The housing crisis in the Pyrenees opens the debate on the limits of camping

“I am a temporary worker and I come to work in the Tena Valley. The rents are 800 euros and I am not going to share a flat. I prefer to live in the van with my cat (…) I don’t understand why they focus on me when I don’t break the regulations.” The words are those of an indignant woman. One to which the Civil Guard demands movement when it understands that it is camping illegally. One that, if what is said in the video is true, is completely right and the regulations are on its side. What happened? The video is brought to X by a user of the social network and in it you see a woman who, between irony and indignation, explains that she works as a seasonal worker in the Tena Valley (Huesca), that she lives in her van and that the Civil Guard is asking her to leave because, supposedly, she is camping. The video shows the conversation between the woman and one of the agents. He defends that “it’s been going on for a month and a half now” and that “that can be considered camping.” She, for her part, alleges that she does not take any items outside and that she also moves, which the agent also acknowledges. “Rents are 800 euros”. In her video, the protagonist points out that the cost of housing is very high in the Tena Valley and that she does not want to share a flat. “I prefer to live in the van with my cat,” he emphasizes. The truth is that this enclave right next to the Pyrenees is very tense. In fact, it was only a few months ago that he was born. Decent Housing Viello Aragón in defense of access to housing in this Aragonese area. They point out that the area is full of tourists. The problem is not just a matter of underused second homes. The group points out that the European funds dedicated to sustainable tourism are causing the attraction of more and more visitors with the conversion into apartments and houses as rural complexes, which worsens the conflict. They defend that it should be stopped the delivery of new licenses for tourist use, they propose the creation of a public housing pool, declaring the region as a stressed area in order to control prices and punish the owners of more than four residential properties who have empty homes. The final objective is to facilitate access to housing and so that the economy can diversify so as not to live solely on tourism. Yes, the law is on your side (sort of). The truth is that if the author of the video complies with what she says, the law is on her side. As explained by the colleagues of Motorpassionthere are no regulations that specify a maximum time in which a person can spend the night in their car. Because camping in a place not authorized for it is illegal but spending the night is allowed. The PROT Instruction 2023/14 It is the one that collects these differences. It states that “parking is not camping” as long as: That the vehicle, with the engine stopped, is only in contact with the ground through the wheels (stabilizing legs or any other device is not used, except for chocks, provided for by the General Traffic Regulations). That the vehicle does not occupy more surface area than what it occupies when closed, that is, without the deployment of projectable elements, chairs, tables, etc., elements that can invade a surface larger than that delimited by the perimeter of the vehicle, understood as the plan projection of the same. That the vehicle does not emit any type of fluids or noises to the outside. One but. And then, the instruction also states the following: All of the above will be understood without prejudice to the powers of the town councils, through their municipal regulations, to limit or regulate, without discrimination based on the type of vehicle, the stopping and parking points under criteria of physical organization of traffic, commerce or environmental criteria, or with the purpose of favoring the arrival of this type of motorhome tourism, establishing for this purpose, parking zones or areas or, where appropriate, camping. Likewise, the regional regulations that have been approved or could be approved for the purpose of tourism promotion in the national territory will be taken into account. to promote a new type of accommodation that in any case will coexist with the full application of national legislation on traffic and road safety and especially the regulations relating to stopping and parking maneuvers. The matter here is a little more delicate because the video does not explain the situation regarding any of these concepts. What the instruction makes clear is that the City Council can delimit where a motorhome can park. In the images it appears that the van is located on the outskirts of a town but it is not clear whether or not the vehicle may be parked there, specifically. Without knowing the municipality, we also do not know if the town’s mobility ordinance imposes a maximum parking time. In the case of not wanting to park in the town, the situation is more delicate. In this case, regional regulations require you to spend the night in an area expressly authorized for this purpose since the Tena Valley is a protected environmental space. What do we get clear? In a municipality, a person can spend the night without any problem in their car or caravan as long as the vehicle is parked correctly and they do not take belongings and objects outside (from chairs to awnings). In that case, the driver is considered to be camping and this can only be done in an area authorized for this. Therefore, living inside a van and making life in it is not illegal as long as no noise or fluids are generated that are emitted to the outside. … Read more

Samsung opens the era of 2nm chips with the Exynos 2600. Chances are we won’t notice much

