ChatGPT has gone from offering you help to insinuating secrets. It is more effective to hook you

There is something that has changed in ChatGPT and that is difficult to name precisely. It is not a new feature nor is it in the update notes. It’s more subtle: the model has begun to finish his answers with a kind of whisper. Things like… “If you want, I can tell you something that almost no one explains about this.” “There is a detail of neighborhood psychology that usually works even better.” “Normally the real number is quite surprising” These three examples are literal, they have appeared to me in my last conversations. In them they are not offering you to do something, as was usual. He is hinting to you that he knows something that you don’t know yet.. And that the majority, as it is conveyed, do not know either. For a few months now, ChatGPT’s behavior has been quite marked: he closed his responses like a diligent butler: “shall I turn this into an infographic?”, “do you want me to compose the email?”. He was proactive, sometimes tiresome, but the gesture was one of service. What he does now is something else. He has gone from offering you his time to offering you access to something almost secret. And that activates something different in whoever reads it. I attach several recent examples: Behavioral psychologists have been studying for decades why certain questions are almost impossible to ignore. The answer has to do with the discomfort caused by knowing that there is information that you are missing and that it is right there. It even manages to convey urgency. The best headlines work like this. The first chapters of the best novels too. What ChatGPT has done, consciously or not (I would bet it is), is to put that mechanism at the end of each response. Each closure is now a hook in the shape of a secret about to be revealed. What makes the trick especially effective is that the hooks are not generic. They are calibrated for the conversation you just had. If you asked about sports supplements, the whisper is about pre-workouts. If you were asking for help for a note in your neighborhood community, it’s about neighborhood psychology. If you wanted to know the aid you can choose to receive to have a child, I promise that the real figure will surprise you. The promise always looks like exactly the information that you, specifically you, need next. That makes her almost irrejectable. It is possible that this has arisen from simple training, from simple statistics that explains all the functioning of the LLMs. But it smells like intentional design, and more so in a context of OpenAI in crisis mode in the face of the advance of Anthropic on the one hand and Google on the other. In either case, ChatGPT has learned that The best way to prolong a conversation is not by being more helpful, but by being more intriguing.. The butler who offers services has a natural limit because at some point the errand is done and there is no point in redounding. But the confidant who keeps secrets does not have that limit. There may always be another enigmatic whisper. And you will always want to listen to it. Me too. Featured image | Xataka, Unsplash, OpenAI In Xataka | ChatGPT’s milestone is not being a good AI: it is having become one of the biggest attention grabbers in history

We believed that the pyramids of Giza did not hide any more secrets. we believed wrong

