Leica is teaching Xiaomi everything it knows. When the student no longer needs the teacher, the agreement will have fulfilled its function

This week there have been two presentations of flagships which, seen together, say something interesting about where each manufacturer believes the industry is going: Samsung introduced the Galaxy S26 Ultra like an AI exhibition: three integrated assistants, the mobile phone as an external brain that anticipates what you are going to need before you ask for it. A few days later, Xiaomi presented the 17Ultra. And his big argument was not AI. It was the camera. And inside the camera, above all, it was Leica. It is advisable to take this collaboration seriously before reducing it to a marketing seal, because it is not. We had the opportunity to check it out in a session with TJ Waltonglobal product manager at Xiaomi, and Pablo Acevedoat the head of Leica’s mobile division. A round with around twenty journalists from Japan, Germany, France, China and other markets, in which Xataka It was the only Spanish medium. Left, TJ Walton. Right, Pablo Acevedo. Image: Xataka. I opened the question session with a very direct question: what does this co-creation model mean in reality, and at what point in the process does Leica come in? Acevedo’s response was also direct: “We are involved from the beginning, from the conception of the device, when we define the concept of what it should be.”. It is therefore not a certificate that is awarded at the end. It is shared engineering from the beginning: color tuning, contrast, physical adjustment of the lenses, testing of the final product… Walton summed it up: “Everything from the beginning to the end of the imaging experience on our smartphones is powered by Leica.” And still There is something in the details of the agreement that deserves attention, because Leica does not give the same thing to everyone. He Leitz Phonethe device that Leica markets as its own with Xiaomi hardware, includes ‘content credentials’, a certification of image authenticity that the Xiaomi 17 Ultra does not incorporate. When a Japanese journalist asked about this asymmetry, Acevedo was clear: “Authenticity is one of the important points for us. There are specific experiences aimed at professional photographers, those who really care about the smallest details of the photographic experience.” Said without euphemisms: Leica gives a lot to Xiaomi, but keeps for itself what it considers most defining of its identity. This ‘co-creation’ has limits. And those boundaries map out quite precisely where the partner ends and the customer begins. The presentation of the Xiaomi 17 in Barcelona just before the MWC. Image: Xataka. There was another moment in that same session that was like someone turned on the lights. When another journalist asked how the revenue from Leitz Phone is divided financially between the two companies, the response was: “I’m not sure if we can talk about that.” That is to say, The part of the agreement that would most reveal the true nature of the relationship is exactly the part that remains opaque.. Which is, in itself, an answer. Collaborations between equals do not usually have silence clauses on how the money is divided. OnePlus went with Hasselblad. I live with Zeiss. All different, all with the same underlying logic: a European name with decades of photographic history placed where the buyer sees it as soon as they take a Chinese phone out of the box. What they are buying is not only technology but the right to be given the benefit of the doubt in a segment where distrust of Chinese brands continues to be a real factoralthough decreasing. Each generation of product with Leica normalizes Xiaomi’s photographic excellence a little more. There will come a time when this standardization is complete, when the European buyer will not need anyone from the West to certify what he already knows. That day Xiaomi will not need to renew the agreement. And Leica will discover that she gave up part of her aura to someone who no longer needs it.while what Xiaomi gave in return (technology, scale, relevance in the smartphone market…) will have remained integrated into its products forever. And there is something there that is worth remembering. Leica has built its value on a very specific idea: scarcity. 8,000 euro cameras, limited production, a community of insiders who pay precisely because not everyone can… That’s the business. And now andHE same name appears on a device that sells tens of millions of units a year. Every Xiaomi 17 Ultra that comes out of a box does not destroy that aura, but it dilutes it a little. But there is something deeper than trade asymmetry. What happens, agreement by agreement, generation by generation, is a silent transfer of the center of gravity of technological prestige: For decades, European and American brands were the ones that certified the excellence of others. Now they are the ones who need someone to call them. Leica is not a victim in this process: it has made its decisions with its eyes open and has probably calculated its short and medium-term benefits well. But the long term has its own logic, and that logic says that when a historic brand becomes the endorsement that others need to grow, something in the balance of power has already changed. Although it is not yet noticeable in the price of their cameras. In Xataka | A week with the Xiaomi Mijia Smart Audio Glasses has shown me how great it is that your glasses are also your headphones Featured image | Xataka

There is an island without which the world would not function. This is how Taiwan has become a world technological epicenter: Crossover 1×35

