Connect with us
DAPA Banner

Tech

5 Tech Tips To Keep Your Work Private And Personal Data Safe

Published

on





It’s often said that those with nothing to hide have nothing to fear, but we now live in a world where that attitude has a chance of upending your life. With hackers, identity thieves, rogue nation-states, data-hungry tech companies, and AI agents on the loose, information that would normally be innocuous can become a devastating weapon against you or your loved ones. Moreover, if an attacker steals company data you were responsible for, it could result in massive losses for your employer and the termination of your employment.

You’ve probably heard about some of the usual threats: suspicious emails that could be phishing attempts, pop-ups that claim your device is hacked, and so on. You’ve been told to change your passwords regularly and not to use the same one with multiple accounts. Many corporate workers have had details about these sorts of attacks and security reminders drilled into them through company training. 

But cybersecurity is an infinitely deep rabbit hole, and there are many more things you can do to keep your data private and safe as you work. Half of the battle is knowledge. You can’t fight back unless you know what you’re up against. So, from locking down your accounts and devices to practicing good digital hygiene, here are five tips that will leave you better equipped to deal with digital threats, keeping your work private and personal data safe.

Advertisement

Use passkeys, not passwords, where possible

Passwords have never been the best way to keep our digital lives secure, but we’ve been stuck with them out of necessity. They force us to choose between convenience and security. Do you use the same password for everything and risk having your entire digital life stolen when a single account is exposed, or do you set unique, complex passwords for each of your accounts and risk losing access when you inevitably forget one? Password managers have stepped in to fill that gap, remembering unique passwords so you don’t have to, but that just makes your password manager an attractive target for hackers.

One of the most basic steps anyone can take to improve their digital privacy and security is to use passkeys instead of passwords. Passkeys store an encrypted “key” on your device. When you sign into an account, you’ll be asked to use the PIN, password, or biometric scan you normally use to unlock the device itself. Instead of remembering a hundred passwords, your computer or phone’s unlock code becomes the only thing you need. This may seem less secure, but because passkeys are tied to your specific device, the website knows you aren’t some hacker on the other side of the world. The service checks your device, and your device confirms that it’s really you. 

Advertisement

You can already use passkeys on many commonly used accounts, including Google, Microsoft, and more. Check in the security sections of each service’s settings to make the switch. You should also pick a passkey manager to store your passkeys. Common options include 1Password, Proton Pass, NordPass, and Google Password Manager.

Advertisement

Use a password on your phone, not fingerprint or face unlock

When setting up the lock screen on your smartphone, you will be presented with a few options. All devices offer a password or PIN, while Android phones offer a pattern lock and often a fingerprint sensor or camera-based face unlock, and iPhones offer the three-dimensional Face ID system. However, due to legal and technical factors, the only options security-conscious users should choose are a password, PIN, or pattern. Although you must take care not to reveal your password, it cannot be forcibly extracted from you.

In the United States, police and other law enforcement officers cannot warrantlessly breach your password. That’s because the Supreme Court has ruled that a password is private knowledge protected by the Fourth Amendment, meaning that you cannot be compelled to divulge it against your will. However, the law currently does not prevent a law enforcement officer from physically forcing you to unlock your phone or other devices by forcibly pressing your thumb to the fingerprint reader or putting you in a headlock to hold your face still while Face ID scans you. 

Circuit courts have ruled in opposite directions, with a 9th Circuit judge finding in 2024 that forcing a defendant’s thumb to the phone’s fingerprint reader was no different than forcibly taking his fingerprints during booking. In 2025, the D.C. Circuit ruled the opposite, finding that a January 6th insurrectionist’s rights were violated when the FBI forced him to open his phone with biometrics. Until the Supreme Court weighs in, it’s a gray area. Either way, an individual officer may not know or care what the law says. For more information, see our explainer on why you should never give the police your phone without a warrant.

Advertisement

Be aware of your surroundings when dealing with sensitive information

Many people worried about their digital privacy and security go to great technical lengths to lock down their devices from prying eyes, but neglect to consider threats in the physical world around them. The weak point in all digital security is the human element, and the most effective hackers are often not typing on a supercomputer from some basement. Instead, they’re using what are called social engineering attacks  — in other words, chatting you up in an attempt to make you divulge the name of your first pet and the street you grew up on so they can reset your passwords, or asking you for your number so they can see you type your phone’s password.