Talk about the pyramids of egypt is to talk about the Great Pyramid of Giza. The one of Cheops is the most colossalthe best preserved, the oldest of the seven wonders of the ancient world and the only one still standing. However, it is accompanied by two other vestiges of the past: that of Mycerinos and that of Khafre. That of Mycerinos, or Menkaura, is the smallest of the three, and for years we thought it had only one entrance. We couldn’t be more wrong. The hypothesis. It seems incredible that three of the most studied monuments of human history continue to keep secrets, but what the ancient Egyptians did with these three pyramids was colossal. They follow us surprising so much on the outside as insideand from time to time, as exploration technologies advance, we discover something new. However, although the large one attracts all attention, an archaeologist had his sights set on the Mycerinos. The reason is that, on the north side, the stones that represent the entrance are perfectly aligned and appear more polished than those of the rest of the structure. However, the researcher Stijn van den Hoven He noticed that there was another set of exceptionally polished granite blocks on another face of the pyramid. And, in 2019, he hypothesized an additional entrance to the structure. Non-destructive exploration. Since science is not done alone and must be done, an international team of archaeologists from Cairo University and the Technical University of Munich they got to work to investigate Stijn’s idea. This group is part of the project ScanPyramidswho analyze the pyramids with non-destructive measurement techniques. To do this, they use techniques that are also being used in other places in the world (for example, to discover the secrets of the Mayans). Thus, the ScanPyramids team, analyzed the pyramid of Mycerinos with the latest technology non-invasive analysis: ERTor Electrical Resistivity Tomography. This detects subsurface resistivity variations that reveal cavities or materials of different density thanks to electrodes that penetrate the structures and are computed using three-dimensional inversion algorithms. GPR or georadars. Through electromagnetic waves that penetrate materials and are reflected, anomalies can be found. U.S.T. or ultrasounds. They measure the reflections of sound waves to examine the interior of structures without causing damage. Excavations have revealed these much more polished stones Air-filled anomalies. It is not the first time that this combination has been used at the site, since in 2023 a hidden corridor in the Great Pyramid of Cheops was confirmed using these techniques. And in Micerinos it has also worked. Specifically, two air-filled cavities located directly behind the area of ​​polished granite that van den Hoven observed. The Anomaly 1 It is a cavity located 1.4 meters deep from the eastern surface and would have dimensions of 1.5 meters wide by one meter high. The Anomaly 2 It starts at 1.13 meters deep and measures about 0.9 meters wide by 0.7 meters high. From the Technical University of Munich, the archaeologist Christian Grosse has stated that these techniques allow developing “very precise conclusions about the nature of the interior of the pyramid,” affirming that “the hypothesis of another entry is very plausible” and commenting that these results go in the direction of confirming said entry. The alleged cameras Next steps. Independent researchers who were not involved in the study have stated that the entrances to the pyramids from this era are located on the north face, but that further exploration will determine whether these voids are an anomaly, part of a second entrance as the ScanPyramids team suspects, or “something else.” Now, although these techniques allow us to recognize the interior very precisely, they cannot determine the extent of the cavities due to limitations in the penetration capacity of the tools. They have suggested that the next steps should go in the direction of using techniques such as infrared thermography or muon tomography with cosmic rays in order to have more precise information. Implications. In the end, all these works are supervised by the Supreme Council of Antiquities of Egypt and by the Ministry of Tourism and Antiquities, very interested in seeing them carried out. these discoveries (due to tourism issues) while complying with the standards of care for heritage research. Grosse comments that technology allows us to make discoveries that were unthinkable not so long ago and, when the analysis is completed and it is determined what those air-filled cavities are inside Mycerinos, it could transform the understanding we had until now of the architectural design of this 4,000-year-old monument. Images | ScienceDirect, TUM In Xataka | Of the seven wonders of the ancient world, there is one that we don’t know where it is. That makes her the most fascinating of all.