In February 1974, the Prime Minister of Taiwan met with a small group of experts and together they came to a conclusion: the country had a difficult time with the economic strategy of the time, and they had to make a bet on the future. That bet They were, of course, the semiconductors. That famous meeting marked a before and after for a country that has a very delicate geopolitical situation. China considers it a rogue state, but while they have their own government and currency. Despite this tension, Taiwan has managed to become a strategic partner of countries such as the aforementioned China or the United States, and in both cases for the same reason: chips. Taiwan has managed to become a absolute giant in the semiconductor industry, and this is demonstrated by the company that It is the crown jewel of the country: TSMC (Taiwan Semiconductor Manufacturing Company). Since it was founded in 1987, the company has grown and its alliance with Apple in the early 2010s has proven crucial to its current dominance. But before all that happened, Taiwan went through a complicated process that included wars and dominance by Japan for nearly half a century. In this episode of Crossover we precisely analyze the history of this peculiar island and how it faces a future that, even with its current position, is full of challenges. On YouTube | Crossover In Xataka | TSMC’s only problem was that it was in Taiwan. So the United States has decided to get her out of there

Its digital notebook function is a big plus

Until recently, those of us who enjoy making annotations in books (including yours truly) had a great handicap when it came to reading digitally, since we could not enjoy this option. But this changed with the arrival of Kindle Scribea electronic book reader which is also digital notebook and that has surprised me very pleasantly. Amazon Kindle Scribe (16GB) | Redesigned screen with uniform edges The price could vary. We earn commission from these links The perfect Kindle for those who love reading and writing The screen of this Kindle Scribe is one of its main assets. It has a diagonal of 10.2 inches and has a resolution of 300 dpi. Although if there is something that it is characterized by, it is the adjustable warm light that it integrates. This adapts to the environment and the moment in which you are using the device, something that seems like magic. The design of this Kindle Scribe is very light and you can easily operate it even with one hand (despite its large screen). This has made it one of my inseparable companions to keep me entertained during my travels. This electronic book reader from Amazon incorporates a premium pencil (with several spare tips), so you can comfortably use its touch screen. Thanks to this accessory, you will be able to make notes, underline and write as if you were doing it in a paper notebook, since the experience is very realistic. You may also be interested in these Kindle Amazon Kindle (16 GB), the lightest and most compact Kindle The price could vary. We earn commission from these links New Amazon Kindle Colorsoft: with 16 GB of storage The price could vary. We earn commission from these links Some of the links in this article are affiliated and may provide a benefit to Xataka. In case of non-availability, offers may vary. Image | Fran León and Amazon In Xataka | Which Kindle to buy: buying guide with recommendations to get it right with Amazon e-book readers In Xataka | Amazon Kindle: guide with 27 functions and tricks to get the most out of your e-book in 2025

How to see any photo with the 3D space effect of iOS 26 on your iPhone using the new function of the APP photos

Let’s explain How to use the app Photos From your iPhone to see with 3D effect The photos you want. It is one of the functions of iOS 26 with which you can use this effect with your photos On the lock screenbut the APP photos also allows you to use it with anyone at any time. Here, you just have to know that this function is pure amusement, to see the effect and that’s it, you can’t use it for much more. But in the end, it can also help you to see how you are with any photograph you have before using it then as a wallpaper. Use the spatial effect with any photo The first thing you have to do is Open the application Photos On your iPhone. Remember that you should have updated iOS 26, and the condition is that the photo where you want to apply the effect must have some type of protagonist, such as a person, pet or object. Choose a photo and enter it. Once you are inside the photo, you have to click on the hexagon icon that will appear above right. To see it you must have the interface, that is, if you only see the photo click on the screen so that the other elements come out. When you press that button, you will see that for a few seconds some purple colors appear on the screen while the AI ​​analyzes the content of the photo. Then you will see that The indicator of Space sceneand that when you move the mobile screen you can see the 3D effect of the photo. In Xataka Basics | How to obtain information from what appears on your iPhone screen with Apple Intelligence and iOS 26

We believed that the iPhone 17 and the Air shone by cameras and design. We have just discovered that they hide an exclusive security function