Some attacks may not involve any interaction, but did you notice that the security camera in your favorite cafe is pointed right toward your laptop as you type in your banking credentials? What about the man seated next to you, whose wandering eyes may have taken note of the same? Of course, one easy solution for some accounts is to use passkeys in tandem with biometric authentication on your phone, eliminating the need to enter passwords. As we discussed above, biometric security can backfire if you’re ever in a tense situation with law enforcement, so it’s up to individuals to determine whether state or non-state actors are likely to present the larger threat to you.

It’s a bit crude, but a good rule of thumb when you’re unsure whether to handle sensitive information in a particular environment is to ask yourself whether you’d look at “not safe for work” content there. If the answer is no, it’s probably a good idea to wait until you’re in a more private setting.

Advertisement

Always update your devices to get the latest security patches

You should almost always install updates on your phone, laptop, PC, and other devices when prompted. Your devices are doing a lot of work on their own to protect you from threats. Major operating systems like Windows, macOS, Android, or iOS include multiple layers of defense that, in most cases, block the most severe threats without any work on your part. However, because of the complexity of our devices and OSes, there are always hidden vulnerabilities waiting to be discovered. In the worst case scenario, which is known as a zero-day exploit, a threat actor discovers them first and deploys them against defenseless users. In the best case, your OS vendor discovers them first and issues a security patch.

When you don’t update your phone or computer, you could lose a lot more than the five minutes it would have taken to install the latest software. Almost every system update to your devices contains at least a few security fixes, and if your OS vendor knows about those vulnerabilities, so do the bad guys. The sooner you update, the safer you’ll be. There are minor exceptions. In January, a series of bad updates wreaked havoc on Windows PCs, breaking important features and even causing boot cycle issues. Microsoft quickly released an out-of-band patch to rectify those issues, at which point responsible users finally updated. If an update is known to cause problems, you should hold off until they’re fixed.

Keep in mind that devices outside your phone and computer may need updates. Your smart TV, game console, smartwatch, wireless earbuds, and many other devices also receive occasional updates that should be applied as soon as possible.

Advertisement

Be cautious with Wi-Fi connections

In “The Lord of the Rings,” the corrupted wizard Saruman uses a scrying orb called a palantir to communicate with the villain Sauron. Gandalf, unaware that his old friend has succumbed to evil, warns him against using the orb, saying, “We do not know who else may be watching.” This is a particularly good metaphor for Wi-Fi, a technology nearly everyone relies on day-to-day. One of the things people aren’t taught about Wi-Fi is that it’s a two-way window. If a network is compromised, a threat actor could see everything you do and steal your most private work and personal data.

Evil twin attacks are among the most common Wi-Fi attacks, and happen most often in public areas like coffee shops, airports, and hotels, where lots of people are connected to the Wi-Fi. An attacker makes a network they control with the same name as the real network. Users may not notice that there are two networks named “Coffee Shop Guest” and connect to the fake one. Another common attack is man-in-the-middle, where an attacker positions themselves between two parties who are communicating, such as a payment vendor and a shopping site. And because Wi-Fi sends data through the air, sniffing attacks  — where an attacker uses a specialized sniffing tool to intercept data packets  — are also common.

Advertisement

You can prevent some attacks by encrypting your data, most commonly through a VPN. Because a VPN encrypts your network traffic, a network attacker will only see scrambled data if they breach a Wi-Fi network you’re connected to. However, not all VPNs are created equal, and there are plenty of shady-looking services out there. Be sure to choose one of the best VPN services to ensure that your traffic is properly anonymized.



Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

Games Workshop brings seven classic Warhammer games to Steam for the first time

Published

on

Fans of miniature plastic soldiers, rejoice. Games Workshop has brought a host of older Warhammer and Warhammer 40K video games to Steam for the first time, alongside a dozen games that haven’t been available on Valve’s storefront for a few years. The new to Steam releases consist of three games from the Warhammer fantasy range — Shadow of the Horned Rat, Mark of Chaos – Gold Edition and Dark Omen — and four from its sci-fi 40K universe — Chaos Gate, Fire Warrior, Final Liberation and Rites of War.

