destroy a key piece of engineering

It is a scene that is repeated in homes throughout the country. A persistent headache, a more acute menstrual malaise than normal or muscle pain that does not yield. 400 mg ibuprofenthat usual ally of the first aid kit, does not seem to be enough, and the ‘version’ of 600 mg can only be achieved with a recipe Medical Then arises the idea of ​​leaving a tablet in two and taking 400 mg more than 200 mg that gives 600 mg. But it’s not that good idea. An idea that has had to deny a pharmacist. Through your Tiltok account, @farmaceuticofernandez, responded to a girl’s video which pointed to that an ibuprofen and a half had been taken. Its verdict is quite clear: mathematical logic is not correct. And is that the principle of the active of the medicine andStá mixed with other excipients And this is not equitably distributed in each half of the tablet, so we do not find 200 mg of medicine on each side of the pill. It is in the end a lottery. In addition, it suggests that some of these tablets have a protective film that covers it with the aim of Protect our stomach or to be absorbed in a specific place of our system. If it starts, this protection effect is lost and can generate more problem than benefit. The anatomy of a tablet. The fundamental assumption behind leaving a pill is that the medicine is distributed perfectly uniformly throughout its volume, such as dissolved sugar in coffee. The reality, however, is much more complex and looks more like a cookie with chocolate pepitas. The active substance (Ibuprofen, in this case) are the “Pepitas”, while the rest of the components, called excipients, are the “mass.” When the cookie starts in half, no one can ensure that each piece contains the same amount of chocolate. The science behind each pill. A tablet It is a pharmaceutical engineering work. In addition to the active substance, it contains a variety of excipients that are essential for its function: diluents To give volume, binders To keep it cohesive, disintegrating to dissolve in the body and lubricants such as Magnesium stearate so that the machinery does not stick during the manufacture. The most common manufacturing process, known as Wet granulationit implies mixing the API dust with the excipients and a liquid binder to form small granules. These granules dry and then compress at high pressure to form the final tablet. The ultimate goal is to ensure the uniformity of dosing units. What the box says. With this system, which is guaranteed only that each whole tablet of a lot contains the declared amount of active substance, within a margin of trust. However, this uniformity guarantee applies to tablet as a unit, and the homogeneous distribution of the active substance within each individual tablet is not ensured. And scientifically demonstrated. A study by pharmacy technicians In controlled conditions, 22 different brands of generic medicines fractioned. The results were surprising, since only 32% of the grooved tablets (designed to be games) and a little 27% of the non -grooved tablets met the uniformity criteria of the weight that are acceptable. In this way, if professionals with adequate tools cannot achieve precise division, the probability that a patient will do it at home with a kitchen knife is tiny. The slot is not decorative. If the internal structure of a tablet is a lottery, the presence or absence of a slot on its surface is the signal that indicates whether we can play or not. That small line is not a decorative element or a simple visual guide. It is a legal and scientific statement of the manufacturer that certifies that this tablet It has been designed to be split by that line To have more or less security we take a precise dose. In order for a tablet to carry a slot, the laboratory must demonstrate to the regulatory agencies that the halves meet the same standards of dose and dissolution uniformity as the entire tablet. The prospect is important to read it. This document, which we sometimes hate because once we open it you can no longer bend correctly, it indicates what we can do with the medication. If this report details that a tablet can be divided, it is because it has been demonstrated. For example, in the Paracetamol prospect From 1 gram, “the tablets are grooved, which allows to divide the tablet into equal doses.” But the same does not happen in a 400 mg ibuprofen leaflet of the Cinfa brand that is very common I even had 400 mg ibuprofen at home and I have been able to verify that I did not have any division to leave the pill in two. Something that obviously faces us to be inaccurate. The doctor has the ‘key’ to have 600 mg ibuprofen. The distinction between the 400 mg ibuprofen and the 600 mg is not just a matter of 200 mg more power; It is a regulatory and security border. In Spain, the presentation of 400 mg can be dispensed without a recipe (although often under the pharmaceutical council), while the 600 mg necessarily requires a medical prescription. This decision, taken by the AEMPS, is not arbitrary, but is based on a exhaustive analysis of the balance between benefit and risk. The issue in this case is that after comparing the effect of the 400 mg version with the 600 mg is almost the same. This phenomenon is known as analgesic “roof effect”, where major doses They do not produce additional pain in a significant way in mild cases. But what it does cause is that they increase the Side effects considerably. Something that also corroborates the pharmacist from the beginning. A suggestion effect. The problem we have in this case is the suggestion to which we are exposed. Obviously, a larger amount correlates with a greater analgesic effect according to our own logic. And this … Read more