Samsung has announced officially the Exynos 2600 SoC. This smartphone chip is especially notable for one particular feature: it is the first to be manufactured with 2 nm photolithography. The question, of course, is whether that will change things much. Why is it important. Node jumps in photolithographic processes are especially striking because they usually lead to significant improvements in performance and efficiency. By reducing the scale it is possible to fit more transistors in the same space, which in essence ends up giving us “more for the same.” The Samsung Exynos 2600 goes precisely in that direction. The data. Samsung’s new System-on-a-Chip (SoC) boasts above all of that new 2nm GAA (Gate-All-Around) manufacturing process, and is composed of the following elements: CPU: ten cores in total. The configuration features one 3.8 GHz C1-Ultra core, three 3.25 GHz C1-Pro cores, and six 2.75 GHz C1-Pro cores. GPU: Samsung Xclipse 960 NPU: 32K MAC What can we expect. According to Samsung, this new CPU increases performance by 39% compared to the Exynos 2500. The Xclipse 960 GPU manages to double the computing capacity of its predecessor and 50% more performance in ray-tracing. And finally, the NPU allows 113% more performance than its predecessor, which will allow you to enjoy AI functions in a theoretically notable way. 320 MP sensors. Another of the differentiating elements of this SoC is the support for sensors of up to 320 MP, in addition to offering zero latency for captures of up to 108 MP. Or what is the same: you take snapshots thanks to that processing capacity. It is also compatible with 8K recording at 30 fps and 4K at 120 fps with HDR. Less throttling. One of the most important novelties of these chips is Heath Path Block technology (HPB). This system improves thermal conductivity using new materials, which reduces thermal resistance and helps the chip maintain high performance for longer. It will therefore be more difficult for us to notice drops in chip performance due to potential overheating, for example in gaming sessions with the mobile phone that integrates this SoC. If that promise is fulfilled, we would be facing a potential solution to a problem that has traditionally been criticized in Exynos chips. Will we notice anything? The truth is that current SoCs are already true computing beasts in all sections and usually give so much room for maneuver that it is difficult to notice differences between them in our daily lives. That perception is misleading, because these hardware advances allow us to take advantage of that performance and efficiency “without realizing it.” Increasingly better photos captured and processed instantly, absolute fluidity in the interface even with high resolutions and refresh rates, or of course gaming in increasingly demanding games are scenarios in which these chips do their best. remains to be seen if Google finally goes ahead with its “PC mode”an area in which having powerful chips like this can offer a user experience much closer to the usual laptop/PC. Competition for Qualcomm. Theoretically, the Samsung chip will be able to compete head to head with the Qualcomm Snapdragon 8 Elite Gen 5. Some previous leaks That’s what they pointed out, but without a doubt we could be facing a great option for a market that will certainly benefit from that competition. Prepared for the Galaxy S26. Samsung is expected to use the new Exynos 2600 in its Galaxy S26 series, although it is not clear at the moment whether that decision will be global and will depend on the region. A global commitment would allow, for example, to integrate this chip on the Galaxy S26 and use Qualcomm chips only in the S26 Ultra, but everything remains to be confirmed. Of course, that type of strategy would be the definitive litmus test for Samsung Foundry, which in recent years has clearly been one step behind in performance and efficiency compared to its competitors. In Xataka | The Samsung Galaxy S26 will be much more than a phone for Samsung: the future of Exynos depends on it

In China they have created a material for their fighters that opens a new technological direction: it aims directly at radars