If you’re a Warhammer fan of a certain age, some of these may be formative experiences for you. I know they are for me. I can’t count how many hours I spent playing Chaos Gate when I first discovered 40K at the age of 10. Yes, it was an XCOM clone, but by that point I didn’t know about the MicroProse original, and Space Marines were cool.

Years later and as a Tau collector at the time, I also loved Fire Warrior, even if it wasn’t the most polished or deep first-person shooter. I haven’t played the other five games included in today’s announcement, but I’ve heard Warhammer: Shadow of the Horned Rat and Warhammer 40K: Rites of War are pretty good if you’re into the setting or, in the latter case, a fan of the Eldar.

To celebrate the re-release of these old gems, Games Workshop is running a Classics sale on Steam, with discounts on all 19 re-releases. Plus, you can get discounts on some more recent releases, including the excellent Dawn of War – Definitive Edition and Dawn of War 2 – Anniversary Edition. If you’re new to the Warhammer 40K universe, and would rather avoid a plastic addiction, one of those would be my first port of call, along with the excellent Space Marine 2.

Advertisement

Source link

Continue Reading

Tech

Roblox boosts child safety with new account types limiting chat and game access

Published

on

Roblox is among the internet’s busiest digital playgrounds, but keeping it safe, especially for the youngest users, has been an ongoing challenge. 

Well, on April 13, 2026, the platform’s founder and CEO, David Baszucki, announced two new age-based account tiers, which will launch in June. 

So, What Exactly Is Changing For Young Players?

The platform is launching Roblox Kids for users between the ages of five and eight and Roblox Select for those aged between nine and 15.

Both categories are assigned automatically through the platform’s existing facial age-check mechanism, the system made mandatory for accessing the in-built chat feature in January 2026. 

For the youngest group, Roblox Kids, chat is completely disabled by default. Game access is also restricted to content carrying only Minimal or Mild maturity ratings. Selected users get more freedom with Moderate-rated games and chat that can be gradually enabled based on age. 

Advertisement

Once a user hits 16, they graduate to a standard account. 

What Does This Mean For Parents And Developers?

Parents gain sharper controls, including the ability to individually block or approve titles up to age 15. Meanwhile, developers face a tougher entry bar. To reach younger audiences, they must provide ID verifications, two-step authentication, and an active Roblox Plus subscription (which costs $4.99 per month). 

As mentioned in the beginning, the new age-based accounts will roll out globally at the beginning of June 2026. Users will also get a transition period to verify their age. 

If you’re wondering where the sudden strategic pivot comes from, it stems from the lawsuits by the attorneys general of Louisiana and Texas over child safety concerns.

It’s food that platforms can no longer keep child safety on the back burner, and if the platform does well, it could set a benchmark for age-appropriate access. 

Advertisement

Source link

Continue Reading

Tech

FBI Raids Texas Home of Man Suspected of Firebombing Sam Altman’s SF Mansion

Published

on

The FBI searched the Texas home of a 20-year-old man accused of throwing a Molotov cocktail at Sam Altman’s San Francisco residence. Authorities say the suspect also made threats at OpenAI’s headquarters, and reports indicate he had written extensively about fears over AI and opposition to AI executives.

The suspect reportedly authored a Substack blog and was a member of the Discord server PauseAI, an activist group focused on banning the development of the most powerful AI models to protect the public. In one post, they wrote: “These machines have already shown themselves to be unaligned with the interest of the people creating them. Models have often been found lying, cheating on tasks, and blackmailing their own creators whenever convenient; let alone the broader question of aligning them to whatever general ‘human interest’ may be.” The Houston Chronicle reports: The search happened hours before the Justice Department charged 20-year-old Daniel Moreno-Gama with possession of an unregistered firearm and damage and destruction of property by means of explosives. An FBI spokesperson on Monday morning confirmed agents were executing a search warrant in Spring, but provided no other information.