A “key molecules” factory “

He James Webb Space Telescope (JWST) has given us another image for memory, but this time, beauty hides a fundamental discovery about the Chemistry of the Universe. An international astronomer team ha used the powerful webb infrared eye To unravel the complex NGC 6302 structure, better known as the Butterfly. Trying to solve a great astrophysics question. The team of scientists has found in this nebula what could be the first direct evidence of a place of training of Policy aromatic hydrocarbons (PAH) in a planetary nebula. These molecules, carbon compounds and fundamental for Prebiotic chemistrythey are an essential ingredient in the cosmos, and understanding where and how they are created is one of the great questions of astrophysics. A chemical puzzle in the heart of the butterfly. The butterfly nebula, located about 3,800 light years awayis the spectacular remnant of a dying star much more massive than our sun. In its center is one of the most known hot stars, with a surface temperature of approximately 220,000 Kelvins. This star bombards with ultraviolet radiation the remains of gas and dust that she expelled, creating the intricate and bright ‘wings’ that give her her characteristic name. However, NGC 6302 presented an enigma that brought scientists heading. Your spectrum It showed the simultaneous presence of oxygen rich dust (such as crystalline silicates) and carbon rich molecules (the PAH). This is extremely unusual, since the chemistry of an evolved star usually opts for one of the two elements, depending on whether in its atmosphere there is more carbon or more oxygen. Finding both in abundance was like mixing water and oil. The Webb turns on the light in the dark. Using the Miri instrument (MID-Infrared Instrument) of the JWST, the researchers led by Mikako Matsuura of the University of Cardiff, managed to create a detailed chemical map of the heart of the nebulose, a dense and darkened area by dust. This map deserved an article in the magazine Monthly Notices of the Royal Astronomical Society where a much more dynamic and complex structure was revealed than was thought. An astronomical treasure. The study confirmed the existence of a dense album of dust and gas that surrounded the central star. And the album is a real treasure, because it not only contains a huge mass (between 0.8 and 3 times the mass of our sun), but is composed of grains of large crystalline silicates. This supports the theory that this dust was formed in an environment of high intensity and slowly, conditions that would be given on a stable album, perhaps influenced by a companion star, and not in the rapid and chaotic stellar wind. Violent bubbles and a PAH factory. One of the most surprising findings is that the nebula is not being formed by a continuous and soft stellar wind. Instead, Webb reveals that the central star has generated a series of hot gas bubbles in violent and intermittent expulsions. It is precisely on the edge of one of these “internal bubbles” where the “Eureka” moment occurred. The scientists observed a clear stratification of the materials. Specifically, an inner layer of highly ionized gases was seen, such as magnesium and silicon, very close to the star. More outside a layer of ionized hydrogen. And coinciding with this layer, or slightly more outside, a layer of molecular hydrogen. But the most interesting thing is that the emission of polycyclic aromatic hydrocarbons (PAH) is even more outside the layers. Something unusual to what is already known. This provision is different from that of other regions of Well -studied star traininglike the Orion bar. The researchers argue that the shock wave generated by the expansion of the hot bubble creates the perfect conditions of radiation and temperature in the material that is right in front. This shock front triggers a chemistry that allows the formation of PAH molecules in that specific strip. Instead of being remains of the star’s past, these complex molecules would be manufactured right now, as a result of the violent nebula dynamics. Why is it important? With this research, a first step has been taken to decipher the origin of Complex molecules in our universewhich are considered fundamental construction blocks for the precursors of life. Understanding where and how they are manufactured in the cosmos is crucial to understand the carbon cycle in the universe and the availability of prebiotic ingredients in galaxies that give a new life. The study also demonstrates that the butterfly nebula was not formed by a soft and continuous stellar wind, but by a series of violent and energy bursts. This changes our understanding about how stars die like the sun and how their elements return to space, demonstrating that the final phase of the life of a star can be a much more dynamic process than was thought. Images | POT In Xataka | Spacex has just published unpublished images of the “Rostized” Starship. A unique perspective of his shock after the toughest reentry

Physicists believed that the neglect was a useless particle. Now they suspect that it is the key to universal quantum computers

