Connect with us

Tech

A premium 4K projector under $1,000 is the kind of deal home theater fans wait for

Published

on

Projectors usually fall into one of two buckets: cheap models that look underwhelming the second you turn them on, or premium ones that feel great until you see the price. This deal lands in a very appealing middle ground. The XGIMI HORIZON Ultra is down to $998.98 for a limited time, which is a big drop from $1,699.99. That’s a 41% discount on a projector that’s clearly aimed at people who want a real living-room upgrade, not a toy for occasional use.

What you’re getting

The HORIZON Ultra is a 4K projector with Dolby Vision, 2300 ISO lumens, and dual light technology that combines LED and laser light sources. XGIMI also lists 3840 x 2160 resolution, built-in Bluetooth, and a set of smart image features like auto focus, auto obstacle avoidance, and auto screen alignment.

This isn’t a barebones projector where you’re expected to do all the work yourself. XGIMI says it uses its Intelligent Screen Adaption 3.0 system to adjust screen correction, handle wall color, and make setup smoother. That matters because the difference between “I use this all the time” and “this was a fun idea” often comes down to how annoying setup is.

It also includes 2 x 12W Harman Kardon speakers, plus Wi-Fi and Bluetooth, which makes it easier to use as an all-in-one entertainment device instead of immediately needing to add more stuff to your cart just to make things happen.

Advertisement

Why it’s worth it

This deal works because the HORIZON Ultra checks the boxes people actually care about. It’s bright enough to be practical, it supports premium HDR-friendly viewing with Dolby Vision, and it has the kind of built-in intelligence that makes everyday use feel easier instead of fiddly. That is exactly what you want if this projector is going in a living room, media room, or shared space where people want to press play, not troubleshoot.

The 2300 ISO lumens spec is the part that helps this feel more serious than the flood of bargain projectors online. It gives you more flexibility for rooms that aren’t perfectly dark, which is important in the real world, where not everyone is building a blacked-out theater cave. And the 200-inch image potential is the kind of thing that reminds you why projectors are fun in the first place: this can create a much bigger-feeling setup than most TVs, especially for movies and sports.

The bottom line

At $998.98, the XGIMI HORIZON Ultra feels like the sweet spot version of a premium projector buy. You’re getting 4K, Dolby Vision, strong brightness, smart setup features, and built-in speakers in a package that now costs hundreds less than usual. If you’ve been waiting for a home theater upgrade that feels substantial without going fully overboard, this is a very easy deal to like

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Antarctica’s Massive Neutrino Observatory Gets an Upgrade

Published

on

There’s already 5,000 sensors embedded in Antarctica’s ice to look for evidence of neutrinos, reports the Washington Post. But in November scientists drilled six new holes at least a mile and a half deep and installed cables with hundreds more light detectors — an upgrade to the massive 15-year-old IceCube Neutrino Observatory to detect the charged particles produced by lower-energy neutrinos interacting with matter:


When they do, the neutrinos produce charged particles that travel through the ice at nearly the speed of light, creating a blue glow called Cherenkov radiation… “Within the first couple years, we should be making much better measurements,” [said Erin O’Sullivan, an associate professor of physics at Uppsala University in Sweden and a spokesperson for the project.] “There’s hope to expand the detector, by an order of magnitude in volume, so the important thing there is we’re not just seeing a few neutrino point sources, but we’re starting to be a true telescope. … That’s really the dream.”

The scientists spent seven years planning the upgrade, according to the article. “To drill holes a mile and a half deep takes about 30 hours, and 18 more hours to return to the surface,” the article points out. “Then, the race begins because almost immediately, the hole starts to shrink as the water refreezes.” (“If it takes too much time, the principal investigator says, “the instruments don’t fit in anymore!”)

Advertisement

Source link

Continue Reading

Tech

The Xiaomi 17 arrives globally to rival the Galaxy S26 and iPhone 17

Published

on

Xiaomi has officially launched the Xiaomi 17 globally, and it’s a direct rival to the just-revealed Galaxy S26 and the ever-popular iPhone 17.

Despite its smaller footprint, the company is promising full “Pro-level” power, particularly in camera performance and battery life.

At the centre of the Xiaomi 17 is a new Leica-engineered triple-camera system. The main 50MP shooter uses a 1/1.31-inch Light Fusion 950 sensor with a bright f/1.67 Leica Summilux lens, designed to pull in more light and reduce motion blur in low-light scenes. Xiaomi claims a 13.5EV dynamic range, which should help preserve detail in both shadows and highlights.

