Apple is taking another run at the premium wireless headphone market with the updated AirPods Max 2, a product that attempts to push its over-ear lineup closer to the center of Apple’s broader audio ecosystem. Powered by the company’s H2 chip, the new model brings a combination of lossless audio support (24-bit/48 kHz via USB-C), Personalized Spatial Audio with dynamic head tracking, Adaptive EQ, and enhanced active noise cancellation; all designed to deliver more detailed playback across music, films, and games while integrating tightly with Apple devices and services.
But the technology story only tells part of what Apple is trying to accomplish. The wireless headphone category has become one of the most crowded segments in consumer audio, dominated by strong incumbents like Sony WH‑1000XM6, Bose QuietComfort Ultra Headphones, and Sennheiser Momentum 4 Wireless, while more traditional hi-fi brands such as Focal Bathys and Bowers & Wilkins Px8 S2 have pushed into the category with higher-end designs that emphasize sound quality and materials.
But the bigger story isn’t just the technology. Apple is trying to tighten its grip on the ecosystem advantage that has driven the success of the broader AirPods lineup. Rather than competing strictly on traditional audiophile metrics, the AirPods Max 2 are positioned as a seamless extension of the Apple platform, working across iPhone, iPad, Mac, Apple TV, and Apple Music with features designed to adapt automatically to the listener and their environment.
In other words, the battle Apple is fighting isn’t just about noise cancellation or battery life. It’s about whether the company can convince buyers that ecosystem integration and advanced processing are as important as raw headphone performance in a market where established audio brands have spent decades refining the fundamentals.
Advertisement
Design, Controls, and Comfort
The AirPods Max 2 retain the industrial design language that defined the original model, combining aluminum ear cups, a stainless steel headband frame, and Apple’s signature Digital Crown control system. The overall design focuses on durability and consistent fit while maintaining the acoustic seal necessary for effective noise cancellation and accurate playback.
Control of playback and calls is handled through the Digital Crown, which allows users to press once to play or pause music, take a photo or video, or mute and unmute during calls. Pressing twice skips tracks or ends calls, while rotating the crown adjusts volume with precise incremental control. A separate noise control button manages listening modes such as Active Noise Cancellation and Transparency.
Comfort remains a major design priority. The headband canopy is constructed from a breathable knit mesh, designed to distribute weight more evenly across the head to reduce pressure during extended listening sessions. This structure works with the stainless steel frame to provide stability while maintaining flexibility.
The ear cushions use acoustically engineered memory foam paired with a custom mesh textile that helps maintain a consistent fit and seal around the ear. The aluminum ear cups rotate independently to balance pressure and adapt to different head shapes.
Advertisement
Adjustability comes from telescoping arms that extend smoothly from the stainless steel headband. Once positioned, the arms stay in place to maintain a consistent fit and listening position without requiring frequent readjustment.
Communication and Smart Listening Features
Apple is positioning the AirPods Max 2 as more than a traditional pair of wireless headphones by expanding their communication capabilities through features powered by Apple Intelligence and the H2 processing platform.
One of the most notable additions is Live Translation, designed to help bridge language barriers in real time. By pressing and holding the listening mode button, the headphones can translate spoken language directly into the listener’s preferred language through the ear cups. The feature is intended to simplify everyday conversations when traveling, working internationally, or interacting with people who speak different languages.
Advertisement. Scroll to continue reading.
Apple has also refined how the headphones respond during conversations with Conversation Awareness. When the user begins speaking, the system automatically lowers the volume of music or other audio while amplifying nearby voices. Once the conversation ends, playback gradually returns to its previous volume without requiring manual adjustments.
Advertisement
Environmental listening modes also receive updates with Loud Sound Reduction and Personalized Volume. Enabled in Transparency and Adaptive Audio modes, Loud Sound Reduction helps soften sudden environmental noise while preserving overall audio clarity. Personalized Volume learns the user’s listening preferences and adjusts playback levels automatically based on surroundings, whether commuting, walking outdoors, or working in quieter environments.
Battery Life, Siri Integration, and Apple Ecosystem Features
Apple has also focused on everyday usability with improvements centered on battery life, voice control, and deeper integration across the Apple ecosystem.