the secrets of Germany’s economy

The imposed obligation by Beijing to German companies to provide sensitive information to continue importing rare earths is not a mere administrative procedure, but a full-scale transfer of industrial intelligence, one in a context in which Germany faces the risk that this data will be used for a wide variety of formulas. Asymmetric dependency. The new ones chinese controls require forms with a level of unusual detail (from product photos showing where the rare earths are housed, to manufacturing diagrams, customer lists, three years of production data and future projections). Why does it matter? Because they will allow Beijing to rebuild with precision which companies depend from a single supplier, who operates without an inventory buffer, where a delay in licensing would stop an entire sector and how that dependence branches out into subsequent value chains. Plus: the German industry accepts because there is no room for maneuver: with the 95% of supply coming from China, refusing is equivalent to stopping, and the rotating nature of the six-month licenses turns material dependence into periodic renewal of obedience. Germany provides information. Bloomberg counted that, while Beijing accumulates data that allows it to control the deep level of European industry, the German government does not have of that same visibility on their own industrial champions: the official questionnaires were not answered, the meetings did not yield information and any attempt to impose mandatory nature would clash with a political climate saturated by the promise of reducing bureaucratic burdens. This produces a strategic paradox: that China knows more about the German industrial anatomy than Germany itself, and the information asymmetry increases just when the country becomes more dependent on external supplies and more vulnerable to selective interruptions. From commercial tool to pressure instrument. He licensing mechanism is inserted in a dynamic that transcends trade: if Washington used China’s dependence on American technology as a weapon, Beijing responds using its supremacy in critical materials to force European concessions. The “white list” of the German embassy (designed to prioritize licenses for large groups) revealedFurthermore, unintentionally, what are the nerves industries that Berlin cannot afford to lose, providing China with a guide to apply surgical coercion. The data allows not only to interrupt civil production but also to infer the structure of the European defense industrial base in the midst of a rearmament cycle precipitated by Ukraine. Coercion and fragmentation. Bloomberg explained that China already suggests implicit barter (lower limits if Europe loosens technological restrictions) exploiting low German internal cohesion: companies demand public compensation To diversify, the government responds that ensuring supplies is a private duty and both postpone decisions because diversifying costs capital, time and reputational risk. At the same time, Beijing prefers negotiate bilaterally with Berlin before the EU to maximize leverage, and Merz arrives at that table without any real ability to threaten replacement because any swap chain makes the final product more expensive and erodes competitiveness, making it more expensive to leave than to remain trapped. Second China Shock. Plus: there are many analyzes that agree that Germany is the most exposed European country to the so-called “Second China Shock”: China’s turn from key customer to competitor with overcapacity in automotive, batteries and solar, supported by a post-pandemic trade surplus that has reached historical levels and fuels an export wave that is difficult for German industry to absorb. The result is downward pressure on prices and margins, a drop in orders for machinery and cars, labor conflicts and retrenchment or relocation plans while the Chinese market brings fewer benefits and more rivalry. Minerals add fuel. This vulnerability is aggravated by the new regulatory coercion of Beijing on critical minerals that we had (which extracts intelligence from supply chains and can interrupt inputs), so that the same Germany that led the European export model now suffers a clamp: subsidized competition from Chinese “surpluses” in key sectors and dependence on essential materials controlled by China. In fact, think tanks and organizations they document it: from that diagnosis from the “China shock 2.0” focused on automobiles and machinery, to the rebound in the Chinese surplus and the expansion of quotas in cars, to the reports on overcapacity and distortions in EVs and photovoltaics, and the deterioration of German manufacturing performance with China going from demand engine to systemic rival. Strategic lesson. If you like, if we broaden the focus, the framework should not surprise Beijing much: years of warnings about its intention to dominate bottlenecks are now being revealed. materialize in rules that turn industrial dependence into political leverage. Controlling rare earths not only ensures tapensures the complete map of the rival’s pipes and valves. Under this architecture, China does not need to cut off flows: it is enough to condition its renewal and demand intelligence in exchange for Europe to pay, again and againhe privilege to continue depending. The underlying warning is crystal clear: those who delay diversification do not freeze the risk, they capitalize on it in favor of the supplier. Image | Uwe Aranas, Ra Boe/Wikipedia In Xataka | China opted for rare earths as the key to its global influence. A country has bypassed that lock In Xataka | China knows that land is its ace to prevail over the US in the trade war. A country wants to thwart your plans

A man had access to the Government’s nuclear secrets. Until he uploaded thousands of porn photos to his work computer

Using your work computer for personal things is a delicate area that can be reason for dismissal. This worker from the US Department of Energy has discovered it by force after uploading hundreds of thousands of pornographic images on his company computer. What has happened? They tell it in 404Medium. In March 2023, the employee wanted to back up his photo collection. He thought he was uploading the images to his personal hard drive, but it was connected to his work computer and he ended up making the copy where it wasn’t. The problem is that it was not a normal collection of photos, but more than 187,000 pornographic images that he had been collecting over several decades. Although he did not lose his job, his mistake has had consequences and the main one is that he has lost his security clearance. To train AI. The employee defended himself by arguing that this happened during a depressive episode in which he felt “extremely isolated and alone.” One of his distractions at this stage was creating images with AI, specifically “robotic porn.” At first he used his cell phone, but tired of using such a small screen, he thought it was a good idea to upload all his pornographic images to the computer to train the AI. The problem is that he did not upload them to his hard drive, but rather they ended up on the network of a government company. Goodbye accreditation. The employee did not realize his mistake until six months later. It was the time it took his bosses to investigate the origin of that enormous amount of porn photos flooding their servers. The result was that his security clearance was withdrawn. The Department of Energy is the in charge of supervising the US nuclear arsenalso we are talking about access to very sensitive information. The worker appealed to get it back, but after an exhaustive investigation, they decided not to return it. If he had not appealed, the story would not have been made public. My boss spies on me. It is one of the reasons that the man presented in his appeal, which compared the investigation to “the Spanish Inquisition.” What does the law say about this? According to expertsAlthough they let us use it for personal things, we should not expect to have privacy on a company-owned computer. Some companies even pre-install software to measure the time employees work. Control programs. Can they force you to install one of these programs? A few years ago we talked about installing software to control the work of remote employees and Joaquín Muñoz, an expert lawyer in digital law, resolved our doubt: the company cannot force us to install a program of this type if the computer we use to work is ours, but if it belongs to the company they can do so. Of course, they are obliged to report in detail about all the functions of said software. Image | Gemini In Xataka | “These are things that a university student would get in trouble for”: Deloitte scammed Australia with a report made with AI