Around the same time, FOX News reported the search was being conducted at the home of Daniel Moreno-Gama, 20, who last week was arrested by San Francisco police suspicion of attempted murder, making criminal threats and possession of a destructive device. The charges were first reported by the Associated Press. When Moreno-Gama was arrested Friday, he was carrying a document that “identified views opposed to Artificial Intelligence (AI) and the executives of various AI companies,” the Associated Press reported. Moreno-Gama has no criminal history in Harris or Montgomery counties, according to public records. […] Agents had left the cul-de-sac by 1 p.m. It was unclear if they removed any items from the house. Another incident occurred outside Sam Altman’s residence early Sunday morning. “Early Sunday morning, a car stopped and appears to have fired a gun at the Russian Hill home of OpenAI’s CEO,” reports The San Francisco Standard, citing reports from the local police department. Two suspects were arrested and booked for negligent discharge.

Source link

Advertisement
Continue Reading

Tech

Today’s NYT Connections Hints, Answers for April 14 #1038

Published

on

Looking for the most recent Connections answers? Click here for today’s Connections hints, as well as our daily answers and hints for The New York Times Mini Crossword, Wordle, Connections: Sports Edition and Strands puzzles.


Today’s NYT Connections puzzle is rather tricky. Read on for clues and today’s Connections answers.

The Times has a Connections Bot, like the one for Wordle. Go there after you play to receive a numeric score and to have the program analyze your answers. Players who are registered with the Times Games section can now nerd out by following their progress, including the number of puzzles completed, win rate, number of times they nabbed a perfect score and their win streak.

Advertisement

Read more: Hints, Tips and Strategies to Help You Win at NYT Connections Every Time

Hints for today’s Connections groups

Here are four hints for the groupings in today’s Connections puzzle, ranked from the easiest yellow group to the tough (and sometimes bizarre) purple group.

Yellow group hint: Surfing the web.

Advertisement

Green group hint: Think Muhammad Ali.

Blue group hint: You might try to do this with a pinball machine.

Purple group hint: Not imprisoned.

Answers for today’s Connections groups

Yellow group: Things stored by a browser.

Advertisement

Green group: Boxing terms.

Blue group: Tilt.

Purple group: Free ____.

Read more: Wordle Cheat Sheet: Here Are the Most Popular Letters Used in English Words

Advertisement

What are today’s Connections answers?

completed NYT Connections puzzle for April 14, 2026

The completed NYT Connections puzzle for April 14, 2026.

NYT/Screenshot by CNET

The yellow words in today’s Connections

The theme is things stored by a browser. The four answers are bookmark, cache, cookie and history.

The green words in today’s Connections

The theme is boxing terms. The four answers are bell, gloves, ring and round.

Advertisement

The blue words in today’s Connections

The theme is tilt. The four answers are lean, list, pitch and tip.

The purple words in today’s Connections

The theme is free ____. The four answers are lance, mason, style and way.

Source link

Advertisement
Continue Reading

Tech

Xbox CEO called Game Pass ‘too expensive for players’ in a leaked memo

Published

on

Xbox’s new chief exec, Asha Sharma, has only been in charge for a few months but things already seem like they might be changing for the better. Or at the very least, they might be getting cheaper. The Verge reported that the new Xbox CEO wrote a memo to employees addressing the current pricing of the Game Pass subscription service.

“Game Pass is central to gaming value on Xbox. It’s also clear that the current model isn’t the final one,” Sharma allegedly said. “Short term, Game Pass has become too expensive for players, so we need a better value equation. Long term, we will evolve Game Pass into a more flexible system which will take time to test and learn around.”

After Microsoft upped the price for Game Pass twice within 15 months, many of us certainly felt that the service had gotten too costly to keep. Xbox is still offering a wide range of titles on Game Pass; the April update is adding indies like Hades 2 and new Double Fine project Kiln alongside AAA hits like the remake of Call of Duty: Modern Warfare. The Verge‘s sources suggested that the addition of the CoD franchise might have been a factor in some of the Game Pass price increases, since Microsoft would lose out on revenue by making the latest entries in the series available under the subscription.

It’s too early to say whether this memo from Sharma means Xbox is on the brink of a resurgence. And there are changes the company could make, like adding ever more complicated tiers, that would further hamper interest and uptake of Game Pass. But acknowledging the problem, even internally, is refreshing to see after so many baffling moves from Xbox in recent years.