The AirPods Max 2 provide up to 20 hours of listening or video playback with Active Noise Cancellation and Spatial Audio enabled, placing them within the expected range for premium wireless headphones used during travel, commuting, or extended listening sessions.
Voice interaction is handled through Siri, which can be activated simply by saying “Siri” or “Hey Siri.” Users can request music playback, place calls, check calendar events, or ask for directions without touching their device. Apple has also introduced gesture-based responses, allowing users to nod or shake their head when Siri asks whether to read messages, answer calls, or manage notifications.
Device integration remains one of Apple’s key strengths. Automatic Switching allows the headphones to transition seamlessly between Apple devices without manual reconnection. For example, a user listening to music on a Mac can answer an incoming call on an iPhone, with the AirPods Max 2 automatically shifting to the active device.
Advertisement
Additional convenience features include on-head detection, which pauses playback when the headphones are removed and resumes audio when they are placed back on.
Apple also continues to support Audio Sharing, enabling two pairs of compatible AirPods or Beats headphones to listen to the same audio stream from a single iPhone, iPad, Mac, or Apple TV.
Charging has also been updated with USB-C connectivity, aligning the headphones with Apple’s current device ecosystem and allowing users to charge them using the same cable as an iPhone, iPad, or Mac.
Key Technology, Sensors, and Technical Specifications
Beyond its core listening features, the AirPods Max 2 incorporate a combination of sensors, microphones, and processing technology designed to improve sound performance, communication clarity, and system responsiveness.
At the center of the design is the Apple H2 chip, installed in each ear cup. This dual-chip configuration processes features such as active noise cancellation, spatial audio calculations, and real-time listening adjustments. The headphones also use an Apple-designed dynamic driver paired with a custom high dynamic range amplifier, engineered to maintain clarity and control across a wide range of music and listening levels.
Advertisement
The AirPods Max 2 rely on a network of nine microphones to manage noise cancellation and voice communication. Eight microphones focus on monitoring environmental sound for Active Noise Cancellation, while a combination of three microphones handles voice pickup for clearer calls and voice commands.
Advertisement. Scroll to continue reading.
Multiple sensors also contribute to automatic system behavior and spatial audio tracking. These include optical sensors, position sensors, and case-detection sensors in each ear cup, along with accelerometers in both ear cups and a gyroscope in the left ear cup. Together, these components support features such as dynamic head tracking, automatic playback control, and accurate positioning for spatial audio.
Wireless connectivity is provided through Bluetooth 5.3, supporting stable connections with Apple devices and other compatible hardware. For wired listening, USB-C connectivity allows lossless audio playback and ultra-low latency performance, which may be useful for video production, gaming, or other applications where timing accuracy matters.
Advertisement
Physically, the AirPods Max 2 measure 7.37 inches (187.3 mm) in height, 6.64 inches (168.6 mm) in width, and 3.28 inches (83.4 mm) in depth, with a weight of 13.6 ounces (386.2 grams) including the ear cushions. The included Smart Case, weighing 4.74 ounces (134.5 grams), places the headphones into an ultra-low-power state to help conserve battery charge during storage.
Charging is handled through USB-C, while the battery delivers up to 20 hours of listening time with Active Noise Cancellation enabled.
The headphones also support several accessibility features, including Live Listen audio, customizable headphone levels, and Apple’s Headphone Accommodations settings, which allow users to tailor audio output based on individual hearing preferences.
AirPods Max 2 are fully compatible with iPhone, iPad, Apple Watch, Mac, Apple TV, and Apple Vision Pro devices running current versions of Apple’s operating systems. They can also function as standard Bluetooth headphones with non-Apple devices, though some advanced features may be limited outside the Apple ecosystem.
Advertisement
The Bottom Line
At $549, the AirPods Max 2 sit in the same premium wireless category as models from Sony, Bose, Sennheiser, Bowers & Wilkins, and Focal—but Apple is playing a different game. While many competitors focus primarily on noise cancellation or sound tuning, Apple’s advantage lies in ecosystem integration and computational audio.
Features like lossless audio over USB-C, Personalized Spatial Audio with dynamic head tracking, Live Translation, and seamless device switching across iPhone, Mac, iPad, and Apple TV create an experience that goes beyond traditional headphone performance. The dual H2 chip architecture, deep Siri integration, and features like Conversation Awareness and Personalized Volume also emphasize adaptive listening and real-time processing.