Backing it up is a 50MP 60mm floating telephoto lens capable of 5x optical-level zoom and 10cm macro photography. It also offers up to 20x AI-assisted zoom, plus a 50MP ultra-wide camera. On the front, there’s a 50MP selfie camera with improved autofocus and auto-framing.

Advertisement

Advertisement

Video capabilities stretch to 8K at 30fps and 4K Dolby Vision recording at up to 60fps. Additionally, Log recording is available for more flexible post-production.

Gaming on the Xiaomi 17Gaming on the Xiaomi 17
Image Credit (Trusted Reviews)

Powering the device is the Snapdragon 8 Elite Gen 5 platform, built on a 3nm process. Xiaomi says this delivers a 20% CPU boost and 23% GPU uplift, alongside notable efficiency gains.

That efficiency matters, given the sizeable 6,330mAh silicon-carbon battery inside — unusually large for a compact 6.3-inch device. It supports 100W wired HyperCharge and 50W wireless charging, as well as reverse wired charging.

The 6.3-inch CrystalRes OLED display features a 1–120Hz LTPO adaptive refresh rate, 2,656 x 1,220 resolution and peak brightness of 3,500 nits. Xiaomi has also reduced bezels to 1.18mm using upgraded LIPO technology. As a result, this gives the phone a distinctly modern edge-to-edge look.

Advertisement

Design remains minimalist, with curved “Golden Arc” corners and matte glass finishes in Venture Green, Ice Blue, Alpine Pink and Black. The aluminium frame and Xiaomi Shield Glass contribute to IP68 protection.

Advertisement

With flagship imaging, a high-density battery and next-gen silicon in a compact 191g body, the Xiaomi 17 is clearly aimed at users who want top-tier performance without stepping up to a larger Pro model.

The real test, though, will be how it stacks up against Samsung and Apple. We’ll soon find out.

Advertisement

Source link

Continue Reading

Tech

This Is the System That Intercepted Iran’s Missiles Over the UAE

Published

on

Missile defense begins with sensors that can detect a launch within seconds. One of the key radars used with THAAD is the AN/TPY-2, a high-frequency X-band radar designed to track small, fast-moving objects at long distances.

Image may contain Airport Adult Person Furniture and Table

BARAK (top), PAC-3 MSE (middle) and THAAD (bottom) missiles from Lockheed Martin.

Photograph: Leon Neal/Getty Images

The radar can detect and track ballistic missiles hundreds of kilometers away, following objects traveling at hypersonic speeds and transmitting that data to command centers in real time.

Once a missile launch is detected, defense systems calculate its trajectory and determine where the missile will be at a given moment in flight. Interceptors are then launched to meet it at that exact point in space.

Advertisement

Why Intercepting Ballistic Missiles Is So Hard

Ballistic missiles travel extremely fast. Some reach speeds of more than 20,000 kilometres per hour, fast enough to cross the entire UAE in just a few minutes. Because of those speeds, defense systems often have only minutes to detect, track. and intercept a missile before it descends toward its target.

To respond within that narrow window, missile defense systems rely on multiple technologies working together: early-warning sensors to detect launches, radar networks to track the threat, and interceptor missiles designed to destroy it mid-flight.

The expansion of missile defense systems across the Gulf has been driven largely by the rapid development of ballistic missile arsenals in the region. Iran is widely considered to possess one of the largest ballistic missile inventories in the Middle East.

As a result, Gulf countries have spent more than a decade investing in radar systems, interceptors, and command networks designed to protect critical infrastructure, major cities, and military facilities. The UAE hosts several major military installations, including Al Dhafra Air Base, which houses both Emirati and US forces.

Advertisement

Even when a missile is successfully destroyed, the danger does not disappear entirely.

Intercepted missiles can break apart at high altitude, sending fragments falling back toward the ground. In some cases, debris can still cause damage if it lands in populated areas. Saturday’s incident illustrates that risk: Although incoming missiles were intercepted before impact, falling debris from one interception killed a civilian in Abu Dhabi.

This story originally appeared on WIRED Middle East.

Source link

Advertisement
Continue Reading

Tech

Xiangyi Cheng Brings AR to Classrooms and Hospitals

Published

on

When Xiangyi Cheng published her first journal paper as a principal investigator in IEEE Access in 2024, it marked more than a professional milestone. For Cheng, an IEEE member and an assistant professor of mechanical engineering at Loyola Marymount University, in Los Angeles, it was the latest waypoint in a career shaped by curiosity, persistence, and a belief that technology should serve people—not the other way around.

The paper’s title was “Mobile Devices or Head-Mounted Displays: A Comparative Review and Analysis of Augmented Reality in Healthcare.”