A productivity guru went to visit Disneyland. And there he found the secrets of silent productivity

Recently, Cal Newport was in Disneyland. Newport is one of the great productivity gurus, and its most widespread thesis is that of Power of the concentration of the deep. His analytical eye allowed him, tail comes, get some interesting lessons about productivity even in the middle of a theme park. First, it describes the experience of attractions as “hyperreality”: worlds that are impressive and artificial at the same time, designed to offer a purified and safe version of the real adventure. Disney has perfected that creation of artificial experiences, and also productivity through the design of systems that eliminate cognitive friction. Something of what We already talked in the past. Every detail of the park is designed so that the visitor does not have to make too many decisions and can concentrate their mental energy on enjoying. Some examples: The posters are placed just where they are needed. The queues serpente so that it is more difficult to estimate their real length. Employees anticipate the questions that visitors usually ask. The show schedules are designed to distribute crowds without noticing manipulation. Even garbage containers are strategically located so you never have to load with remains. It is a great accumulated example of the philosophy of Do not understand productivity how to do more thingsbut to eliminate everything that does not matter to do well what does matter. And something deeper: Newport connects this experience comparing it to what happens when we use our mobile. Instagram, X or Tiktok offer us diluted versions of real experiences: The morbidity of traveling without traveling. Outrage without consequences. Entertainment effortlessly. Pirates of the Caribbean in 6 inches. The difference is that Disney designs for our well -being as a visitor (and potentially so that we want to return or so that we have easier to spend there). Social networks design for our addiction as a product. Disney wants you to go happy after a couple of days, social networks want you to never leave. And that is the lesson that we can apply: in the same way that Disney designs experiences that minimize the cognitive burden of its visitor, We can design our days to minimize trivial decisions. Automate the routine, systematize the repetitive, eliminate what it distracts. The mantra of creating an environment where we can concentrate on what generates value, and not simply work more hours. In Xataka | 99 Undecuted Tips on Productivity Outstanding image | Xiaozhen bread in Unspash

The most legendary magician in history was not the most skilled, but a masked recklessness that revealed the secrets