Advertisement

Source link

Continue Reading

Tech

High earners quietly slow down AI usage as new data shows accuracy beating speed in real workplace decision making

Published

on


  • Top earners use AI tools to verify decisions before execution, not to create ideas
  • Executives now prioritize accuracy and error prevention over speed in AI workflows
  • Mid-level professionals rely less on AI for structured decision validation processes

The early narrative around artificial intelligence promised speed, scale, and unprecedented output.

A different picture is now emerging from recent survey data collected by Use.AI which found high-earning professionals are not racing to produce more content faster.

Source link

Advertisement
Continue Reading

Tech

Is Stardew Valley cross-platform? – Digital Trends

Published

on

Despite indie darling Stardew Valley only being built by a single developer, you certainly wouldn’t know it by the amount of support the game has received since its launch in 2016. Regular updates, ports to other platforms, and even a fully-fledged online multiplayer mode make the game feel essentially endless. In fact, it’s one of Digital Trends’ top 50 video games of all time.

With Stardew Valley’s 1.6 update adding that multiplayer mode, fans have been begging for cross-platform play, as well as cross-progression. So, if you’re looking to recruit some fellow agriculture enthusiasts or some farming friends, read on to find out whether or not you can pull them from across console, PC, and mobile.

Is Stardew Valley cross-platform?

While developer ConcernedApe has worked in an awful lot of new content, at the time of writing (October 2025) Stardew Valley still does not offer cross-platform support, so you’ll need to play with friends on the same platform.

One reason for this could be that, since it launched in 2016, Stardew Valley predates the big cross-platform push spearheaded by the likes of Fortnite.

Advertisement

As a result, you’ll need to play on PlayStation 4, PlayStation 5, Xbox One, Xbox Series X, Nintendo Switch, or PC with other players on the same system, but you can at least enjoy multiplayer thanks to the 1.6 update.

Back in 2018, one fan asked ConcernedApe if cross-platform play is likely to come to the farming sim.

“Unfortunately, there will not be crossplay. Apparently, the technical barriers are very high. It’s still something I really want to add and I promise to look into it more closely, but first priority is getting the update out there,” he responded, and the trail has gone quiet since.

As for cross-save, that’s not here either. You can’t save on your PC and pick up where you left off on your Xbox, for example, or jump between Nintendo Switch and PlayStation.

Arguably the closest you’ll get is using Steam’s Cloud Save functionality to play on PC and then pick up on a laptop or Steam Deck, but that won’t be a solution that suits everyone.

Advertisement

Haunted Chocolatier, the next game from ConcernedApe, is certainly looking promising, so here’s hoping cross-platform play and cross-save make it into that one at least. And hey, who knows? Maybe the dev will surprise us with crossplay and cross-save in the future.

Current status in 2026

The most relevant recent change is not full crossplay, but experimental multiplayer on mobile. Stardew Valley’s official mobile multiplayer guide confirms that Android and iOS now have a hidden experimental multiplayer feature tied to the 1.6 mobile release.

Which Stardew Valley platforms can play together?

  • Windows, Mac, and Linux: Yes
  • PlayStation with PlayStation: Yes
  • Xbox with Xbox: Yes
  • Switch with Switch: Yes
  • PC with console: No
  • PlayStation with Xbox or Switch: No
  • Console with mobile: No standard crossplay
  • Mobile with PC: Experimental only, with setup required

So if the goal is easy co-op with friends, the safest advice is still painfully boring: buy the game on the same platform.

What about Stardew Valley mobile multiplayer?

This is the one part of the answer that now needs nuance.

According to the official Stardew Valley mobile multiplayer guide, Android and iOS have a hidden experimental multiplayer mode. It isn’t enabled like standard multiplayer, and it comes with extra steps. Players need to be on the same game version, connect by IP, and often be on the same local network unless they’re using more advanced setup methods such as port forwarding. The official guide also warns that the feature is experimental and may have bugs or save-related issues.

Advertisement

That means mobile multiplayer exists, but it isn’t polished, full-featured crossplay. It’s closer to an official experimental workaround than a seamless “buy anywhere, play anywhere” system.

Does Stardew Valley have cross-save?