For a long time we have lived with the illusion that there are impenetrable computer systems. The reality is less resounding: in security, everything is reduced to how much effort, time and resources it requires to force a lock. Just as it is not the same to open the door of the house as the vault of a bank, in the digital world There are more or less resistant barriers and unexpected shortcuts that avoid brute force. The objective of the defense is not perfection, but to raise the toll to break it is impracticable. From there, the risk never disappears, it is managed. With that practical look, Apple has been adding layers to make every step of the attacker more and reduce its maneuvering margin. According to the Cupertino companythe most sophisticated exploitation chains that have observed against iOS come from the mercenary spyware and rely on memory vulnerabilities. Although they do not explicitly mention it, they surely refer to threats such as Pegasus of the company NSO. And the answer they have raised is a new piece in that wall: a reinforcement that integrates hardware and system to monitor the integrity of memory and cut overwhelms or undue accesses before they thrive. Memory Integrity Enforcement on iPhone 17 and iPhone Air Apple has presented Memory Integrity Enforcement (Mie) as part of the new iPhone 17, iPhone 17 Pro and Pro Max and iPhone Airan integrated memory defense directly in its hardware and operating system. This development is the result of five years of joint work among their teams of Chips and Software Engineeringwith the aim of drastically raising the cost and complexity of attacks based on memory corruption. Mie promises to act continuously and transparently, covering critical areas such as kernel and more than 70 processes in user space, all this without compromising energy consumption and device performance. The Miene nucleus combines several layers that work in a coordinated manner to reinforce security. The typated memory assigners are systems that organize the data according to their type, as if each object class had a specific drawer. This organization makes it more difficult than an error in a program allows one data to overwrite another. If a failure occurs, the system can detect it before it becomes an attack. On this basis acts the Enhanced Memory Tagging Extension (EMTE), a hardware technology that adds an extra layer of memory control. Emte works by assigning a “secret label” to each memory block. Every time an app or the system wants to access it, you must present the correct label; If it does not coincide, Hardware blocks attempt And the system can close the process. This permanent and synchronized check allows to detect and stop classic attacks such as buffer overflows or use after release (USE-AFTER-FREE), which are usual techniques to take control of a device. The allocators protect the use of large -scale memory, while EMTE provides precision to the smallest blocks, where the software itself does not respond with the same effectiveness. This permanent and synchronized check allows to detect and stop classic attacks such as buffer overflows The bet responds to a landscape of threats where the highest levels against iOS are faces, complex and directed, historically associated with state actors. These chains usually share a common denominator: they exploit interchangeable memory vulnerabilities that have been present throughout the industry. The intention of Mie is cutting the progression in early stages, when the attacker still has little room and depends on chaining multiple fragile steps to gain control. Apple graph showing real exploitation chains and the points where it blocks them The scope of protection includes kernel and extends to key system processes that are usually entry objectives. In addition, Apple makes available to developers the possibility of testing and integrating these defenses through the Enhanced Security option in Xcode, including EMTE capabilities in compatible hardware. That is especially relevant to applications where a user can be direct objective, as messaging or social networkswhich often appear at the beginning of the exploitation chains. To sustain the labeling and synchronous check -up without perceptible impact, Apple redesigned the A19 and A19 Pro allocating CPU area, CPU speed and memory for label storage. The company precisely modeled where and how to deploy emte, so that the hardware meets the demand for checks. The software, on the other hand, takes advantage of the assignments typated to raise the bar of protection against memory corruption, while the hardware assumes fine verification. As we point out above, this should maintain the expected experience in performance and autonomy. The project was evaluated with its offensive research team from 2020 to 2025. First with conceptual exercises, then with practical attacks in simulated environments and, finally, on hardware prototypes. This prolonged collaboration allowed to identify and close complete exploitation strategies Before launch. According to Apple, even trying to rebuild known real chains, they failed to restore them reliably against Mie, because too many steps were neutralized at the base. Even so, Apple remembers that perfect security does not exist. Very rare cases could survive, such as certain overflows within the same allocation. For previous generations without EMTE support, the company promises to continue expanding software -based improvements and safe memory allocatives, with the aim of bringing part of these benefits to previous devices without affecting its stability. Ultimately, Mie does not eliminate riskbut it does redraw the rules of the game by raising the cost and difficulty of memory corruption techniques. For those who buy an iPhone 17 or an iPhone Air, this translates into always active protection and, according to Apple, invisible for the user. Images | Xataka with Gemini 2.5 In Xataka | Or pay or we will use your works to train AI: the threat of hackers to an artist website In Xataka | How to change all our passwords according to three cybersecurity experts