From the early days of World War II to the stealth fighters of the 21st century, the goal of remaining unnoticed by the enemy has been a constant obsession in military aviation. Aerial “invisibility”, more than a myth, It is a technological challenge that has marked decades of innovation in materials and design. A team from Chinese universities describes a flexible and ultra-thin coating capable of absorbing radar waves without losing thermal resistance, collects SCMP. If its effectiveness is confirmed in flight, it could change the conversation about modern aerial stealth. The development was detailed on October 14 in Advanced Materials. The study, signed by Cui Guang, Liu ZhongfanHuihui Wang and Maoyuan Li, among others, presents a graphene-on-silica-fabric (G@SF) metasurface that combines flexibility, low weight and thermal resistance of up to 1,000 degrees Celsius. According to its authors, the direct integration of the material into the insulating layer of an aircraft would allow the reflected radar signal to be reduced to −42 dB, without compromising the structure or weight of the aircraft. A surface that wants to defy the radar The material is based on a silica textile base on which the researchers deposited graphene using a chemical vapor deposition process. On that layer they applied a laser “erasing” technique, which allowed them to create a precise pattern on the surface and adjust your electrical impedance. In this way, they claim, they managed to make the coating effectively absorb electromagnetic waves without needing to increase its thickness or weight. The result is a flexible, ultralight metasurface with an adjustable sheet resistance between 50 and 5,000 ohms per square. {“videoId”:”x9ri2iu”,”autoplay”:false,”title”:”How China, the biggest polluter on the planet, has also become the complete opposite”, “tag”:”webedia-prod”, “duration”:”740″} Laboratory tests showed that the material maintains stable performance even under extreme conditions. After five minutes of exposure to 600 degrees Celsius in air, it retained its absorption capacity, and also withstood prolonged heating to 1,000 degrees in a vacuum without degrading. In tests with air currents of up to 200 meters per second, its loss of efficiency was less than 1%, and neither the surface pattern nor the resistance of the sheet were altered. These properties make it an ideal candidate for high-speed aircraft exposed to intense heat and friction. Withstood prolonged heating to 1,000 degrees in vacuum without degrading The material described in the study poses a possible alternative to conventional coatings, although it has yet to be demonstrated whether its advantages are sustainable outside the laboratory. US stealth fighters, such as the F-22 and F-35they use absorbent compounds They offer good initial performance, but require constant and expensive maintenance. In China, the J-20 has been seen with a coating apparently more stable, although those impressions come from displays and not verifiable technical data. The difference, for now, is in the discourse rather than the evidence. The new coating is still far from becoming a technology in real use, but it illustrates the direction of Chinese research in stealth materials. The challenge is not only to achieve high performance in the laboratory, but to keep it in flight and under extreme conditions. Chinese scientists aim to solve one of the most persistent limitations of modern fighters: the fragility of absorbent coatings. If the material achieves this stability, it could open a different stage in aircraft protection. In Xataka We believed that the F-16s were Ukraine’s great achievement: it has just taken the first step to receive up to 150 European Gripen fighters Beijing has set 2035 as the horizon to complete the modernization of its armed forces. In this context, the development of new compounds, sensors and materials responds to a broader policy aimed at strengthening its technological and military industry. Each advance in the field of stealth materials is interpreted not only as a technical improvement, but also as a step towards greater strategic independence. Images | Wikimedia Commons | Arthur Wang In Xataka | The Chinese ambition to lead each and every area of ​​the planet has found its next adversary: ​​Jaén (function() { window._JS_MODULES = window._JS_MODULES || {}; var headElement = document.getElementsByTagName(‘head’)(0); if (_JS_MODULES.instagram) { var instagramScript = document.createElement(‘script’); instagramScript.src=”https://platform.instagram.com/en_US/embeds.js”; instagramScript.async = true; instagramScript.defer = true; headElement.appendChild(instagramScript); } })(); – The news In China they have created a material for their fighters that opens a new technological direction: it aims directly at radars was originally published in Xataka by Javier Marquez .

A new generation of robots promises precision and efficiency. It also opens the door to cyberspage risks