For listeners already invested in Apple’s ecosystem, that level of integration may be the AirPods Max 2’s biggest differentiator. Competing models from Sony, Bose, and Sennheiser may offer longer battery life or different sound signatures, while brands like Focal and Bowers & Wilkins lean more heavily into audiophile tuning and materials. Apple’s approach focuses instead on smart listening features, spatial audio processing, and seamless device interaction, which together define what makes the AirPods Max 2 distinct at this price point.
Where to buy: $549 at Apple (Available March 25, 2026)
An attacker embeds a single instruction inside a forwarded email. An OpenClaw agent summarizes that email as part of a normal task. The hidden instruction tells the agent to forward credentials to an external endpoint. The agent complies — through a sanctioned API call, using its own OAuth tokens.
The firewall logs HTTP 200. EDR records a normal process. No signature fires. Nothing went wrong by any definition your security stack understands.
That is the problem. Six independent security teams shipped six OpenClaw defense tools in 14 days. Three attack surfaces survived every one of them.
The exposure picture is already worse than most security teams know. Token Security found that 22% of its enterprise customers have employees running OpenClaw without IT approval, and Bitsight counted more than 30,000 publicly exposed instances in two weeks, up from roughly 1,000. Snyk’s ToxicSkills audit adds another dimension: 36% of all ClawHub skills contain security flaws.
Jamieson O’Reilly, founder of Dvuln and now security adviser to the OpenClaw project, has been one of the researchers pushing fixes hardest from inside. His credential leakage research on exposed instances was among the earliest warnings the community received. Since then, he has worked directly with founder Peter Steinberger to ship dual-layer malicious skill detection and is now driving a capabilities specification proposal through the agentskills standards body.
Advertisement
The team is clear-eyed about the security gaps, he told VentureBeat. “It wasn’t designed from the ground up to be as secure as possible,” O’Reilly said. “That’s understandable given the origins, and we’re owning it without excuses.”
None of it closes the three gaps that matter most.
Three attack surfaces your stack cannot see
The first is runtime semantic exfiltration. The attack encodes malicious behavior in meaning, not in binary patterns, which is exactly what the current defense stack cannot see.
Palo Alto Networks mapped OpenClaw to every category in the OWASP Top 10 for Agentic Applications and identified what security researcher Simon Willison calls a “lethal trifecta”: private data access, untrusted content exposure, and external communication capabilities in a single process. EDR monitors process behavior. The agent’s behavior looks normal because it is normal. The credentials are real, and the API calls are sanctioned, so EDR reads it as a credentialed user doing expected work. Nothing in the current defense ecosystem tracks what the agent decided to do with that access, or why.
Advertisement
The second is cross-agent context leakage. When multiple agents or skills share session context, a prompt injection in one channel poisons decisions across the entire chain. Giskard researchers demonstrated this in January 2026, showing that agents silently appended attacker-controlled instructions to their own workspace files and waited for commands from external servers. The injected prompt becomes a sleeper payload. Palo Alto Networks researchers Sailesh Mishra and Sean P. Morgan warned that persistent memory turns these attacks into stateful, delayed-execution chains. A malicious instruction hidden inside a forwarded message sits in the agent’s context weeks later, activating during an unrelated task.
O’Reilly identified cross-agent context leakage as the hardest of these gaps to close. “This one is especially difficult because it is so tightly bound to prompt injection, a systemic vulnerability that is far bigger than OpenClaw and affects every LLM-powered agent system in the industry,” he told VentureBeat. “When context flows unchecked between agents and skills, a single injected prompt can poison or hijack behavior across the entire chain.” No tool in the current ecosystem provides cross-agent context isolation. IronClaw sandboxes individual skill execution. ClawSec monitors file integrity. Neither tracks how context propagates between agents in the same workflow.
The third is agent-to-agent trust chains with zero mutual authentication. When OpenClaw agents delegate tasks to other agents or external MCP servers, no identity verification exists between them. A compromised agent in a multi-agent workflow inherits the trust of every agent it communicates with. Compromise one through prompt injection, and it can issue instructions to every agent in the chain using trust relationships that the legitimate agent already built.