China’s sky has just given us another track of its air ambition. A plane so radical that costs to guess its function

In the month of June Some images In the sky of China they went viral. The future furtive hunt for the nation appeared on the scene, The J-36and did it clearly leaving behind the clues and indications of a technical ambition rather than remarkable. Now, a month later, another figure has just appeared thundering the sky of Beijing. But this time it seems something else. A new device without a tail. Yeah, Recent images They have revealed the existence of a new furtive combat apparatus in the test phase in China, whose Design without tail You have aroused doubts about whether it is a man -generated manned plane or an advanced combat drone with functions From “Loyal Wingman”. Although it is not clear if the aircraft has a cabin, the model presents features of a design of great sizepossibly manned, with wide fuselage and significant fuel capacity and internal armament. The absence of cola vertical surfaces, the wings in configuration with a “W” -shaped escape edge and the integration of twin air inputs suggest an effort by Maximize rankiness. The double wheel front landing train and the data probe in the Morro point to an early test of tests, but also to a considerable weight design, even suitable for aircraft carrier operations. Odds. The fact that the device shows similar characteristics TO CHENGDU J-36but in a seemingly more compact format, it has led to speculate that it could be a direct competitor of the SHENYANG J-XDS/J-50as part of the struggle between the two main aeronautical houses of China. This hypothesis makes sense if it is considered that The J-36due to its size and conception, it does not compete in the same segment as the J-XDs. A derivative smaller, bimotor And optimized as more traditional mission hunting, would fit in Chengdu plans to diversify its range and rival Shenyang. The possibility that it is an optimized design is also considered For aircraft carrier or of a sixth generation hunt in medium version, although the scale of the device cannot be determined with the available images. Another image of the new device The alternative of a drone. Another interpretation indicates that this model could be one of several Chinese projects inspired by the American program of Collaborative combat aircraft (CCA). In that case, it would not be a manned plane but A high performance UCAV With advanced autonomy, designed both to operate together with manned fighters and for independent long -range missions. Experts like Andreas Rupprecht They have identified Similarities and differences with other designs “without a tail” detected recently, which reinforces the idea that China simultaneously develops multiple prototypes of furtive drones, informally known as “tea cups”in contrast to the manned fighters nicknamed “teapots”. The diversity of configurations (from Deltas modified to diamond wings and mixed configurations) suggests that the country experiments with several solutions before consolidating an operational fleet. Tests and indications. Plus: The revelation of this new plane coincides with satellite images taken in Yangfangnear Beijing, where at least five different designs of CCA drones were identified in preparation for the September 3 parade, on the occasion of the 80th anniversary of the victory over Japan in World War II. Among them you can see models 9 to 12 meters long, some without tail and others with more traditional configurations, partially camouflaged under canvases. The same base also houses Balistic and UCAVS missile launches already known, such as the GJ-11 Sharp Swordwhich reinforces the idea that the parade will publicly exhibit the new generation of unmanned combat systems. In parallel, another large fuselage appeared in Shenyang’s plantwith a modified Delta design, which adds more unknowns about the different ongoing programs. China vs.euu. It We have counted. The accelerated rhythm of the Chinese military aerospace industry It is undeniableand this new plane (whether or not manned) demonstrates Beijing’s ability to generate Strategic surprise In a recurring way. In this field, the comparison with Washington is inevitable: the American Air Force currently develops The YFQ-42a of General Atomics and YFQ-44a de Andurilwith flights planned for next year and with an approach based on iterative design and deployment cycles. China seems to be emulating this modelmultiplying prototypes and moving rapidly in autonomy, AI and swarm capabilities. The biplaza fighters J-20s They have been profiled as drone swarm controllers, while early alert planes KJ-500 either H-6 bombers They are intended to become key nodes of this manned-nokened collaborative network. The strategic importance. Although it is not yet known with certainty if the new plane is a sixth generation hunting or An advanced UCAVthe truth is that China is developing a Range of platforms ranging from disposable drones to long -range pools. If it is confirmed that it is an unmanned plane, the model could constitute a more powerful and autonomous version than The GJ-11with the ability to accompany To the futures H-20, J-36 and H-6 in Missions of great action radius. If instead it was a new manned fighter, industrial rivalry would be consolidated Between Shenyang and Chengdu and would reinforce China’s jump towards a diversified fleet of sixth generation. In both cases, the message is clear: Beijing accelerate your advance In air combat technologies and seeks to reduce the gap with the West, positioning itself as a power capable of combining furtive aviation, AI and collaborative operations in a single air war ecosystem of the future. Image | X In Xataka | China seems to be molding a huge poaching plane called J-36. This image is emerging as proof of its ambition In Xataka | A number has revealed what was a secret until now: China already has its “invisible hunt” ready for action, and double