The movement of the robotic arm seems impeccable: each turn, each clamp, each displacement occurs with the accuracy of a metronome. However, while these actions convey confidence in a hospital or a factory, another story is drawn in the background. The commands, although encrypted, let rhythms and pauses In the traffic that travels through the network. These patterns, invisible to the naked eye, in many cases allow to deduce the task executed. The same accuracy that we applaud in the robot can become a trace for external observers. Over the last years the interest in collaborative robots has shot himself. Hospitals are used as surgical assistants for their ability to make fine movements without fatigue, and in factories they have become allies for repetitive or risk tasks. Not only do productivity improve, they also reduce accidents by replacing the operator in hostile environments. The connectivity that drives its expansion, however, is also the one that can expose them to new vulnerability scenarios, According to a study in the University of Waterlooin Canada. Precision that dazzles in hospitals, a trail that can be interpreted The investigation did not focus on real -time robots by means Preprogrammed scripts. These systems receive an orders sequence and execute them with minimal human intervention, which reduces direct supervision and expands automation possibilities. At the same time, the way in which these systems structure high -level commands generates regular traffic patterns, and that regularity opens opportunities for analysis. The work was designed with a very concrete scenario: a passive attacker, someone who only observes the network traffic between the robot and its controller without deciphering it. The experiment was carried out with an arm Kinova Gen3a light robot usually used in research environments. The controller executed preprogrammed commands and the communications were protected with TLS encryption. With this assembly, the researchers registered 200 network traces corresponding to four different actions, looking for a varied and representative set. The authors began by converting network catches into temporary signals: instead of looking at the content of the packages, they analyzed when each one was sent and with what separation. Those time series were treated as acoustic signs, which allowed to apply classic signal processing techniques, such as correlation and convolution, which seek similarities and patterns in pulses and rhythms. From this transformation they trained a classifier that, in the closed environment of the test, assigned an action to each trace. The experiment used 200 traces on four actions and showed that, even with activated TLS, temporary subpatrones were detectable. Kinova Gen3 The trials showed that the method worked with remarkable efficiency: in most tests the system was able to identify the robot action with a success level close to 97%. This means that, although the orders travel encrypted by TLS, the observation of the intervals and the cadence can allow to rebuild what task it is executed. In a hospital, that could give clues about the nature of an intervention; In a factory, on the production sequence. A complete deduction is not always achieved, but the finding shows that the encryption alone is not enough. Although orders travel encrypted by TLS, the observation of the intervals and cadence can allow to rebuild what task it is executed. The finding acquires relevance to extrapolating it to real environments. In health, an attacker could identify details of a surgical intervention without the need to access the medical history, only observing the robot communication flows. In the industry, the patterns themselves could reveal assembly steps or Characteristics of a patented process. It is not an isolated failure of a specific model, but an alert signal on how connectivity multiplies the exposure. Each connected robot becomes a possible observation point. The researchers did not limit themselves to pointing out the problem: they also explored possible defenses. One of them is to modify the timing of the robot programming interface, so that the commands do not follow such a regular and predictable pattern. Another is to apply package filling and timing manipulation to hide the real rhythms. These measures could reduce the inference capacity of an attacker, although with a cost: lower network efficiency and, in some cases, more latency in the execution of the robot. Technological innovation always advances in parallel to the need to protect it. Cobots exemplify that balance: they promise efficiency and new forms of work, but also force rethink defense measures. It is not about stopping its adoption, but about doing it with a conscious look of the risks. Security and development are not opposite paths; They must travel together if you want the future of robotics to be sustainable and reliable. Images | Kinova Robotics (1, 2) | Freepik In Xataka | Alibaba is becoming the Ai Open Source sponator. Your family of Qwen models is putting the market above

Roborock opens with a 1,500 euro washing machine

Roborock is One of the best known brands in the vacuum robots segment And he has just expanded his catalog with new products. Hand vacuum cleaners, a new high-end robot, a corteped robot and the one that concerns us: its first high-end washer. It is called Roborock Zeo X and marks a trend: that of Chinese brands entering the large appliance sector. Chinese technology brands want to conquer the home Chinese brands that manufacture appliances there were already many (Haier, Hisense, Measure …), but recently we are seeing as other purely technological brands are going to this category. We have the precedent with the alliance between Midea and Huawei. In 2020 they announced a series of appliances that worked with Harmonyosalthough it did not leave China. A clear recent example we have in Xiaomi, which had already conquered mobile phones and has long expanded its ecosystem to other segments: out of home, The car. Inside, Large appliances. We saw it in its event to celebrate the fifteen anniversary that was held last May. Within their Mijia range they announced airs conditioned, refrigerators, washing machines and even an intelligent tap. For now, Only air conditioner has arrivedbut the plan is to bring the fridge and the washing machine before the end of the year. Now, Roborock follows his steps. Roborock Zeo X: Lava and Dry with a design that does not look like a washing machine Earlier this year they already made their first foray into the washing of clothes with the Roborock Zeo Lite and Zeo Minibut this is its first high-end washing machine and consolidates its entry into a segment that until recently was unknown. Roborock Zeo X has a embedded design that moves away from the classic front front. The door is tactile and the controls are found in the glass itself, but when we are not using it they are not seen, leaving a clean front that does not seem like a washing machine. A Chinese company that you do not know manufactures 35% of all microwaves in the world. Probably yours too To ensure deep and efficient washing, it has a technology called Finefoam that allows you to better penetrate tissues, while reducing water consumption by 32% and energy by 20%, always according to Roborock. As for drying, its ZEO-CYCLE function uses a natural zeolite mineral to dry at low temperatures (between 37 and 50 degrees), so that problems with delicate tissues are avoided. Of course, intelligent functions could not miss. Its algorithm automatically adjusts the amount of water, drum speed and drying temperature. It also has a detergent tank that is adjusted automatically and avoids us having to fill it every time. It will cost 1,499 euros. In Xataka | We are experts in technology, but it is time to buy a washing machine and we suffer