Microsoft’s security team published guidance in February calling OpenClaw untrusted code execution with persistent credentials, noting the runtime ingests untrusted text, downloads and executes skills from external sources, and performs actions using whatever credentials it holds. Kaspersky’s enterprise risk assessment added that even agents on personal devices threaten organizational security because those devices store VPN configs, browser tokens, and credentials for corporate services. The Moltbook social network for OpenClaw agents already demonstrated the spillover risk: Wiz researchers found a misconfigured database that exposed 1.5 million API authentication tokens and 35,000 email addresses.
Advertisement
What 14 days of emergency patching actually closed
The defense ecosystem split into three approaches. Two tools harden OpenClaw in place. ClawSec, from Prompt Security (a SentinelOne company), wraps agents in continuous verification, monitoring critical files for drift and enforcing zero-trust egress by default. OpenClaw’s VirusTotal integration, shipped jointly by Steinberger, O’Reilly, and VirusTotal’s Bernardo Quintero, scans every published ClawHub skill and blocks known malicious packages.
Two tools are full architectural rewrites. IronClaw, NEAR AI’s Rust reimplementation, runs all untrusted tools inside WebAssembly sandboxes where tool code starts with zero permissions and must explicitly request network, filesystem, or API access. Credentials get injected at the host boundary and never touch agent code, with built-in leak detection scanning requests and responses. Carapace, an independent open-source project, inverts every dangerous OpenClaw default with fail-closed authentication and OS-level subprocess sandboxing.
Two tools focus on scanning and auditability: Cisco’s open-source scanner combines static, behavioral, and LLM semantic analysis, while NanoClaw reduces the entire codebase to roughly 500 lines of TypeScript, running each session in an isolated Docker container.
O’Reilly put the supply chain failure in direct terms. “Right now, the industry basically created a brand-new executable format written in plain human language and forgot every control that should come with it,” he said. His response has been hands-on. He shipped the VirusTotal integration before skills.sh, a much larger repository, adopted a similar pattern. Koi Security’s audit validates the urgency: 341 malicious skills found in early February grew to 824 out of 10,700 on ClawHub by mid-month, with the ClawHavoc campaign planting the Atomic Stealer macOS infostealer inside skills disguised as cryptocurrency trading tools, harvesting crypto wallets, SSH credentials, and browser passwords.
Advertisement
OpenClaw Security Defense Evaluation Matrix
Dimension
ClawSec
VirusTotal Integration
IronClaw
Advertisement
Carapace
NanoClaw
Cisco Scanner
Discovery
Advertisement
Agents only
ClawHub only
No
mDNS scan
Advertisement
No
No
Runtime Protection
Config drift
Advertisement
No
WASM sandbox
OS sandbox + prompt guard
Container isolation
Advertisement
No
Supply Chain
Checksum verify
Signature scan
Advertisement
Capability grants
Ed25519 signed
Manual audit (~500 LOC)
Static + LLM + behavioral
Advertisement
Credential Isolation
No
No
WASM boundary injection
Advertisement
OS keychain + AES-256-GCM
Mount-restricted dirs
No
Auditability
Advertisement
Drift logs
Scan verdicts
Permission grant logs
Prometheus + audit log
Advertisement
500 lines total
Scan reports
Semantic Monitoring
No
Advertisement
No
No
No
No
Advertisement
No
Source: VentureBeat analysis based on published documentation and security audits, March 2026.
The capabilities spec that treats skills like executables
O’Reilly submitted a skills specification standards update to the agentskills maintainers, led primarily by Anthropic and Vercel, that is in active discussion. The proposal requires every skill to declare explicit, user-visible capabilities before execution. Think mobile app permission manifests. He noted the proposal is getting strong early feedback from the security community because it finally treats skills like the executables they are.
“The other two gaps can be meaningfully hardened with better isolation primitives and runtime guardrails, but truly closing context leakage requires deep architectural changes to how untrusted multi-agent memory and prompting are handled,” O’Reilly said. “The new capabilities spec is the first real step toward solving these challenges proactively instead of bolting on band-aids later.”
Advertisement
What to do on Monday morning
Assume OpenClaw is already in your environment. The 22% shadow deployment rate is a floor. These six steps close what can be closed and document what cannot.