Experts Quantum computing with those who have had the opportunity to speak, such as Spanish physicists Ignacio Cirac either Juan José García RipollThey argue that quantum computers will be able to make great contributions when they are capable of amend your own mistakes. The main problem they face in this area is noise, understood as the disturbances that can alter the internal state of the cubits and introduce calculation errors. The strategy for which many of the research groups that are involved in the development of quantum computers are opting for monitoring the operations carried out by the cubits to identify real -time errors and correct them. The problem is that from a practical point of view This strategy is very challenging. Logical cubits represent a way to overcome the difficulty involved in the use of hardware or physical cubits, which are extremely noise sensitive, and, therefore, prone to make mistakes. Each logical cubit is constructed abstractly on several physical or hardware cubits, so that a single logical cubit encodes a single cubit of quantum information, but with redundancy. It is precisely this redundancy that allows to detect and correct the errors that are present in the physical cubits. Anyway, the researchers will have one more tool to deal with the errors of quantum computers. It can even be the most powerful resource that they currently have at your fingertips: the Neglectón. Universal quantum computers are one step closer One of the most promising research fields in this area is topological quantum computing. Its purpose is to protect the delicate quantum information that the cubits work coding it in the geometric properties of exotic particles known as ISING anions. An important note before moving forward: in condensed physics an anion is not the same as in chemistry. In fact, Ising’s anions are quasiparticles that, in theory, arise in some two -dimensional materials. Its existence has not yet been demonstrated experimentally, so they are a theoretical result at the moment. It seems a complicated concept, and it is, but in this article we do not need to deepen much more. What we do need is that Ising’s anions They are presumably much more robustand, therefore, resistant to errors that traditional cubits. In practice this implies that moving some anions around others in a specific way should allow researchers to carry out logical operations with them. This is the reason why they are so attractive in quantum computing. And, in addition, they have another great advantage: this configuration is largely immune to external noise. Ising’s anions are quasiparticles that, in theory, arise in some two -dimensional materials Currently, Ising’s anions are thoroughly investigating in the condensed matter laboratories of the entire planet because they are one of the main candidates to participate in the construction of universal quantum computers, and, therefore, immune to errors. Aaron Lauda, ​​professor of mathematics, physics and astronomy at the University of Southern California (USA), Holds the following: “By themselves, Ising’s anions cannot perform all the necessary operations for a general purpose quantum computer. The calculations they support are based on the ‘braided’ (branding), And they require physically moving anions around each other To carry out quantum logic. For Ising’s anions, this braided only allows a limited set of operations known as Clifford doors, which fall short with respect to all the power required for universal quantum computing. “ Fortunately, the research team led by Lauda has found a way to transform ISING anions into universal structures that are capable of performing any quantum calculation through braided. Its solution for the moment is only theoretical, but its potential is enormous. The surprising thing is that what they propose is to resort to a new type of anion known as Neglectón that was initially discarded when it was “discovered” in the theoretical framework. In fact, Neglelectón has gone from being a mathematical waste to be the new hope of quantum computers. In theory when combining Ising’s anions and neglect, universal quantum computing will be possible through braided. According to Aaron Lauda Only one neglect is needed because it remains in the stationary or static state while the calculations are carried out by braiding Ising anions around them. It is a surprising conclusion. One last note to conclude: The neglect is not a fundamental particlesuch as the electron or the quark; It is a theoretical quasiparticle that arises from the collective behavior of many other particles in a two -dimensional system. Let us trust that it is consolidated as the definitive tool that will allow researchers to carry quantum computing from theory to practice in a robust and efficient way. Image | IBM More information | Science Daily In Xataka | Bitcoin encryption and other cryptocurrencies will fall. And those responsible will be quantum computers

China was isolated from one of the key arteries of the Internet for an hour. It is not clear if it was an essay or a failure