If you lived the explosion of the private ones at the end of the 20th century, you lived the success of ‘Magic without secrets’, a program of Antena 3 in which A masked wizard executed classic illusionism on stage And then it meticulously revealed how he had done them. A broken taboo in front of the cameras that beat its responsible, Val Valentino, mortal enemies within the entertainment world. However, over time, the masked magician has found unexpected disciples: on the Internet, dozens of magicians They reveal without stopping The great secrets of magic. If illusionism has always interested, it has not stopped interesting that they tell us “how it is done.” And the masked wizard was the first to do it with a mass audience attached to the TV. Revealed magic In the 1990s, stage magic was … one thing. The scenario magicians were in the zenith of their success, with television specials that, from the eighties, They showed challenges to the laws of logic that fascinated the audiences. Were the times when David Copperfield The statue of freedom flew or disappeared, in which Siegfried & Roy -There are a tragic accident with a white tiger that would withdraw them from the stages in 2003- signed millionaire contracts in Las Vegas and in which even people like David BlaineAt the end of the decade, I was about to carry magic in an entirely new direction with its ‘Street Magic’. In that context, ‘magic without secrets’ came, a series of four specials of 1997 that in Spain issued Antena 3 and that did the unthinkable: explain how the apparently impossible classic tricks of illusionism were carried out. In them, a masked magician accompanied by the inevitable female assistants reviewed the entire repertoire of the magicians. As TV was what it was for those times, special attention was paid to the apparently more dangerous numbers: the magician was sawn in two, crossed with swords, swallowed fire, was shot and buried alive. Everything had a trick, of course, and explained. Double backgrounds, trucades, fire bullets, pussy sabers … The program did not leave triquiñuela without revealingbut the spectator had the feeling that he was accessing knowledge prohibited for a simple reason: the magician hid his features with a mask that remembered those of wrestling. The program was responsible for reminding us the code of the magicians to which the original title of the specials referred: ‘Breaking The Magician’s Code: Magic’s Biggest Secrets Finally Reveled’. Any wizard that broke it would immediately enter a black list of the guild, and would not work again. Black lists This detail is not necessarily true: much more prestigious magicians than this masking, such as the magnificent Penn & Teller, who in that decade were also overly unknown media figures, based on their numbers on revealing classic tricks … to take the enigma much further. They had also been controversial in the guild for playing the three balls and vessels With plastic containersallowing the secret to be seen, 0 revealing the Seven principles of magicand had unleashed a controversy that Even today it is between fans and professionals About whether to reveal the tricks power or fulminates magic. But although Total classics like Paul Daniels They had previously revealed tricks as part of their shows, no one had the media impact of the masked magician. Behind the program was Nash Entertainment, a producer of doccu-realities with titles such as ‘The World’s Deadliest Volcanoes’, ‘World’s Most Dary Dad Rescues’, ‘World’s Scariest Police Shootouts’, ‘When Good Pets Go Bad’ or ‘Prisoners out of control’. ‘Magic without secrets’ became one of his greatest successes: In 1997, the first program was the most watched special in Fox’s history. But … who was the masked wizard? His identity was revealed in the fourth and last special and as expected, it was not a first -class wizard but rather the opposite. Its history seems the secret origin of what ended up being: a comic supervillain between magicians. Val Valentino had been fond of magic since childhood and when he was a teenager he made a number in an exchange program with schools around the world that gave him a considerable audience among the kids of his age. There he played to reveal the tricks as a way to surprise and enhance the effects. And he discovered that no magic game could compete with revealing the secret. In the eighties and nineties he had a moderately successful career as a magician, appearing on television specials and acting, of course, in Las Vegas. When the opportunity arose to shoot the specials for Nash recalled the impact their children’s revelations had and decided to use it in their favor: success was considerable, and although Much of the controversy that the programs were awakened was prefabricated by Fox (There was no “threat of death by secret groups of magicians”), there was some demand for scenario magicians such as Andre Kole or Kevin Spencer. They claimed that the masked wizard had made them lose hundreds of thousands of dollars with their revelations. The courts gave the reason to Valentino, since the secrets of the tricks are not protected by the laws of intellectual property, much less those who had been part of the magical public domain. Although the new century has already entered the show tried to be relaunched with new secrets and new magicians, it did not enjoy the popularity of the four original specials. And in fact, magic, thanks to the Internet, enjoys better health than ever. So no, Val Valentino did not kill magic. In fact, in social networks like Tiktok there are accounts that are dedicated to revealing without rest Small magic gameswhich has given them an unprecedented scope. As Valentino predicted (and Penn & Teller already knew), knowing the secrets does not ruin anything, because what counts is the execution and ingenuity. The Supervillain at the end was a hero, even in that he looked like a comic character. Header | Nash … Read more

The history of the iPod that saved it is a story of secrets and technical miracles