The decision that opens a gap between China and the United States and will define the future of AI

It is one of the hottest debates in the AI race and that is making the difference between the two most advanced powers. China is committed to Open Source with models such as Deepseek, while in the United States they lead private developments such as Chatgpt or Claude. Meta, on the other hand, has been defending the Open Source for a long time. Or we believed. According to the New York Timesnew Mark Zuckerberg Superintelligence Team I would be questioning this strategy in favor of developing a closed model. Flying. If confirmed, it would be a drastic change in the finish line. In 2023, goal It joined other companies To defend the creation of open source models and have not been few times when Mark Zuckerberg has said that his AI is Open Source (although not all true). Now that the new Superintelligence Team commanded by Alexandr Wang He has started working, they are considering whether to continue with the plan or choose to develop a closed model. Behemoth. It is the name of the AI Open Source that Meta was developing, its largest model to date. In fact, Behemoth’s bad results would have been The trigger for Zuckerberg decided to create the new AI team. Nearby sources claim that one of the first discussions of the team has been to leave its development. There is also the possibility that Behemoth’s development continues and that the new team focuses on developing a new model that points to the great goal of goal: Create a general artificial intelligence. What is an open AI. The Open Source concept is not new, but with the arrival of AI there has been enough debate about its definition. The AI models are very complex and the classical definition did not adapt to them, so in October last year the Open Source Initiative agency The Osaid published (Open source ai definition), a definition with which Target I did not agree. In order for an AI open source, it must allow the following: Use the system for any purpose and without having to ask permission. Study the operation of the system and inspect its components. Modify the system for any purpose, even to change your performance. Share the system so that others use it, with or without modifications, for any purpose. Chinese patience. The United States and China are the two most powerful players in the AI race, but although they play the same game, they do it with Very different strategies. With Deepseekhis most famous AI model, China surprised to bet on the open source, a strategy that has allowed him Avoid the zancadillas that your rival puts With vetoes and restrictions. And it is not the only oun source in China, there are many more: Qwen from Alibaba, Doubou by bytedance, Ernie from Baidu, Hunyuan Turbo of Tencent or Kimi From MoNshot AI. It is not a matter of giving in exchange for anything, behind there is a strategy of Soft Power Technological: Today I give you access, with the intention of being dominant tomorrow. China wants to create global dependence on its models and be an alternative to the payment models of the Americans. China has the future vision and patience to do so, we have already seen how invested for decades to form engineers And that today gives a clear advantage in the AI race. American immediacy. OpenAI, Anthropic, Google… The greats of the AI of the United States have opted for private development and subscriptions to access their most leading models. The exception to the rule was put by the goal with flame, the only one whose code is accessible (at least part), But if they focus on private development, that closed approach will be armed even more. The objective is clear: they have the most advanced models and resources to continue training them, so they can obtain an economic benefit by monetizing them. They do it through subscriptions to pro versions or with specific products such as AI agents, it is the case of the newly announced Chatgpt agent. The trap. China’s strategy makes all the meaning if we take into account that they were behind their rival (although They have managed to cut positions in record time). With open and free IAS they manage to create a great very fast user base and create that dependence. However, it is not a good long -term strategy from the economic point of view. If in the future they begin to monetize, that sooner or later they will have to do it, they face two problems: that their users come out in disarray and that the regulators put their eyes in them. The United States maintains strong control and obtains benefits from minute one. Has the most sophisticated models, but every time prices are higher And that makes a luxury within reach of a few. Many will look for alternatives and there will be China with their open and free models. They are two opposite visions: one focused on the present and one in the future. We will have to wait to see what vision is imposed. Image | Bibek ghosh, and Kaboomps (Pexels) In Xataka | Four AI companies are monopolizing the intellectual future of humanity. They are not good news

The last tactic of Ukraine is a drone that seeks to catch him. When Russia opens it displays its threat: a virus