On the Internet there are falls that are noticed. And then there is what happened in China. For a whole hour, one of the main road traffic with the outside stopped working without explanation. It was not a total blackout, but a cut that became visible in many parts: applications that were halfway, websites that did not respond, services that failed right in the border crossing. The ruling did not fit with the typical local fall or with a problem of a single operator. It lasted 74 minutes, crossed networks and left behind an awkward silence. What fell was not all the Internet, but a concrete and widely used part: the channel that allows encrypted connections to function safely. According to GFW Reportbetween 00:34 and 01:48 of August 20, Beijing time (UTC+8), a generalized blockade was recorded in the Port 443which is the one that uses the majority of traffic HTTPS. The effect was broad and sustained, but did not affect other channels. The most striking thing is that, until now, no one has explained what caused that cut or why it happened in that strip. The technical analysis points to a very concrete pattern. Every time a connection tried to settle in that port, special packages – the RST+ACK – appeared that act as a closing order. They are the digital equivalent to hang the phone before someone attends. These packages were not sent by mistake: they were being injected into large quantities just at the key moment of the exchange between client and server. According to the specialists, this alteration did not fit with a fall due to congestion and affected both connections that came out of China and to those trying to enter. Despite the serious cut, not everything stopped working. Internal connections within China were still active, and other ports, such as 80 – for non -encrypted traffic – or 22, intended for remote connections, showed no block signs. The problem was focused on port 443. That explains why some services could continue to work while others became inaccessible: it was not a total disconnection, but a very selective interruption of the encryption step that crosses the digital border of the country. There are no public reports indicating that platforms such as WechatBaidu or Weibo suffered a generalized fall in that strip; Its main infrastructure is mostly within the country and does not depend on the international crossing for basic functions. But many Chinese apps incorporate components that depend on Servers outside of China-action, mini-programs, external APIS or cloud functions-and those calls could fail when the encrypted step was blocked. There are no public reports that indicate that platforms such as Wechat, Baidu or Weibo suffered a general fall in that strip The impact was more noticeable in international services. According to The Registerpart of the connections of foreign services – including some functions of Apple or Tesla – could be interrupted for users in China during the blockade window. Other international services that depend on HTTPS, such as certain CDNS or VPN connections that use TCP/443. In summary: the internal network was not broken, the encrypted channel was cut out and that was enough to leave many out. One of the most relevant clues is precisely that technical footprint. Each system that filters or interrupts connections leaves a trail –a fingerprint– Recognizable for the order of the packages, the TTL or the TCP window size. In this case, these values ​​differ from the previous documents, so the researchers propose two hypotheses: a new equipment deployed for tests or a known team that was in an anomalous or poorly configured state. The conclusions remain in condition until there are more data. Traffic returned to normal and there were no visible consequences on a large scale.But the cut was real, it was documented and left an unknown in the air. There were no officials or official explanations. In any case, the great firewall is still there, functioning as always, and with an intervention capacity that this time was recorded. Images | Leon Seibert | Xataka with Gemini 2.5 In Xataka | To have a rather mediocre AI it has been necessary to loot all the internet content. And Reddit has said enough

The key was a divorce at the right time

When you think about Steve Jobs as a billionairethe most logical thing is to link that wealth with Apple. However, what really catapulted that category of Milmillonario It wasn’t the iPhonethe Mac or the iPod. It was a small animation company called Pixar. And, curiously, Pixar only existed as an independent company because George Lucas divorced his wife. The flutter of a butterfly, in animation version. George Lucas and his divorce In the late 70s, George Lucas was already one of Hollywood’s most successful directors. In full Star Wars ProductionLucas had founded Industrial Light & Magic (ILM), the study of special effects that marked a trend for innovations in special effects and animation that applied in the productions of the Lucas saga. In 1980, Lucas hired two computer experts: Ed Catmull and Alvy Ray Smith. Together they founded the computer graphics division within ILM, and from that department they began to develop Pioneer tools on CGI (Computer-Genered Imagery). Later John Lasseter would join, a young animator expelled from Disney for betting too soon for digital animation. Among the three engineers laid the foundations of what would later be Pixar. But, at that time, they were only a small technical division within the study. In parallel, George Lucas’s personal life staggered. His marriage to Mountain Marcia Lucas – who won an Oscar For your work at Star Wars– He collapsed, and ended up divorcing in 1983. The divorce process was complex and Lucas had to pay his ex -wife 50 million dollars. And that forced Lucas to Sell assets To deal with payments. To avoid getting rid of the entire production study, it fractioned it by departments and, one of those departments was precisely the division of computer graphics in which Catmull, Smith and Lasseter worked. Steve Jobs enters the scene In 1985, Steve Jobs had been fired from Apple, the company he founded, and was looking for new projects to invest. When he learned that George Lucas wanted to part with his computer division, he saw an opportunity. Lucas requested 30 million dollars for that department. But Jobs negotiated until you reduce the purchase to about 5 million. Lucas rejected the offer for being too low. Disney also made an offer, but it was even lower. Finally, Steve Jobs made an offer again for the CGI division of Lucasfilm, although this time it would be for an investment of 10 million dollars: 5 million to take the technology they had developed and another 5 million to capitalize on the new company. Thus Pixar was bornwith an initial team of 40 people, including Catmull, Smith and Lasseter. Toy Story changed the game For almost a decade, Pixar did not produce films. Sold hardware and software specialized in graphics and computer -generated effects, such as the Pixar Image Computeraimed at very niche markets in the medical and graphic industry. That specialization made Pixar was not profitable And Jobs was about to close The company several times. Salvation came in the form of an alliance with Disney. Pixar agreed to produce three animated films generated entirely by computer. The first one was Toy Story (1995), which revolutionized the industry and was a criticism and box office raising 360 million dollars worldwide. To take advantage of the moment, Pixar went over the same month of the premiere. On their first day, the shares shot up to $ 39. And that made Steve Jobs a billionaire in the spot. It was his first great business victory after his departure from Apple. Thanks to Pixar’s success, Jobs recovered his reputation as a technological visionary. That gave him confidence and merits to return to his charge as CEO of Apple in 1997. But his adventure with Pixar had not finished. For years, Pixar continued to operate as an independent study, although His films They were distributed under the umbrella and Marketing of Disney chaining successes as looking for Nemo or Cars. In 2006, the Mickey Mouse company bought Pixar for 7,400 million dollars in shares. Pixar’s purchase operation provided Jobs 138 million shares, which meant 7% of Disney’s shares, becoming the main private shareholder of Disney and allowed him to occupy a seat on his board of directors. That percentage of shares would currently be valued at about 15,577 million dollars. Not bad to have been an investment of 10 million. In Xataka | How rich would be Steve Jobs today with the actions he had when he died Image | Flickr (David Geller), Wikimedia Commons (Achanhk, Coolcaesar)