“Today it is almost impossible to imagine it, but there was a time when Apple was about to disappear”Thus, our new episode of ‘Xataka presents’ starts, with a direct squeak to the history of one of the most admired companies on the planet. And it is not just a good beginning: it is a reality that many people have forgotten. In this series we have already explored other curious stories of technology, Like Bonzi Buddythat purple virtual assistant who promised to help and ended up becoming a digital nightmare. When we think today in Apple, we think of leadership, in innovation, an ecosystem that many try to imitate. But there was a time when all that seemed a mirage. Apple was against the strings. And if he managed to survive, it was thanks to a series of decisions that, seen in retrospect, seem almost miraculous. What decisions were those? What product was so important that the company’s trajectory changed completely? And above all, how was it possible that A seemingly simple device (A music player) will end up being the turning point of an entire era? If you are passionate about technology as well as us, this video is a mandatory trip. Because we don’t talk only about iPod. We talked about vision, of risk, of moments when everything could go wrong. How a company without experience in pocket products, without know-how In lithium batteries or portable software, he threw himself to the unknown … and won. “The iPod was that product and it was a success,” says our partner Jota García in the video. But getting there was anything but easy. After the purchase of NextSteve Jobs had returned to Apple with a clear mission. The IMAC had already been a first blow on the table, but it was not enough. Napster stirred the foundations of the music industry. The CDs began to lose ground. The world asked for another way of consuming music. Jobs, as always, didn’t want to settle. “He didn’t want to make another partner of the pile. He wanted to do the best. The most elegant, the fastest, the simplest.” Hence an unusual piece: “A 1.8 -inch Toshiba hard drive, compact, light and with 5 GB of capacity.” And from there a phrase was born that would end up defining a whole generation: a thousand songs in your pocket. And did you know that the name “iPod” was not even Apple’s idea? Or that the project was almost secret and was about to be canceled more than once? In the video we break up step by step how Apple went from the “P-68” to the device that would change everything. “They had no experience by manufacturing pocket products. They did not handle lithium batteries, they did not have software for portable devices … ”. The Apple at that time was not the Apple now. It was a vulnerable company. And yet it was launched with everything. The rest is history … but a story with many nuances. Because when Jobs presented the iPod, not everything was ovation. “The day Apple presented the iPod … almost nobody cared.” It cost $ 399, it worked only with Mac, and many media criticized him openly. And yet, there was the magic: Apple’s story was beginning to rewrite, although few knew it yet. In the video we relive that moment, and also how, step by step, Apple broke his own rules to change his destiny. In addition, we navigate the history of the iPod until its disappearance and his legacy on the iPhone. But that story not only serves to understand the past, it also helps us to contrast two very different times. That Apple that improvised to survive Today is one of the most valuable companies in the worldbut still making strategic decisions not to be left behind. In full career for artificial intelligence, he has presented Apple Intelligence and has announced the integration of Chatgpt In their operating systems. All that, as then, with one goal: to continue in the race when the direction of technology changes again. Did you have an iPod? Do you remember the song you listened to most? Leave it in the comments. And give the play. Because if you ever thought that everything had already been told about Apple … You haven’t seen this video yet. Images | Xataka In Xataka | If Apple does not want to be left behind in the AI ​​race, you have a very obvious option at your fingertips: Buy Anthropic

Two workers from Elon Musk in Doge agreed to a private network. The US keeps the secrets of your nuclear arsenal there

