combining the genre Moba with the Hero Shooter. It is located in an early stage of development, but more than 10,000 people say it. It has no release date, requirements, nothing at all, but is in the oven. When will it come out? We will have to wait. Image | Valve In Xataka | If you like ‘Doom’, the mod called ‘Doom Zero’ that includes 32 new levels can already be enjoyed in consoles, mobiles and PC

The code names of the four phones in the series are leaked

The Pixel 10 have been leaking some details to get closer to next summer in which its launch is expected, since last year Google brought forward the presentation date of the Pixel 9. An internal Google source has shared certain documents that confirm the Pixel 11 codenames which will be released next year. A leak that skips the next Google devices this year, since the first that would be presented is the Pixel 9a to replace the Pixel 8a last year launched in Spainand then the Pixel 10 series for its launch next summer as the station of choice for the technology giant. The internal source has given some documents to Android Authority and thus know the code names that are usually of unique animal species. For example, for the Pixel 11 the denominator theme is going to be the bear, and it is not at all something new for Google use certain names according to a theme; For older versions of Android it always used dessert names like KitKat (Android 4.4), Lollipop (Android 5.0) or Marshmallow (Android 6.0). Each of the mobile phones that make up the Pixel 11 series, and which is surprising for still being four models so that the folding mobile follow another of the protagonistshave their only name as one of the most dangerous subspecies and animals on the planet, the grizzly bear: Pixel 11: “cubs” or “4CS4”. Pixel 11 Pro: “grizzly” or “CGY4”. Pixel 11 Pro XL: “kodiak” or “PKK4”. Pixel 11 Pro Fold: “yogi” or “9y14”. Pixel 9 Pro Chema Flores The Free Android The references are more than clear and “cubs” are for bear cubs, while “grizzly” for one of the subspecies that lives in North America and “kodiak” for the Alaskan brown bear. The last one is “yogi”, inspired by the mythical cartoon character that for so many decades entertained so many generations. Android Authorirty has given more details and it is about the chip that each of the Pixel 11 series models will use: the G6 tensioner with the code name “malibu”. All four will launch sometime in the second half of 2026, so there is a lot of room to maneuver to continue with the same 2024 strategy or make some changes. The Pixel 10a would be another of the protagonists 2026 and its code name is also known: “stallion” or “STA5”. This mobile phone is in a very early stage of development and according to what it maintains Android Authority According to Google, it is considering bringing a completely customized Tensor G5 to the mid-range mobile or staying with the chip designed by Samsung, the Tensor G4. The reason for passing G5 tensioner It would be due to its larger size, since it measures much larger than itself. Apple A18 Prowhich would increase its production cost and possible price; leaked just in autumn 2024. The ideal would be a custom Tensor G6 chip, although it would be quite complicated since the Pixel 10a is launched before the Pixel 11. There is a lot left for these devices and the next one would be the Pixel 9a for the month of March, which will arrive to break some of the patterns that Google has been accustoming the user to, and be a different mobile phone in specifications compared to its older brothers; The previous Pixel 8a and 7a did not represent a big change in the experience according to their specifications.

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.