Open the car from the mobile promises comfort. A failure has shown that we may not be the only ones with the key

Imagine that it is enough to look at the windshield of a car to score its frame number – a 17 -character code visible from outside – introduce it into an internal tool, find out the name of the owner and link that vehicle to a mobile account. From there, you could unlock the doors remote from an official app, without touching a lock or forcing anything. That is fair what a cybersecurity researcher demonstrated After accessing the internal portal used by the dealers of a large car brand. We do not talk about an attack on users or public servants, but about a gap on the business platform that connects the manufacturer with its sales network. A rear door with access to connected functions and personal data. The failure was not in the car, but in the chain that unites everything Behind this finding is Eaton Zveare, who has been tracking vulnerabilities into digital platforms of large brands, especially of the automobile sector. This time it was no different. Zveare discovered that the internal web portal of a known car brand It allowed to modify the behavior of the system from the browser itself. Specifically, it managed to alter the login page code to skip security checks and create an administrator account with national privileges. With that account, access covered more than 1,000 concessionaires in the United States. From there, the problem dimension changed completely. It was not just about accessing internal resources of a concessionaire. The account he managed to generate gave access to the complete system: I could see the data of all the concessionaires connected, act in the name of other users without knowing their credentials and, the most delicate, accessing tools that allowed them to consult information about vehicles and their owners. All that from a platform that, in theory, is reserved for professionals in the sector. Zveare did not force anything, did not installed any malicious software or attacked from the outside. What he found was a badly closed door within a legitimate system. And the most worrying thing is that this door not only allowed him to enter: he offered, from within, a set of tools that nobody outside the manufacturer should control so easily. In the United States, the laws that regulate the sale of vehicles vary by state, but share a common principle: in most of them, Manufacturers cannot sell new cars directly to the consumer. They are obliged to do so through independent dealers, legally protected against direct competition of the manufacturer. That has given rise to a franchised network structure that groups thousands of points of sale and after -sales. Tesla has tried to uncheck that model and sell directly, but it has not been easy. Although he has achieved it in some states, in many others he continues to find legal restrictions that prevent him from selling or even delivering vehicles directly. Your case is the most visible exception, but not the norm. The most delicate is not that this system showed confidential information. The serious thing is that it allowed to act with high privileges, as if one is part of the official structure of the manufacturer. From there, it was possible to assume identities of other employees, intervene on registered vehicles anywhere in the country or access functions designed exclusively for authorized technicians. The portal was designed to give agility to the dealer network, not to resist malicious access from within As we say above, each car has a unique frame number. It is a code of 17 characters – right and numbers – that serves to legally identify it throughout the world. What the average driver probably does not imagine is that this code is visible from the outside, at the base of the windshield, and that in the context of this case it was the entrance key. In a real test, Zveare introduced a visible vin from the outside and obtained the name of the owner. From the portal it was also possible to match the vehicle to a new mobile account. Zveare did not try to drive any vehicles or alter its physical configuration. But with the control that I had, open it at a distance and empty its interior would have been perfectly possible. Today, The name of the affected manufacturer has not been made public. And it’s not because nobody knows. The researcher who discovered vulnerability, does know what brand he was behind the committed portal, but has decided not to mention it in his report or during his defense presentation. Nor Techcrunch, the first medium that echoed the case, has revealed the identity of the manufacturer. It is not something so unusual. In some cases, researchers choose to maintain the anonymity of the company involved by prudence, even when vulnerability has already been corrected to avoid putting third parties at risk: concessionaires, employees or customers who still depend on that system. It can also influence the fact that the compromised platform gave access to entire networks, not an isolated server. Images | Xataka with Gemini 2.5 Flash In Xataka | Bugatti decided not to put speakers in a car of four million euros. His secret is a technique of 1881

China has shielded its space station against embargoes and sanctions. The key is how it has built it