What really has the viral notice and what really does this function

Let’s tell you What does the option Improved Chat Privacy Regarding AIand to what extent I prevents us from spying on us. In recent days there is a viral notice that is being shared by many WhatsApp groups. It is said that we must Activate the improved privacy option so that artificial intelligence Do not access your messages. But this is not really true, and This option does not work exactly that way. There is some context in which I can prevent the IA from reading the messages, but it has nothing to do with protecting them from it. We are going to explain everything in a simple and easy to understand way. The improved WhatsApp and improved privacy In recent days a message has been spreading that it is said that “it seems” that if the option of “improved chat” in WhatsApp is not activated, Any artificial intelligence can access group messagessee the phone numbers and catch personal mobile information, even in private messages. This is not true, because AIs cannot enter WhatsApp chats uncontrollably and steal all data, it does not work in this way. Although there is something in which this function interferes with the fact that the members of a group or a chat can share a message or several with an AI. This viral message misinforms and lies, and that on the way or not, it causes an unjustified alarm. But it is also fair to say that it does not cause you problems, because This option will not do anything wrongIt will simply protect your conversations a little more, although in a different way. How advanced chat privacy works When you press in the name of the group in which you are or the person you are talking about in WhatsApp, you will enter the settings of that conversation. In them, you have a new option called advanced privacy of chatwhich serves to prevent messages on it from being shared. This function serves for the following things: Prevent your messages or photos from sharing in other chats. It prevents multimedia files from automatically saved in the mobiles of the members of the chat. The messages cannot be used for AI functions, such as mentioning goal AI. When you are in a chat, anyone who is in it, be it an individual conversation or a group, can Share a message or photo in other chats That you have in your WhatsApp. With this function activated in a, then this option to share them disappears. In addition, WhatsApp allows you to configure it so that all the photos that are shared in a group or chat They are automatically saved in the gallery of the mobile. In some cases the option is preactivated. Advanced privacy causes the files not to be saved by default. It is also mentioned that messages are prevented from being used for AI functions, but this has nothing to do with what is said in the viral message. Now we will explain it to you. How to protect the function against AI There are two ways in which an AI can access the conversations of a chat. The first is that You share a message to artificial intelligence. Remember that it is no longer just Goal AI in WhatsAppyou also have Chatgpt in WhatsAppand many ortho artificial intelligence systems that function as if they were normal chats, and those that you can share messages. As advanced privacy prevents sharing messages, It also prevents you from sharing messages to AI As to any other contact with which you have a chat. And then we have a goal AI, the artificial intelligence of the company responsible for WhatsApp. This AI allows other functions, such as mention it inside a group to ask for things. When you do this, a target AI can read the content of this group. If you do not mention the goal AI, it does not have to read the chat content. And if you activate this function, you will not be able to use AI goal in the chat, therefore you can not access what is said in it. Of course, goal can always use the content of the chats in general to train their AI, although There is a way to ask not to do it. About the viral message, another thing you should know is that An AI cannot enter your mobile by WhatsApp to catch your personal info And the content of private chats, so activating this function will not protect you from something that does not happen. In summary, the advanced chat privacy function protects you against only certain interactions with AI concrete, which are the integration of goal AI in the chat and to be able to share with any artificial intelligence a message. But nothing more. In Xataka Basics | 22 useful and not so well -known free artificial intelligence tools