In February, one of the most rocambolesque stories was known around Doge, the Government Efficiency Department led by Elon Musk to essence, cut where he can in the administration of the United States Government. Apparently, they fired 350 officials who had to Readmit rapidly. The reason: they were the specialists in the assembly of nuclear eyelets. The story has now taken a more dangerous turn. The access they should never have. I told it a few hours ago exclusively NPR through confidential information access. Apparently, it was revealed that two young employees of that government efficiency department (Doge) created under the orders of Elon Musk, obtained accounts in classified networks With nuclear information highly sensitive. What’s doubt, the news has unleashed a political storm and national security in the United States. Luke Farritor, a former 23 -year -old Spacex fellow, and Adam Ramada, a Angel Investor Without previous experience in armament or intelligence, they appeared for at least two weeks in the directories of the reserved systems of the National Nuclear Safety Administration (NNSA) and the Department of Defense, according to sources with direct access to the networks. From denial to confirmation. The media counted that, although the energy department first denied any link, later admitted that the accounts Yes they were createdalthough they insisted that never They were activated nor used. So, the medium NPR remembers that the mere existence of these accounts, in maximum security environments that normally require a “Q” accreditation (The highest level of authorization of the DOE), has aroused alarm among experts, who interpret it as a sign of the growing and worrying doge penetration in critical areas of the state apparatus. All nuclear information. To understand the importance of the network to which they have had access, let’s think that the systems accessed by these employees are not mere confidential data repositories: these are networks that store and transmit plans for nuclear weapons design, special materials for their manufacture and strategic communications between laboratories, production centers and the pentagon. The first one, the NNSA Enterprise Secure Networkserves to share Restricted data between key actors of nuclear arsenal. The second, Siprnetallows the flow of information classified between the Department of Energy and Defense, including operations that could compromise national security if they were disclosed. Although it appears in the access directories does not equals to directly see classified documents (by the policy of “Need To Know”), experts Consulted by NPR They emphasize that it is the technical “head” that could provide future applications or expand the scope of influence within those platforms. Shadows on transparency. Plus: the incident adds to a series of controversial episodes starred By Doge In other federal agencies. As we count in February, a purge in the NSA directed by Doge (reviring only partially after public pressure) caused the dismissal of dozens of nuclear area employees. Shortly after, an informant denounced that Doge members had accessed internal systems of the National Board of Labor Relations (NLRB), requesting that They will not register their activities and deactivating monitoring tools, in addition to delete access traces. Not just that. One of the income attempts was made from an IP address located in Russia Using credentials created by Doge, which unleashed new suspicions and ignited cybersecurity alerts in several sectors of the government. These movements, added to the recent scandal by the use of signal application On the part of the Secretary of Defense Pete Hegseth to discuss sensitive military operations, they delineate a dangerous informality pattern and reckless management of critical information of the nation. The Doge experiment. Thus, the very existence of Doge, an entity born to “modernize the State” under the tutelage of Musk, begins to be questioned even between related sectorsgiven its opaque growth and the lack of accountability. His model (which combines entrepreneurs, technologists and actors outside the public administration) was sold as a response to the traditional bureaucracy, but it is generating fissures in institutional security and control systems. The case of Farritor and Ramadapeople without experience in intelligence or defense, shows the risks of introducing private operators in the ultrasecreta spheres of the State without proper safeguards. While the Department of Energy avoids giving explanations about why these accounts were created, analysts such as Hans Kristensen, of the Nuclear Information Projectthey warn that even unlacified budgets require delicate technical referencesand that any “ajar door” can have unpredictable consequences. A parallel state. The truth is that, far from being an isolated incident, Doge insertion into nuclear networks reveals a broader and more dangerous trend: the emergence of a administrative power not electedwith access to privileged information, but without clear legal mandate or sufficient democratic supervision. If you want also, it implies that the logic of “technocratic” access overlaps institutional logic, and in that scenario the state becomes a testing ground for Operators with own agendas. The consequences of this reconfiguration are still in development (even overlaps Musk’s output), but the scandal leaves a warning meridianly clear: when the obsession with efficiency eliminates controls, which is gained at speed can cost very expensive, at least, In security. Image | Gage Skidmore In Xataka | Elon Musk fired hundreds of employees and now he has to hire them again: they were experts in nuclear weapons In Xataka | Elon Musk fired 6,000 employees two weeks ago. Now the US faces the massive entry of invasive species

The book that reveals the secrets of the most powerful European company in the chips industry