XIANGYI CHENG

Employer

Advertisement

Loyola Marymount University, in Los Angeles

Title

Assistant professor of mechanical engineering

Member grade

Advertisement

Member

Alma maters

China University of Mining and Technology; Texas A&M University

Cheng’s work spans robotics, intelligent systems, human-machine interaction and artificial intelligence. It has applications in patient-specific surgical planning, an approach whereby treatment is customized to the anatomy and clinical needs of each individual.

Advertisement

Her research also covers wearables for rehabilitation and augmented-reality-enhanced engineering education.

The throughline of her career is sound judgment based on critical thinking. She urges her students to avoid the temptation to accept the answers they’re given by AI without cross-checking them against their own foundational understanding of the subject matter.

“AI can give you ideas,” Cheng says, “but it should never lead your thinking.”

That principle—honed through uncertainty, disciplinary shifts, and hard-earned confidence—has made Cheng an emerging voice in applied intelligent systems and a thoughtful educator preparing students for an AI-saturated world.

Advertisement

From Xi’an to Beijing: A mind drawn to mathematics

Cheng, born in Xi’an, China, grew up in a household shaped by her parents’ disparate careers. Her father was a mining engineer, and her mother taught Chinese and literature at a high school.

“That contrast between logical and literary thinking helped me understand myself early,” Cheng says. “I liked math, and STEM felt natural to me.”

Several teachers reinforced her inclination, she says, particularly a math teacher whose calm, fair approach emphasized reasoning over punishments such as detention for misbehavior or failure to complete assignments.

“It wasn’t about being right,” Cheng says. “It was about thinking clearly.”

Advertisement

She moved to Beijing in 2011 to attend the China University of Mining and Technology , where she studied mechanical engineering. After graduating with a bachelor’s degree in 2015, she was unsure where the field would take her.

An IEEE paper changed her trajectory

Later in 2015, she traveled to the United States to study at Case Western Reserve University, in Cleveland.

She initially viewed the move as exploratory rather than a long-term commitment.

“I wasn’t thinking about a Ph.D.,” she says. “I wasn’t even sure research was for me.”

Advertisement

That uncertainty shifted in 2017, when Cheng submitted her “IntuBot: Design and Prototyping of a Robotic Intubation Device” paper to the IEEE International Conference on Robotics and Automation (ICRA)—which was accepted.

“AI can give you more possibilities, but thinking is still our responsibility.”

Intubation is a procedure in which an endotracheal tube is inserted into a patient’s airway—usually through the mouth—to help them breathe. Because placing the tube correctly is not simple and usually must be done quickly, it requires training. That’s why research into robotic or assisted intubation systems focuses on improving speed, accuracy, and safety.

She presented her findings at ICRA in 2018, giving her early exposure to a global research community.

Advertisement

“That acceptance gave me confidence,” she recalls. “It showed me I could contribute to the field.”

Her advisor at Case Western encouraged her to switch from the mechanical engineering master’s program to the Ph.D. track. When the advisor moved to Texas A&M University, in College Station, in 2019, Cheng decided to transfer. She completed her Ph.D. in mechanical engineering at Texas A&M in 2022.

Although she didn’t earn a degree from Case Western, she credits her experience there with clarifying her professional direction.

Shortly after graduating with her Ph.D., Cheng was hired as an assistant professor of mechanical engineering at Ohio Northern University, in Ada. She left in 2024 to become an assistant professor at Loyola Marymount.

Advertisement

Engineering for the body—and the classroom

Cheng’s research focuses on human-centered engineering, particularly in health care. One of her major projects addresses syndactyly, a congenital condition in which a newborn’s fingers are fused at birth. Surgeons rely on their experience to estimate the size and shape of skin grafts to be taken from another part of the body for the corrective surgery.

She is developing technology to scan the patient’s hand, extract anatomical landmarks, and use finite element analysis—a computer-based method for predicting how a physical object will behave under real-world conditions—to determine the optimal graft size and shape.

Smiling portrait of Xiangyi Cheng. Xiangyi Cheng designs human-centered intelligent systems with applications in health care and education.Xiangyi Cheng

“Everyone’s hand is different,” Cheng says. “So the surgery should be personalized.”

Another project centers on developing smart gloves to assist with hand rehabilitation, pairing the unaffected hand with the injured one so the person’s natural motion can help guide therapy.

Advertisement

She also is exploring augmented reality in engineering education, using immersive visualization and AI tools to help students grasp three-dimensional concepts that are difficult to convey through traditional learning tools. Such visualization lets students see and interact with a digital world as if they’re inside it instead of viewing it on a flat screen.