Inventory what is running. Scan for WebSocket traffic on port 18789 and mDNS broadcasts on port 5353. Watch corporate authentication logs for new App ID registrations, OAuth consent events, and Node.js User-Agent strings. Any instance running a version before v2026.2.25 is vulnerable to the ClawJacked remote takeover flaw.
Mandate isolated execution. No agent runs on a device connected to production infrastructure. Require container-based deployment with scoped credentials and explicit tool whitelists.
Deploy ClawSec on every agent instance and run every ClawHub skill through VirusTotal and Cisco’s open-source scanner before installation. Both are free. Treat skills as third-party executables, because that is what they are.
Require human-in-the-loop approval for sensitive agent actions. OpenClaw’s exec approval settings support three modes: security, ask, and allowlist. Set sensitive tools to ask so the agent pauses and requests confirmation before executing shell commands, writing to external APIs, or modifying files outside its workspace. Any action that touches credentials, changes configurations, or sends data to an external endpoint should stop and wait for a human to approve it.
Map the three surviving gaps against your risk register. Document whether your organization accepts, mitigates, or blocks each one: runtime semantic exfiltration, cross-agent context leakage, and agent-to-agent trust chains.
Bring the evaluation table to your next board meeting. Frame it not as an AI experiment but as a critical bypass of your existing DLP and IAM investments. Every agentic AI platform that follows will face this same defense cycle. The framework transfers to every agent tool your team will assess for the next two years.
The security stack you built for applications and endpoints catches malicious code. It does not catch an agent following a malicious instruction through a legitimate API call. That is where these three gaps live.
You would be very hard pressed to find any sort of CPU or microcontroller in a commercial product that uses anything but binary to do its work. And yet, other options exist! Ternary computing involves using trits with three states instead of bits with two. It’s not popular, but there is now a design available for a ternary processor that you could potentially get your hands on.
The device in question is called the 5500FP, as outlined in a research paper from [Claudio Lorenzo La Rosa.] Very few ternary processors exist, and little effort has ever been made to fabricate such a device in real silicon. However, [Claudio] explains that it’s entirely possible to implement a ternary logic processor based on RISC principles by using modern FPGA hardware. The impetus to do so is because of the perceived benefits of ternary computing—notably, that with three states, each “trit” can store more information than regular old binary “bits.” Beyond that, the use of a “balanced ternary” system, based on logical values of -1, 0 , and 1, allows storing both negative and positive numbers without a wasted sign bit, and allows numbers to be negated trivially simply by inverting all trits together.
The research paper does a good job of outlining the basis of this method of computing, as well as the mode of operation of the 5500FP processor. For now, it’s a 24-trit device operating at a frequency of 20MHz, but the hope is that in future it would be possible to move to custom silicon to improve performance and capability. The hope is that further development of ternary computing hardware could lead to parts capable of higher information density and lower power consumption, both highly useful in this day and age where improvements to conventional processor designs are ever hard to find.
Advertisement
Head over to the Ternary Computing website if you’re intrigued by the Ways of Three and want to learn more. We perhaps don’t expect ternary computing to take over any time soon, given the Soviets didn’t get far with it in the 1950s. Still, the concept exists and is fun to contemplate if you like the mental challenge. Maybe you can even start a rumor that the next iPhone is using an all-ternary processor and spread it across a few tech blogs before the week is out. Let us know how you get on.
For many people, gold mining conjures images of an old prospector sifting sandy water through a metal pan in the blazing sun. But these days, the process is far more advanced than the 1800s gold rush era of the western United States. In fact, researchers have actually developed a method to recover gold from electronic waste. This means that yes, there’s gold inside your household electronics. So your drawer of outdated devices may be a goldmine—at least in theory.
A study published in Advanced Materials describes how this was achieved with a process using protein amyloid nanofibrils. Extracted from whey, these materials are tiny, thin protein fibers with a huge surface area. This allows them to precisely remove gold from dissolved electronic components like computer motherboards. The process then converts gold ions into single particles, resulting in high-purity gold nuggets.