How to do it and 11 profits for the function

Let’s explain How and what can you send you WhatsApp messages yourself. This function It has been available since 2022, and is one of the great underestimates of the application, since it makes it grow in a very important way. We are going to start the article telling you how you can perform this function to have a conversation with your person. And then, we will go on to give you a list of suggestions of things with which you will be able to get the most out of it, where we will mention a function that still lacks and that makes the level of these messages with yourself are still below those of Telegram. How to send messages to yourself Sending to yourself on WhatsApp is very simple. The first thing you have to do is go to the main page of the chats, and there Press in the writing button a new chat. You can do this on both Android and your iPhone. Both on Android (left) and in iOS (right), when you enter the screen of starting a new chat, You will appear as an outstanding contact at all. This means that you are going to see your own profile image and your contact, and you just have to click on it to start the conversation. Just in case, It is advisable to have yourself or yourself on the agenda of your mobilethat you have added your own number in the event that the mobile does not do it for itself. And that’s it. With this you will start a conversation with your person, and everything you write in this chat You can only see itand from any device in which you log in to WhatsApp. What can you do when sending messages And what can you do with this function? Well, the truth is that there are several ways in which you can take advantage of it. Here we leave you a few to keep them into account. Save links you see online: If you don’t want to install a third -party app to save links, you can simply send them to WhatsApp. You will have them in the chat whenever you want. Send files and photos from one device to another: You can use WhatsApp on several devices at the same time, so you can send a file, or photos or videos in one of them and will reach other devices. It serves you for everything, including tickets, tickets, guards or other important documents. Sending photos with original quality: Do not forget that you can Send photos or videos as if they were filesso that you can take them from one device to another in their original quality. Is your notes: You can also write messages writing down things you have in mind at any time and then be able to read them when you want to put yourself with it. You can make reminders: Unfortunately, WhatsApp does not allow the messages to be programmed, so they will not be useful reminders. But if you write something, then when you open whatsapp you will see it there, in the message yourself, which can help you remember things. You can also create lists: If someone is recommending you films, series or books, you can create a list and you will have it there later. You can also store purchase lists if you are looking at online stores but you don’t want to buy what you like right now. Save jokes and memes to use later: If in a channel or chat someone sends you a joke or meme that you like, you can share yourself and save it to use it later in another chat. Remember passwords: Maybe you are registering on a website from a device where you don’t have access to your Password manager. In this case, you can write it down on WhatsApp, but I recommend that The stories as soon as you can and when you keep them in a safer manager. Do content and format tests: If you want to send a WhatsApp message to another person, you can first write it in this place sure they are the messages with your person. You can try the formats to use and create a draft to continue with it and send it when prepared. Create stickers: Can create stickers on whatsapp using photos That is in your chats. But if you want to do it from a specific photo that you do not want to spread or with which you do not want to disturb anyone, send it to you and generate the stick from the chat with yourself. Use it as your diary: You can also use these messages to write a newspaper. So simple, every day writes what you want. In Xataka Basics | Alternatives to whatsapp: the best messaging applications if you want to change the finish line for another

The Nvidia IA supercomputer costs three million dollars. And to function wears a switch with three km cable

When Nvidia presented her new AI chips, The B200 with Blackwell architecturetook the opportunity to present an AI accelerator called GB200. And by joining 36 of those accelerators created its AI server, the monstrous DGX GB200 NVL72, which also keeps some spectacular surprises. Each node is bestial. Each of those GB200 accelerators has a CPU Nvidia Grace with 72 ARM Neaven V2 nuclei and two B200 GPUS. By combining its power we end up having a kind of bestial GPU combined with a power of 1.44 Exaflops in precision FP4. A closet that weighs a quintal. The appearance of the GB200 NVL72 DGX is that of a small and narrow closet that is above all very dense: this rack weighs 1.36 tons. Inside there are 18 Bianca computing nodes in 1u format, and each of them has two GB200, or what is the same, with four B200 GPUS (hence 18 x 4 = 72). He estimated cost of this AI server is about three million. Liquid cooling is key. The heat dissipated by these components is remarkable, which makes in this case the best option to cool those elements is the liquid cooling. This system not only applies to the CPU Grace or in the B200 GPUS, but in the NVLink chips of the switches, which can also be heated a lot due to the massive transfer of data between the accelerators. Interconnections everywhere. For all these GPUS to work together, each of the 36 GB200 has specialized network cards with NVLINK support of fifth generation that allow each of the computer nodes to be connected to others. For this there are nine switches that provide that huge amount of interconnections. 3 km cable. The system allows you to enjoy a bidirectional bandwidth of 1.8 TB/s between the 72 server GPUS. But as they point out In The Registerthe really surprising thing is that in total inside that “closet” there are 3.2 kilometers of copper cable. Only the module with the switches weighs more than 30 kilograms due to both these components and the more than 5,000 cables that are used so that all Nvidia GPUS work together and in perfect synchrony. Why copper? It may be able to opt for copper cable seems strange, especially taking into account the needs in terms of bandwidth imposed by this machine. However, the solution with fiber optic cables imposed clear problems: we would have to use electronic components necessary to stabilize and convert optical signals. That would have increased not only the cost, but the consumption of the final system. Can Crysis run? The performance of each B200 chip It is already brutal on its own: Its power is the triple than that of the GeForce RTX 5090, and the entire server includes 72 of these specialized GPUSs for AI, which demonstrates the computing capacity that said machine possesses. It also has RT (Ray-Training) nuclei of the fourth generation, which would theoretically allow you to use these AI chips to play video games, although of course that is not even its purpose. In fact your performance in this area will probably be almost as poor as the Nvidia H100. Cloud consumption. Although new chips are much more efficient than H100 –25 times less, says Nvidia – this AI server has an estimated TDP of 140 kW. Since the average consumption of an average home in Spain round The 3,000 kWh per year, in an hour of use of the Nvidia server we consume the same as an average Spanish home in 17 days. Have it on and running all year raises a consumption similar to 415 middle homes throughout the year in Spain. In Xataka | AMD has a splendid roadmap for its AI chips. The problem is still in your software