The Russian invasion in Ukraine has led to two very different lines of development in kyiv. On the one hand, and in the face of investment in sophisticated and expensive armament, Ukraine has shown that systems relatively simple and low costas The mounted shotguns In drones, they can be equal or more decisive in asymmetric combat scenarios. On the other, and given the adversity, the creation of one of the most powerful industries From the planet: national combat drones. The last one is a surprise. Technology on the battlefield. We have gone counting months ago. The war between Russia and Ukraine, marked from the beginning by intensive use of New technologieshe has seen in the drones one of his more decisive instruments. However, a recent video Shared in social networks of Russian origin warns about a new and worrying front: Malware use by Ukraine embedded in drones capable of infecting Russian systems. Although these computer threats have been considered lower so far (mainly because they do not attack complete networks, but individual devices such as computers or the captured drones themselves) their appearance represents a more than significant change in the cyber dimension of the conflict. Ukrainian malware. Apparently, Forbes counted that the malware detected in Ukrainian drones has Specific functions: physically damage USB ports, prevent the Reflasso of the system, block the reprogramming of the drone or even very important, allow Ukraine to locate the new Russian operators if the drone is reused by Moscow. As? These malicious codes are designed to sabotage any reuse attempt by the enemy, disabled the electronics of the devices or creating vulnerabilities They can be remotely exploited. In a context in which both countries face resource restrictions, limiting the ability to have enemy drones represents a crucial strategic advantage for Ukraine. Operational impact and consequences. No doubt, the use of malware has immediate tactical implications. Russia depends on the detailed analysis of the enemy drones captured for Adapt your systems of countermeasures, which requires manipulating its components and studying its software. If these drones are protected with code that disables or compromises their systems when connecting them, the reverse engineering process becomes slower, complex and, ultimately, risky. Thus, Ukraine manages to extend the useful life cycle of its drones before Moscow develops an effective countermelted, something vital in an environment where technological innovation translates into direct tactical advantage. “Human” talent. Development looks in the form achieved with the Double cannon or with The optical fiber. The success of these strategies lies in the force of Ukrainian technological sectorthat before the war already stood out for its dynamism and human talent. With a robust base of software engineers and cybersecurity experts, Ukraine has managed to transfer civil abilities to the military, generating asymmetric tools that do not require great physical resources, but a high degree of technical sophistication. The development of malware in drones allows maximizing the impact of available resources, hindering Russian work without increasing the number of devices deployed. A new cyber career in the theater. Not just that. The introduction of malware also marks the beginning of a new phase in the struggle for technological superiority. If Ukraine has begun to use malware with limited but effective functions, it is reasonable to anticipate that Russia will respond with Your own developments Similar offensives, as has happened with previous innovations of both sides. In this way, a climbing cycle is opened: more advanced malware will require better defenses, which in turn will be target of more sophisticated versions. In a short time, it is assumed that both parties could implement specific antivirus protection in drones, harden managerial device management protocols and use new malicious software variants that attack command and control networks or even open rear doors for intelligence operations. Technological consequences. In the last three years, both Russia and Ukraine have converted their respective scientific ecosystems into Weapons at the service of war effort. The Ukrainian decision to integrate malware into its drones not only slows the Russian reusing, but redefines the battle for Technological supremacy In the conflict. In addition, the strategy can be extended perfectly to other electronic devices, including smart weapons, communications sensors or systems. What began as an innovative tactic could be consolidated as a digital war doctrine, influencing the design, use and protection of all military equipment from now on. If you want also, the deployment of malware in Ukrainian drones shows how modern war has moved towards the scope of the code, where only a small script can have effects comparable to a certain shot … without the need for a single bullet. Image | Rawpixel In Xataka | To hunt Russian drones, Ukraine is resorting to a revolutionary technique … from World War I In Xataka | A Russian drone has opened one of the greatest engineering works. The problem: it was the sarcophagus of Chernobil reactor 4

This is the smallest microcontroller in the world that opens “unlimited possibilities”