The study shows that this method of gold recovery costs around $1.10 per gram, a far cry from the market value of about $50 per gram for 22-carat gold. The process is also more eco-friendly than traditional mining methods, as it uses fewer organic materials and produces less waste overall. Additionally, the protein gels used to extract the gold are reusable, and represent a circular approach. The end result is that electronic waste, as well as food waste, is recycled and repurposed into a different substance.
Advertisement
The value and history of gold in electronic devices
Sebastian_Photography/Shutterstock
A typical smartphone has anywhere from 7 to 34 milligrams of gold in its circuit boards and connectors. This equals around $1.16 to $5.81 total value as of this writing. Of course, larger devices like desktop computers can have more gold, though it’s still not an impressive amount. While it’s illegal to throw away electronics in many states, millions of devices are tossed every year, which means the value of the gold inside can add up very quickly.
The reason gold is often used in electronic devices is because of its physical and chemical properties. First, gold conducts electricity very well. It’s also durable and doesn’t corrode over time as other metals can. Plus, it can easily be shaped into thin wires without breaking. All of these features combined better ensure reliable signal transmission, and smooth, extended performance. That’s why gold is the ideal substance for circuit boards, connectors, and other components, inside smartphones, computers, and more.
Advertisement
The use of gold in electronic devices dates back to the mid-20th century. Both computers and military communications equipment required more reliable and longer-lasting connections than what were available at the time. So gold was eventually integrated, becoming an important addition to these devices. As time went on, the military defense sector of the US utilized the precious metal extensively. This led to widespread adoption by NASA, who used the metal in golden records on the Voyager missions, and in various equipment as well.
Chord Electronics’ digital audio consultant Rob Watts takes us on a deep dive into the challenges of reproducing lifelike sound from 16-bit/44.1kHz PCM digital audio (CD quality music from compact discs or streaming). From his groundbreaking DAC designs priced from $650 to $20,000, to why off-the-shelf chips can’t compete, Rob explains how his unique approach to D/A (digital to analog) conversion goes beyond conventional measurement-based audio engineering. He also previews Chord’s next flagship product, the Quartet M Scaler, which will build on the Hugo M Scaler, and shares his thoughts on DSD, the importance of cables, and hidden sonic factors like RF and power supply issues. Even 45 years after the CD’s debut, there’s still high-resolution audio left to uncover.
Sponsor: Thank you to our sponsor SVS for your support.
Last week’s cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices.
The organization says in an update on Sunday that all its medical devices are safe to use but electronic ordering systems remain offline, and customers must place orders manually through sales representatives.
Stryker emphasizes that the incident was not a ransomware attack and that the threat actor did not deploy any malware on its systems.
The attacker alleged that they wiped “over 200,000 systems, servers, and mobile devices” and stole 50 terabytes of data. However, investigators did not find any indication that data was exfiltrated.
Following the disruption, Stryker employees in multiple countries started to complain that their managed devices had been remotely wiped overnight.
Some employees had their personal devices enrolled in the company network and lost personal data during the wiping process.
Hackers had Global Admin privileges
A source familiar with the attack told BleepingComputer that the threat actor used the wipe command in Intune, Microsoft’s cloud-based endpoint management service, to erase data from nearly 80,000 devices between 5:00 and 8:00 a.m. UTC on March 11.
Advertisement
The attacker carried out the action after compromising an administrator account and creating a new Global Administrator account.
The investigation is being conducted by the Microsoft Detection and Response Team (DART) in collaboration with cybersecurity experts from Palo Alto Unit 42.
Stryker’s update highlights that the attack did not impact any of its products, connected or otherwise, and was limited exclusively to the internal Microsoft corporate environment.
“All Stryker products across our global portfolio, including connected, digital, and life-saving technologies, remain safe to use,” the company says.
Advertisement
Restoration efforts are currently underway, the main focus being on resuming shipping and transactional services. Customers are encouraged to maintain normal communication with company personnel while the infrastructure is steadily recovered.
Any order placed before the cyberattack will be honored as systems are restored, while those placed during the disruption will be processed when systems are back online, and the supply flow resumes to normal.
The company is working with its global manufacturing sites to deal with potential operational impact.
Stryker’s current priority is to restore the supply-chain system and resume customer orders and shipping. “Our core transactional systems are already on a clear path to full recovery,” the company says.
Advertisement
Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.
Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.