Teaching balance in an AI-driven world

Despite working at the forefront of AI-enabled systems, Cheng cautions her students to be judicious in their use of the technology so that they don’t rely on it too heavily.

“AI is not always right and perfect,” she says. “You still need to be able to judge whether the answers it provides are correct.”

As AI continues to reshape engineering, Cheng remains grounded in a simple principle, she says: “We should use these tools. But we should never let them replace our judgment. AI can give you more possibilities, but thinking is still our responsibility.”

Advertisement

In her lab and classroom, Cheng prioritizes independent thinking, critical evaluation, and persistence. Many of her research students are undergraduates, and she encourages them to take ownership of their work—planning ahead, testing ideas, and learning from failure.

“The students who succeed don’t give up easily,” she says.

What she finds most rewarding, she says, is watching students mature. Reserved first-year students often become confident seniors who can present complex work and manage demanding projects.

“Getting to witness that transformation is why I teach,” she says.

Advertisement

For students considering engineering, Cheng offers straightforward advice: “Focus on mathematics. Engineering looks hands-on, but math is the foundation behind everything.”

With practice and persistence, she says, students can succeed and find meaning in the field.

Why IEEE continues to matter

Cheng joined IEEE in 2017, the year she submitted her first paper to ICRA. The organization has remained central to her professional development, she says.

She has served as a reviewer for IEEE journals and conferences including Robotics and Automation Letters, Transactions on Medical Robotics and Bionics, Transactions on Robotics, the International Conference on Intelligent Robots and Systems, and ICRA.

Advertisement

IEEE’s interdisciplinary scope aligns naturally with her work, she says, adding that the organization is “one of the few places that truly welcomes research across boundaries.”

More personally, IEEE helped her see a future she had not initially imagined.

“That first conference was a turning point,” she says. “It helped me realize I belonged.”

From Your Site Articles

Advertisement

Related Articles Around the Web

Source link

Continue Reading

Tech

QuickLens Chrome extension steals crypto, shows ClickFix attack

Published

on

Chrome

Chrome attack

A Chrome extension named “QuickLens – Search Screen with Google Lens” has been removed from the Chrome Web Store after it was compromised to push malware and attempt to steal crypto from thousands of users.

QuickLens was initially published as a Chrome extension that lets users run Google Lens searches directly in their browser. The extension grew to roughly 7,000 users and, at one point, received a featured badge from Google.

However, on February 17, 2026, a new version 5.8 was released that contained malicious scripts that introduced ClickFix attacks and info-stealing functionality for those using the extension.

Wiz

The malicious QuickLens extension

Security researchers at Annex first reported that the extension had recently changed ownership after being listed for sale on ExtensionHub, a marketplace where developers sell browser extensions.

Annex says that on February 1, 2026, the owner changed to support@doodlebuggle.top under “LLC Quick Lens,” with a new privacy policy hosted on a barely functional domain. Just over two weeks later, the malicious update was pushed to users.

Advertisement

Annex’s analysis shows that version 5.8 requested new browser permissions, including declarativeNetRequestWithHostAccess and webRequest.

It also included a rules.json file that stripped browser security headers, such as  Content-Security-Policy (CSP), X-Frame-Options, and X-XSS-Protection, from all pages and frames. These headers would have made it more difficult to run malicious scripts on websites.

The update also introduced communication with a command-and-control (C2) server at api.extensionanalyticspro[.]top. According to Annex, the extension generated a persistent UUID, fingerprinted the victim’s country using Cloudflare’s trace endpoint, identified the browser and OS, and then polled the C2 server every five minutes for instructions.

BleepingComputer learned about the extension this week after seeing numerous users [1, 2] reporting fake Google Update alerts on every web page they visited.

Advertisement

“That is appearing in every site i go, i through it could be because Chrome wasn’t updated, but even after uptading it continues to appear,” a user seeking help said on Reddit.

“Of course i will not run the code that it copy on my clipboard on the run box but it keeps appearing in every site, making it impossible to interact with anything.”

BleepingComputer’s analysis of the extension showed it connected to a C2 server at https://api.extensionanalyticspro[.]top/extensions/callback?uuid=[uuid]&extension=kdenlnncndfnhkognokgfpabgkgehoddto, where it received an array of malicious JavaScript scripts.

These payloads were then executed on every page load using a technique that Annex described as a “1×1 GIF pixel onload trick.”

Advertisement
Array of malicious JavaScript payloads
Array of malicious JavaScript payloads
Source: BleepingComputer

Because the extension stripped CSP headers on all visited sites, this inline JavaScript execution worked even on sites that would normally block it.