When Yang Liwei became The first Chinese astronaut in 2003The United States and Russia – bypassing the advances of the former Soviet Union – already accumulated decades of experience and more than fifty manned missions. In just over twenty years, that gap has been reduced by leaps and bounds. Of a modest debut, China has become humans to space, Mars And finally, To raise your own space station. A project that points to self -sufficiency with its own technology In Beijing they do not hesitate to show off technological independence. Yang Hong, chief engineer of the space station system, summed it up in June this year: “The central technologies of the Chinese Space Station have intellectual property totally independentand all its components are of national manufacture. ” The statement is ambitious: an orbital laboratory raised without resorting to foreign licenses, with all its critical systems designed and produced in China. To understand how China has come to raise its own space station, it is convenient to go back to 2011. That year, the US Congress approved the call Wolf amendment, a provision that prevents NASA and some federal offices use funds to cooperate bilaterally with Chinese entities in spatial matters, except express authorization from Congress and Certification of the FBI. This includes the exchange of technology, data or training, and in practice has blocked any Chinese access route to the International Space Station through NASA. The measure was officially justified for security reasons and concerns about sensitive technology transfer. Analysts like Makena Youngfrom the Center for Strategic and International Studies (CSIS), argue that the exclusion imposed by the Wolf amendment “has encouraged China to Accelerate your space programscreating a serious competitor for American leadership in this key scanner of exploration ” Everything indicates that this led Beijing to reinforce its long-term plans and redefine its strategy: move towards a manned program with greater independence, with Tiangong-1 and Tiangong-2 as test laboratories before the current station. Now, is there inheritance of previous designs? Yes, and it is not a secret. But one thing is the historical lineage and another, the current dependence. The key is in critical blocks, presumably energy, attitude control, life support, navigationcommunications, computation and software. If those links are under national control, the self -sufficiency narrative gains strength, which means that there are no weak points that a rival country can take advantage of. In operations, there have been no public signs of external dependence: crew rotations and the resupplies have been fulfilled. But there enters the nuance: outside the official story, there are no independent verifications, so it is convenient to avoid absolute, despite the solid signals of autonomy. If we see this from a broader perspective we can discover that the US vetoes They have promoted the development of more advanced national chipsimprovements in manufacturing nodes, An impulse in electric mobility. External barriers have not stopped Beijing: they have been, rather, A strategic catalyst. Images | CMS In Xataka | The state of the ISS is so alarming that the United States and Russia have sat at the table for the first time in eight years In Xataka | It was not an extraterrestrial ship, but not a giant kite. We were totally wrong about 3i/Atlas

Ukraine has opened the most advanced Drone Kamikaze in Russia. Now they know what the key to their power is: nvidia

For a while to this Ukrainian part has turned the opening of the different Russian drones confiscated or fallen in combat in the closest to research pieces to third parties. Thus they have revealed from hidden messages of the troops of Moscow, until The origin of the vast majority of technology components (with big surprises). It has also been known to what extent China is part of the war machinery. Now you have to add to a new and important actor: Nvidia. Drones with ia. We have gone counting: The drone war in Ukraine has entered into A new phasewith both sides competing for deploying systems endowed with artificial intelligence capable of Resist electronic interference and attack objectives autonomously. The chip. What has now known is that Russia, despite the sanctions that should prevent access to Nvidia hardware, has managed to incorporate Its powerful Jetson processors in several of the most advanced drones models, obtained by contraband in small lots and through third countries. These chips, fundamental in the development of AI due to their parallel processing capacity, allow to integrate advanced navigation, recognition and guided functions that increase lethality and reduce dependence on control links vulnerable to blockages. Nvidia and the technological basis. Nvidia, valued in more than Four billion dollars and around 85% of the global market From chips for AI, it produces both high performance units for data centers and Jetson compact plates for edge devices, including drones. The latter, low relative cost, They have demonstrated in competitions of 2021 and 2023 its capacity to defeat human pilots In FPV races, using only sensors and processing on board. The version Jetson Orincurrent standard in advanced drones, multiply by ten the power of your predecessor Tx2opening the door to autonomous navigation algorithms, detection of complex objectives and maneuvers such as swarm. Digital predators. In 2023 It was discovered that Russian drones Lancet, with 11 kg of weight and scope of 40 km, They used the Jetson Tx2 For automatic monitoring functions, increasing impact precision even if communication was lost. After an initial phase of problems in 2024, software improvements raised from 30% to 60% the percentage of impacts guided by AI. Forbes counted that the new generation includes three key models with Jetson Orin: the Shahed modified MS001that Combine Satellite navigation, thermal chamber and objective recognition; The V2Uof four wings and 40 km of reach, with navigation by comparison of land and sequential attack capacity in basic swarm, and the Tyuvika small version of the Shahed with 32 km of reach, designed to hunt moving vehicles and manufactured with commercial components. Capacities and limitations. The MS001, in addition to its autonomous navigation, can Identify and attack Objectives without depending exclusively on preprogrammed coordinates. The V2U, with a high -resolution camera, laser telemeter and digital modem, can Tour routes Looking for whites, although his discrimination is imperfect and has registered erroneous attacks. Your mode of teamworkdistinguishing drones by color marks and attacking in shifts, represents an advance towards the coordinated swarm. The Tyuvik, lighter, points to saturate defenses by low cost and mass production. In all cases, software and hardware are scalable and compatible between platforms, which allows to incorporate simultaneously the entire fleet. Strategic implications. No doubt, these advances bring the end of the drones not endowed with in high intensity environments. With software systems as Flir prism either Auterion Skynodenew functions (from air combat to advanced swarm) can be implemented quickly and with reduced costs. Hardware proliferation Like Jetsonaccessible in the global and difficult to control market, makes this technology “out of the bottle” and available for any state or non -state actor. On the Ukrainian front, where drone saturation marks the combat rhythm, the combination of flexible production, advanced AI and autonomous capabilities multiply the threat and redefine the balance in the Low Cota Air War. Image | UKRAINE MOD In Xataka | Ukraine has hunted an “invisible” drone of Russia. The surprise has been capitalized when opening it: it is “made in USA” In Xataka | Ukraine knocked a Russian Shahed drone and opened it. A hidden message has revealed Moscow’s advantage in electronic warfare