I have taken less than a week to deactivate the star function of iOS 26. The filter called is to kill flies to guns

I’ve been from the night of the WWDC 25held on June 9 using the beta of iOS 26. This is the largest redesign of the Apple operating system in years, and the first real approach to how the company will implement its local artificial intelligence in native applications. One of the most commented functions was that of Anti spam protection. A system that comes to rival some already existing, like Google’sbut in a more aggressive and less intelligent way. So much so that I had to deactivate it just a week later. How the Apple filter works. Within the Apple Telephone App, from iOS 26, there are new ways to filter unknown numbers. Filter incoming calls: the incoming calls of unknown numbers are filtered. Whoever makes the call has to identify and, once we have that information, we can choose to pick up or not. Send all calls from unknown numbers to the voice mailbox. Automatically silence all calls of unknown numbers. The second and third option are quite aggressive (in addition to the second one was already present in previous versions of iOS). The great novelty is in How Apple Applies Ia Upon receiving calls, since it is Siri who attends the person, not us. The first day, the first notice. I receive many calls a week, more than I would like. Mainly, of messaging companies that contact me to know if I am at home. I analyze smartphones in Xataka and the different parcel companies call practically daily. From numbers that I don’t have saved, of course. It soon realized that they were calling me from a parcel company, and the delivery man was not answering the questions of Siri. How do I know? For how this new feature works. Thanks, don’t hang up. When someone with an unknown number calls us, Siri asks him to identify and explain the reason for the call. It is not necessary to be too explicit: it is enough to say “I am Ricardo, it is important.” But here there are two issues. The first is that the iPhone notifies discreetly when the filter is active, with a minimum vibration that we will not notice. The second is that, if the person does not identify, the phone does not start sounding until 20 seconds. A filter that does not filter so much. Yeah The call is urgentit is more than likely to hang. It is just what happened to me this week, both with the deliveries and with a call that I received from my health center. After a robot (Siri) ask you what you want, if you are not willing (or you cannot) answer at that time the question, it is difficult to be 20 seconds waiting for the phone to begin to sound to the other person. I saw perfectly how the delivery man hung before he started sounding and, after asking him (I had to call him later), he told me that he did not know if it was some type of fraud. Normalize that Siri takes it. It will not be easy to normalize that Siri takes the phone. It would be necessary for practically all Apple users to activate this function, and that users understand that every time you call an iPhone, you have to go through Siri. The most important factor of the urgent call is also lost: immediacy. A accident cases in which they call you with unknown numbers, medical consultations … No one likes calls of unknown numbers, but filtering them all, regardless of whether they have advertising purposes or not, is to kill flies to cannon. Google makes it much better. Google Filter suspicious calls of fraud or spam has been filtering years indicating precisely that the calls are spam. If we call us a number for commercial or fraudulent purposes, Google uses its AI model to analyze in the cloud where that number comes from. In the event that we are not clear who calls us, we have nothing but to filter so that the Google assistant does exactly the same thing that Apple does: ask the interlocutor who he is and the reason for his call. It is a practically infallible filter for commercial and fraudulent calls but in which at all times we are finding out whether or not they call us. Image | Xataka and Xataka Android In Xataka | What is the Robinson list and how to sign up for it to avoid unwanted advertising

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.