The first payload contacts google-update[.]icu, where it receives an additional payload that displays a fake Google Update prompt. Clicking the update button would display a ClickFix attack, prompting users to perform a verification by running code on their computers.

Fake Google Update alert leading to a ClickFix attack
Fake Google Update alert leading to a ClickFix attack
Source: Reddit [1, 2]

For Windows users, this led to the download of a malicious executable named “googleupdate.exe” [VirusTotal] that was signed with a certificate from “Hubei Da’e Zhidao Food Technology Co., Ltd.”

Upon execution, the malware launched a hidden PowerShell command that spawned a second PowerShell instance to connect to drivers[.]solutions/META-INF/xuoa.sys using a custom “Katzilla” user agent.

The response was piped into Invoke-Expression for execution. However, by the time BleepingComputer analyzed the payloads, the second-stage URL was no longer serving any malicious content.

Another malicious JavaScript “agent” delivered by the https://api.extensionanalyticspro[.]top C2 was used to steal cryptocurrency wallets and credentials.

Advertisement

The extension would detect if MetaMask, Phantom, Coinbase Wallet, Trust Wallet, Solflare, Backpack, Brave Wallet, Exodus, Binance Chain Wallet, WalletConnect, and the Argon crypto wallets were installed. If so, it would attempt to steal activity and seed phrases, which would be used to hijack wallets and steal their assets.

Another script captured login credentials, payment information, and other sensitive form data.

Additional payloads were used to scrape Gmail inbox contents, extract Facebook Business Manager advertising account data, and collect YouTube channel information.

A review of the now-removed Chrome extension page claims that macOS users were targeted with the AMOS (Atomic Stealer) infostealer. BleepingComputer has not been able to independently verify if these claims are true.

Advertisement

Google has since removed QuickLens from the Chrome Web Store, and Chrome now automatically disables it for affected users.

QuickLens disabled and flagged as malware by Chrome
QuickLens disabled and flagged as malware by Chrome
Source: BleepingComputer

Users who installed QuickLens – Search Screen with Google Lens should ensure the extension is fully removed, scan their device for malware, and reset passwords for any credentials stored in the browser.

If you use any of the mentioned cryptocurrency wallets, you should transfer your funds to a new wallet.

This extension is not the first to be used in ClickFix attacks. Last month, Huntress discovered a browser extension that intentionally crashed browsers and then displayed fake fixes that installed the ModeloRAT malware.

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Advertisement

Source link

Continue Reading

Tech

Hacked Prayer App Sends ‘Surrender’ Messages to Iranians Amid Israeli and US Strikes

Published

on

Residents across Tehran and other Iranian cities were jolted awake by sounds of loud explosions in the early hours of Saturday morning, as Israel and the US launched joint attacks on Iran.

The attacks, which the US and Israel are calling “preemptive strikes,” come after a period of failed negotiations between the countries, and on the heels of mass protests in Iran earlier this year that saw the death of at least 3,117 civilians, according to government statistics.

Shortly after the first set of explosions, Iranians received bursts of notifications on their phones. They came not from the government advising caution, but from an apparently hacked prayer-timing app called ‘BadeSaba Calendar’ that has been downloaded more than 5 million times from the Google Play Store.

The messages arrived in quick succession over a period of 30 minutes, starting with the phrase ‘Help Has Arrived’ at 9:52 am Tehran time, shortly after the first set of explosions. No party has claimed responsibility for the hacks.

Advertisement

Screenshots shared with WIRED Middle East show messages urging Iranian military personnel to surrender their weapons with the promise of amnesty. They also urged army personnel to join “the forces of liberation” and to “defend your brothers.”

Image may contain Text Electronics Mobile Phone Phone and Credit Card

The push notifications are all titled “Help is on the way”, and call on Iranian military members to surrender.

Screenshot: WIRED Middle East

“The time for revenge has come,” one notification received at 10:02 am read (translated from Farsi). “The regime’s repressive forces will pay for their cruel and merciless actions against the innocent people of Iran. Anyone who joins in defending and protecting the Iranian nation will be granted amnesty and forgiveness.”

“For the freedom of our Iranian brothers and sisters, this is a call to all oppressive forces—lay down your weapons or join the forces of liberation. Only in this way can you save your lives. For a free Iran,” another message sent at 10:14 am read.

Advertisement

Cybersecurity analysts confirmed that BadeSabah users had received notifications around the time of the strikes, but have not been able to identify the source of the hack. “At this point, we genuinely do not know who is behind them, whether it was Israel or other anti-government Iranian groups,” says Narges Keshavarznia, digital rights researcher at the Miaan Group, adding that no hacker group has claimed credit.