Jeff Bezos’s space company has advanced Spacex in a key milestone to go to the moon and Mars: zero evaporation

One of the biggest obstacles to a mission to Mars is not the distance or travel time. It is the fuel. To send a manned ship, NASA estimates that dozens of Cryogenic propellant tons stored for weeks or months. But those liquids do not behave like on earth: in a vacuum, exposed to heat and without gravity, They are slowly evaporating even if the tank is perfectly sealed. That phenomenon, known as Boil-offforces to release the generated gas so that the pressure does not rise dangerously inside the tank. It is a constant loss that, in a long -term mission, can mean tons of tons of fuel lying to space. Therefore, developing tanks capable of preserving this propellant at safe pressure and without losses, which is known as zero evaporation technology, has become a technical requirement to go beyond the low orbit. Zero evaporation: the technical challenge that separates the orbit low from the rest of the solar system Blue Origin claims to have taken an important step To solve that problem. Jeff Bezos’ company has managed to maintain liquid oxygen and hydrogen in stable conditions, without evaporation, using Hardware flight prototype In earth tests (Blue Origin has not detailed whether it is vacuum thermal cameras or conventional banks). Dave clean announced itits CEO, as part of the lunar permanence program, stating that they already meet all the objectives set by NASA in this area. Click to see the publication in x The result is not less: we talk about conserving hydrogen at 20 Kelvin and oxygen to 90 Kelvin, two extreme temperatures, during sustained periods. This makes Blue Origin – which we know – the first private company that publicly and explicitly communicates a zero evaporation condition in cryogenic propelants. In the absence of this technology to vuele and demonstrate in orbit, what is achieved represents the most tangible advance so far towards tanks capable of storing liquid fuel without losses, a key piece to operate ships on the moon or Mars. Storing loss without space is not just a matter of good materials. It is a constant battle against physics. Even the best thermal insulation ends up giving in. Therefore, the path to zero evaporation goes through active solutions that cool the deposit from within. NASA has investigated two: The sub -housing jet and microgotes injectiontwo methods that allow to reduce the steam temperature and prevent internal pressure. Blue Origin has not detailed which of the two uses, but the logic points to the sub -deputy jet, The only tested method So far in microgravity by NASA. It consists of directing a very cold liquid jet where the steam is accumulated. When condensing it, it is avoided that the pressure rises and it is not necessary to release gas. It is a technologically complex system, but so far it has demonstrated greater efficacy and stability in test conditions. Long before Blue Origin announced its advance, NASA had already tested these systems In space. The ZBOT program, deployed aboard the International Space Station, allowed us to observe how a microgravity propellant tank behaves. One of its main discoveries was that the Interaction between the sub -housing jet and steam It does not follow the classic rules we know on earth. The Blue Origin cryogenic system during the ground tests of its zero evaporation technology In ZBOT-1, not only was it possible to control internal pressure with active mixture. Unexpected phenomena were also detected as cavitation, sudden formation of bubbles or flow alterations that could affect the stability of the system. That information – obtained with sensors, cameras and laser measurement systems – has served several companies, including Blue Origin, to design tanks capable of functioning stable in extreme environments. Spacex has not yet announced a zero evaporation solution as such. But that It does not mean that I am not working on it. In collaboration with NASA, The company has developed A cryogenic architecture oriented to reduced evaporation, which has already been validated in flight. In March 2025Starship made a Internal transfer of liquid oxygen in spacedemonstrating that he could move fuel and control his pressure without losing it excessively. NASA Artistic Recreation Although Spacex and Blue Origin are addressing the same general challenge – almaceinar propelants in space without losses – do not work with the same fuels or face the same level of thermal difficulty. Spacex uses liquid methane and liquid oxygen, while Blue Origin works with liquid hydrogen and liquid oxygen. That difference is key. Liquid hydrogen must be maintained to one much lower temperature than that of methane or even that of oxygen. In addition, hydrogen is less dense, more prone to escape and much more difficult to isolate. Achieving zero evaporation conditions with hydrogen is therefore a major technical challenge. The advance announced by Blue Origin is not only significant by the result, but by the type of fuel with which it has achieved it. When talking about going to Mars, you often think of rockets, habitats or space costumes. But one of the most serious bottleneck is in something much more basic: conserve fuel. In a long -lasting mission, the propellant is not used at once. You have to store it, transfer it and, many times, keep it operational for weeks without being lost by evaporation. That makes zero evaporation technology a key piece for both future interplanetary missions and missions Artemis To the moon. Images | Blue Origin (1, 2) | POT | Xataka with Grok In Xataka | Spain is very excited about the three eclipses that will arrive between 2026 and 2028. The government is worried