Fujifilm has just introduced the Instax Mini 13, the latest addition to one of the best selling instant camera lines in the world. It sits comfortably in the palm of your hand from the moment you pick it up, and a metallic silver logo on the front adds a subtle touch of shine without making the whole thing feel fussy or overcomplicated.
Simply twist the lens ring and you’re good to go in one fluid action. Twist it again, and the close-up mode appears, allowing you to take close-up photographs of whatever is directly in front of you. Because of built-in parallax correction, the viewfinder lines up perfectly with the lens, ensuring that everything is centered.
Compact and cute design. Easily twist the lens to turn on and off
Built-in selfie mirror for easy selfies Close-up mode with parallax correction
Features automatic exposure and flash control for bright photos that are not “washed-out”
There’s a tiny mirror on the front to help you line up your own pictures perfectly. You have dual timers built in that clock down from two to ten seconds depending on whether you’re taking a group shot or flying solo. Fujifilm also includes a small wedge piece that snaps into the strap and then be used to raise the camera up on a level surface. The countdown will run automatically while you get everything in place. The exposure settings are also automatically adjusted, regardless of the lighting conditions. The flash has its own small control mechanism that performs an excellent job of balancing the results whether you’re in full light or just in the shade.
Advertisement
If you put two regular AA batteries in the bottom, it will print about a hundred times before needing to be replaced. The camera also includes a feature that allows it to turn off after five minutes of inactivity, which helps to extend the battery life. The film loads at the back, just like any other Instax Mini. Each finished print measures approximately 3.5 x 2 inches overall, with a photo area of 2.5 x 1.75 inches. You’ll have to wait around 90 seconds for the colors to appear properly, however if you’re in cool air, it may take a little longer.
There are five colors, including Dreamy Purple, Frost Blue, Candy Pink, Lagoon Green, and Clay White. The camera alone costs $94 MSRP, and Fujifilm is also releasing a new film pack called Pastel Galaxy, which includes sparkling cosmic motifs in ultra delicate pastel tones along the edges. That gives a fun touch to each print. If you scan prints into your phone, you will find that the companion app now does a better job of isolating the image from the background, resulting in cleaner-looking digital copies. Availability begins in late June. [Source]
Affinity’s latest update to introduces Light UI for a brighter and cleaner workplace, Convert to Curves to eliminate manual tracing by transforming objects into a fully editable vector curves, and Live Tone Blend Groups which blends layers dynamically and non-destructively.
Did you ever wonder how the mechanical voltage regulator — that big black box wired up to the generator on a car from the ’60s or before — worked? [Jonelsonster] has some answers.
For most people in 2026 an old car perhaps means one from the 20th century, now that vehicles from the 1990s and 2000s have become the beloved jalopies of sallow youths with a liking for older cars and a low budget. But even a 1990s vehicle is modern in terms of its technology, because a computer controls the show. It has electronic fuel injection (EFI), anti-lock braking system (ABS), closed loop emissions control, and the like.
Go back in time to the 1970s, and you’ll find minimal electronics in the average car. The ABS is gone, and the closest thing you might find to EFI is an electronic ignition where the points in the distributor have been replaced with a simple transistor. Perhaps an electronic voltage regulator on the alternator. Much earlier than that and everything was mechanical, be that the ignition, or that regulator.
The video below the break has a pair of units, it seems from 1940s tractors. They would have had a DC generator, a spinning coil with a commutator and brushes, in a magnetic field provided by another coil. These things weren’t particularly powerful by today’s standards and sometimes their charging could be a little lackluster, but they did work. We get to see how, as he lifts the lid off to reveal what look like a set of relays.
Advertisement
We’re shown the functions of each of the three coils with the aid of a lab power supply; we have a reverse current relay that disconnects the generator if the battery tries to power it, an over-current relay that disconnects the field coil if the current is too high, and an over-voltage relay that does the same for voltage. The regulating comes down to the magnetic characteristics, and while it’s crude, it does the job.
We remember European devices with two coils and no field terminal, but the principle is the same. There is never a dull moment when you own an all mechanical car.
Nvidia CEO Jensen Huang thinks every company should have an OpenClaw strategy. And Nvidia is here to provide it.