The portrait of ASML proposed by Dutch journalist Marc Hijink in the book ‘Focus: The Asml Way’ It is extremely thorough. This Company of the Netherlands leads the manufacturing industry of photolithography teams that are necessary to produce integrated avant -garde circuits. In addition, in the short term it is very unlikely that another company will be able to compete with it from you to you. At least if we stick to extreme ultraviolet machines (UVE) that are used to make the most advanced chips. ASML was founded in 1984 by Philips and also the Dutch International (Advanced material semiconductor). The purpose of this alliance was to take advantage of the long experience of Philips in the tuning of optical equipment and lithography machines, and the knowledge of ASM in the field of integrated circuit manufacturing processes, to design and manufacture avant -garde photolithographic equipment. Today ASML holds an “invisible monopoly”as Hijink holds in his essay. The road to the UVE photolithography team has been long and tortuous This book seems to me a highly recommended work for any reader interested in technology in general. And essential for those who want to know better the semiconductor industry and scrutinize it through the eyes of the European company linked to this most relevant market. The chapters that Marc Hijink dedicates to the prolegomena that gave rise to THE CONSTITUTION OF ASML They are very interesting, but my favorites are all those in which the enormous complexity of avant -garde photolithography machines explores. Intel invested in 2012 no less than 4,000 million dollars to help Asml to finance the development of its UVE lithography team This company is where it is thanks to its UVE lithography machines. And the path that has taken him to them has not been at all a path of roses. In fact, Canon and Nikon, their natural competitors, they also tried to develop these chips production equipment, but They failed in the attempt due to the enormous technical and economic resources that implied its tuning. ASML It took more than two decades to have a fully functional UVE lithography machine ready, and had the economic and technological support of its best customers. Intel invested in 2012 no less than 4,000 million dollars To help you finance the development of this chips manufacturing machine. TSMC and Samsung also economically supported this company of the Netherlands during this project. And the play did well. In fact, these are the three companies that currently have ASML UVE lithography teams. The tuning of this lithographic team has given this Dutch Company the mastery of the manufacture of high integration semiconductors. In some moments the text of Hijink adopts a tone more similar to that of a black novel than that of an essay dedicated to technology. And it is reasonable for a reason: A ASML is currently subject to a lot of pressure by US governments and the Netherlands. The sanctions that have deployed both in recent years prevent this company sell your most advanced equipment to your Chinese customersand Marc Hijink explores the geopolitical plot in which ASML has been involved with the rigor that deserves a situation whose end is not yet evident. For now ‘Focus: The Asml Way’ It is only available in English, but you read effortlessly if you are minimally familiar with this language. Highly recommended. * Some price may have changed from the last review BIBLIOGRAPHY | ‘Focus: The Asml Way’by Marc Hijink In Xataka | 2024 has been a year full of uncertainty for chip designers. So much that the market has changed leader

The secrets of the port of Shanghai, the colossus of international trade where automation reigns

Check out around you. The screen you are looking at, the clothes you wear or even your coffee maker have probably crossed the ocean in a container before reaching you. It is not a simple random assumption. About 80% of the goods travel by boat, which makes maritime transport into the backbone of the World Trade. Without this machinery running precisely, getting many of the things we use every day would be little less than an odyssey. A key piece of this system is the sea ports. We are talking about the nerve centers that not only receive and dispatch millions of containers a year, but also coordinate a millimeter logistics that allows goods to circulate fluently between continents. It is no secret that this world is in constant movement, but there is a title that has not changed hands for a long time: the port of Shanghai has been the most active in the world for 14 years. The port of Shanghai is also a port megaciudad After a long time, In 2024 the port of Shanghai became In the first in the world to handle more than 50 million teu in a single year. And when we talk about TEU, we refer to the standard container unit of 20 feet (6.1 meters) long. This port did not begin its rise to the throne yesterday. One of his first great achievements occurred in 1994, when he first exceeded the million TEU. Since then, its performance has grown exponentially, multiplying by 50 in three decades. There is no doubt that this reality is directly related to China’s industrial muscle, which has established itself as The greatest manufacturing power in the worldand with the spirit of the Asian giant for developing ambitious works. The port of Shanghai has not stopped evolving during the last decades. Automated terminals have gained ground to improve efficiency and security drastically. Less people work and everything becomes much faster. The port has completely automated terminals where tasks such as goods discharge, stacking and output are controlled by the “brain” of the management system. Sun Jinyu, one of the leaders of the Shangdong terminal, had in 2021 that The cranes needed about 108 operators in the past, but automation had allowed the same tasks With only 7 operators. And, because of that was not enough, most of the work was done through remote operation. But an impressive infrastructure would not be enough without strategic ties. The port of Shanghai began to handle containers in the 1970s and it was not until 1978 that he opened his first international route, one that joined China with Australia. At present, it is linked to almost 350 international routes, connecting more than 700 ports in more than 200 countries and regions of the world. Internal level, it also has 22 ports distributed by various Chinese provinces, consolidating its role as a key node in global trade. Images | Shanghai International Port (1, 23) | Reb42 In Xataka | Chinese submarines are authentic crickets: a new generation promises to change the rules of the game

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.