No. Stardew Valley still doesn’t offer broad, official cross-save or cross-progression across its major platform ecosystems. A save on Switch, for example, isn’t meant to flow neatly into Xbox, PlayStation, or PC in the way players now expect from fully connected live-service games.

Why doesn’t Stardew Valley have full crossplay?

Part of the answer is timing. Stardew Valley launched in 2016, long before full cross-platform support became an expected multiplayer feature for almost every popular co-op game. Multiplayer support expanded over time, and the current game supports up to eight players in multiplayer in supported environments, but that still doesn’t mean broad crossplay across every platform family.

In other words, Stardew Valley has multiplayer, but not the universal version modern players expect.

Advertisement

Stardew Valley cross-platform status in 2026

Stardew Valley still isn’t fully cross-platform in 2026. PC players can play together across Windows, Mac, and Linux. Console players generally need to stay within their own platform ecosystem. Mobile now has an official experimental multiplayer option, including the ability to connect in ways that blur the old boundaries a bit, but it’s still limited, hidden, and far from full crossplay.

If the goal is to start a farm with friends and avoid technical nonsense, everyone should still plan to buy the same version on the same platform. It’s not glamorous advice, but it beats discovering too late that your multiplayer plans were built on wishful thinking and turnips.

Source link

Advertisement
Continue Reading

Tech

Agentic coding at enterprise scale demands spec-driven development

Published

on

Presented by AWS


Autonomous agents are compressing software delivery timelines from weeks to days. The enterprises that scale agents safely will be the ones that build using spec-driven development.

There’s a moment in every technology shift where the early adopters stop being outliers and start being the baseline. We’re at that moment in software development, and most teams don’t realize it yet.

A year ago, vibe coding went viral. Non-developers and junior developers discovered they could build beyond their abilities with AI. It lowered the floor. It made prototyping much quicker, but it also introduced a surplus of slop. What the industry then needed was something that raised the ceiling — something that improved code quality and worked the way the most expert developers work. Spec-driven development did that. It laid the foundation for trustworthy autonomous coding agents.

Advertisement

Specs are the trust model for autonomous development

Most discussions of AI-generated code focus on whether AI can write code. The harder question is whether you can trust it. The answer runs directly through the spec.

Spec-driven development starts with a deceptively simple idea: before an AI agent writes a single line of code, it works from a structured, context-rich specification that defines what the system is supposed to do, what its properties are, and what “correct” actually means. That specification is an artifact the agent reasons against throughout the entire development process — fundamentally different from pre-agentic AI approaches of writing documentation after the fact.

Enterprise teams are building on this foundation. The Kiro IDE team used Kiro to build Kiro IDE — an agentic coding environment with native spec-driven development — cutting feature builds from two weeks to two days. An AWS engineering team completed an 18-month rearchitecture project, originally scoped for 30 developers, with six people in 76 days using Kiro. An Amazon.com engineering team rolled out “Add to Delivery” — a feature that lets shoppers add items after checkout — two months ahead of schedule by using Kiro and spec-driven development. Alexa+, Amazon Finance, Amazon Stores, AWS, Fire TV, Last Mile Delivery, Prime Video, and more all integrate spec-driven development as part of their build approaches.

That shift changes everything downstream.

Advertisement

Verifiable testing is what makes autonomous agents safe to run

The spec becomes an automated correctness engine. When a developer is generating 150 check-ins per week with AI assistance, no human can manually review that volume of code. Instead, code built against a concrete specification can be verified through property-based testing and neurosymbolic AI techniques that automatically generate hundreds of test cases derived directly from the spec, probing edge cases no human would think to write by hand. These tests prove that the code satisfies the spec’s defined properties, going well beyond hand-written test suites to provably correct behavior.

Verifiable testing enables the shift from one-shot programming to continuous autonomous development. Traditional AI-assisted development operates as a single shot: you give the agent a spec, the agent produces output, and the process ends. Today’s agents continuously correct themselves, feeding build and test failures back into their own reasoning, generating additional tests to probe their own output, and iterating until they produce something both functional and verifiable. The spec is the anchor that keeps that loop from drifting. Instead of developers constantly checking in to see if the agent is making the right decisions, the agent can check itself against the spec to make sure it is on the right path.