“Attribution in cases like this is always complex, and it’s still too early to draw conclusions.”

​​Morey Haber, the chief security advisor at BeyondTrust, however, pointed out that a cyber operation of this nature would almost certainly have been planned in advance.

“The compromise of assets [likely] happened some time ago, and these messages of ‘help’ were timed” strategically, he claims. “This is not a smash-and-grab style of attack. It is nation-state versus nation-state and is being executed with intent and precision.”

Advertisement

Iran on Saturday launched retaliatory kinetic attacks targeting key military bases across the Middle East. Explosions were reported in Bahrain, Kuwait, the UAE, and Qatar on Saturday, including multiple missiles that were intercepted.

Digital Blackout, Cyber Warfare

As the war unfolds, the Iranian public has already faced internet blackouts and weeks of severely reduced connectivity. “The country has been experiencing a widespread internet disruption, and access to the internet has significantly decreased in several parts of the country, including Tehran,” Keshavarznia says.

According to internet monitoring tool NetBlocks, overall network traffic has dropped to 4 percent. Data from ArvanCloud’s Radar monitoring system, an Iranian-operated cloud service, indicates that many of the country’s main data centers and domestic PoP sites have either lost connectivity to the international internet or are experiencing severe disruption, Keshavarznia pointed out.

Communication networks are also down with outages in phone lines and SMS services, and severe degradation of both mobile data and fixed broadband connections. “Incoming international calls to Iran are also reportedly affected. Even using VPNs has become extremely difficult,” she says.

Advertisement

Source link

Continue Reading

Tech

‘World’s Largest Battery’ Soon At Google Data Center: 100-Hour Iron-Air Storage

Published

on

Interesting Engineering reports:

US tech giant Google announced on Tuesday that it will build a new data center in Pine Island, Minnesota. The new facility will be powered by 1.9 gigawatts (GW) of clean energy from wind and solar, coupled with a 300-megawatt battery, claimed to be the ‘world’s largest’, with a 30-gigawatt-hour (GWh) capacity and 100-hour duration… The planned battery would dwarf a 19 GW lithium-ion project in the UAE…

Form Energy’s batteries work very differently from most large batteries today. Instead of using lithium like the batteries in electric cars, they store electricity by making iron rust and then reversing the rusting process to release the energy when needed… Form’s iron-air batteries are heavier and less efficient than their counterparts; they can only return about 50% to 70% of the energy used to charge them, while lithium-ion batteries return more than 90%. However, Form’s batteries have one distinct advantage. They are cheaper than lithium-ion batteries, costing about $20 per kilowatt-hour of storage, which is almost three times as cheap… It will store 150 MWh of electricity and can supply to the grid for up to 100 hours, delivering about 1.5 MW at peak output.

Thanks to long-time Slashdot reader schwit1 for sharing the article.

Source link

Advertisement
Continue Reading

Tech

Palantir Sues Swiss Magazine For Accurately Reporting That The Swiss Government Didn’t Want Palantir

Published

on

from the surveillance-streisand dept

If you run a company whose entire value proposition is the ability to see patterns, predict outcomes, and connect dots that others miss, you’d think someone in the building might have flagged that suing a small independent magazine over unflattering-but-accurate reporting would only guarantee that millions more people read it.

And yet, here we are.

Palantir Technologies, the infamous surveillance and data analytics giant chaired by Peter Thiel, has filed a lawsuit against Republik, a small Swiss online magazine, over a pair of investigative articles published in December. The articles, produced in collaboration with the investigative collective WAV, detailed a years-long, multi-ministry charm offensive by Palantir to sell its software to Swiss federal authorities. The campaign was, by all accounts, a comprehensive failure. Swiss agencies rejected Palantir at least nine times, with concerns ranging from data sovereignty to reputational risk to the simple fact that nobody needed the product.

The reporting was based on documents obtained through 59 freedom of information requests filed with Swiss federal agencies. The key finding was an internal Swiss Armed Forces report that concluded Palantir’s software posed unacceptable risks because sensitive military data could potentially be accessed by U.S. government intelligence agencies. As the Republik article details:

Advertisement

The authors of the report state that using Palantir’s software would increase dependence on a U.S. provider. It also poses the risk of losing data sovereignty and thereby national sovereignty.

Above all, however, the army’s staff experts say it remains unclear who has access to data shared with Palantir. The following sentence from the Swiss Army report is particularly relevant: “Palantir is a U.S.-based company, which means there is a possibility that sensitive data could be accessed by the US government and intelligence services.”