There is a career to inflate the numbers in the processors segment. Further millions of transistorsmore power, more speed (More consumption In the case of GPUs …). But there is also a career to make the components are getting smaller and while maintaining, or overcome, the power of previous generations. And the Texas Instruments company ends to pass the game with the MSPM0C1104. Because yes, what you see in the main image is the smallest microcontroller in the world. And their possibilities are very interesting. Microcontrollers. They are basically a small computer in a single chip. Without the need for a complex operating system, they can manage tasks by integrating the processor, RAM, and the EEPROM in the same unit. In addition, they have the necessary pins for input and exit signals, among other components. Raspberry Pi RP2040 is an example and are created to function with light systems and fulfill specific tasks. MSPM0C1104. With this name, Texas Instruments has baptized what, according to them, is the smallest microcontroller in the world. It has a size of just 1.38 mm². If you have a black pepper grain at home, you can get an idea of ​​what is the approximate size of this MCU. Specifically, the company comments that it is 38% smaller than the smallest MCUs of the competition. 20 cents. The truth is that it is shocking to see the amount of elements that have been able to unite something so small. It is based on Arm Cortex-m+ and account With a frequency of 24 MHz, 16 kb of memory, an analog-digital converter of 12 bit, six input/output pins and compatibility with standard communication interfaces. If they are purchased in 1,000 units packages, the chips have a price of just 16 cents and Texas Instruments offers a rapid prototyped hardware kit to facilitate development in their MCU, as well as tools to develop and execute MCU applications in a simple way without having to program. The MCU inside some headphones “Unlimited possibilities”. Now, we talked about power a few lines and surely those 24 MHz and 16 kb of RAM have squeak. This is not intended to run an operating system as they can do other microprocessors such as the aforementioned Raspberry Pibut it is something focused on other uses. The company gives the example of optical pencils or more advanced toothbrushes, but also comment that “the possibilities are unlimited to enable smarter and connected experiences in our daily lives”, putting an example headphones and medical probes. As this MCU is so small, these devices can maintain the current power by reducing the space that the microcontroller occupies on the plate, and other elements that improve the characteristics of the product can be added. That’s it? In the press release, the examples are somewhat scarce, but in a video that the company has shared we can see some uses beyond the ‘brain’ of headphones, a digital pencil or a medical probe. For example, such a small system can be introduced into the USB-C cable plate. Thus, if the size of the cable processor ‘is reduced, the connections or dissipation can be reinforced to make it more stable and increase its speed. Another very interesting example is the presence in the smart rings plate. Here they have a lot of sense because they are complex plates due not only to the size of a ring, but to the peculiar curved shape of it. And we return to the same thing: the less space occupies the processor of a ring, the more battery, for example, it can be introduced. In the end, the technical details of this type of microcontrollers are more interesting for those who want to toys with them and for device manufacturers, but it is always interesting to know that this race for size does not respond to a whim, but is useful to solve problems on the devices we use daily. Or for run more thingsclear. Images | Texas Instruments In Xataka | The United States does not want “Made in China” chips, to achieve it, it will disburse 162 million dollars and manufacture them in Colorado

What does a football club like you in a Nasdaq like this. Cádiz opens on Wall Street

Cádiz CF has announced The Nasdaq launch of its Nomadar technological subsidiary, with the aim of capturing 123 million euros to finance Sportech City, its ambitious sports and technological city project. Why is it important. It is the first time that a Spanish soccer club tries to quote in the American technological market. The operation, of complying with what was sought by the club, can transform the Gaditano team, with a current budget of 35 million, to make it a reference for sports innovation and shoot its income. Between bambalins. The nomadar subsidiary is mostly participated by Cádiz and It has the former Liverpool CEO, Peter Mooreas a vowel in your advice. The club will maintain 92% of the vote power even after selling 34.5% of the shares. Deepen. Sportech City will be a multifunctional complex of 110,000 square meters that will include: Auditorium for 40,000 spectators. International category hotel. Convention Center. 56 stores and 17 restaurants. Advanced Sports Medicine Center, Gym and Spa. Nomadar will not only develop the physical complex, but will manage four technological business areas: A sports high performance digital platform. Football academies with advanced analysis technology, International exploitation of the Magic Brand González (Nomadar Ambassador) through Ecommerce. A data center and sports innovation laboratory. The money trail. The required total financing is 370 million euros: 123 million from the IPO. 167 million debt. The rest, direct contributions of the club. Main winner? Cádiz CF can end up multiplying its income and competitive capacity if you achieve success on Wall Street. Its president, Manuel Vizcaíno, He said that this will “increase the salary limit without depending exclusively on television or subscribers.” Yes, but. The project has its risks. FC Barcelona had to resign last year to a similar attempt with its audiovisual subsidiary. The operation will depend on the investment appetite that Clear Street finds, the investment bank in charge of the placement. In Xataka | When the neighbor sings the goal before you: why football retransmissions for DTT or Internet arrives late Outstanding image | Cádiz CF