The autonomous agent of the future will write its own specs, using specifications as the mechanism for self-correction, for verification, for ensuring that what it produces matches the intended behavior of the system.

Multi-agent, autonomous, and running right now

The developers setting the pace today operate in a fundamentally different way. Developers spend significant time building their spec, as well as writing steering files used by the spec to make sure the agent knows what and how to build — more time than their agent may spend building the actual software. They run multiple agents in parallel to critique a problem from different perspectives, as well as run multiple specs, each written for a different component of the system they are building. They let agents run for hours, sometimes days. They use thousands of Kiro credits because the output justifies it.

Advertisement

A year ago, agents would lose context and fall apart after 20 minutes. Now, every week you can run them longer than the week before. Agentic capabilities have improved significantly in the last six months that genuinely complex problems are tractable. Newer LLMs are more token-efficient than the previous generation, so for the same spend, you get dramatically more done.

The challenge is that doing this well requires deep expertise. The tools, methodologies, and infrastructure exist, but orchestrating them is hard. The goal with Kiro is to bring these capabilities with deep expertise to every developer, not just the top one percent who’ve figured it out.

Infrastructure is catching up to ambition

Agents will be ten times more capable within a year. That’s the rate of improvement we’re seeing week over week.

The infrastructure to support that level of capability is converging at the same time. Agents are now running in the cloud rather than locally, executing in parallel at scale with secure, reliable communication between agent systems. Organizations can now run agentic workloads the way they’d run any enterprise-grade distributed system — with governance, cost controls, and reliability guarantees that serious software demands. Spec-driven development is the architecture of tomorrow’s autonomous systems.

Advertisement

Developers are no longer restricted by how they want to solve the problem. The developers who thrive in this world are the ones building that foundation now: using spec-driven development, prioritizing testability and verification from the start, working with agents as collaborators, and thinking in systems instead of syntax.

Deepak Singh is VP of Kiro at AWS.


Sponsored articles are content produced by a company that is either paying for the post or has a business relationship with VentureBeat, and they’re always clearly marked. For more information, contact sales@venturebeat.com.

Source link

Advertisement
Continue Reading

Tech

Stop Killing Games backs California bill supporting clearer end-of-life rules for online games

Published

on


Stop Killing Games is backing a new bill from Chris Ward, a member of the California State Assembly since 2020. Introduced earlier this year, the Protect Our Games Act would require gaming companies to make clear commitments to long-term support for “server-connected” video games. The bill has undergone a significant…
Read Entire Article
Source link

Continue Reading

Tech

Linux 7.0 Released – Slashdot

Published

on

“The new Linux kernel was released and it’s kind of a big deal,” writes longtime Slashdot reader rexx mainframe. “Here is what you can expect.” Linuxiac reports: A key update in Linux 7.0 is the removal of the experimental label from Rust support. That (of course) does not make Rust a dominant language in kernel development, but it is still an important step in its gradual integration into the project. Another notable security-related change is the addition of ML-DSA post-quantum signatures for kernel module authentication, while support for SHA-1-based module-signing schemes has been removed.

The kernel now includes BPF-based filtering for io_uring operations, providing administrators with improved control in restricted environments. Additionally, BTF type lookups are now faster due to binary search. At the same time, this release continues ongoing cleanup in the kernel’s lower layers. The removal of linuxrc initrd code advances the transition to initramfs as the sole early-userspace boot mechanism.

Linux 7.0 also introduces NULLFS, an immutable and empty root filesystem designed for systems that mount the real root later. Plus, preemption handling is now simpler on most architectures, with further improvements to restartable sequences, workqueues, RCU internals, slab allocation, and type-based hardening. Filesystems and storage receive several updates as well. Non-blocking timestamp updates now function correctly, and filesystems must explicitly opt in to leases rather than receiving them by default. Phoronix has compiled a list of the many exciting changes.

Linus Torvalds himself announced the release, which can be downloaded directly from his git tree or from the kernel.org website.

Advertisement

Linux 7.0 has a major new version number but it’s “largely a numbering reset […], not a sign of some unusually disruptive release,” notes Linuxiac.

Source link

Continue Reading

Trending

Copyright © 2025