Nvidia has developed NemoClaw, an enterprise-grade AI agent platform, Huang announced during his GTC keynote on Monday. The platform is built on top of OpenClaw, the popular open-source framework for building and running AI agents locally on a company’s own hardware.
The new open source platform is essentially OpenClaw with enterprise-grade security and privacy features baked in. The idea is to turn OpenClaw into a secure platform that enterprises can tap into with one command, giving them control over how agents behave and handle data, according to Nvidia.
“For the CEOs, the question is, what’s your OpenClaw strategy?” Huang said onstage. “We need it. We all have a Linux strategy. We all needed to have an HTTP HTML strategy, which started the internet. We all needed to have a Kubernetes strategy, which made it possible for mobile cloud to happen. Every company in the world today needs to have an OpenClaw strategy, an agentic systems strategy.”
Advertisement
Nvidia worked with OpenClaw’s creator Peter Steinberger to develop NemoClaw, Huang said.
Once released, NemoClaw users will be able to tap any coding agent or open-source AI model, including Nvidia’s NemoTron open models to build and deploy AI agents. The platform allows users to access cloud-based models on their local devices. The platform is hardware agnostic — it doesn’t need to run on Nvidia’s own GPUs — and integrates with NeMo, Nvidia’s AI agent software suite.
For now, Nvidia is describing NemoClaw as an early-stage alpha release. “Expect rough edges. We are building toward production-ready sandbox orchestration, but the starting point is getting your own environment up and running,” the company stated on its website in a note directed toward developers.
Techcrunch event
Advertisement
San Francisco, CA | October 13-15, 2026
Building enterprise AI agent platforms has become the du jour obsession of the AI space in recent months.
Advertisement
OpenAI launched Frontier, its open platform for enterprises to build and manage AI agents, in February. In December, global research firm Gartner released a report about how governance platforms for AI agents would be the crucial infrastructure needed for enterprises to adopt the AI tech. Nvidia clearly got the message.
“OpenClaw gave us, gave the industry exactly what it needed at exactly the time,” Huang said. “Just as Linux gave the industry exactly what it needed at exactly the time, just as Kubernetes showed up at exactly the right time, just as HTML showed up. It made it possible for the entire industry to grab on to this open source stack and go do something with it.”
There are , but most of them are basically digital notebooks. They are great for reading and handwriting notes, but not so great for doing all of that regular tablet stuff like checking emails and doomscrolling. Boox, however, has released a number of E Ink tablets that can , opening up users to the wide world of traditional smartphone apps.
The company’s latest product is a refresh of the Go 10.3 tablet, called the Go 10.3 Lumi. This introduces plenty of new features and, as the name suggests, one is a front light. The tablet has been designed for both natural sunlight and low-light environments. The previous model was great, but it turns into a useless paperweight without access to ambient light.
Boox
Despite the front-facing light, the Go 10.3 Lumi is still lighter than its predecessor, at 12.8 ounces. It’s also on the thinner side, with a 4.8mm profile.
The basic specs are similar to the Go tablet, with an octa-core processor, 4GB of RAM and 64GB of internal storage. It runs on , which is a massive improvement for both security and access to apps. The previous iteration ran on Android 12, and Google . That means no more critical security updates.
Advertisement
In addition to beefed up security, Boox promises the upgrade to Android 15 offers users improved memory management, better multitasking and smoother UI interactions. E Ink devices can be sluggish so I’m all for anything that speeds things up.
It integrates with external keyboards and boasts integrated speakers, which will certainly come in handy when navigating apps downloaded from the Play Store. Despite the screen technology, this is an Android tablet. It should be able to run just about any app available.
However, the E Ink technology will likely run into hiccups with video-based apps and games. It’s just not made for that. This could be a great little gadget for emails and text-based social media, but not for something like TikTok. It should be able to handle non-animated games just fine, like crossword puzzles and stuff like that.
Boox says the tablet gets “substantial battery life” and has been “optimized for extended usage cycles.” The company hasn’t announced detailed battery specs, but did say people “can work all day without looming battery anxiety.” E Ink devices tend to last a good while, so I’m not worried about that.
Advertisement
The Boox Go 10.3 Lumi is available to order right now and costs $450. If you want to save a few bucks and have no interest in a front light, there’s a stripped down version that also runs Android 15 but costs $420.
You must be logged in to post a comment Login