Ariadne Artiles opens an album from her childhood to celebrate her birthday… and she was already pointing out ways as a model

Ariadne Artiles is celebrating and has taken advantage this special day to share your most personal album of memories. “Walking through some of the best moments of my childhood, today I celebrate the 43rd birthday of the older girl that I am and I hope to continue being for the rest of my life,” she wrote on her social networks. “I grew up believing that I could solve all the world’s problems and, although maturity gives you a harsh blow of reality, I am glad to see that I’m still that girl who believes that nothing is impossiblethat everything can be achieved if one desires it intensely,” he confesses. © ariadneartiles © ariadneartiles The author of mother life He has sent a message full of meaning to all his followers encouraging them to create “the life you want and don’t let anyone tell you otherwise.” “And, above all, may we never stop being the children we were. Don’t let anything or anyone steal our hope,” writes the model in a post that has received countless beautiful messages. “Thank you for the congratulations and so many expressions of affection and to all of you who accompany me along the way, family, friends “Thank you, because you make me very happy”, concludes this text that has been accompanied by some of his favorite photos. © ariadneartiles © ariadneartiles Their first ‘posed’ When you see all these images, it is clear that Ariadne pointed out ways from a very young age. This is how she posed in front of the camera, exuding self-confidence and self-confidence both in a bikini and with the most striking outfits, like this pink outfit with white polka dot and ruffle pants. Who was going to tell this young girl that it would end? fulfilling your dream and becoming an important model who would work in numerous national and international campaigns. © ariadneartiles © ariadneartiles Unforgettable moments with his parents and sister It’s endearing how, looking back, Ariadne remembers some of the moments when she was happiest. And in many of them were, of course, their parents and his little sister, Aida. On many occasions, the top Canary Islander has dedicated precious words to her parents, ensuring that she is the daughter of “a wonderful father“and that he was lucky “to enjoy him in every way and to have him constantly present in my life.” © ariadneartiles About her mother, Ariadne always has words of admiration every time she congratulates her on her birthday. “Since this day there has been no one who has not felt you close, sometimes too close, but that’s how we mothers are… Thank you for so much. I have always chosen you as a travel companion. I could literally go with anyone, but you will always be my best plan. With you time flies,” he once wrote. © ariadneartiles Ariadne adores her sister, whom she affectionately refers to as “my first baby“. “Nothing made me more excited than having a little sister to take care of, pamper and protect. Today I see my daughter Ari with her sisters and it is the perfect reflection of all those years that we lived together, hand in hand, so many memories, so much to tell… Aidita, as we call her at home, was my glass baby, with porcelain skin and a doll’s face, but more trash and brute than any. “It took me half my life to understand that I was not their mother, but I found out and I had no choice but to take a step back because neither brothers nor children can be protected for life, you have to let them fly,” he reflected. © ariadneartiles Your family, your engine The model has had a very happy birthday both personally and professionally. Although she is a tireless worker, she has always been clear that her family is her top priority. For more than 14 years he has maintained a consolidated relationship with the businessman José María García Fraile, son of the legendary journalist José María Garcíawhich always tries to stay in the background away from the spotlight. © Getty Images Together they have formed a dream family with their three princesses: Ariwho came into the world on December 31, 2017, and the twins Mary and Julietwho were born on April 16, 2021. Last year, Ariadne talked about how she managed to live between Gran Canaria and Madrid and confessed that the most difficult thing about being a mother is making peace, although she recognized that she is truly privileged. “I have worked hard to achieve it and I am lucky that they have a great father. “I have given myself the gift of being able to have them with me as much as I want and not taking them to daycare or school out of necessity,” he said. © ariadneartiles Precisely in mother life She is open-hearted and honest about her daily life with her three daughters, acknowledging that “Being a mother is a roller coaster, but it is worth it again and again“. Her girls are her greatest joy and they always surprise her with their occurrences. © ariadneartiles The model has instilled in them her healthy lifestyle habits and his great passions since very little. She makes the most of every minute she spends with her daughters and it is common to see her doing some of your favorite family plans: painting, reading, doing yoga, cooking, playing on the beach…

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.