As if it’s any sort of surprise that European governments are wary of betting on US tech companies with close ties to the US government. It’s not like reports of US spies co-opting US tech companies for surveillance efforts haven’t been front page news over the past twenty years. And now, this administration—with its willingness to antagonize everyone in Europe, and its close ties to Palantir and Thiel? It’s no freaking wonder that the Swiss government was like “yo, maybe pass.”

So how does a sophisticated data intelligence company respond to well-sourced investigative journalism based on official government documents?

By suing the journalists, of course.

Advertisement

But here’s the thing that makes this even more absurd: Palantir isn’t even claiming the articles are false. The company isn’t suing for defamation. It isn’t seeking damages. Instead, it’s invoking a Swiss “right of reply” statute, alleging that Republik didn’t give the company a sufficient opportunity to respond. Palantir wants the court to force the magazine to publish lengthy counter-statements to each article.

According to the FT:

Palantir’s lawsuit, filed in January, is not seeking damages or making libel claims against Republik, but instead alleges that the company was not given sufficient right to reply under Swiss media law. The company objects to Republik’s presentation of the public documents and believes its right to reply has been wrongfully denied.

….

Republik’s managing director Katharina Hemmer said Palantir had wanted the magazine to publish a very lengthy counterstatement to each article. Republik believed the proposed statements did not fairly address or rebut the reporting, she said, adding that the magazine stands by its reporting.

Advertisement

To which I say: good. Because Palantir’s demand here is absurd. Oh boo-fucking-hoo, the big defense contractor didn’t like the coverage? Pull on your big boy pants and get over it. Switzerland’s right of reply law exists so people can correct factual errors, not so corporations can force publications to run PR copy because they didn’t like the tone of accurate, document-based reporting.

And it’s worth noting: Palantir has already used other avenues to respond. The company published a blog post complaining that the Republik article “paints a false and misleading picture” and “hinders important discussions about the modernization of European software.” They’ve got the platform. If Palantir wants to push back on the story, they have many methods of doing so. Hell, they can do so on X any time they want—on what Musk and company like to call the global town square for free speech.

But that’s apparently not enough. Instead, a multibillion-dollar American defense and intelligence contractor is hauling a small independent Swiss magazine into court, not because anything the magazine published was wrong, but because Palantir wants to force the publication to run its talking points under legal compulsion.

Compelled speech isn’t free speech, guys. And this is nothing more than a blatant intimidation campaign to frighten away reporters from reporting the truth about Palantir.

Advertisement

The European Federation of Journalists has called this exactly what it is: a SLAPP suit—a strategic lawsuit against public participation, designed to use the weight and cost of litigation to intimidate and punish journalists for doing their jobs.

“The investigation conducted by WAV and Republik into Palantir is largely based on official documents that journalists were able to access thanks to Swiss freedom of information law,” notes EFJ President Maja Sever. “The legal action brought by this powerful multinational firm against a small Swiss media start-up is, in our view, an attempt at intimidation aimed at discouraging any critical analysis of Palantir’s activities.”

And in case you didn’t catch the irony: the Swiss military rejected Palantir in part because of fears about a heavy-handed American entity with uncomfortably close ties to U.S. intelligence. Palantir’s response to the reporting of that rejection? Behave like a heavy-handed American entity trying to bully a small foreign publication into submission. If anyone at Palantir had run this decision through their own pattern-recognition software, you’d hope a few red flags would have popped up.

Meanwhile, the lawsuit has done exactly what anyone with a passing familiarity with the Streisand Effect could have predicted. The original Republik articles were about the Swiss government politely but firmly declining Palantir’s advances—an embarrassing but relatively contained story.

Now, thanks to the lawsuit, the story has gone international. The Financial Times is covering it. The European Federation of Journalists is covering it. A UK member of parliament has already cited the Republik investigation during a debate on British defense contracts with Palantir, using the story to suggest that the British government “pivot away” from Palantir.

Advertisement

The Republik investigation itself is genuinely worth reading, and not just because Palantir desperately doesn’t want you to.

It paints a picture of a company that spent seven years working every angle to get Swiss federal agencies to buy its products—approaching the Federal Chancellery during COVID, pitching the Federal Office of Public Health on contact tracing, presenting anti-money laundering software to financial regulators, making repeated runs at the military—and getting turned away at every door. Sometimes embarrassingly, such as the Federal Statistical Office director apparently just ignoring Palantir’s outreach entirely.

For a company that brags about its ability to “optimize the kill chain” and whose CEO once told investors that “Palantir is here to disrupt… and, when it’s necessary, to scare our enemies and occasionally kill them,” getting politely rejected by the Swiss statistical office has to sting a little.