Ozzy Osbourne was key to lighting something almost more culturally important than metal: television realities

The death of Ozzy Osbourne is generating multiple manifestations of condolenceand it is not for less: one of the latest genuine stars of classic rock leaves. However, although his passage through Black Sabbath and his solo career are his most relevant milestones within music, it is also worth remembering him for how he helped configure modern television in one of his most popular aspects: the reality shows. The Lord of Darkness. It is impossible to summarize here the relevant role that Ozzy Osbourne has in the history of rock, as it is impossible ‘I’m Ozzy’, edited by Espop). However, and despite the success of classics such as’Crazy Train‘ either ‘War Pigs‘, In 2002 nobody already remembered Ozzy. Until The Osbournes revolutionized the genre of realities forever. Mrs. Osbourne. Sharon Osbourne was Ozzy’s wife since 1982, although he had been as a representative of his solo career since 1979 (his father, a historic industry, had also been Black Sabbath’s manager). Sharon was fundamental in Ozzy’s sound in the 80s, oriented to a more pop metal that opened the doors of the MTV. And it was also the brain of the reality ‘The Osbournes’, conceived as a project in which their children were clips presenters, but ended up evolving to show the daily life of the family. His inspiration was also MTV’s canonical reality ‘The Real World’, but with a difference. Here the protagonists were famous. The never seen. The concept was very novel for the time: show the intimacy of a famous family, of the most trivial details to the most dramatic. The chaos that breathed Ozzy’s life gave him a strange air of likelihood and lost that semi-guy air of ‘The Real World’. Success was immediate: razed in audience (In his day, it was the most watched program in the history of the channel) and became the first program of its kind in win a primetime emmyin the category of best non -fiction series. The fault that MTV will become a video clip channel to one of realitieswith programs such as’ Jersey Shore ‘(a phenomenon that would give rise to’ Gandía Shore ‘),’ Teen Mom ‘, ’16 and pregnant’ or ‘catfish’ coping the channel grill? It is from ‘The Osbournes’. Sitcoms in real life. What makes ‘The Osbournes’ so iconic is possibly that he had all the elements of a classic sitcom (hallucinated but endearing father, cunning mother, rebel children), but with themes and vocabulary that could not be seen in a fiction series (continuous swear Patriarch jumping again and again Sharon’s attempts to have something remotely similar to a script. Something of that spirit was transmitted to the next great success (which still lasts) of the genre, ‘Las Kardashian’ and, in Spain, ‘Alaska and Mario’. Ephemeral success, indelible footprint. The program only lasted four seasons, not for a fall at the audience, but because Success surpassed its protagonists. Ozzy was not prepared for all that attention again (in fact, he fell to the drink), and Jack had to go to therapy. He configured, yes, the image of Ozzy that already accompanied him until his death: a rock star that started snacks of pigeons on stage, but with which you would not mind sitting up for a while in front of TV in slippers to listen to his comments about the “horrible, horrible music” that the kids do today. Header | MTV In Xataka | Japan had a real “Truman show”. And it was starred by a man locked up, naked and forced to survive with coupons

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.