But suing the journalists who reported on it? When the entire basis of your lawsuit is “we want you to publish our talking points” rather than “anything you published was wrong,” it makes pretty clear you don’t actually have a substantive response to the reporting. If Palantir thinks the picture is false, the remedy is to demonstrate that the documents are wrong—not to drag a small magazine through expensive litigation until it capitulates or goes broke.

Advertisement

Seriously, how fucking fragile are the egos in the Palantir executive suite that they can’t handle a bit of mildly embarrassing reporting? Grow up.

A Zurich court is expected to rule on the case in March. Whatever the outcome, Palantir has already lost the only contest that matters: the one for public perception. For a company that sells the ability to see around corners, they apparently never thought to search “The Streisand Effect.”

Filed Under: chilling effects, free speech, journalism, right to reply, swiss government, switzerland

Companies: palantir, republik

Advertisement

Source link

Continue Reading

Tech

Skullcandy Crusher PLYR 720 review: a thumping gaming headset with an equally hard-hitting price tag

Published

on

Why you can trust TechRadar


We spend hours testing every product or service we review, so you can be sure you’re buying the best. Find out more about how we test.

Skullcandy Crusher PLYR 720: two-minute review

The Skullcandy Crusher PLYR 720 is an open-back headset with a bass-heavy sound designed to impart as much impact as possible when playing games.

For a gaming headset, the Crusher PLYR 720 has quite a muted appearance; even the RGB lighting is restrained. In fact, the most prominent feature is the sheer bulk of the drivers, which are hard to ignore and aren’t exactly flattering when cupped over your ears.

Advertisement

Source link

Advertisement
Continue Reading

Tech

NASA Is Making Big Changes to Speed Up the Artemis Program

Published

on

“This is just not the right pathway forward,” Isaacman said.

A senior NASA official, speaking on background to Ars, noted that the space agency has experienced hydrogen and helium leaks during both the Artemis I and Artemis II prelaunch preparations, and these problems have led to monthslong delays in launch.

“If I recall, the timing between Apollo 7 and 8 was nine weeks,” the official said. “Launching SLS every three and a half years or so is not a recipe for success. Certainly, making each one of them a work of art with some major configuration change is also not helpful in the process, and we’re clearly seeing the results of it, right?”

The goal therefore is to standardize the SLS rocket into a single configuration in order to make the rocket as reliable as possible, and launching as frequently as every 10 months. NASA will fly the SLS vehicle until there are commercial alternatives to launch crews to the moon, perhaps through Artemis V as Congress has mandated, or perhaps even a little longer.

Advertisement

Is Everyone on Board?

The NASA official said all of the agency’s key contractors are on board with the change, and senior leaders in Congress have been briefed on the proposed changes.

The biggest opposition to these proposals would seemingly come from Boeing, which is the prime contractor for the Exploration Upper Stage, a contract worth billions of dollars to develop a more powerful rocket that was due to launch for the first time later this decade. However, in a NASA news release, Boeing appeared to offer at least some support for the revised plans.

“Boeing is a proud partner to the Artemis mission and our team is honored to contribute to NASA’s vision for American space leadership,” said Steve Parker, Boeing Defense, Space & Security president and CEO, in the news release. “The SLS core stage remains the world’s most powerful rocket stage, and the only one that can carry American astronauts directly to the moon and beyond in a single launch. As NASA lays out an accelerated launch schedule, our workforce and supply chain are prepared to meet the increased production needs.”

Solid Reasons for Changing Artemis III

NASA’s new approach to Artemis reflects a return to the philosophy of the Apollo program. During the late 1960s, the space agency flew a series of preparatory crewed missions before the Apollo 11 lunar landing. These included Apollo 7 (a low-Earth-orbit test of the Apollo spacecraft), Apollo 8 (a lunar orbiting mission), Apollo 9 (a low-Earth-orbit rendezvous with the lunar lander), and Apollo 10 (a test of the lunar lander descending to the moon, without touching down).

Advertisement

With its previous Artemis template, NASA skipped the steps taken by Apollo 7, 9, and 10. In the view of many industry officials, this leap from Artemis II—a crewed lunar flyby of the moon testing only the SLS rocket and Orion spacecraft—to Artemis III and a full-on lunar landing was enormous and risky.

Image may contain Adult Person Astronaut Face Head Clothing Coat and Jacket

The Artemis II crew rehearse a walkout from the Neil A. Armstrong Operations and Checkout Building at NASA’s Kennedy Space Center.Photograph: Joe Raedle/Getty Images

Source link

Continue Reading

Trending

Copyright © 2025